Tag #using
13251 papers:
- PADL-2020-BrikX #pipes and filters
- Diagnosing Data Pipeline Failures Using Action Languages: A Progress Report (AB, JX), pp. 73–81.
- PADL-2020-ChanC #distance #edit distance #flexibility #graph #programming #set
- Flexible Graph Matching and Graph Edit Distance Using Answer Set Programming (SCC, JC), pp. 20–36.
- PADL-2020-ShakerinG #induction #mining
- Whitebox Induction of Default Rules Using High-Utility Itemset Mining (FS, GG), pp. 168–176.
- POPL-2020-AnSMS #relational #synthesis
- Augmented example-based synthesis using relational perturbation properties (SA, RS, SM, RS), p. 24.
- ASPLOS-2020-HildebrandKTLA #automation #integer #linear #memory management #named #programming
- AutoTM: Automatic Tensor Movement in Heterogeneous Memory Systems using Integer Linear Programming (MH, JK, ST, JLP, VA), pp. 875–890.
- ASPLOS-2020-LimN #hardware #optimisation #performance
- Optimizing Nested Virtualization Performance Using Direct Virtual Hardware (JTL, JN), pp. 557–574.
- ASPLOS-2020-Mathur0 #linear
- Atomicity Checking in Linear Time using Vector Clocks (UM, MV0), pp. 183–199.
- ASPLOS-2020-YangGLSPNBCHRKH #named #scheduling
- Interstellar: Using Halide's Scheduling Language to Analyze DNN Accelerators (XY, MG, QL, JS, JP, AN, SB, KC, HH, PR, CK, MH), pp. 369–383.
- CC-2020-FegadeW #analysis #data type #modelling #pointer #scalability #semantics
- Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
- CC-2020-PuriniBCB #analysis #image #pipes and filters #smt
- Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
- CGO-2020-JavanmardAKPCH #algorithm #compilation #divide and conquer #multi #parametricity #programming #recursion
- Deriving parametric multi-way recursive divide-and-conquer dynamic programming algorithms using polyhedral compilers (MMJ, ZA, MK, LNP, RC, RJH), pp. 317–329.
- CGO-2020-ShobakiKM #approach #combinator #gpu #optimisation
- Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
- EDM-2019-ArthursSKP #modelling
- Grades are not Normal: Improving Exam Score Models Using the Logit-Normal Distribution (NA, BS, SK, CP).
- EDM-2019-BanjadeR #logic #probability #student #tutorial
- Assessing Student Response in Tutorial Dialogue Context using Probabilistic Soft Logic (RB, VR).
- EDM-2019-GruverMCPSP #modelling
- Using Latent Variable Models to Observe Academic Pathways (NG, AM, BC, CP, MLS, AP).
- EDM-2019-GuoB #analysis #collaboration #detection
- Collaboration Analysis Using Object Detection (ZG, RB).
- EDM-2019-HarrakBL #approach #categorisation #hybrid #student
- Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
- EDM-2019-HicksCL #analysis #process #student
- Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
- EDM-2019-HowlinD #approach #behaviour #clustering #detection #fuzzy #student
- Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
- EDM-2019-HuangBS #collaboration #identification #machine learning
- Identifying Collaborative Learning States Using Unsupervised Machine Learning on Eye-Tracking, Physiological and Motion Sensor Data (KH, TB, BS).
- EDM-2019-Ikeda #analysis #education #learning #quality
- Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
- EDM-2019-JayaramanGG #identification #machine learning #student
- Supporting Minority Student Success by using Machine Learning to Identify At-Risk Students (JDJ, SG, JG).
- EDM-2019-JeonSBLR #online #process #student
- Time-series Insights into the Process of Passing or Failing Online University Courses using Neural-Induced Interpretable Student States (BJ, ES, LB, JL, CPR).
- EDM-2019-MalekianBKBN #analysis #process #student
- Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
- EDM-2019-NguyenWSM #component #comprehension #game studies #learning #modelling
- Using Knowledge Component Modeling to Increase Domain Understanding in a Digital Learning Game (HN, YW, JCS, BMM).
- EDM-2019-RamirezYCRS #learning #student #towards
- Toward Instrumenting Makerspaces: Using Motion Sensors to Capture Students' Affective States in Open-Ended Learning Environments (LR, WY, EC, IR, BS).
- EDM-2019-Reddick #algorithm #learning
- Using a Glicko-based Algorithm to Measure In-Course Learning (RR).
- EDM-2019-Sher #learning #mobile
- Anatomy of mobile learners: Using learning analytics to unveil learning in presence of mobile devices (VS).
- EDM-2019-Unal #composition #modelling #performance #student
- Modeling Student Performance and Disengagement Using Decomposition of Response Time Data (DSU).
- EDM-2019-WampflerKSSG #mobile #predict #smarttech
- Affective State Prediction in a Mobile Setting using Wearable Biometric Sensors and Stylus (RW, SK, BS, VRS, MG0).
- EDM-2019-WeitekampHMRK #learning #predict #student #towards
- Toward Near Zero-Parameter Prediction Using a Computational Model of Student Learning (DWI, EH, CJM, NR, KRK).
- EDM-2019-YahyaMO #data mining #education #effectiveness #mining #novel #source code
- A Novel Use of Educational Data Mining to Inform Effective Management of Academic Programs (AAY, FAM, AO).
- EDM-2019-Yeung #learning #named
- Deep-IRT: Make Deep Learning Based Knowledge Tracing Explainable Using Item Response Theory (CKY).
- EDM-2019-ZaidiCDMBR #learning #modelling #student
- Accurate Modelling of Language Learning Tasks and Students Using Representations of Grammatical Proficiency (AHZ, AC, CD, RM, PB, AR).
- ICPC-2019-AlrubayeM0 #detection #information retrieval #java #library #migration #on the
- On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
- ICPC-2019-FontanaP #debugging #sequence #visualisation
- Visualizing sequences of debugging sessions using swarm debugging (EAF, FP), pp. 139–143.
- ICPC-2019-FucciGNQL #comprehension #lightweight #replication
- A replication study on code comprehension and expertise using lightweight biometric sensors (DF, DG, NN, LQ, FL), pp. 311–322.
- ICPC-2019-KuangG0M0ME #analysis #feedback #traceability
- Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
- ICPC-2019-MizouchiSII #adaptation #detection #named #online
- PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
- ICSME-2019-AungHS #interactive #traceability #visualisation
- Interactive Traceability Links Visualization using Hierarchical Trace Map (TWWA, HH, YS), pp. 367–369.
- ICSME-2019-PalacioMMBPS #identification #learning #network
- Learning to Identify Security-Related Issues Using Convolutional Neural Networks (DNP, DM, KM, CBC, DP, CS), pp. 140–144.
- ICSME-2019-ShimariI0I #debugging #execution #java
- Near-Omniscient Debugging for Java Using Size-Limited Execution Trace (KS, TI, TK0, KI), pp. 398–401.
- MSR-2019-DamPN0GGKK #fault #lessons learnt #predict
- Lessons learned from using a deep tree-based model for software defect prediction in practice (HKD, TP, SWN, TT0, JCG, AG, TK, CJK), pp. 46–57.
- MSR-2019-EfstathiouS #identifier #modelling #semantics #source code
- Semantic source code models using identifier embeddings (VE, DS), pp. 29–33.
- MSR-2019-KiehnPC #classification #empirical #version control
- Empirical study in using version histories for change risk classification (MK, XP, FC), pp. 58–62.
- MSR-2019-LiuLZFDQ #commit #generative #network
- Generating commit messages from diffs using pointer-generator network (QL, ZL, HZ, HF, BD, YQ), pp. 299–309.
- SANER-2019-KirinukiTN #named #recommendation #testing #web
- COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application (HK, HT, KN), pp. 310–320.
- SANER-2019-MuscedereHAADG #analysis #detection #lightweight
- Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
- SANER-2019-SunBBS #documentation #mining #specification
- Mining Specifications from Documentation using a Crowd (PS, CB, IB, KTS), pp. 275–286.
- SANER-2019-VerhaegheEASDDD #case study #industrial #migration #user interface
- GUI Migration using MDE from GWT to Angular 6: An Industrial Case (BV, AE, NA, AS, LD, SD, MD), pp. 579–583.
- SANER-2019-ZhangLML #approach #effectiveness #fault #named #network
- CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
- SCAM-2019-HendersonPK #automation #fault #locality #markov #process
- Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
- SCAM-2019-MasudC #towards
- Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
- SCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language
- An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
- SCAM-2019-PerumaMDN #commit #refactoring
- Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
- FM-2019-BardBD #fault #smt
- Formally Verified Roundoff Errors Using SMT-based Certificates and Subdivisions (JB, HB, ED), pp. 38–44.
- FM-2019-GomesB19a #csp #model checking #named
- Circus2CSP: A Tool for Model-Checking Circus Using FDR (AOG, AB), pp. 235–242.
- FM-2019-SilveiraJVJ #formal method #implementation #specification
- Formal Methods Applicability on Space Applications Specification and Implementation Using MORA-TSP (DS, AJ, MV, TJ), pp. 727–737.
- IFM-2019-BenesBGPS #algebra #constraints #parametricity #synthesis
- Accelerating Parameter Synthesis Using Semi-algebraic Constraints (NB, LB, MG, SP, DS), pp. 27–45.
- IFM-2019-BruckerW #certification #ontology
- Using Ontologies in Formal Developments Targeting Certification (ADB, BW), pp. 65–82.
- IFM-2019-LutebergetCJ #automation #optimisation #satisfiability
- Automated Drawing of Railway Schematics Using Numerical Optimization in SAT (BL, KC, CJ), pp. 341–359.
- SEFM-2019-BeckertBGHLU #relational #slicing #verification
- Using Relational Verification for Program Slicing (BB, TB, SG, MH, DL, MU), pp. 353–372.
- SEFM-2019-FarrellBFDDYM #analysis #case study #verification
- Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
- ICFP-2019-HameerP #automation #case study #education #experience #functional #programming
- Teaching the art of functional programming using automated grading (experience report) (AH, BP), p. 15.
- AIIDE-2019-BehroozRJ #matter #quality #word
- Story Quality as a Matter of Perception: Using Word Embeddings to Estimate Cognitive Interest (MB, JR, AJ), pp. 3–9.
- AIIDE-2019-Sanghrajka #authoring #interactive #modelling
- Interactive Narrative Authoring Using Cognitive Models in Narrative Planning (RS), pp. 224–226.
- AIIDE-2019-Shirvani #towards
- Towards More Believable Characters Using Personality and Emotion (AS), pp. 230–232.
- CHI-PLAY-2019-SchertlerKW #analysis #game studies #semantics
- User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
- CoG-2019-Aitchison #experience
- Optimal Use of Experience in First Person Shooter Environments (MA), pp. 1–4.
- CoG-2019-ChangAS #assurance #automation #named #quality #testing
- Reveal-More: Amplifying Human Effort in Quality Assurance Testing Using Automated Exploration (KC, BA, AMS), pp. 1–8.
- CoG-2019-ChristiansenGW #bias #game studies
- Resolving Simultaneity Bias: Using Features to Estimate Causal Effects in Competitive Games (AHC, EG, BSW), pp. 1–8.
- CoG-2019-Eidelberg0D #game studies #performance
- Using Active Probing by a Game Management AI to Faster Classify Players (AE, CJ0, JD), pp. 1–8.
- CoG-2019-FendtA #education #game studies #learning #student
- Using Learning Games to Teach Texas Civil War History to Public Middle School Students (MWF, EA), pp. 1–4.
- CoG-2019-IshiiITH #game studies #generative
- A Fighting Game AI Using Highlight Cues for Generation of Entertaining Gameplay (RI, SI, RT, TH), pp. 1–6.
- CoG-2019-JooK #game studies #how #learning #question #visualisation
- Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
- CoG-2019-JoppenSF #approximate #game studies
- Ordinal Bucketing for Game Trees using Dynamic Quantile Approximation (TJ, TS, JF), pp. 1–8.
- CoG-2019-KatonaSHDBDW #learning #predict
- Time to Die: Death Prediction in Dota 2 using Deep Learning (AK, RJS, VJH, SD, FB, AD, JAW), pp. 1–8.
- CoG-2019-KimLLHK #algorithm #automation #game studies #generative #graph
- Automatic Generation of Game Content using a Graph-based Wave Function Collapse Algorithm (HK, SL, HL, TH, SK), pp. 1–4.
- CoG-2019-KusanoLPTH #game studies
- Motion Gaming AI using Time Series Forecasting and Dynamic Difficulty Adjustment (TK, YL, PP, RT, TH), pp. 1–6.
- CoG-2019-Lanzi #complexity
- Evaluating the Complexity of Players' Strategies using MCTS Iterations (PLL), pp. 1–8.
- CoG-2019-LipinskiSRA #generative #graph #incremental
- Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees (BvRL, SS, JR, DA), pp. 1–7.
- CoG-2019-LiuR0S #heuristic #performance
- Using Restart Heuristics to Improve Agent Performance in Angry Birds (TL, JR, PZ0, MS), pp. 1–8.
- CoG-2019-MassoudBBGP #behaviour #game studies #profiling
- Eco-driving Profiling and Behavioral Shifts Using IoT Vehicular Sensors Combined with Serious Games (RM, FB, RB, ADG, SP), pp. 1–8.
- CoG-2019-NamI #game studies #generative #learning
- Generation of Diverse Stages in Turn-Based Role-Playing Game using Reinforcement Learning (SN, KI), pp. 1–8.
- CoG-2019-NygrenD #case study #concept #game studies #self
- Using Simple Games to Evaluate Self-Organization Concepts: a Whack-a-mole Case Study (NN, JD), pp. 1–8.
- CoG-2019-SarkarC #game studies
- Inferring and Comparing Game Difficulty Curves using Player-vs-Level Match Data (AS, SC), pp. 1–4.
- CoG-2019-SpickCW #generative #learning
- Procedural Generation using Spatial GANs for Region-Specific Learning of Elevation Data (RJS, PC, JAW), pp. 1–8.
- FDG-2019-GandhiH #generative #modelling #probability #visual notation
- Guided open story generation using probabilistic graphical models (SG, BH), p. 7.
- FDG-2019-JemmaliKBARE #concept #design #game studies #learning #programming
- Using game design mechanics as metaphors to enhance learning of introductory programming concepts (CJ, EK, SB, MVA, ER, MSEN), p. 5.
- FDG-2019-LiGH #game studies #generative #multi #video
- End-to-end let's play commentary generation using multi-modal video representations (CL0, SG, BH), p. 7.
- FDG-2019-LiuLLMHSWCGLDT #automation #generative
- Automatic generation of tower defense levels using PCG (SCL, CL, YL, HM, XH, YS, LW, ZC, XG, HL, YD, QT), p. 9.
- FDG-2019-LuoGR #network #parsing #video
- Making CNNs for video parsing accessible: event extraction from DOTA2 gameplay video using transfer, zero-shot, and network pruning (ZL, MG, MR), p. 10.
- FDG-2019-MacCormickZ #development #game studies #named #programming #visual notation
- SuBViS: the use of subjunctive visual programming environments for exploring alternatives in game development (DM, LZ), p. 11.
- FDG-2019-OuelletteBC #analysis #comprehension #design #education #game studies
- Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
- FDG-2019-SarkarC #array #rating
- Using rating arrays to estimate score distributions for player-versus-level matchmaking (AS, SC), p. 8.
- VS-Games-2019-BakalosRDDPV #identification #network
- Choreographic Pose Identification using Convolutional Neural Networks (NB, IR, ND, AD, EP, AV), pp. 1–7.
- VS-Games-2019-Gabriel #concept #design #game studies
- We Make Games. Using Serious Game Design Concepts in Secondary School (SG), pp. 1–4.
- VS-Games-2019-HeinzS #design #evaluation #heuristic #simulation
- Addressing Spatio-Temporal Geogame Relocation Issues Using Design Evaluation Heuristics and Agent-based Simulation (TH0, CS), pp. 1–4.
- VS-Games-2019-KharvariH #3d #architecture #artificial reality #game studies #visualisation
- The Role of Serious Gaming using Virtual Reality Applications for 3D Architectural Visualization (FK, WH), pp. 1–2.
- VS-Games-2019-KicoL #comparison
- Comparison of Trajectories and Quaternions of Folk Dance Movements Using Dynamic Time Warping (IK, FL), pp. 1–4.
- CIKM-2019-ChristmannRASW #graph
- Look before you Hop: Conversational Question Answering over Knowledge Graphs Using Judicious Context Expansion (PC, RSR, AA, JS, GW), pp. 729–738.
- CIKM-2019-DuongRN #multi #sketching #streaming
- Sketching Streaming Histogram Elements using Multiple Weighted Factors (QHD, HR, KN), pp. 19–28.
- CIKM-2019-GongZ00XWH #community #detection #developer #learning #online
- Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
- CIKM-2019-HanMNKURNS #detection #image #learning
- Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
- CIKM-2019-IslamMR #graph #named #network #predict #social
- NActSeer: Predicting User Actions in Social Network using Graph Augmented Neural Network (MRI, SM, NR), pp. 1793–1802.
- CIKM-2019-JungLPP #framework #named
- PRIVATA: Differentially Private Data Market Framework using Negotiation-based Pricing Mechanism (KJ, JL, KP, SP), pp. 2897–2900.
- CIKM-2019-KangPKCC #modelling #recommendation #topic
- Recommender System Using Sequential and Global Preference via Attention Mechanism and Topic Modeling (KK, JP, WK, HC, JC), pp. 1543–1552.
- CIKM-2019-LinPLO #network #recognition
- An Explainable Deep Fusion Network for Affect Recognition Using Physiological Signals (JL, SP, CSL, SLO), pp. 2069–2072.
- CIKM-2019-LinWXLB #estimation #hybrid #network
- Path Travel Time Estimation using Attribute-related Hybrid Trajectories Network (XL, YW, XX, ZL, SSB), pp. 1973–1982.
- CIKM-2019-YangWCW #graph #network #predict
- Using External Knowledge for Financial Event Prediction Based on Graph Neural Networks (YY, ZW, QC, LW), pp. 2161–2164.
- CIKM-2019-YanLWLWZG #classification #image #multi #random
- Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples (WY, RL, JW, YL, JW, PZ, XG), pp. 1131–1140.
- CIKM-2019-ZhangL
- Interpretable MTL from Heterogeneous Domains using Boosted Tree (YLZ, LL), pp. 2053–2056.
- ECIR-p1-2019-BalikasDMAA #learning #semantics
- Learning Lexical-Semantic Relations Using Intuitive Cognitive Links (GB, GD, RM, HA, MRA), pp. 3–18.
- ECIR-p1-2019-DavilaJSGZ #graph #image #named
- Tangent-V: Math Formula Image Search Using Line-of-Sight Graphs (KD, RJ, SS, VG, RZ), pp. 681–695.
- ECIR-p1-2019-GlavasV #bidirectional #retrieval
- Zero-Shot Language Transfer for Cross-Lingual Sentence Retrieval Using Bidirectional Attention Model (GG, IV), pp. 523–538.
- ECIR-p1-2019-JeawakJS #modelling
- Embedding Geographic Locations for Modelling the Natural Environment Using Flickr Tags and Structured Data (SSJ, CBJ, SS), pp. 51–66.
- ECIR-p1-2019-NguyenV
- End-to-End Neural Relation Extraction Using Deep Biaffine Attention (DQN, KV), pp. 729–738.
- ECIR-p1-2019-ZhongZ #similarity
- Structural Similarity Search for Formulas Using Leaf-Root Paths in Operator Subtrees (WZ, RZ), pp. 116–129.
- ECIR-p2-2019-AkbariCBOSW #modelling #process
- Modeling User Return Time Using Inhomogeneous Poisson Process (MA, AC, SB, ADO, MS, JW0), pp. 37–44.
- ECIR-p2-2019-Ghosh #information retrieval
- Exploring Result Presentation in Conversational IR Using a Wizard-of-Oz Study (SG), pp. 327–331.
- ECIR-p2-2019-ImaniVMS19a #network #query #word
- Deep Neural Networks for Query Expansion Using Word Embeddings (AI, AV, AM, AS), pp. 203–210.
- ECIR-p2-2019-PritsosRS #distance #identification #nearest neighbour #web
- Open-Set Web Genre Identification Using Distributional Features and Nearest Neighbors Distance Ratio (DAP, AR0, ES), pp. 3–11.
- ICML-2019-ChangMG #metric #scheduling
- Dynamic Measurement Scheduling for Event Forecasting using Deep RL (CHC, MM, AG), pp. 951–960.
- ICML-2019-DaoGERR #algorithm #learning #linear #performance
- Learning Fast Algorithms for Linear Transforms Using Butterfly Factorizations (TD, AG, ME, AR, CR), pp. 1517–1527.
- ICML-2019-ElfekiCRE #learning #named #process
- GDPP: Learning Diverse Generations using Determinantal Point Processes (ME, CC, MR, ME), pp. 1774–1783.
- ICML-2019-GordalizaBGL
- Obtaining Fairness using Optimal Transport Theory (PG, EdB, FG, JML), pp. 2357–2365.
- ICML-2019-HendrycksLM #nondeterminism #robust
- Using Pre-Training Can Improve Model Robustness and Uncertainty (DH, KL, MM), pp. 2712–2721.
- ICML-2019-HollandI #robust
- Better generalization with less data using robust gradient descent (MJH, KI), pp. 2761–2770.
- ICML-2019-HuntBLH #policy
- Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
- ICML-2019-MendisRAC #estimation #named #network #performance #throughput
- Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks (CM, AR, SPA, MC), pp. 4505–4515.
- ICML-2019-Ravi #modelling #performance
- Efficient On-Device Models using Neural Projections (SR), pp. 5370–5379.
- ICML-2019-ThulasidasanBBC #learning
- Combating Label Noise in Deep Learning using Abstention (ST, TB, JAB, GC, JMY), pp. 6234–6243.
- ICML-2019-TranKSK #named #network
- DeepNose: Using artificial neural networks to represent the space of odorants (NBT, DRK, SS, AAK), pp. 6305–6314.
- ICML-2019-TrippeHAB #approximate #named #rank
- LR-GLM: High-Dimensional Bayesian Inference Using Low-Rank Data Approximations (BLT, JHH, RA, TB), pp. 6315–6324.
- ICML-2019-WangDWK #learning #logic #named #reasoning #satisfiability
- SATNet: Bridging deep learning and logical reasoning using a differentiable satisfiability solver (PWW, PLD, BW, JZK), pp. 6545–6554.
- ICML-2019-X #bound #named #policy #predict
- POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
- ICML-2019-YangW #parametricity
- Sample-Optimal Parametric Q-Learning Using Linearly Additive Features (LY, MW), pp. 6995–7004.
- ICML-2019-ZanetteB #bound #learning #problem
- Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
- ICML-2019-ZhaoHDSZ #network
- Improving Neural Network Quantization without Retraining using Outlier Channel Splitting (RZ, YH, JD, CDS, ZZ), pp. 7543–7552.
- KDD-2019-ChenLPS #predict #twitter
- Using Twitter to Predict When Vulnerabilities will be Exploited (HC0, RL, NP, VSS), pp. 3143–3152.
- KDD-2019-ChenSJ0Z0 #behaviour #effectiveness #performance #recommendation #reuse
- Effective and Efficient Reuse of Past Travel Behavior for Route Recommendation (LC, SS, CSJ, BY0, ZZ, LS0), pp. 488–498.
- KDD-2019-DeshpandeS #adaptation #modelling #streaming
- Streaming Adaptation of Deep Forecasting Models using Adaptive Recurrent Units (PD, SS), pp. 1560–1568.
- KDD-2019-GuoHJZW0 #behaviour #multi #network #predict #realtime
- Buying or Browsing?: Predicting Real-time Purchasing Intent using Attention-based Deep Network with Multiple Behavior (LG, LH, RJ, BZ, XW, BC0), pp. 1984–1992.
- KDD-2019-KillianWSCDT #learning
- Learning to Prescribe Interventions for Tuberculosis Patients Using Digital Adherence Data (JAK, BW, AS, VC, BD, MT), pp. 2430–2438.
- KDD-2019-KitadaIS #effectiveness #multi #network #predict
- Conversion Prediction Using Multi-task Conditional Attention Networks to Support the Creation of Effective Ad Creatives (SK, HI, YS), pp. 2069–2077.
- KDD-2019-LeeIFSM #approach #data-driven #estimation #named
- DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
- KDD-2019-MarxV
- Identifiability of Cause and Effect using Regularized Regression (AM, JV), pp. 852–861.
- KDD-2019-MonathZSMA #clustering
- Gradient-based Hierarchical Clustering using Continuous Representations of Trees in Hyperbolic Space (NM, MZ, DS, AM, AA), pp. 714–722.
- KDD-2019-OhI #detection #learning
- Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
- KDD-2019-PanLW00Z #learning #predict
- Urban Traffic Prediction from Spatio-Temporal Data Using Deep Meta Learning (ZP, YL, WW, YY0, YZ0, JZ), pp. 1720–1730.
- KDD-2019-ParkKDZF #graph #network
- Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks (NP, AK, XLD, TZ, CF), pp. 596–606.
- KDD-2019-RawatLY #learning #multi
- Naranjo Question Answering using End-to-End Multi-task Learning Model (BPSR, FL, HY0), pp. 2547–2555.
- KDD-2019-SchonD0 #fault #how #predict
- The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
- KDD-2019-SchulzeMRLB #identification
- Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (JPS, AM, ER, HAL, KB), pp. 2059–2068.
- KDD-2019-SheehanMTUJBLE #development #predict #wiki
- Predicting Economic Development using Geolocated Wikipedia Articles (ES, CM, MT, BU, NJ, MB, DBL, SE), pp. 2698–2706.
- KDD-2019-ShenVAAHN #learning #monitoring #smarttech
- Ambulatory Atrial Fibrillation Monitoring Using Wearable Photoplethysmography with Deep Learning (YS, MV, AA, AA, AYH, AYN), pp. 1909–1916.
- KDD-2019-SiciliaPG #named
- DeepHoops: Evaluating Micro-Actions in Basketball Using Deep Feature Representations of Spatio-Temporal Data (AS, KP, KG), pp. 2096–2104.
- KDD-2019-TariqLSLJCW #detection #multi #probability
- Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
- KDD-2019-WangZTWX #named #network
- AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks (JW, YZ0, KT, JW, ZX), pp. 1900–1908.
- KDD-2019-WuYZXZPXA #graph #kernel #random #scalability
- Scalable Global Alignment Graph Kernel Using Random Features: From Node Embedding to Graph Embedding (LW, IEHY, ZZ0, KX, LZ0, XP0, YX, CCA), pp. 1418–1428.
- KDD-2019-YabeTSSU #behaviour #predict #web
- Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior (TY, KT, TS, YS, SVU), pp. 2707–2717.
- KDD-2019-ZhengXKWMAY #linear #predict
- Glaucoma Progression Prediction Using Retinal Thickness via Latent Space Linear Regression (YZ, LX, TK, JW0, HM, RA, KY), pp. 2278–2286.
- KDD-2019-ZhouMGBB #comprehension #network
- Understanding Consumer Journey using Attention based Recurrent Neural Networks (YZ, SM, JG, TB, NB), pp. 3102–3111.
- BX-2019-Tullsen #encoding
- ASN.1 Encoding Schemes Done Right Using CMPCT (MT), pp. 1–15.
- MoDELS-2019-BencomoP #learning #modelling #named #ram #runtime
- RaM: Causally-Connected and Requirements-Aware Runtime Models using Bayesian Learning (NB, LHGP), pp. 216–226.
- MoDELS-2019-TorreSSBAG #case study #experience #modelling
- Using Models to Enable Compliance Checking Against the GDPR: An Experience Report (DT, GS, MS, LCB, YA, PG), pp. 1–11.
- OOPSLA-2019-ChenWFBD #learning #relational #verification
- Relational verification using reinforcement learning (JC, JW, YF, OB, ID), p. 30.
- OOPSLA-2019-GoelV #design #implementation #lazy evaluation #on the
- On the design, implementation, and use of laziness in R (AG, JV), p. 27.
- OOPSLA-2019-KrikavaMV #scala #scalability
- Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild (FK, HM, JV), p. 28.
- PADL-2019-AriasC #composition #evaluation #incremental #logic programming
- Incremental Evaluation of Lattice-Based Aggregates in Logic Programming Using Modular TCLP (JA, MC), pp. 98–114.
- PADL-2019-KahramanE #personalisation #programming #set
- Personalized Course Schedule Planning Using Answer Set Programming (MKK, EE0), pp. 37–45.
- PLDI-2019-0001R #database #learning #modelling
- Using active learning to synthesize models of applications that access databases (JS0, MCR), pp. 269–285.
- PLDI-2019-DhulipalaBS #graph #streaming
- Low-latency graph streaming using compressed purely-functional trees (LD, GEB, JS), pp. 918–934.
- PLDI-2019-HeoRSN #difference #reasoning #source code
- Continuously reasoning about programs using differential Bayesian inference (KH, MR, XS, MN), pp. 561–575.
- PLDI-2019-LeZN #dynamic analysis #invariant #logic #named
- SLING: using dynamic analysis to infer program invariants in separation logic (TCL, GZ, TN), pp. 788–801.
- POPL-2019-BaeL #bound #logic #model checking
- Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
- POPL-2019-CastroHJNY #api #communication #distributed #parametricity #programming #static typing
- Distributed programming using role-parametric session types in go: statically-typed endpoint APIs for dynamically-instantiated communication structures (DCP, RH, SSJ, NN, NY), p. 30.
- POPL-2019-SkorstengaardDB #control flow #encapsulation #linear #named #stack
- StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities (LS, DD, LB), p. 28.
- POPL-2019-SpathAB #analysis #automaton #data flow
- Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
- SAS-2019-DelmasM #abstract interpretation #analysis
- Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
- ASE-2019-Balasubramaniam #machine learning #representation #towards
- Towards Comprehensible Representation of Controllers using Machine Learning (GB), pp. 1283–1285.
- ASE-2019-ChenSHWL #behaviour #case study #experience #generative #testing
- An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour (JC, WS, AEH, YW, JL), pp. 669–681.
- ASE-2019-KimC #embedded #model checking
- Model Checking Embedded Control Software using OS-in-the-Loop CEGAR (DK, YC), pp. 565–576.
- ASE-2019-MehraSKP #artificial reality #named #towards
- XRaSE: Towards Virtually Tangible Software using Augmented Reality (RM, VSS, VK, SP), pp. 1194–1197.
- ASE-2019-NafiKRRS #api #clone detection #detection #documentation #named
- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
- ASE-2019-Ramamoorthy #game studies #multi
- User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications (KMKR), pp. 1265–1267.
- ASE-2019-Sharma #adaptation #automation #source code #synthesis
- Automatically Repairing Binary Programs Using Adapter Synthesis (VS), pp. 1238–1241.
- ASE-2019-ZhengFXS0HMLSC #automation #game studies #learning #named #online #testing
- Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning (YZ, CF, XX, TS, LM0, JH, ZM, YL0, RS, YC), pp. 772–784.
- ESEC-FSE-2019-BarashFJRTZ #feature model #interactive #ml #requirements
- Bridging the gap between ML solutions and their business requirements using feature interactions (GB, EF, IJ, OR, RTB, MZ), pp. 1048–1058.
- ESEC-FSE-2019-Cetin #developer #graph #identification #traceability
- Identifying the most valuable developers using artifact traceability graphs (HAC), pp. 1196–1198.
- ESEC-FSE-2019-Correia #industrial #testing
- An industrial application of test selection using test suite diagnosability (DC), pp. 1214–1216.
- ESEC-FSE-2019-CorreiaASN #multi #named #testing
- MOTSD: a multi-objective test selection tool using test suite diagnosability (DC, RA, PS, JN), pp. 1070–1074.
- ESEC-FSE-2019-Denkers #case study #domain-specific language #industrial
- A longitudinal field study on creation and use of domain-specific languages in industry (JD), pp. 1152–1155.
- ESEC-FSE-2019-FucciMM #api #documentation #identification #machine learning #on the
- On using machine learning to identify knowledge in API reference documentation (DF, AM, WM), pp. 109–119.
- ESEC-FSE-2019-LiewCDS #constraints #float #fuzzing
- Just fuzz it: solving floating-point constraints using coverage-guided fuzzing (DL, CC, AFD, JRS), pp. 521–532.
- ESEC-FSE-2019-NguyenSCMBL #as a service #multitenancy
- Using microservices for non-intrusive customization of multi-tenant SaaS (PHN, HS, FC, RM, SB, EL), pp. 905–915.
- ESEC-FSE-2019-Radavelli #modelling #testing
- Using software testing to repair models (MR), pp. 1253–1255.
- ESEC-FSE-2019-SangleM #on the #open source #python
- On the use of lambda expressions in 760 open source Python projects (SS, SM), pp. 1232–1234.
- ESEC-FSE-2019-Sulun #graph #traceability
- Suggesting reviewers of software artifacts using traceability graphs (ES), pp. 1250–1252.
- ICSE-2019-FanLLWNZL #analysis #android #graph #learning
- Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
- ICSE-2019-HuangLKSHLW #data type
- Distilling neural representations of data structure manipulation using fMRI and fNIRS (YH0, XL, RK, TS, XH, KL, WW), pp. 396–407.
- ICSE-2019-KimFY #learning #testing
- Guiding deep learning system testing using surprise adequacy (JK, RF, SY), pp. 1039–1049.
- ICSE-2019-ZhangHMBLU #ltl #named #source code
- AutoTap: synthesizing and repairing trigger-action programs using LTL properties (LZ, WH, JM, NB, SL, BU), pp. 281–291.
- GPCE-2019-Dimovski #abstract domain #diagrams #static analysis
- Lifted static analysis using a binary decision diagram abstract domain (ASD), pp. 102–114.
- ASPLOS-2019-KondguliH #hardware #named #performance #smt #thread
- Bootstrapping: Using SMT Hardware to Improve Single-Thread Performance (SK, MH), pp. 687–700.
- ASPLOS-2019-RenZYLXQLW #co-evolution #design #framework #multi #named
- ADMM-NN: An Algorithm-Hardware Co-Design Framework of DNNs Using Alternating Direction Methods of Multipliers (AR, TZ, SY, JL, WX, XQ, XL, YW), pp. 925–938.
- ASPLOS-2019-WuSCL #pointer
- Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
- CASE-2019-AndersonlPL #estimation #mobile #recursion
- Mobile Robotic Radiation Surveying Using Recursive Bayesian Estimation (RBA, MP, SL), pp. 1187–1192.
- CASE-2019-AshouriNSG #predict
- Day-ahead Prediction of Building Occupancy using WiFi Signals (AA, GRN, ZS, HBG), pp. 1237–1242.
- CASE-2019-AyoobiCVV #learning
- Handling Unforeseen Failures Using Argumentation-Based Learning (HA, MC0, RV, BV), pp. 1699–1704.
- CASE-2019-BiedigerMB #artificial reality
- Investigating the survivability of drone swarms with flocking and swarming flight patterns using Virtual Reality (DB, AM, ATB), pp. 1718–1723.
- CASE-2019-ChangLH #coordination #detection #network #realtime
- Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
- CASE-2019-ChengT #flexibility #tool support
- Control of a mechatronics-assisted system for surgeries using flexible tools (LC, MT), pp. 1768–1773.
- CASE-2019-ChenLVR #machine learning #process
- Strip Snap Analytics in Cold Rolling Process Using Machine Learning (ZC, YL, AVM, FR), pp. 368–373.
- CASE-2019-DasSAP #estimation #interactive #physics
- Joint Torque Estimation using Base Force-Torque Sensor to Facilitate Physical Human-Robot Interaction (pHRI) (SKD, MNS, SA, DOP), pp. 1367–1372.
- CASE-2019-DuHD #identification #physics
- Model Identification and Physical Exercise Control using Nonlinear Heart Rate Model and Particle Filter (DD, ZH, YD), pp. 405–410.
- CASE-2019-FarooquiF #learning #modelling #synthesis
- Synthesis of Supervisors for Unknown Plant Models Using Active Learning (AF, MF), pp. 502–508.
- CASE-2019-FujitaDKRKSHAFA #multi
- Bin-picking Robot using a Multi-gripper Switching Strategy based on Object Sparseness (MF, YD, RK, GAGR, KK, KS, RH, RA, HF, SA, MH, AJC, AN, HO, TO), pp. 1540–1547.
- CASE-2019-HagelskjaerSKB #constraints #estimation #industrial #performance #precise
- Using spatial constraints for fast set-up of precise pose estimation in an industrial setting (FH, TRS, NK, AGB), pp. 1308–1314.
- CASE-2019-HekmatnejadPF #scheduling #smt
- Task Scheduling with Nonlinear Costs using SMT Solvers (MH, GP, GF), pp. 183–188.
- CASE-2019-HoangPDZH #configuration management #multi
- Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO (VTH, MDP, THD, QZ, QPH), pp. 1670–1675.
- CASE-2019-HongCL #learning #locality #mobile #realtime
- Real-time Visual-Based Localization for Mobile Robot Using Structured-View Deep Learning (YFH, YMC, CHGL), pp. 1353–1358.
- CASE-2019-HuML #petri net
- Active Diagnosis of Petri Nets Using Q-Diagnoser (YH, ZM, ZL), pp. 203–208.
- CASE-2019-ImamM #metric #modelling
- Thermal Modeling of Indoor Spaces using Illumination Measurement as a Surrogate for Solar Heat Gain (MHTI, SM), pp. 1093–1098.
- CASE-2019-JoshiLBB
- Motion-planning Using RRTs for a Swarm of Robots Controlled by Global Inputs (PJ, JL, DB, ATB), pp. 1163–1168.
- CASE-2019-KazmiNVRC #detection #learning #recognition
- Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
- CASE-2019-KumarAS #array #monitoring
- Speed and Separation Monitoring using On-Robot Time-of-Flight Laser-ranging Sensor Arrays (SK, SA, FS), pp. 1684–1691.
- CASE-2019-LaiL #detection #learning
- Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
- CASE-2019-LiGZYWSZ #detection #fault
- Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
- CASE-2019-LiuZHZWW #estimation #learning #network
- sEMG-Based Continuous Estimation of Knee Joint Angle Using Deep Learning with Convolutional Neural Network (GL, LZ, BH, TZ, ZW, PW), pp. 140–145.
- CASE-2019-LuoLLWG #multi #optimisation #problem #scheduling
- Green Job Shop Scheduling Problem with Machine at Different Speeds using a multi-objective grey wolf optimization algorithm* (YL, CL, XL, LW, LG0), pp. 573–578.
- CASE-2019-MackensenKRS #automation #energy #smarttech
- Energy autonomous automation of Smart Home applications using the example of a wireless Indoor Smart Gardening system (EM, JK, AR, AS), pp. 1087–1092.
- CASE-2019-MerktIYV #towards
- Towards Shared Autonomy Applications using Whole-body Control Formulations of Locomanipulation (WM, VI, YY, SV), pp. 1206–1211.
- CASE-2019-NguyenLLGL #network #self
- Visual-Guided Robot Arm Using Self-Supervised Deep Convolutional Neural Networks (VTN, CL, CHGL, SMG, JJJL), pp. 1415–1420.
- CASE-2019-NiuLNLW #detection #fault #generative #named #network
- DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
- CASE-2019-PangXHP #modelling #multi #optimisation
- optimizing outpatient Department Staffing Level using Multi-Fidelity Models (BP, XX, BH, YP), pp. 715–720.
- CASE-2019-PirehgalinTOV #analysis #automation #image #video #visual notation
- Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
- CASE-2019-PitschlP #adaptation #maintenance #mobile #persistent #reasoning
- Obstacle Persistent Adaptive Map Maintenance for Autonomous Mobile Robots using Spatio-temporal Reasoning (MLP, MWP), pp. 1023–1028.
- CASE-2019-RobinsonSP #heuristic #visual notation
- Bin-Picking using Model-Free Visual Heuristics and Grasp-Constrained Imaging (CR, MNS, DOP), pp. 1618–1624.
- CASE-2019-RoselliHRFA #equivalence #on the
- On the Use of Equivalence Classes for Optimal and Sub-Optimal Bin Covering (SFR, FH, SR, MF, KÅ), pp. 1004–1009.
- CASE-2019-RoyMN #adaptation #visual notation
- Dynamic Eye-in-Hand Visual Servoing using Adaptive Backstepping with a Supervisory Feature Jacobian (PLGR, CJBM, JN), pp. 1131–1137.
- CASE-2019-SchulerS #analysis #automation #modelling #process #towards
- Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
- CASE-2019-SharabianiBGND #algorithm #kernel #polynomial
- A Computer-Aided System for Determining the Application Range of a Warfarin Clinical Dosing Algorithm Using Support Vector Machines with a Polynomial Kernel Function (AS, AB, WLG, RN, HD), pp. 418–423.
- CASE-2019-SunLY #detection #network
- Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
- CASE-2019-ThonnessenSFCK #quickcheck #safety #testing
- Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
- CASE-2019-WangJRH #image #realtime #scalability
- Real-time control for large scale additive manufacturing using thermal images (FW, FJ, KR, NH), pp. 36–41.
- CASE-2019-WannerS #flexibility #polynomial #programming
- Tool-center-point control of a flexible link concrete pump with hydraulic limitations using quadratic programming (JW, OS), pp. 561–566.
- CASE-2019-WarsewaBRST #design #distributed #scalability
- Decentralized and Distributed Observer Design for Large-Scale Structures using Dynamic Condensation (AW, MB, PR, OS, CT), pp. 1256–1262.
- CASE-2019-XiaoH0HZ #detection #fault
- Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
- CASE-2019-ZhangLWGG #fault #learning #network
- Fault Diagnosis Using Unsupervised Transfer Learning Based on Adversarial Network (ZZ, XL, LW, LG0, YG), pp. 305–310.
- CGO-2019-KimK #generative #hardware
- Translating CUDA to OpenCL for Hardware Generation using Neural Machine Translation (YK, HK), pp. 285–286.
- CGO-2019-KruppeOS0 #lightweight
- Extending LLVM for Lightweight SPMD Vectorization: Using SIMD and Vector Instructions Easily from Any Language (RK, JO, LS, AK0), pp. 278–279.
- CGO-2019-SunBSB #graph #reasoning
- Reasoning about the Node.js Event Loop using Async Graphs (HS, DB, FS, WB), pp. 61–72.
- CAV-2019-DavisHK #fault #formal method #multi #protocol #proving
- When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
- CAV-2019-ElfarWP #game studies #synthesis
- Security-Aware Synthesis Using Delayed-Action Games (ME, YW0, MP), pp. 180–199.
- CAV-2019-LiuWL #source code #verification
- Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (PL, TW, AL), pp. 386–404.
- CAV-2019-LiuZWYLLYZ #algorithm #hoare #logic #quantum #verification
- Formal Verification of Quantum Algorithms Using Quantum Hoare Logic (JL, BZ, SW, SY, TL, YL, MY, NZ), pp. 187–207.
- ICST-2019-CoppikSS #fuzzing #memory management #named
- MemFuzz: Using Memory Accesses to Guide Fuzzing (NC, OS, NS), pp. 48–58.
- ICST-2019-HellhakeSW #black box #data flow #distributed #integration #test coverage #testing
- Using Data Flow-Based Coverage Criteria for Black-Box Integration Testing of Distributed Software Systems (DH, TS, SW0), pp. 420–429.
- ICST-2019-LeeHYKKY #integration #network #static analysis
- Classifying False Positive Static Checker Alarms in Continuous Integration Using Convolutional Neural Networks (SL, SH, JY, TK, CJK, SY), pp. 391–401.
- ICST-2019-PatersonCAKFM #empirical #fault #predict #testing
- An Empirical Study on the Use of Defect Prediction for Test Case Prioritization (DP, JC, RA, GMK, GF, PM), pp. 346–357.
- ICST-2019-Radavelli #modelling #testing
- Using Testing to Repair Models (MR), pp. 489–491.
- ICTSS-2019-BombardaBGRDL #consistency #generative #protocol #refinement #state machine #testing
- Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
- ICTSS-2019-BozicW #testing
- Testing Chatbots Using Metamorphic Relations (JB, FW), pp. 41–55.
- ICTSS-2019-Huerta-GuevaraA19a #adaptation #named #performance #testing
- DYNAMOJM: A JMeter Tool for Performance Testing Using Dynamic Workload Adaptation (OHG, VAR, LM0, AOPD), pp. 234–241.
- TAP-2019-CavalcantiBHL #csp #testing
- Testing Robots Using CSP (AC, JB, RMH, RL), pp. 21–38.
- VMCAI-2019-AndreFMS #abstraction #algorithm #industrial #model checking #parametricity #verification
- Verification of an Industrial Asynchronous Leader Election Algorithm Using Abstractions and Parametric Model Checking (ÉA, LF, JMM, RS), pp. 409–424.
- VMCAI-2019-BallabrigaFGLR #memory management #static analysis
- Static Analysis of Binary Code with Memory Indirections Using Polyhedra (CB, JF, LG, GL, JR), pp. 114–135.
- VMCAI-2019-DeckerP #ltl #model checking #quantifier
- Flat Model Checking for Counting LTL Using Quantifier-Free Presburger Arithmetic (ND, AP), pp. 513–534.
- VMCAI-2019-NguyenTC #automation #program repair #verification
- Automatic Program Repair Using Formal Verification and Expression Templates (TTN, QTT, WNC), pp. 70–91.
- ECSA-2018-ChangS #as a service #mobile
- Providing Context as a Service Using Service-Oriented Mobile Indie Fog and Opportunistic Computing (CC, SNS), pp. 219–235.
- ECSA-2018-SchneiderBK #information management #quality #trade-off
- Using Informal Knowledge for Improving Software Quality Trade-Off Decisions (YS, AB, AK), pp. 265–283.
- ICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #privacy #simulation
- Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
- JCDL-2018-AlonsoKT #evolution #how #social
- How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
- JCDL-2018-KobayashiS0 #distributed #recommendation #representation
- Citation Recommendation Using Distributed Representation of Discourse Facets in Scientific Articles (YK, MS, YM0), pp. 243–251.
- JCDL-2018-MaiGS #learning #performance #semantics
- Using Deep Learning for Title-Based Semantic Subject Indexing to Reach Competitive Performance to Full-Text (FM, LG, AS), pp. 169–178.
- JCDL-2018-PoziMBJK #editing
- Preserving Author Editing History Using Blockchain Technology (MSMP, GM, AAB, AJ, YK), pp. 165–168.
- EDM-2018-BotelhoBOH #detection
- Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
- EDM-2018-CookOKD #approach #authentication #education
- An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
- EDM-2018-EstebanGR #algorithm #approach #hybrid #multi #recommendation #search-based #student
- A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
- EDM-2018-HalpernTWGPDG
- Knowledge Tracing Using the Brain (DH, ST, HYW, CG, POP, LD, TMG).
- EDM-2018-HoernleGGPR #interactive #markov #modelling #simulation #student
- Modeling the Effects of Students' Interactions with Immersive Simulations using Markov Switching Systems (NH, YG, BJG, PP, AR).
- EDM-2018-MittalNSDDK #knowledge base #multi
- Using a Common Sense Knowledge Base to Auto Generate Multi-Dimensional Vocabulary Assessments (RSM, SN, MS, UD, PD, RK).
- EDM-2018-NandaHWDG #comprehension #modelling #online #topic
- Understanding Learners' Opinion about Participation Certificates in Online Courses using Topic Modeling (GN, NMH, DRW, KAD, DG).
- EDM-2018-NguyenL #modelling #student
- Using Student Logs to Build Bayesian Models of Student Knowledge and Skills (HN, CWL).
- EDM-2018-ReillyRS #collaboration #learning #multi
- Exploring Collaboration Using Motion Sensors and Multi-Modal Learning Analytics (JMR, MR, BS).
- EDM-2018-SalesBPH #big data #testing
- Using Big Data to Sharpen Design-Based Inference in A/B Tests (AS, AB, TP, NTH).
- ICPC-2018-OttAHBAFL #learning #network #programming language
- Learning lexical features of programming languages from imagery using convolutional neural networks (JO, AA, PH, NB, HA, CF, EL), pp. 336–339.
- ICPC-2018-TakahashiSHS #case study #debugging #locality #smell
- A preliminary study on using code smells to improve bug localization (AT, NSL, SH, MS), pp. 324–327.
- ICSME-2018-Alsolai #maintenance #object-oriented #predict
- Predicting Software Maintainability in Object-Oriented Systems Using Ensemble Techniques (HA), pp. 716–721.
- ICSME-2018-FrickG0P #difference #generative
- Generating Accurate and Compact Edit Scripts Using Tree Differencing (VF, TG, FB0, MP0), pp. 264–274.
- ICSME-2018-IshioMSI #detection #distance #normalisation
- Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
- ICSME-2018-PalombaZL #automation #detection #information retrieval #smell
- Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
- ICSME-2018-RahmanR #code search #crowdsourcing #data analysis #effectiveness #query
- Effective Reformulation of Query for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), pp. 473–484.
- ICSME-2018-RahmanR18a #api #code search #crowdsourcing #data analysis #named #query
- NLP2API: Query Reformulation for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), p. 714.
- ICSME-2018-SchlieSS #analysis #matlab #matrix #modelling #multi
- Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
- MSR-2018-AfzalG #case study #debugging #ide
- A study on the use of IDE features for debugging (AA, CLG), pp. 114–117.
- MSR-2018-CiborowskaKD #behaviour #detection #developer #reuse #web
- Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
- MSR-2018-LamotheS08 #android #api #automation #case study #experience #migration
- Exploring the use of automated API migrating techniques in practice: an experience report on Android (ML, WS), pp. 503–514.
- MSR-2018-MoslehiAR #feature model
- Feature location using crowd-based screencasts (PM, BA, JR), pp. 192–202.
- MSR-2018-RabbaniHSGM #fault #ide #interactive #replication #visual notation
- Revisiting “programmers' build errors” in the visual studio context: a replication study using IDE interaction traces (NR, MSH, SS, KG, SM), pp. 98–101.
- MSR-2018-WilkieHKLNRPK #developer #ide #identification
- Who's this?: developer identification using IDE event data (JW, ZAH, AK, JL, GN, CR, MP, JK), pp. 90–93.
- SANER-2018-KatzRS #decompiler #network
- Using recurrent neural networks for decompilation (DSK, JR, ES), pp. 346–356.
- SANER-2018-LeemansAB18a #analysis #mining #process #scalability #statechart
- The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
- SANER-2018-NucciPTSL #detection #machine learning #question #smell
- Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
- SANER-2018-SantosCPHA #detection #fault #modelling #syntax
- Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
- SANER-2018-SotoG #debugging #predict #probability
- Using a probabilistic model to predict bug fixes (MS, CLG), pp. 221–231.
- SCAM-2018-IslamIMRRS #detection #research #transitive
- [Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
- SCAM-2018-JiangCZPP0 #code search #research #semantics
- [Research Paper] Semantics-Based Code Search Using Input/Output Examples (RJ, ZC, ZZ, YP0, MP, TZ0), pp. 92–102.
- SCAM-2018-MostaeenSRRS #automation #design #machine learning #research #tool support #towards #validation
- [Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools (GM, JS, BR, CKR, KAS), pp. 155–164.
- SCAM-2018-MuylaertR #commit #research #slicing
- [Research Paper] Untangling Composite Commits Using Program Slicing (WM, CDR), pp. 193–202.
- SCAM-2018-NafiRRS #api #detection #documentation #research #similarity
- [Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
- SCAM-2018-PaceTG #architecture #predict #research #smell #towards
- [Research Paper] Towards Anticipation of Architectural Smells Using Link Prediction Techniques (JADP, AT, DG), pp. 62–71.
- CIAA-2018-NozakiHYS #automaton #finite
- Enumeration of Cryptarithms Using Deterministic Finite Automata (YN, DH, RY, AS), pp. 286–298.
- FM-2018-0001BFLMR #automaton #energy #nondeterminism #robust #synthesis
- Optimal and Robust Controller Synthesis - Using Energy Timed Automata with Uncertainty (GB0, PB, UF, KGL, NM, PAR), pp. 203–221.
- FM-2018-AkazakiLYDH #cyber-physical #learning
- Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning (TA, SL, YY, YD, JH), pp. 456–465.
- FM-2018-Boralv #automation #design #proving
- Interlocking Design Automation Using Prover Trident (AB), pp. 653–656.
- FM-2018-GeislerH #development #distributed #model checking
- Stepwise Development and Model Checking of a Distributed Interlocking System - Using RAISE (SG, AEH), pp. 277–293.
- IFM-2018-DoughertyGR #analysis #protocol #security #smt
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
- IFM-2018-GlabbeekHW
- Analysing AWN-Specifications Using mCRL2 (Extended Abstract) (RJvG, PH, DvdW), pp. 398–418.
- IFM-2018-KangMH #constraints #probability #verification
- Probabilistic Verification of Timing Constraints in Automotive Systems Using UPPAAL-SMC (EYK0, DM, LH), pp. 236–254.
- IFM-2018-KornerLM #model checking #state of the art
- State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin (PK, ML, JM), pp. 275–295.
- IFM-2018-SchmidtKL #formal method #generative #modelling #synthesis
- Repair and Generation of Formal Models Using Synthesis (JS, SK, ML), pp. 346–366.
- SEFM-2018-BabaeeGF #framework #learning #predict #runtime #statistics #verification
- Prevent : A Predictive Run-Time Verification Framework Using Statistical Learning (RB, AG, SF), pp. 205–220.
- SEFM-2018-DinSC #exception #verification
- Program Verification for Exception Handling on Active Objects Using Futures (CCD, RS, TCC), pp. 73–88.
- SEFM-2018-DuboisGPC #interactive #protocol #proving #theorem proving
- Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
- SEFM-2018-GolraDSSG #requirements #specification
- Bridging the Gap Between Informal Requirements and Formal Specifications Using Model Federation (FRG, FD, JS, IS, SG), pp. 54–69.
- ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #how
- Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
- ICFP-2018-StampoulisC #functional #higher-order #learning #logic programming #prolog #prototype
- Prototyping a functional language using higher-order logic programming: a functional pearl on learning the ways of λProlog/Makam (AS, AC), p. 30.
- AIIDE-2018-MathewsonM #game studies #named
- Improbotics: Exploring the Imitation Game Using Machine Intelligence in Improvised Theatre (KWM, PM), pp. 59–66.
- CHI-PLAY-2018-ByrneMM #case study #experience #game studies
- AR Fighter: Using HMDs to create Vertigo Play Experiences (RB, JM, F'M), pp. 45–57.
- CHI-PLAY-2018-FrommelFR0 #self
- Emotion-based Dynamic Difficulty Adjustment Using Parameterized Difficulty and Self-Reports of Emotion (JF, FF, KR, MW0), pp. 163–171.
- CHI-PLAY-2018-VellaPKPMJ #case study #game studies
- Using Applied Games to Engage mHealth Users: A Case Study of MindMax (KV, NP, MK, BP, JM, DJ0), pp. 511–522.
- CIG-2018-GlavinM #experience #learning
- Skilled Experience Catalogue: A Skill-Balancing Mechanism for Non-Player Characters using Reinforcement Learning (FGG, MGM), pp. 1–8.
- CIG-2018-Guerrero-Romero #algorithm #design #game studies #testing
- Using a Team of General AI Algorithms to Assist Game Design and Testing (CGR, SML, DPL), pp. 1–8.
- CIG-2018-KaravolosLY #automation #design
- Using a Surrogate Model of Gameplay for Automated Level Design (DK, AL, GNY), pp. 1–8.
- CIG-2018-KosmidesDAKOL #game studies #named
- InLife: Combining Real Life with Serious Games using IoT (PK, KPD, EFA, NK, YO, VDL), pp. 1–7.
- CIG-2018-StreckW #animation #markov
- Using Discrete Time Markov Chains for Control of Idle Character Animation (AS, TW), pp. 1–4.
- CIG-2018-TziortziotiMMVC #education #game studies #internet #process
- Scenarios for Educational and Game Activities using Internet of Things Data (CT, IM, GM, AV, IC), pp. 1–8.
- FDG-2018-PlumbKS #clustering #game studies #hybrid #multi #network #online
- Hybrid network clusters using common gameplay for massively multiplayer online games (JNP, SKK, RS), p. 10.
- FDG-2018-SiljebratAP #towards
- Towards human-like artificial intelligence using StarCraft 2 (HS, CA, AP), p. 4.
- FDG-2018-SmithPV #generative #graph #programming #set
- Graph-based generation of action-adventure dungeon levels using answer set programming (TS0, JAP, AV), p. 10.
- VS-Games-2018-BardisKSVD #evolution #image
- Image Warping Using WebGL for a Smart Avatar Animating Body Weight Evolution (GB, YK, NS, AV, ND), pp. 1–4.
- VS-Games-2018-LewisAMCKBDM #game studies #mobile
- Balance Trucks: Using Crowd-Sourced Data to Procedurally-Generate Gameplay within Mobile Games (MRL, SA, LM, SC, LCK, AB, SD, AM), pp. 1–4.
- VS-Games-2018-Lim #case study #protocol
- Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
- VS-Games-2018-MunozVCMH #artificial reality #coordination #diagrams
- Dynamic Systems Theory in Human Movement Exploring Coordination Patterns by Angle-Angle Diagrams Using Kinect (JEMC, JFV, SC, MFM, ÓAH), pp. 1–4.
- VS-Games-2018-OberdorferL #game studies
- Effectivity of Affine Transformation Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
- VS-Games-2018-OberdorferL18a #encoding #game studies
- Gamified Knowledge Encoding: Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–2.
- VS-Games-2018-OberdorferL18b #effectiveness #game studies
- Effective Orbital Mechanics Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
- VS-Games-2018-OhmotoTN #comprehension
- Improving Context Understanding Using Avatar's Affective Expressions Reflecting Operator's Mental States (YO, ST, TN), pp. 1–4.
- VS-Games-2018-RallisLGVDD #analysis #artificial reality #game studies #learning #visualisation
- An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
- VS-Games-2018-Ramic-Brkic #education #game studies
- Enhancing Progressive Education through the Use of Serious Games (BRB), pp. 1–4.
- VS-Games-2018-WuGHL #3d #data fusion #multi #robust #towards
- Towards Robust 3D Skeleton Tracking Using Data Fusion from Multiple Depth Sensors (YW, LG, SH, RWL), pp. 1–4.
- CIKM-2018-AdigaCKMRRS #modelling #network #probability #query
- Inferring Probabilistic Contagion Models Over Networks Using Active Queries (AA, VCM, CJK, MVM, SSR, DJR, RES), pp. 377–386.
- CIKM-2018-ANR #algorithm #generative #higher-order #scalability
- A Scalable Algorithm for Higher-order Features Generation using MinHash (PA, NN, RR), pp. 1213–1222.
- CIKM-2018-CirsteaMMG0 #correlation #multi #network
- Correlated Time Series Forecasting using Multi-Task Deep Neural Networks (RGC, DVM, GMM, CG, BY0), pp. 1527–1530.
- CIKM-2018-DeutchGM #detection #privacy
- Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
- CIKM-2018-GeDJNW #personalisation
- Personalizing Search Results Using Hierarchical RNN with Query-aware Attention (SG, ZD, ZJ, JYN, JRW), pp. 347–356.
- CIKM-2018-GeZZCLYHLSLYHZZ #behaviour #image #matter #modelling #visual notation
- Image Matters: Visually Modeling User Behaviors Using Advanced Model Server (TG, LZ, GZ, KC, SL, HY, ZH, BL, PS, HL, PY, SH, ZZ, XZ, YZ, KG), pp. 2087–2095.
- CIKM-2018-HashemiWKZC #query #user satisfaction
- Measuring User Satisfaction on Smart Speaker Intelligent Assistants Using Intent Sensitive Query Embeddings (SHH, KW, AEK, IZ, PAC), pp. 1183–1192.
- CIKM-2018-Kieu0GJ
- Distinguishing Trajectories from Different Drivers using Incompletely Labeled Trajectories (TK, BY0, CG, CSJ), pp. 863–872.
- CIKM-2018-KweeCPL #lifecycle #mining #named #visualisation
- Traffic-Cascade: Mining and Visualizing Lifecycles of Traffic Congestion Events Using Public Bus Trajectories (ATK, MFC, PKP, EPL), pp. 1955–1958.
- CIKM-2018-LinmansVK #detection #robust #scalability #semantics #web
- Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
- CIKM-2018-PandeyKS #learning #recommendation
- Recommending Serendipitous Items using Transfer Learning (GP0, DK, AS), pp. 1771–1774.
- CIKM-2018-PatidarAVS #automation #modelling
- Automatic Conversational Helpdesk Solution using Seq2Seq and Slot-filling Models (MP, PA, LV, GMS), pp. 1967–1975.
- CIKM-2018-PrasojoKN #fine-grained #information management #named #semantics
- StuffIE: Semantic Tagging of Unlabeled Facets Using Fine-Grained Information Extraction (REP, MK, WN), pp. 467–476.
- CIKM-2018-RoleMN #algorithm #clustering #evaluation #word
- Unsupervised Evaluation of Text Co-clustering Algorithms Using Neural Word Embeddings (FR, SM, MN), pp. 1827–1830.
- CIKM-2018-RoyGBBM #how #information retrieval #normalisation #performance #word
- Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
- CIKM-2018-ShangSSLGKLY0
- Investigating Rumor News Using Agreement-Aware Search (JS, JS, TS, XL, AG, FK, ÁDL, CY0, JH0), pp. 2117–2125.
- CIKM-2018-ShenYZPZ #parallel
- Parallel Hashing Using Representative Points in Hyperoctants (CS, MY, CZ, YP, GZ), pp. 813–822.
- CIKM-2018-SyedRN #named #rdf #validation
- FactCheck: Validating RDF Triples Using Textual Evidence (ZHS, MR, ACNN), pp. 1599–1602.
- CIKM-2018-Voorhees #on the #reuse
- On Building Fair and Reusable Test Collections using Bandit Techniques (EMV), pp. 407–416.
- CIKM-2018-ZhangNCC #database #parallel #probability #scalability
- Scalable Entity Resolution Using Probabilistic Signatures on Parallel Databases (YZ, KSN, TC, PC), pp. 2213–2221.
- ECIR-2018-BalikasLRA #distance #documentation #retrieval
- Cross-Lingual Document Retrieval Using Regularized Wasserstein Distance (GB, CL, IR, MRA), pp. 398–410.
- ECIR-2018-DeySK #detection #topic #twitter
- Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
- ECIR-2018-Jalan0V #classification #learning
- Medical Forum Question Classification Using Deep Learning (RSJ, MG0, VV), pp. 45–58.
- ECIR-2018-McDonaldMO18a #overview #predict #towards
- Towards Maximising Openness in Digital Sensitivity Review Using Reviewing Time Predictions (GM, CM, IO), pp. 699–706.
- ECIR-2018-SinghM #recommendation #symmetry
- Benefits of Using Symmetric Loss in Recommender Systems (GS, SM), pp. 345–356.
- ECIR-2018-Zhang0LZ #analysis #matrix #representation #sentiment #twitter
- Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
- ICML-2018-0001JCCJ #robust
- Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training (XW0, UJ, JC, LC, SJ), pp. 5330–5338.
- ICML-2018-AghazadehSLDSB #feature model #named #scalability #sketching
- MISSION: Ultra Large-Scale Feature Selection using Count-Sketches (AA, RS, DL, GD, AS, RGB), pp. 80–88.
- ICML-2018-ArenzZN #performance #policy
- Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
- ICML-2018-BajajGHHL #clustering #named
- SMAC: Simultaneous Mapping and Clustering Using Spectral Decompositions (CB, TG, ZH, QH, ZL), pp. 334–343.
- ICML-2018-BangS #generative #network
- Improved Training of Generative Adversarial Networks using Representative Features (DB, HS), pp. 442–451.
- ICML-2018-BansalAB #agile #design
- Using Inherent Structures to design Lean 2-layer RBMs (AB, AA, CB), pp. 452–460.
- ICML-2018-BarretoBQSSHMZM #learning #policy
- Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
- ICML-2018-ChenLW #learning #scalability
- Scalable Bilinear Learning Using State and Action Features (YC, LL0, MW), pp. 833–842.
- ICML-2018-DaiZGW #network
- Compressing Neural Networks using the Variational Information Bottleneck (BD, CZ, BG, DPW), pp. 1143–1152.
- ICML-2018-DharGE #generative #modelling
- Modeling Sparse Deviations for Compressed Sensing using Generative Models (MD, AG, SE), pp. 1222–1231.
- ICML-2018-FengWCS #learning #multi #network #parametricity
- Nonparametric variable importance using an augmented neural network with multi-task learning (JF, BDW, MC, NS), pp. 1495–1504.
- ICML-2018-GaninKBEV #image #learning #source code
- Synthesizing Programs for Images using Reinforced Adversarial Learning (YG, TK, IB, SMAE, OV), pp. 1652–1661.
- ICML-2018-HuangA0S #learning
- Learning Deep ResNet Blocks Sequentially using Boosting Theory (FH, JTA, JL0, RES), pp. 2063–2072.
- ICML-2018-HuWL #analysis #probability #reduction #source code
- Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
- ICML-2018-IcarteKVM #composition #learning #specification
- Using Reward Machines for High-Level Task Specification and Decomposition in Reinforcement Learning (RTI, TQK, RAV, SAM), pp. 2112–2121.
- ICML-2018-JohnH #fourier #process #scalability
- Large-Scale Cox Process Inference using Variational Fourier Features (STJ, JH), pp. 2367–2375.
- ICML-2018-KaiserBRVPUS #modelling #performance #sequence
- Fast Decoding in Sequence Models Using Discrete Latent Variables (LK, SB, AR, AV, NP, JU, NS), pp. 2395–2404.
- ICML-2018-KalimerisSSW #learning
- Learning Diffusion using Hyperparameters (DK, YS, KS, UW), pp. 2425–2433.
- ICML-2018-KeivaniS #nearest neighbour
- Improved nearest neighbor search using auxiliary information and priority functions (OK, KS), pp. 2578–2586.
- ICML-2018-KuleshovFE #learning #nondeterminism
- Accurate Uncertainties for Deep Learning Using Calibrated Regression (VK, NF, SE), pp. 2801–2809.
- ICML-2018-RaileanuDSF #learning #modelling #multi
- Modeling Others using Oneself in Multi-Agent Reinforcement Learning (RR, ED, AS, RF), pp. 4254–4263.
- ICML-2018-SharmaNK #clique #problem #random
- Solving Partial Assignment Problems using Random Clique Complexes (CS, DN, MK), pp. 4593–4602.
- ICML-2018-Sinha #clustering #matrix #random
- K-means clustering using random matrix sparsification (KS), pp. 4691–4699.
- ICML-2018-WeissGY #automaton #network #query
- Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples (GW, YG, EY), pp. 5244–5253.
- ICML-2018-YoonJS #generative #named
- GAIN: Missing Data Imputation using Generative Adversarial Nets (JY, JJ, MvdS), pp. 5675–5684.
- ICML-2018-YoonJS18a #dataset #generative #modelling #multi #named #network #predict
- RadialGAN: Leveraging multiple datasets to improve target-specific predictive models using Generative Adversarial Networks (JY, JJ, MvdS), pp. 5685–5693.
- ICPR-2018-AbdeldayemB #automation #detection
- Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
- ICPR-2018-AfonsoPSP #classification #learning
- Improving Optimum- Path Forest Classification Using Unsupervised Manifold Learning (LCSA, DCGP, ANdS, JPP), pp. 560–565.
- ICPR-2018-AkdemirBS #locality #realtime
- Real-time Vehicle Localization and Tracking Using Monocular Panomorph Panoramic Vision (BA, ANB, LMS), pp. 2350–2355.
- ICPR-2018-AzzopardiFGSV #gender #image #recognition
- Gender recognition from face images using trainable shape and color features (GA, PF, AG, AS, MV), pp. 1983–1988.
- ICPR-2018-BeheraDDR #recognition
- Air Signature Recognition Using Deep Convolutional Neural Network-Based Sequential Model (SKB, AKD, DPD, PPR0), pp. 3525–3530.
- ICPR-2018-BhuniaBBKB0P #network
- Handwriting Trajectory Recovery using End-to-End Deep Encoder-Decoder Network (AKB, AB, AKB, AK, PB, PPR0, UP0), pp. 3639–3644.
- ICPR-2018-BhuniaBBKB0P18a #generative #image #network #word
- Word Level Font-to-Font Image Translation using Convolutional Recurrent Generative Adversarial Networks (AKB, AKB, PB, AK, AB, PPR0, UP0), pp. 3645–3650.
- ICPR-2018-BicegoLDGA #mining #modelling #topic
- Mining NMR Spectroscopy Using Topic Models (MB, PL, MD, FG, MA), pp. 3784–3789.
- ICPR-2018-CombinidoMA #approach #image #network
- A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
- ICPR-2018-CuiZZH #learning #multi #network #recognition
- Multi-source Learning for Skeleton -based Action Recognition Using Deep LSTM Networks (RC, AZ, SZ, GH0), pp. 547–552.
- ICPR-2018-CzovnyBSC #3d
- Minutia Matching using 3D Pore Clouds (RKC, ORPB, LS, HSGC), pp. 3138–3143.
- ICPR-2018-DehzangiBI #detection #multi #process
- Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
- ICPR-2018-DehzangiM #behaviour #predict
- Unobtrusive Driver Drowsiness Prediction Using Driving Behavior from Vehicular Sensors (OD, SM), pp. 3598–3603.
- ICPR-2018-DehzangiS #analysis #process #recognition #reduction #robust
- IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
- ICPR-2018-DehzangiT #detection #network #representation
- Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
- ICPR-2018-Dey0GVLP #image #learning #multi #retrieval #sketching
- Learning Cross-Modal Deep Embeddings for Multi-Object Image Retrieval using Text and Sketch (SD, AD0, SKG, EV, JL0, UP0), pp. 916–921.
- ICPR-2018-DongTC #automation #image
- Automatic Inspection of Aerospace Welds Using X-Ray Images (XD, CJT, TFC), pp. 2002–2007.
- ICPR-2018-DuanMKY #classification #image
- A New Single Image Super-resolution Method Using SIMK-based Classification and ISRM Technique (PD, AM, XK, CY), pp. 3043–3048.
- ICPR-2018-El-GamalEAGBHKE #framework
- Significant Region-Based Framework for Early Diagnosis of Alzheimer's Disease Using 11C PiB-PET Scans (FEZAEG, MME, AA, MG, GNB, HH, RK, ASEB), pp. 2989–2994.
- ICPR-2018-EskenaziGO #component #image
- Watercolor, Segmenting Images Using Connected Color Components (SE, PGK, JMO), pp. 3633–3638.
- ICPR-2018-GarciaLSH #classification #complexity #metric #recommendation
- Classifier Recommendation Using Data Complexity Measures (LPFG, ACL, MCPdS, TKH), pp. 874–879.
- ICPR-2018-GarrettR #3d #network #performance
- Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network (TG, RR), pp. 1211–1216.
- ICPR-2018-HeYLXLHS #estimation #physics
- Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise (WH, YY, YL, HX, LL0, WH, MS), pp. 3766–3771.
- ICPR-2018-HibrajVSP #clustering #set
- Speaker Clustering Using Dominant Sets (FH, SV, TS, MP), pp. 3549–3554.
- ICPR-2018-JaberiPF #clustering #probability
- Probabilistic Sparse Subspace Clustering Using Delayed Association (MJ, MP, HF), pp. 2087–2092.
- ICPR-2018-JiQYKZ #automation #image #network #segmentation
- Automatic Prostate Segmentation on MR Images Using Enhanced Holistically-Nested Networks (DJ, JQ, JY, TK, SZ), pp. 3820–3825.
- ICPR-2018-JohnKGKM #estimation
- Free Space, Visible and Missing Lane Marker Estimation using the PsiNet and Extra Trees Regression (VJ, NMK, CG, KK, SM), pp. 189–194.
- ICPR-2018-JyotiD #automation #estimation #geometry #network
- Automatic Eye Gaze Estimation using Geometric & Texture-based Networks (SJ, AD), pp. 2474–2479.
- ICPR-2018-KateFG #visual notation
- Visual Tracking with Breeding Fireflies using Brightness from Background-Foreground Information (PK, MF, PG), pp. 2570–2575.
- ICPR-2018-KawanishiMXTY #estimation
- Which Content in a Booklet is he/she Reading? Reading Content Estimation using an Indoor Surveillance Camera (YK, HM, JX, KT, HY), pp. 1731–1736.
- ICPR-2018-KilKC
- Scene text rectification using glyph and character alignment properties (THK, HIK, NIC), pp. 3663–3668.
- ICPR-2018-KimuraSDNKBI #3d #representation
- Representing a Partially Observed Non-Rigid 3D Human Using Eigen-Texture and Eigen-Deformation (RK, AS, FLD, YN, HK, AB, KI), pp. 1043–1048.
- ICPR-2018-KokakiTKHO #modelling
- Sequential Fish Catch Forecasting Using Bayesian State Space Models (YK, NT, TK, KH, TO), pp. 776–781.
- ICPR-2018-KonwerBBBB0P #generative #network
- Staff line Removal using Generative Adversarial Networks (AK, AKB, AB, AKB, PB, PPR0, UP0), pp. 1103–1108.
- ICPR-2018-KurzendorferBSB #analysis #classification #random #segmentation
- Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
- ICPR-2018-LeeLC
- Cancelable Biometrics Using Noise Embedding (DHL, SHL, NIC), pp. 3390–3395.
- ICPR-2018-LiangYLH #classification
- A Segmented Local Offset Method for Imbalanced Data Classification Using Quasi-Linear Support Vector Machine (PL, XY, WL, JH), pp. 746–751.
- ICPR-2018-LiaoCQ #image #visualisation
- Visualization of Hyperspectral Images Using Moving Least Squares (DL, SC, YQ), pp. 2851–2856.
- ICPR-2018-LiCGJH #gesture #multimodal #recognition
- Multimodal Gesture Recognition Using Densely Connected Convolution and BLSTM (DL, YC, MkG, SJ, CH), pp. 3365–3370.
- ICPR-2018-LiciottiPPFZ #network #segmentation #semantics
- Convolutional Networks for Semantic Heads Segmentation using Top-View Depth Data in Crowded Environment (DL, MP, RP, EF, PZ), pp. 1384–1389.
- ICPR-2018-LiH #algorithm #estimation #performance #robust
- Fast and Robust Pose Estimation Algorithm for Bin Picking Using Point Pair Feature (ML, KH), pp. 1604–1609.
- ICPR-2018-Liu0H #integration
- High-Quality and Memory-Efficient Volumetric Integration of Depth Maps Using Plane Priors (YL, WG0, ZH), pp. 1749–1754.
- ICPR-2018-LiuH0 #online #optimisation
- Online Temporal Calibration of Camera and IMU using Nonlinear Optimization (JL, ZH, WG0), pp. 1761–1766.
- ICPR-2018-LiW18a #detection #semantics #visual notation
- Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
- ICPR-2018-LiWK18a #framework #image #learning
- Infrared and Visible Image Fusion using a Deep Learning Framework (HL0, XJW, JK), pp. 2705–2710.
- ICPR-2018-LocBO #documentation #image #network #security
- Document Images Watermarking for Security Issue using Fully Convolutional Networks (CVL, JCB, JMO), pp. 1091–1096.
- ICPR-2018-LuoCCTTKH
- Oil Price Forecasting Using Supervised GANs with Continuous Wavelet Transform Features (ZL, JC, XJC, KT, TT, TK, SH), pp. 830–835.
- ICPR-2018-MaH #generative #network
- Perceptual Face Completion using a Local-Global Generative Adversarial Network (RM, HH0), pp. 1670–1675.
- ICPR-2018-MaierSSWSCF #learning #network #precise #towards
- Precision Learning: Towards Use of Known Operators in Neural Networks (AKM, FS, CS, TW, SS, JHC, RF), pp. 183–188.
- ICPR-2018-MaLHY #estimation #hybrid #network
- Image-based Air Pollution Estimation Using Hybrid Convolutional Neural Network (JM, KL, YH, JY), pp. 471–476.
- ICPR-2018-MerchantSKM #dataset #image
- Appearance-based data augmentation for image datasets using contrast preserving sampling (AKM, TQS, BK, RM), pp. 1235–1240.
- ICPR-2018-MohantyDG #detection #performance
- An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
- ICPR-2018-MustaniemiKSMH #detection #metric #performance
- Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
- ICPR-2018-NadeemHS #algorithm #automation #detection #image #segmentation
- An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
- ICPR-2018-NguyenTL #data-driven #learning
- Are French Really That Different? Recognizing Europeans from Faces Using Data-Driven Learning (VDN, MT, JL), pp. 2729–2734.
- ICPR-2018-PassalisT #information management #network #similarity
- Neural Network Knowledge Transfer using Unsupervised Similarity Matching (NP, AT), pp. 716–721.
- ICPR-2018-PengSCCXJ #architecture #detection #multi
- Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
- ICPR-2018-PereraAP #generative #multi #named #network
- In2I: Unsupervised Multi-Image-to-Image Translation Using Generative Adversarial Networks (PP, MA, VMP), pp. 140–146.
- ICPR-2018-RhifWF #3d #network #recognition #sequence
- Action Recognition from 3D Skeleton Sequences using Deep Networks on Lie Group Features (MR, HW, IRF), pp. 3427–3432.
- ICPR-2018-RoyT #higher-order #learning
- Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs (AR, ST), pp. 97–102.
- ICPR-2018-SadafiKHPMS #multi
- Multiple Mice Tracking: Occlusions Disentanglement using a Gaussian Mixture Model (AS, VMK, HH, FP, VM, DS), pp. 2433–2437.
- ICPR-2018-Savchenko #performance #recognition #statistics
- Efficient Statistical Face Recognition Using Trigonometric Series and CNN Features (AVS), pp. 3262–3267.
- ICPR-2018-ShibataIHM #image #set
- Restoration of Sea Surface Temperature Satellite Images Using a Partially Occluded Training Set (SS, MI, AH, MM), pp. 2771–2776.
- ICPR-2018-SuHK #analysis #classification #component #multi #performance
- Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
- ICPR-2018-SuJ #analysis #image #multi
- Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
- ICPR-2018-TayanovKS #classification #learning #predict
- Prediction-based classification using learning on Riemannian manifolds (VT, AK, CYS), pp. 591–596.
- ICPR-2018-UekiHKK #fine-grained #query #retrieval #video
- Fine-grained Video Retrieval using Query Phrases - Waseda_Meisei TRECVID 2017 AVS System - (KU, KH, KK, TK), pp. 3322–3327.
- ICPR-2018-VinayavekhinCMA #comprehension #learning #what
- Focusing on What is Relevant: Time-Series Learning and Understanding using Attention (PV, SC, AM, DJA, GDM, DK, RT), pp. 2624–2629.
- ICPR-2018-WangF #detection
- Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
- ICPR-2018-WangHJ #learning
- Focus on Scene Text Using Deep Reinforcement Learning (HW, SH, LJ), pp. 3759–3765.
- ICPR-2018-WangSH #algorithm #black box #generative
- Universal Perturbation Generation for Black-box Attack Using Evolutionary Algorithms (SW, YS, YH), pp. 1277–1282.
- ICPR-2018-WangZGW #detection #image #multi #network #parametricity
- Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
- ICPR-2018-WeiCYLL #black box #classification #image
- Explain Black-box Image Classifications Using Superpixel-based Interpretation (YW, MCC, YY, SNL, SL), pp. 1640–1645.
- ICPR-2018-Windeatt #analysis #classification #optimisation
- Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
- ICPR-2018-WitmerB #classification #image #learning #multi
- Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning (AW, BB), pp. 1408–1413.
- ICPR-2018-WuW #gesture #recognition
- Applying hand gesture recognition and joint tracking to a TV controller using CNN and Convolutional Pose Machine (YW, CMW), pp. 3086–3091.
- ICPR-2018-WuY0Y #robust
- Robust ECG Biometrics Using Two-Stage Model (BW, GY, LY0, YY), pp. 1062–1067.
- ICPR-2018-XinCCZYW #locality #recognition #visual notation
- Visual Localization in Changing Environments using Place Recognition Techniques (ZX, YC, SC, JZ0, YY, YW), pp. 1785–1790.
- ICPR-2018-XiongJXXLW #documentation #energy #estimation #image
- Historical document image binarization using background estimation and energy minimization (WX0, XJ, JX, ZX, ML, JW), pp. 3716–3721.
- ICPR-2018-XuCG #learning #modelling #multi #random
- Common Random Subgraph Modeling Using Multiple Instance Learning (TX, DKYC, IG), pp. 1205–1210.
- ICPR-2018-XuD #detection #modelling
- Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
- ICPR-2018-XuDMB #recognition
- Video-based Emotion Recognition using Aggregated Features and Spatio-temporal Information (JX, YD, LM, HB), pp. 2833–2838.
- ICPR-2018-XuZZ #image #network #recognition
- Screen-rendered text images recognition using a deep residual network based segmentation-free method (XX0, JZ, HZ), pp. 2741–2746.
- ICPR-2018-YamadaIYK #network #segmentation
- Texture Segmentation using Siamese Network and Hierarchical Region Merging (RY, HI, NY, TK), pp. 2735–2740.
- ICPR-2018-Yang0CF #analysis #canonical #correlation #detection #image
- Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
- ICPR-2018-YangZT
- Reducing Tongue Shape Dimensionality from Hundreds of Available Resources Using Autoencoder (MY, DZ, JT), pp. 2875–2880.
- ICPR-2018-YanWSLZ #image #learning #network
- Image Captioning using Adversarial Networks and Reinforcement Learning (SY, FW, JSS, WL, BZ), pp. 248–253.
- ICPR-2018-YlimakiHK #3d #re-engineering #refinement
- Accurate 3-D Reconstruction with RGB-D Cameras using Depth Map Fusion and Pose Refinement (MY, JH, JK), pp. 1977–1982.
- ICPR-2018-YuanTLDZ #automation #learning #multi #segmentation
- Fully Automatic Segmentation of the Left Ventricle Using Multi-Scale Fusion Learning (TY, QT, XL, XD, JZ), pp. 3838–3843.
- ICPR-2018-ZhangSOS #identification #network
- Person Re-identification Using Two-Stage Convolutional Neural Network (YZ, JS, DO, HTS), pp. 3341–3346.
- ICPR-2018-ZhanLL #network #recognition #string
- Handwritten Digit String Recognition using Convolutional Neural Network (HZ, SL, YL), pp. 3729–3734.
- ICPR-2018-ZhaoLZTNM #analysis #automation #component #image #multi #robust #segmentation
- Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
- ICPR-2018-ZhaoPL0DWQ #learning #locality #semantics #topic
- Learning Topics Using Semantic Locality (ZZ, KP, SL, ZL0, CD, YW, QQ), pp. 3710–3715.
- ICPR-2018-ZhaoSJ #integer #linear #locality #programming
- Temporal Pattern Localization using Mixed Integer Linear Programming (RZ, GS, QJ), pp. 1361–1365.
- ICPR-2018-ZhaoYT #network #order #predict
- Pen Tip Motion Prediction for Handwriting Drawing Order Recovery using Deep Neural Network (BZ, MY, JT), pp. 704–709.
- KDD-2018-DaltayanniDA #automation #segmentation
- Automated Audience Segmentation Using Reputation Signals (MD, AD, LdA), pp. 186–195.
- KDD-2018-DasSCHLCKC #learning #named #performance
- SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression (ND, MS, STC, FH, SL, LC, MEK, DHC), pp. 196–204.
- KDD-2018-GittensRWMGPKRM #data analysis #library #scalability
- Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist (AG, KR, SW, MWM, LG, P, JK, MFR, KJM), pp. 293–301.
- KDD-2018-GohSVH #learning #predict #rule-based
- Using Rule-Based Labels for Weak Supervised Learning: A ChemNet for Transferable Chemical Property Prediction (GBG, CS, AV, NOH), pp. 302–310.
- KDD-2018-GrbovicC #personalisation #ranking #realtime
- Real-time Personalization using Embeddings for Search Ranking at Airbnb (MG, HC), pp. 311–320.
- KDD-2018-HarelR #network #prototype
- Accelerating Prototype-Based Drug Discovery using Conditional Diversity Networks (SH, KR), pp. 331–339.
- KDD-2018-He0LRLTZ #detection
- Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
- KDD-2018-HundmanCLCS #detection #parametricity
- Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
- KDD-2018-Janakiraman #learning #multi #safety
- Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
- KDD-2018-JauvionGSGG #optimisation
- Optimization of a SSP's Header Bidding Strategy using Thompson Sampling (GJ, NG, PDS, AG, SG), pp. 425–432.
- KDD-2018-KhuranaASV
- Resolving Abstract Anaphora Implicitly in Conversational Assistants using a Hierarchically stacked RNN (PK, PA, GMS, LV), pp. 433–442.
- KDD-2018-KumarRBVWKEFMZG #machine learning
- Using Machine Learning to Assess the Risk of and Prevent Water Main Breaks (AK, SAAR, BB, RAV, KHW, CK, SE, AF, AM, JZ, RG), pp. 472–480.
- KDD-2018-LeeRK #classification #graph
- Graph Classification using Structural Attention (JBL, RAR, XK), pp. 1666–1674.
- KDD-2018-OshriHACDWBLE #assessment #framework #learning #quality
- Infrastructure Quality Assessment in Africa using Satellite Imagery and Deep Learning (BO, AH, PA, XC, PD, JW, MB, DBL, SE), pp. 616–625.
- KDD-2018-RouxPMVF #approach #detection #machine learning
- Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
- KDD-2018-Ruhrlander0U #modelling #predict
- Improving Box Office Result Predictions for Movies Using Consumer-Centric Models (RPR, MB0, MU), pp. 655–664.
- KDD-2018-ShashikumarSCN #bidirectional #detection #network
- Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
- KDD-2018-Ting #bound #empirical #estimation #fault #named
- Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
- KDD-2018-WuCYXXA #clustering #random #scalability
- Scalable Spectral Clustering Using Random Binning Features (LW, PYC, IEHY, FX, YX, CCA), pp. 2506–2515.
- KDD-2018-WuZW #graph #on the
- On Discrimination Discovery and Removal in Ranked Data using Causal Graph (YW, LZ0, XW), pp. 2536–2544.
- KDD-2018-XuLDH #learning #metric #robust
- New Robust Metric Learning Model Using Maximum Correntropy Criterion (JX0, LL, CD, HH), pp. 2555–2564.
- KDD-2018-ZhaoAS0 #classification #dependence #performance #predict
- Prediction-time Efficient Classification Using Feature Computational Dependencies (LZ0, AAF, MS, KZ0), pp. 2787–2796.
- ECMFA-2018-RutleIKD #automation #co-evolution #graph transformation #modelling #traceability
- Automatic Transformation Co-evolution Using Traceability Models and Graph Transformation (AR, LI, HK, ZD), pp. 80–96.
- ICMT-2018-Voelter #design #evolution #functional #kernel
- The Design, Evolution, and Use of KernelF — An Extensible and Embeddable Functional Language (MV), pp. 3–55.
- MoDELS-2018-MarussySV #incremental #modelling
- Incremental View Model Synchronization Using Partial Models (KM, OS, DV), pp. 323–333.
- MoDELS-2018-PouraliA #challenge #empirical #modelling #tool support
- An Empirical Investigation to Understand the Difficulties and Challenges of Software Modellers When Using Modelling Tools (PP, JMA), pp. 224–234.
- ECOOP-2018-QunaibitBNVF #dynamic typing #optimisation #platform
- Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization (MQ, SB, YN, SV, MF), p. 29.
- OOPSLA-2018-AlpernasFFRSSW #data flow #information management
- Secure serverless computing using dynamic information flow control (KA, CF, SF, LR, MS, TS, KW), p. 26.
- OOPSLA-2018-WilliamsMW #contract
- The root cause of blame: contracts for intersection and union types (JW, JGM, PW), p. 29.
- AdaEurope-2018-JaradatP #contract #design #runtime #safety #verification
- Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
- LOPSTR-2018-PapapanagiotouF #approach #composition #linear #logic #process #scalability
- A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
- PADL-2018-AnandCN #automation #consistency #detection #logic #nondeterminism
- An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
- PADL-2018-Crary #code generation #source code
- Hygienic Source-Code Generation Using Functors - (Extended Abstract) (KC), pp. 53–60.
- PLDI-2018-DuckY #c #c++ #detection #effectiveness #fault #memory management #named
- EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
- PLDI-2018-FengMBD #learning #synthesis
- Program synthesis using conflict-driven learning (YF, RM, OB, ID), pp. 420–435.
- PLDI-2018-HongSKRKPRS #analysis #gpu #kernel #optimisation
- GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
- PLDI-2018-LeeHAN #modelling #probability #search-based #synthesis
- Accelerating search-based program synthesis using learned probabilistic models (WL, KH, RA, MN), pp. 436–449.
- PLDI-2018-RaghothamanKHN #reasoning
- User-guided program reasoning using Bayesian inference (MR, SK, KH, MN), pp. 722–735.
- POPL-2018-Danielsson
- Up-to techniques using sized types (NAD), p. 28.
- POPL-2018-InalaS #named #spreadsheet #web
- WebRelate: integrating web data with spreadsheets using examples (JPI, RS), p. 28.
- POPL-2018-WangDS #abstraction #refinement #synthesis
- Program synthesis using abstraction refinement (XW0, ID, RS), p. 30.
- PPDP-2018-NogatzKS #definite clause grammar #prolog #visualisation
- Web-based Visualisation for Definite Clause Grammars Using Prolog Meta-Interpreters: System Description (FN, JK, DS), p. 10.
- SAS-2018-RothenbergDH #abstraction #incremental #verification
- Incremental Verification Using Trace Abstraction (BCR, DD, MH), pp. 364–382.
- SAS-2018-Shoham #decidability #distributed #interactive #logic #protocol #verification
- Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
- ASE-2018-AbdessalemPNBS #feature model #interactive #testing
- Testing autonomous cars for feature interaction failures using many-objective search (RBA, AP, SN, LCB, TS), pp. 143–154.
- ASE-2018-HabibP #documentation #graph #learning #thread
- Is this class thread-safe? inferring documentation using graph-based learning (AH, MP), pp. 41–52.
- ASE-2018-PatwardhanSSKG #ambiguity #automation #towards
- Towards automating disambiguation of regulations: using the wisdom of crowds (MP, AS, RS, SK, SG), pp. 850–855.
- ASE-2018-QuLCJCHZ #2d #fault #named #network #predict
- node2defect: using network embedding to improve software defect prediction (YQ, TL0, JC, YJ, DC, AH, QZ), pp. 844–849.
- ESEC-FSE-2018-AmarBB0M #difference #finite #modelling
- Using finite-state models for log differencing (HA, LB, NB, DL0, SM), pp. 49–59.
- ESEC-FSE-2018-DashAB #named
- RefiNym: using names to refine types (SKD, MA, ETB), pp. 107–117.
- ESEC-FSE-2018-HuaZWK #approach #automation #generative #lazy evaluation #named #program repair #sketching
- SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
- ESEC-FSE-2018-HuZY #machine learning #named #reuse #robust #testing #user interface
- AppFlow: using machine learning to synthesize robust, reusable UI tests (GH, LZ, JY), pp. 269–282.
- ESEC-FSE-2018-KimC0 #fault
- Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF (MK, SCC, SK0), pp. 679–690.
- ESEC-FSE-2018-LeB0 #mining #named #network #specification
- DSM: a specification mining tool using recurrent neural network based language model (TDBL, LB, DL0), pp. 896–899.
- ESEC-FSE-2018-StoccoYM18a #named #web
- Vista: web test repair using computer vision (AS0, RY, AM0), pp. 876–879.
- ESEC-FSE-2018-TuZZZ #empirical #issue tracking
- Be careful of when: an empirical study on time-related misuse of issue tracking data (FT, JZ, QZ, MZ), pp. 307–318.
- ICSE-2018-AbdessalemNBS #algorithm #testing
- Testing vision-based control systems using learnable evolutionary algorithms (RBA, SN, LCB, TS), pp. 1016–1026.
- ICSE-2018-DamevskiCSKP #behaviour #developer #ide #modelling #predict #topic
- Predicting future developer behavior in the IDE using topic models (KD, HC, DCS, NAK, LLP), p. 932.
- ICSE-2018-HabayebMMB #debugging #markov #on the #predict
- On the use of hidden Markov model to predict the time to fix bugs (MH, SSM, AVM, ABB), p. 700.
- ICSE-2018-KimCK #c #precise #source code #testing
- Precise concolic unit testing of C programs using extended units and symbolic alarm filtering (YK, YC, MK), pp. 315–326.
- ICSE-2018-LangeNTY #behaviour #framework #message passing #verification
- A static verification framework for message passing in Go using behavioural types (JL, NN, BT, NY), pp. 1137–1148.
- ICSE-2018-MechtaevNNGR #implementation #program repair #semantics
- Semantic program repair using a reference implementation (SM, MDN, YN, LG, AR), pp. 129–139.
- SLE-2018-MeySHSKFOA #attribute grammar #validation
- Continuous model validation using reference attribute grammars (JM, RS, GH, ES, TK0, NF, JÖ, UA), pp. 70–82.
- ASPLOS-2018-DickensGFH #encryption #named #performance
- StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption (BDI, HSG, AJF, HH), pp. 708–721.
- CASE-2018-AshouriHNS #approximate #detection #energy #performance
- Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
- CASE-2018-BarretoC #multi #simulation
- Matching the Free-Vibration Response of a Delta Robot with Pick-and-Place Tasks Using Multi-Body Simulation (JPB, BC), pp. 1487–1492.
- CASE-2018-CheonKKKC #design #fuzzy #optimisation
- Systematic Design Method of Controller using Discrete Fuzzy PI Control and Particle Swarm Optimization (JC, JK, HK, SK, YC), pp. 1581–1586.
- CASE-2018-ChuBIICS #learning #multi #online #power management
- Plug-and-Play Power Management Control of All-Electric Vehicles Using Multi-Agent System and On-line Gaussian Learning (KCC, GB, MI, AI, CC, KS), pp. 1599–1604.
- CASE-2018-DasWSP #adaptation #detection #interactive
- Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
- CASE-2018-DingLWL #automation #testing
- 6-DOF Automated Flight Testing Using a Humanoid Robot Arm (CD, LL0, CW0, JL), pp. 217–222.
- CASE-2018-FrancoAGABB #approach #deployment #optimisation #probability
- Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
- CASE-2018-GaoXDCSG #detection
- Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
- CASE-2018-HaghighiRATMC #detection
- Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
- CASE-2018-InuiEMZ #geometry #gpu #process #simulation
- Geometric Simulation of Infeed Grinding Process of Silicon Wafer Using GPU (MI, YE, TM, LZ), pp. 1519–1524.
- CASE-2018-JulienN #coordination #exponential
- Dynamics and Control of Tree-Type Manipulator Systems using Exponential Coordinates (AJ, KN), pp. 136–143.
- CASE-2018-KacarMU #problem #reduction
- Problem Reduction Approaches for Production Planning Using Clearing Functions (NBK, LM, RU), pp. 931–938.
- CASE-2018-KangYJ #analysis #performance #realtime
- Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
- CASE-2018-KuoC #algorithm #capacity #industrial #scheduling #search-based
- Using Auxiliary Capacity Planning Strategy Genetic Algorithm for TFT-LCD photolithography scheduling to empower Industry 3.5 (HAK, CFC0), pp. 920–925.
- CASE-2018-LowO #hybrid #implementation #predict #realtime
- Real-time Implementation of Nonlinear Model Predictive Control for Mechatronic Systems Using a Hybrid Model (SL, DO), pp. 164–167.
- CASE-2018-RibeiroRPS #approach #architecture #design
- An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
- CASE-2018-ShimasakiOJTIY #image #pattern matching #pattern recognition #recognition
- HFR-video-based Image Pattern Recognition Using Pixel-level Temporal Frequency Response Matching (KS, TO, MJ, TT, II, KY), pp. 451–456.
- CASE-2018-SpenrathP #heuristic #network #random
- Using Neural Networks for Heuristic Grasp Planning in Random Bin Picking (FS, AP), pp. 258–263.
- CASE-2018-StarkGDBG #integration
- Cloud-based integration of robot engineering data using AutomationML (KS, TG, JD, PB, DG), pp. 645–648.
- CASE-2018-TerzimehicVW #deployment #design
- Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems (TT, SV, MW), pp. 881–886.
- CASE-2018-ToriiH #3d #approximate #estimation #parametricity
- Model-less Estimation Method for Robot Grasping Parameters Using 3D Shape Primitive Approximation (TT, MH), pp. 580–585.
- CASE-2018-WijayasingheSPP #adaptation #algorithm #interface #search-based
- Adaptive Interface for Robot Teleoperation using a Genetic Algorithm (IBW, MNS, SP, DOP, SC), pp. 50–56.
- CASE-2018-XuLS0L #realtime #recognition #self
- Real-time Shape Recognition of a Deformable Link by Using Self-Organizing Map (SX, GL, DS, LS0, JL), pp. 586–591.
- CASE-2018-ZhangLFL #integer #linear #programming #sequence
- Shortest Legal Firing Sequence of Net Condition/Event Systems Using Integer Linear Programming (JZ, HL, GF, ZL), pp. 1556–1561.
- CGO-2018-0001LQDL #android #detection #distributed #logic
- Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
- ESOP-2018-Matsuda0 #combinator #lens #named #programming
- HOBiT: Programming Lenses Without Using Lens Combinators (KM, MW0), pp. 31–59.
- FASE-2018-Dimovski #model checking
- Abstract Family-Based Model Checking Using Modal Featured Transition Systems: Preservation of CTL* (ASD), pp. 301–318.
- FASE-2018-KatirtzisDS #api #clustering
- Summarizing Software API Usage Examples Using Clustering Techniques (NK, TD, CAS), pp. 189–206.
- FASE-2018-LandsbergSK #fault #locality #optimisation #source code #specification
- Optimising Spectrum Based Fault Localisation for Single Fault Programs Using Specifications (DL, YS, DK), pp. 246–263.
- FASE-2018-ParkSR #analysis #framework #web
- EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
- CAV-2018-KongBH #approximate #set
- Reachable Set Over-Approximation for Nonlinear Systems Using Piecewise Barrier Tubes (HK, EB, TAH), pp. 449–467.
- CAV-2018-BouajjaniEMT #abstraction #reasoning #reduction #source code
- Reasoning About TSO Programs Using Reduction and Abstraction (AB, CE, SOM, ST), pp. 336–353.
- CAV-2018-NiemetzPRBT #quantifier
- Solving Quantified Bit-Vectors Using Invertibility Conditions (AN, MP, AR, CWB, CT), pp. 236–255.
- ICST-2018-MahajanAMH #automation #clustering #search-based #similarity #web
- Automated Repair of Internationalization Presentation Failures in Web Pages Using Style Similarity Clustering and Search-Based Techniques (SM, AA, PM, WGJH), pp. 215–226.
- ICST-2018-PradhanW00L #mining #multi #named #testing
- REMAP: Using Rule Mining and Multi-objective Search for Dynamic Test Case Prioritization (DP, SW0, SA0, TY0, ML), pp. 46–57.
- ICST-2018-Rajaram #fault #taxonomy #testing
- Taxonomy Based Testing Using SW91, a Medical Device Software Defect Taxonomy (HKR), pp. 422–423.
- IJCAR-2018-KazakovS
- Enumerating Justifications Using Resolution (YK, PS), pp. 609–626.
- IJCAR-2018-ZeljicBWR #approximate #float
- Exploring Approximations for Floating-Point Arithmetic Using UppSAT (AZ, PB, CMW, PR), pp. 246–262.
- TAP-2018-HerdaTB #data flow #dependence #graph #testing #verification
- Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties (MH, SST, BB), pp. 83–102.
- TAP-2018-VorobyovKS #c #case study #detection #experience #runtime #security #verification
- Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
- VMCAI-2018-KranzS #analysis #bytecode #composition #on-demand
- Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
- ECSA-2017-FilhoRAB #architecture #consistency #design #exception
- Preventing Erosion in Exception Handling Design Using Static-Architecture Conformance Checking (JLMF, LSR, RMCA, RB), pp. 67–83.
- ICSA-2017-GesvindrBG #as a service #design #evaluation #prototype #quality
- Quality Evaluation of PaaS Cloud Application Design Using Generated Prototypes (DG, BB, OG), pp. 31–40.
- ICSA-2017-Yasaweerasinghelage #architecture #latency #modelling #predict #simulation
- Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation (RY, MS, IW), pp. 253–256.
- JCDL-2017-AlamKWN #re-engineering
- Client-Side Reconstruction of Composite Mementos Using ServiceWorker (SA, MK, MCW, MLN), pp. 237–240.
- JCDL-2017-CastroCWPF #framework #platform #semistructured data
- Classifying Short Unstructured Data Using the Apache Spark Platform (EPSC, SC, EW, DAP, EAF), pp. 129–138.
- JCDL-2017-ChironDCVM #fault #library #towards
- Impact of OCR Errors on the Use of Digital Libraries: Towards a Better Access to Information (GC, AD, MC, MV, JPM), pp. 249–252.
- JCDL-2017-GippBMB #feedback #named #overview
- CryptSubmit: Introducing Securely Timestamped Manuscript Submission and Peer Review Feedback Using the Blockchain (BG, CB, NM, JB), pp. 273–276.
- JCDL-2017-HassanAH #identification #information management
- Identifying Important Citations Using Contextual Information from Full Text (SUH, AA, PH), pp. 41–48.
- JCDL-2017-KleinS
- Discovering Scholarly Orphans Using ORCID (MK, HVdS), pp. 189–198.
- JCDL-2017-KocherS #clustering
- Author Clustering Using SPATIUM (MK, JS), pp. 265–268.
- JCDL-2017-YangHHOZKG #identification #learning #library
- Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
- CSEET-2017-IacobF #education #requirements
- Using Extreme Characters to Teach Requirements Engineering (CI, SF), pp. 107–111.
- CSEET-2017-PintoFSG #open source #perspective
- Training Software Engineers Using Open-Source Software: The Professors' Perspective (GHLP, FFF, IS, MAG), pp. 117–121.
- CSEET-2017-PortelaVOS #case study #experience #industrial #re-engineering
- The Use of Industry Training Strategies in a Software Engineering Course: An Experience Report (CSP, AV, SRBO, MRdAS), pp. 29–36.
- EDM-2017-AndresBSGSC #framework #replication #scalability
- Studying MOOC Completion at Scale Using the MOOC Replication Framework (JMLA, RSB, GS, DG, CAS, SAC).
- EDM-2017-GrawemeyerWSHMP #graph #learning #modelling #student
- Using Graph-based Modelling to explore changes in students' affective states during exploratory learning tasks (BG, AW, SGS, WH, MM, AP).
- EDM-2017-HongB #learning #predict
- A Prediction and Early Alert Model Using Learning Management System Data and Grounded in Learning Science Theory (WJH, MLB).
- EDM-2017-LiuL #student
- Exploring the Relationship Between Student Pre-knowledge and Engagement in MOOC Class Using Polytomous IRT (JL, HL).
- EDM-2017-MadaioLCO #mining #predict
- Using Temporal Association Rule Mining to Predict Dyadic Rapport in Peer Tutoring (MAM, RL, JC, AO).
- EDM-2017-McBride #simulation #student
- Student Use of Inquiry Simulations in Middle School Science (EM).
- EDM-2017-McBrideVL #simulation #student
- Student Use of Scaffolded Inquiry Simulations in Middle School Science (EM, JMV, MCL).
- EDM-2017-MichalenkoLB #feedback #memory management #network #personalisation
- Personalized Feedback for Open-Response Mathematical Questions using Long Short-Term Memory Networks (JJM, ASL, RGB).
- EDM-2017-MiF #adaptation #recommendation
- Adaptive Sequential Recommendation for Discussion Forums on MOOCs using Context Trees (FM, BF).
- EDM-2017-ParedesHH #behaviour #comprehension #programming #student
- Understanding Student's Reviewing and Reflection Behaviors Using Web-based Programming Grading Assistant (YVMP, PKH, SIHH).
- EDM-2017-PatikornSHBZ #detection #multi
- Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
- EDM-2017-PokrajacSYH #markov #modelling
- Modeling Dormitory Occupancy Using Markov Chains (DDP, KS, DY, TH).
- EDM-2017-RihakP #education #performance #similarity
- Measuring Similarity of Educational Items Using Data on Learners' Performance (JR, RP).
- EDM-2017-ShenC #clustering #student
- Clustering Student Sequential Trajectories Using Dynamic Time Wrapping (SS, MC).
- EDM-2017-ShiPG #analysis #learning #performance
- Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
- EDM-2017-WanDGP #predict
- Dropout Prediction in MOOCs using Learners' Study Habits Features (HW, JD, XG, DP).
- EDM-2017-WangSLP #learning #programming #student
- Learning to Represent Student Knowledge on Programming Exercises Using Deep Learning (LW, AS, LL, CP).
- EDM-2017-YasudaNKKH #automation #network
- Automatic Scoring Method for Descriptive Test Using Recurrent Neural Network (KY, IN, HK, HK, MH).
- ICPC-2017-AlexandruPG #behaviour #parsing
- Replicating parser behavior using neural machine translation (CVA, SP, HCG), pp. 316–319.
- ICPC-2017-HatanoM #compilation #industrial
- Removing code clones from industrial systems using compiler directives (TH, AM), pp. 336–345.
- ICSME-2017-ChaparroFM #behaviour #debugging #locality #query
- Using Observed Behavior to Reformulate Queries during Text Retrieval-based Bug Localization (OC, JMF, AM), pp. 376–387.
- ICSME-2017-DeshmukhMPSD #debugging #learning #retrieval #towards
- Towards Accurate Duplicate Bug Retrieval Using Deep Learning Techniques (JD, KMA, SP, SS, ND), pp. 115–124.
- ICSME-2017-Gupta #maintenance #mining #predict #process
- Improving Software Maintenance Using Process Mining and Predictive Analytics (MG0), pp. 681–686.
- ICSME-2017-HanLXLF #learning #predict
- Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description (ZH, XL0, ZX, HL, ZF0), pp. 125–136.
- ICSME-2017-TerdchanakulHPM #classification #debugging #n-gram
- Bug or Not? Bug Report Classification Using N-Gram IDF (PT, HH, PP, KM), pp. 534–538.
- MSR-2017-CartaxoPRKSSS
- Using Q&A websites as a method for assessing systematic reviews (BC, GP0, DMR, FK, RESS, FQBdS, SS), pp. 238–242.
- MSR-2017-NiL #classification #effectiveness #predict
- Cost-effective build outcome prediction using cascaded classifiers (AN, ML0), pp. 455–458.
- MSR-2017-RahmanRK #code review #developer #experience #overview #predict
- Predicting usefulness of code review comments using textual features and developer experience (MMR0, CKR, RGK), pp. 215–226.
- MSR-2017-RajbahadurWKH #classification #fault #modelling
- The impact of using regression models to build defect classifiers (GKR, SW0, YK, AEH), pp. 135–145.
- SANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #pointer
- Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
- SANER-2017-LaverdiereM #modelling #security
- Computing counter-examples for privilege protection losses using security models (MAL, EM), pp. 240–249.
- SANER-2017-LiuLNB #fault #locality #modelling #predict #search-based #testing
- Improving fault localization for Simulink models using search-based testing and prediction models (BL, L, SN, LCB), pp. 359–370.
- SANER-2017-TangL #approach #mining #named #novel #probability
- StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
- SCAM-2017-0008SMOBL #analysis #consistency #identifier
- Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
- IFM-2017-AronisFS #model checking #testing #verification
- Testing and Verifying Chain Repair Methods for Corfu Using Stateless Model Checking (SA, SLF, KS), pp. 227–242.
- IFM-2017-FerreiraJMB #authentication #case study #coq #linux #quality
- Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules (JFF, SAJ, AM, PJB), pp. 407–421.
- IFM-2017-KovalovLGL #network #smt
- Task-Node Mapping in an Arbitrary Computer Network Using SMT Solver (AK, EL, AG, DL), pp. 177–191.
- SEFM-2017-TomascoN0TP #abstraction #design #memory management #modelling
- Using Shared Memory Abstractions to Design Eager Sequentializations for Weak Memory Models (ET, TLN, BF0, SLT, GP), pp. 185–202.
- Haskell-2017-WiegleyD #coq #haskell #performance
- Using Coq to write fast and correct Haskell (JW, BD), pp. 52–62.
- ICFP-2017-AuerbachHMSS #case study #compilation #coq #experience #prototype #query
- Prototyping a query compiler using Coq (experience report) (JSA, MH, LM, AS, JS), p. 15.
- AIIDE-2017-BunianCCE #behaviour #difference #game studies #modelling
- Modeling Individual Differences in Game Behavior Using HMM (SB, AC, RCC, MSEN), pp. 158–164.
- AIIDE-2017-FarrellW #interactive
- Influencing User Choices in Interactive Narratives Using Indexter's Pairwise Event Salience Hypothesis (RF, SGW), pp. 37–42.
- AIIDE-2017-FarrellW17a #semantics
- Causal Link Semantics for Narrative Planning Using Numeric Fluents (RF, SGW), pp. 193–199.
- AIIDE-2017-ViljanenAHP
- A/B-Test of Retention and Monetization Using the Cox Model (MV, AA, JH, TP), pp. 248–254.
- CHI-PLAY-2017-BoweyM #game studies #prototype
- Those are not the Stories you are Looking For: Using Text Prototypes to Evaluate Game Narratives Early (JTB, RLM), pp. 265–276.
- CHI-PLAY-2017-Peddycord-LiuCK #game studies #question #student #what
- Using Serious Game Analytics to Inform Digital Curricular Sequencing: What Math Objective Should Students Play Next? (ZPL, CC, SK, TB, CFL, TR), pp. 195–204.
- CIG-2017-ApeldoornV #game studies #knowledge base
- Measuring strategic depth in games using hierarchical knowledge bases (DA, VV), pp. 9–16.
- CIG-2017-BaldwinDFH #design pattern #game studies #generative
- Mixed-initiative procedural generation of dungeons using game design patterns (AB0, SD, JMF, JH), pp. 25–32.
- CIG-2017-BrownA #game studies #multi
- Using multiple worlds for multiple agent roles in games (JAB, DA), pp. 37–44.
- CIG-2017-BurnsT #detection #game studies
- Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
- CIG-2017-JiangHT #generative
- Procedural generation of angry birds fun levels using pattern-struct and preset-model (YJ0, TH, RT), pp. 154–161.
- CIG-2017-JustesenR #learning
- Learning macromanagement in starcraft from replays using deep learning (NJ, SR), pp. 162–169.
- CIG-2017-MinK #game studies #learning #visual notation
- Learning to play visual doom using model-free episodic control (BJM, KJK), pp. 223–225.
- CIG-2017-OonishiI #game studies #learning
- Improving generalization ability in a puzzle game using reinforcement learning (HO, HI), pp. 232–239.
- CIG-2017-PhucNK #behaviour #learning #statistics
- Learning human-like behaviors using neuroevolution with statistical penalties (LHP, KN, KI), pp. 207–214.
- CIG-2017-SilvaVT #game studies #monte carlo
- Using Monte Carlo tree search and google maps to improve game balancing in location-based games (LFMS, WV, FT), pp. 215–222.
- CIG-2017-SnodgrassO #generative #multi
- Procedural level generation using multi-layer level representations with MdMCs (SS, SO), pp. 280–287.
- FDG-2017-Abuzuraiq #clustering #constraints #generative #graph #morphism #on the
- On using graph partitioning with isomorphism constraint in procedural content generation (AMA), p. 10.
- FDG-2017-AllartLPGN #analysis #game studies #motivation #video
- Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
- FDG-2017-CampbellV
- Exploration in NetHack using occupancy maps (JC, CV), p. 4.
- FDG-2017-CleghernLOR #modelling #predict
- Predicting future states in DotA 2 using value-split models of time series attribute data (ZC, SL, OYÖ, DLR), p. 10.
- FDG-2017-Mawhorter #case study #generative #performance #product line #representation
- Efficiency, realism, and representation in generated content: a case study using family tree generation (PAM), p. 4.
- FDG-2017-MelcerI17a #challenge #collaboration #education #game studies #programming
- Embodiment, collaboration, and challenge in educational programming games: exploring use of tangibles and mouse (EFM, KI), p. 6.
- FDG-2017-MurrayMW #graph #interactive
- Proposal for analyzing player emotions in an interactive narrative using story intention graphs (JTM, MM, NWF), p. 4.
- FDG-2017-SeguraIBW #design
- Design, appropriation, and use of technology in larps (EMS, KI, JB, AW), p. 4.
- VS-Games-2017-FerkovaZUM #database #image #re-engineering
- Single image reconstruction of human faces using database of depth images (ZF, MZ, PU, PM), pp. 109–116.
- VS-Games-2017-KontadakisCPM #3d #low cost
- Gamified 3D orthopaedic rehabilitation using low cost and portable inertial sensors (GK, DC, DP, KM), pp. 165–168.
- CIKM-2017-BouadjenekVZ #biology #learning #sequence
- Learning Biological Sequence Types Using the Literature (MRB, KV, JZ), pp. 1991–1994.
- CIKM-2017-BrayteeLCK #correlation #feature model #multi
- Multi-Label Feature Selection using Correlation Information (AB, WL0, DRC, PJK), pp. 1649–1656.
- CIKM-2017-ChavaryEL #mining #network
- Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining (EAC, SME, CL), pp. 2015–2018.
- CIKM-2017-DasMBS #word
- Estimating Event Focus Time Using Neural Word Embeddings (SD, AM, KB, VS), pp. 2039–2042.
- CIKM-2017-DhakadDBDKM #named #process
- SOPER: Discovering the Influence of Fashion and the Many Faces of User from Session Logs using Stick Breaking Process (LD, MKD, CB, SD, MK, VM), pp. 1609–1618.
- CIKM-2017-DingLHM #fault tolerance #performance #recommendation
- Efficient Fault-Tolerant Group Recommendation Using alpha-beta-core (DD, HL, ZH0, NM), pp. 2047–2050.
- CIKM-2017-GarciaM #energy #network
- Inferring Appliance Energy Usage from Smart Meters using Fully Convolutional Encoder Decoder Networks (FCCG, EQBM), pp. 2075–2078.
- CIKM-2017-GaurBB #graph #query
- Tracking the Impact of Fact Deletions on Knowledge Graph Queries using Provenance Polynomials (GG, SJB, AB0), pp. 2079–2082.
- CIKM-2017-GuptaLHA #induction #sequence #taxonomy
- Taxonomy Induction Using Hypernym Subsequences (AG, RL, HH, KA), pp. 1329–1338.
- CIKM-2017-HalderKS #concurrent #health #recommendation #thread #topic
- Health Forum Thread Recommendation Using an Interest Aware Topic Model (KH, MYK, KS), pp. 1589–1598.
- CIKM-2017-KhandpurJJ0LR #crowdsourcing #detection #social #social media
- Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
- CIKM-2017-KhoaAW #analysis #framework #incremental #maintenance
- Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
- CIKM-2017-KimJY #multi #online
- Construction of a National Scale ENF Map using Online Multimedia Data (HK, YBJ, JWY), pp. 19–28.
- CIKM-2017-KwonKS #recognition #robust
- A Robust Named-Entity Recognition System Using Syllable Bigram Embedding with Eojeol Prefix Information (SK, YK, JS), pp. 2139–2142.
- CIKM-2017-MehrotraY #learning #query
- Task Embeddings: Learning Query Embeddings using Task Context (RM, EY), pp. 2199–2202.
- CIKM-2017-Ni0ZYM #fine-grained #learning #metric #similarity
- Fine-grained Patient Similarity Measuring using Deep Metric Learning (JN, JL0, CZ, DY, ZM), pp. 1189–1198.
- CIKM-2017-ParmarBBK #online #process
- Forecasting Ad-Impressions on Online Retail Websites using Non-homogeneous Hawkes Processes (KP, SB, SB, SK), pp. 1089–1098.
- CIKM-2017-ProskurniaM0AC #detection #documentation #performance #topic
- Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
- CIKM-2017-TengLW #detection #learning #multi #network
- Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
- CIKM-2017-VellosoD #approach #web
- Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
- CIKM-2017-WangCL #graph #twitter
- Using Knowledge Graphs to Explain Entity Co-occurrence in Twitter (YW, MJC, YFL), pp. 2351–2354.
- CIKM-2017-YeHHCLQS #classification
- Nationality Classification Using Name Embeddings (JY, SH, YH, BC, ML, HQ, SS), pp. 1897–1906.
- CIKM-2017-ZhangH #ambiguity #graph #network
- Name Disambiguation in Anonymized Graphs using Network Embedding (BZ, MAH), pp. 1239–1248.
- CIKM-2017-ZhangJT #retrieval
- Temporal Analog Retrieval using Transformation over Dual Hierarchical Structures (YZ, AJ, KT), pp. 717–726.
- CIKM-2017-ZhiSLZ0 #database #named #realtime #verification #web
- ClaimVerif: A Real-time Claim Verification System Using the Web and Fact Databases (SZ, YS, JL, CZ0, JH0), pp. 2555–2558.
- ECIR-2017-AletrasM #image #network #topic
- Labeling Topics with Images Using a Neural Network (NA, AM), pp. 500–505.
- ECIR-2017-ArguelloA0 #performance #predict #query
- Using Query Performance Predictors to Reduce Spoken Queries (JA, SA, FD0), pp. 27–39.
- ECIR-2017-AyadiKHDJ #image #learning
- Learning to Re-rank Medical Images Using a Bayesian Network-Based Thesaurus (HA, MTK, JXH, MD, MBJ), pp. 160–172.
- ECIR-2017-BaruaP #classification #query
- Named Entity Classification Using Search Engine's Query Suggestions (JB, DP), pp. 612–618.
- ECIR-2017-J0V #twitter
- Improving Tweet Representations Using Temporal and User Context (GJ, MG0, VV), pp. 575–581.
- ECIR-2017-McDonaldMO #classification #semantics #word
- Enhancing Sensitivity Classification with Semantic Features Using Word Embeddings (GM, CM, IO), pp. 450–463.
- ECIR-2017-ParamitaCG #similarity #wiki
- Using Section Headings to Compute Cross-Lingual Similarity of Wikipedia Articles (MLP, PDC, RJG), pp. 633–639.
- ICML-2017-BernsteinMSSHM #learning #modelling #visual notation
- Differentially Private Learning of Undirected Graphical Models Using Collective Graphical Models (GB, RM, TS, DS, MH, GM), pp. 478–487.
- ICML-2017-BoraJPD #generative #modelling
- Compressed Sensing using Generative Models (AB, AJ, EP, AGD), pp. 537–546.
- ICML-2017-ChenKB #equation #identification #linear #modelling #testing
- Identification and Model Testing in Linear Structural Equation Models using Auxiliary Variables (BC, DK, EB), pp. 757–766.
- ICML-2017-ChouMS #learning #policy #probability
- Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
- ICML-2017-EcksteinGK #generative
- Rule-Enhanced Penalized Regression by Column Generation using Rectangular Maximum Agreement (JE, NG, AK), pp. 1059–1067.
- ICML-2017-JaderbergCOVGSK #interface
- Decoupled Neural Interfaces using Synthetic Gradients (MJ, WMC, SO, OV, AG, DS, KK), pp. 1627–1635.
- ICML-2017-Kallus #clustering #personalisation #recursion
- Recursive Partitioning for Personalization using Observational Data (NK), pp. 1789–1798.
- ICML-2017-MhammediHRB #network #orthogonal #performance
- Efficient Orthogonal Parametrisation of Recurrent Neural Networks Using Householder Reflections (ZM, ADH, AR, JB0), pp. 2401–2409.
- ICML-2017-MollaysaSK #modelling
- Regularising Non-linear Models Using Feature Side-information (AM, PS, AK), pp. 2508–2517.
- ICML-2017-NguyenLST #machine learning #named #novel #probability #problem #recursion
- SARAH: A Novel Method for Machine Learning Problems Using Stochastic Recursive Gradient (LMN, JL, KS, MT), pp. 2613–2621.
- ICML-2017-SchlegelPCW #adaptation #kernel #online
- Adapting Kernel Representations Online Using Submodular Maximization (MS, YP, JC, MW), pp. 3037–3046.
- ICML-2017-Villacampa-Calvo #classification #multi #process #scalability
- Scalable Multi-Class Gaussian Process Classification using Expectation Propagation (CVC, DHL), pp. 3550–3559.
- ICML-2017-YangHSB #modelling
- Improved Variational Autoencoders for Text Modeling using Dilated Convolutions (ZY, ZH, RS, TBK), pp. 3881–3890.
- KDD-2017-AgarwalBSJ #effectiveness #evaluation #feedback #multi
- Effective Evaluation Using Logged Bandit Feedback from Multiple Loggers (AA, SB0, TS, TJ), pp. 687–696.
- KDD-2017-AlbertKG #identification #network #scalability
- Using Convolutional Networks and Satellite Imagery to Identify Patterns in Urban Environments at a Large Scale (AA, JK, MCG), pp. 1357–1366.
- KDD-2017-ChamberlainCLPD #predict
- Customer Lifetime Value Prediction Using Embeddings (BPC, ÂC, CHBL, RP, MPD), pp. 1753–1762.
- KDD-2017-EmraniMX #learning #multi
- Prognosis and Diagnosis of Parkinson's Disease Using Multi-Task Learning (SE, AM, WX), pp. 1457–1466.
- KDD-2017-FoxAJPW
- Contextual Motifs: Increasing the Utility of Motifs using Contextual Data (IF, LA, MJ, RPB, JW), pp. 155–164.
- KDD-2017-LiHG #concept #enterprise #spreadsheet
- Discovering Enterprise Concepts Using Spreadsheet Tables (KL, YH, KG), pp. 1873–1882.
- KDD-2017-MaurusP #detection
- Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
- KDD-2017-MottiniA #network #pointer #predict
- Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
- KDD-2017-WoodsAMM #feedback #modelling #predict
- Formative Essay Feedback Using Predictive Scoring Models (BW, DA, SM, EM), pp. 2071–2080.
- ICMT-2017-BurguenoHVG #modelling #testing
- Testing Transformation Models Using Classifying Terms (LB, FH, AV, MG), pp. 69–85.
- ICMT-2017-GerkingSB #imperative
- Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities (CG, DS, IB), pp. 19–34.
- OOPSLA-2017-MazinanianKTD #comprehension #java
- Understanding the use of lambda expressions in Java (DM, AK, NT, DD), p. 31.
- OOPSLA-2017-WangDS #automaton #finite #synthesis
- Synthesis of data completion scripts using finite tree automata (XW0, ID, RS), p. 26.
- AdaEurope-2017-JeongYB #transaction
- Lock Elision for Protected Objects Using Intel Transactional Synchronization Extensions (SJ, SY, BB), pp. 121–136.
- PADL-2017-MantadelisR #logic #probability
- Using Iterative Deepening for Probabilistic Logic Inference (TM, RR0), pp. 198–213.
- PEPM-2017-HengleinR #dynamic analysis #parsing expression grammar
- PEG parsing in less space using progressive tabling and dynamic analysis (FH, UTR), pp. 35–46.
- PEPM-2017-WolffH #typescript
- Refining types using type guards in TypeScript (IGdW, JH), pp. 111–122.
- PLDI-2017-HuD #automation #transducer
- Automatic program inversion using symbolic transducers (QH, LD), pp. 376–389.
- PLDI-2017-PetrashkoLO #compilation #composition #named #performance #program transformation
- Miniphases: compilation using modular and efficient tree transformations (DP, OL, MO), pp. 201–216.
- POPL-2017-SrikanthSH #complexity #theorem #verification
- Complexity verification using guided theorem enumeration (AS, BS, WRH), pp. 639–652.
- QAPL-2017-LidmanS #fuzzy #logic #program analysis
- Bridging Static and Dynamic Program Analysis using Fuzzy Logic (JL, JS), pp. 111–126.
- SAS-2017-OuadjaoutM #communication #markov #protocol #static analysis
- Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
- ASE-2017-Abdelrasoul #order #random #scheduling
- Promoting secondary orders of event pairs in randomized scheduling using a randomized stride (MA), pp. 741–752.
- ASE-2017-JiangAM #automation #commit #generative
- Automatically generating commit messages from diffs using neural machine translation (SJ, AA, CM), pp. 135–146.
- ASE-2017-KrugerNRAMBGGWD #developer #encryption #named
- CogniCrypt: supporting developers in using cryptography (SK, SN, MR, KA0, MM, EB, FG, FG0, CW, DD, RK), pp. 931–936.
- ASE-2017-LinZZX #concept #retrieval #source code
- Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
- ASE-2017-NguyenDV #invariant #named
- SymInfer: inferring program invariants using symbolic states (TN, MBD, WV), pp. 804–814.
- ASE-2017-RahmanR #concept #documentation #query
- Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
- ASE-2017-Sultana #metric #predict #towards
- Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
- ASE-2017-SunCWB
- Improving missing issue-commit link recovery using positive and unlabeled data (YS, CC, QW0, BWB), pp. 147–152.
- ESEC-FSE-2017-Abdalkareem #developer #perspective
- Reasons and drawbacks of using trivial npm packages: the developers' perspective (RA), pp. 1062–1064.
- ESEC-FSE-2017-LabuschagneIH #case study #cost analysis #integration #java #testing
- Measuring the cost of regression testing in practice: a study of Java projects using continuous integration (AL, LI, RH), pp. 821–830.
- ESEC-FSE-2017-MaggioPFH #automation #multi
- Automated control of multiple software goals using multiple actuators (MM, AVP, AF, HH), pp. 373–384.
- ESEC-FSE-2017-NairMSA
- Using bad learners to find good configurations (VN, TM, NS, SA), pp. 257–267.
- ESEC-FSE-2017-Oliveira #architecture #co-evolution #dependence #fine-grained #named #refactoring
- DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies (MCdO0), pp. 1018–1021.
- ESEC-FSE-2017-Schramm #automation #heuristic #performance #program repair
- Improving performance of automatic program repair using learned heuristics (LS), pp. 1071–1073.
- ESEC-FSE-2017-Wang #adaptation #nondeterminism #re-engineering #search-based #self
- Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems (LW), pp. 1014–1017.
- ESEC-FSE-2017-YiAKTR #automation #program repair #programming
- A feasibility study of using automated program repair for introductory programming assignments (JY, UZA, AK, SHT, AR), pp. 740–751.
- ICSE-2017-0004CC #learning #semantics #traceability
- Semantically enhanced software traceability using deep learning techniques (JG0, JC, JCH), pp. 3–14.
- GPCE-2017-GrebeYG #compilation #domain-specific language #haskell
- Rewriting a shallow DSL using a GHC compiler extension (MG, DY, AG), pp. 246–258.
- SLE-2017-BrambillaCIM #crowdsourcing #domain-specific language
- Better call the crowd: using crowdsourcing to shape the notation of domain-specific languages (MB, JC, JLCI, AM), pp. 129–138.
- ASPLOS-2017-GeCJ #control flow #named
- GRIFFIN: Guarding Control Flows Using Intel Processor Trace (XG, WC, TJ), pp. 585–598.
- ASPLOS-2017-RenLDQWLQY #named #network #probability
- SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing (AR, ZL0, CD, QQ, YW, JL0, XQ, BY0), pp. 405–418.
- CASE-2017-0013YG #graph #image #optimisation
- Accurate image mosaicing for bridge deck using graph optimization with GPS data (FL0, JY, NG), pp. 1090–1095.
- CASE-2017-CarliD #distributed #grid #monitoring #multi #smarttech
- Using the distributed proximal alternating direction method of multipliers for smart grid monitoring (RC, MD), pp. 418–423.
- CASE-2017-CarliD17a #distributed #energy #programming #scalability
- A decentralized control strategy for energy retrofit planning of large-scale street lighting systems using dynamic programming (RC, MD), pp. 1196–1200.
- CASE-2017-ChenZ #automation #detection #multi
- An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
- CASE-2017-DuHZL #automation #petri net #robust
- Robust control of automated manufacturing systems with complex structures using Petri Nets (ND, HH, YZ0, YL0), pp. 364–369.
- CASE-2017-HuangMY #algorithm #difference #evolution #performance #throughput
- Forecasting of throughput performance using an ARMA model with improved differential evolution algorithm (JTH, YM, YY), pp. 376–381.
- CASE-2017-InuiKU #gpu #parallel #performance
- Fast extraction of cutter engagement features by using the parallel processing function of a GPU (MI, MK, NU), pp. 668–673.
- CASE-2017-KeL #mobile #predict #robust #visual notation
- Visual servoing of constrained differential-drive mobile robots using robust tube-based predictive control (FK, ZL0), pp. 1073–1078.
- CASE-2017-KongN #approach #fault #predict
- A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
- CASE-2017-LeeJFBGBL #analysis #modelling #process #simulation
- Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
- CASE-2017-LiangMLLG #automation #industrial #learning
- Using dVRK teleoperation to facilitate deep learning of automation tasks for an industrial robot (JL, JM, ML, PL, KG), pp. 1–8.
- CASE-2017-LiLHTCLW #analysis
- The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
- CASE-2017-OhKKSC
- Calibration of 6 axis force/torque sensor by using deep-learning method (HSO, GK, UK, JKS, HRC), pp. 1316–1317.
- CASE-2017-QinLG #data analysis #energy #internet
- Data analytics for energy consumption of digital manufacturing systems using Internet of Things method (JQ, YL, RIG), pp. 482–487.
- CASE-2017-SugimotoMMM #3d #modelling
- A 3D block printer using toy bricks for various models (CS, YM, TM, SM), pp. 958–963.
- CASE-2017-SunLYLL #simulation #smarttech
- Muscle control of fore-aft and vertical body center of mass accelerations of human slip recovery gait: A simulation study using wearable sensor shoes (WS, GL, JY, QL, TL0), pp. 1408–1413.
- CASE-2017-SunLZJ #framework #functional #learning
- Exploring functional variant using a deep learning framework (TS, ZL, XMZ, RJ), pp. 98–99.
- CASE-2017-ToneS
- A ferrofluid-based robotic sheet for liquid manipulation by using vibration control (TT, KS), pp. 776–781.
- CASE-2017-WangOLC #big data #problem #self
- Capacitated competitive facility location problem of self-collection lockers by using public big data (YW0, TO, LHL, EPC), p. 1344.
- CASE-2017-WangW #approach #constraints #higher-order #programming
- Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
- CASE-2017-WangZLHSMGY #online
- Smart control of indoor thermal environment based on online learned thermal comfort model using infrared thermal imaging (FW, BZ, RL, DH, ZS, SM, ZG, WY), pp. 924–925.
- CASE-2017-Xiao #constraints
- Selecting the best system using transient means with sequential sampling constraints (HX), p. 1052.
- CASE-2017-ZhangJ17a #estimation
- An occupancy distribution estimation method using the surveillance cameras in buildings (CZ, QSJ), pp. 894–899.
- CC-2017-ShirakoHS #gpu #parallel
- Optimized two-level parallelization for GPU accelerators using the polyhedral model (JS, AH, VS), pp. 22–33.
- CGO-2017-SenguptaCBK #bound #hardware #memory management #named #transaction
- Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
- ESOP-2017-0001P #source code #syntax
- Programs Using Syntax with First-Class Binders (FF0, BP), pp. 504–529.
- ESOP-2017-KhyzhaDGP #partial order #proving
- Proving Linearizability Using Partial Orders (AK, MD, AG, MJP), pp. 639–667.
- ESOP-2017-KopS #complexity #higher-order #nondeterminism #power of #programming
- The Power of Non-determinism in Higher-Order Implicit Complexity - Characterising Complexity Classes Using Non-deterministic Cons-Free Programming (CK, JGS), pp. 668–695.
- FASE-2017-LeblebiciAS #consistency #graph grammar #linear #optimisation
- Inter-model Consistency Checking Using Triple Graph Grammars and Linear Optimization Techniques (EL, AA, AS), pp. 191–207.
- CAV-2017-Vafeiadis #consistency #logic #memory management #verification
- Program Verification Under Weak Memory Consistency Using Separation Logic (VV), pp. 30–46.
- CAV-2017-BouajjaniEEM #proving #simulation
- Proving Linearizability Using Forward Simulations (AB, ME, CE, SOM), pp. 542–563.
- CAV-2017-ReynoldsWBBLT #scalability #string
- Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification (AR, MW, CWB, DB, TL, CT), pp. 453–474.
- ICST-2017-ChanWSPS #analysis #concurrent #fault #invariant #multi #named #source code #thread
- IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
- ICST-2017-ConverseOK #execution #generative #semantics #symbolic computation #testing
- Non-Semantics-Preserving Transformations for Higher-Coverage Test Generation Using Symbolic Execution (HC, OO, SK), pp. 241–252.
- ICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #safety
- Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
- ICST-2017-DiasFFLSSV #concurrent #contract #source code #verification
- Verifying Concurrent Programs Using Contracts (RJD, CF0, JF, JML, AS, DGS, TV), pp. 196–206.
- ICST-2017-LinWC #semantics #similarity #testing #web
- Using Semantic Similarity in Crawling-Based Web Application Testing (JWL, FW, PC), pp. 138–148.
- ICST-2017-LuckowKP #analysis #complexity
- Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
- ICST-2017-SunRJB #android #named #runtime #verification #weaving
- ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving (HS, AR, OJ, WB), pp. 532–539.
- ICST-2017-XuLC #concurrent #data type #debugging #testing
- Using Delta Debugging to Minimize Stress Tests for Concurrent Data Structures (JX, YL, RHC), pp. 35–46.
- ICTSS-2017-HusterSRKR #robust #testing #verification
- Using Robustness Testing to Handle Incomplete Verification Results When Combining Verification and Testing Techniques (SH, JS, JR, TK, WR), pp. 54–70.
- ICTSS-2017-SalvaR #integration #security #testing
- Using Data Integration for Security Testing (SS, LR), pp. 178–194.
- ICTSS-2017-SimosBDGKLW #combinator #execution #framework #testing
- Testing TLS Using Combinatorial Methods and Execution Framework (DES, JB, FD, BG, KK, YL, FW), pp. 162–177.
- VMCAI-2017-BotbolCG #communication #process #static analysis #transducer
- Static Analysis of Communicating Processes Using Symbolic Transducers (VB, EC, TLG), pp. 73–90.
- VMCAI-2017-FerraraT0K #abstract interpretation #fault
- Using Abstract Interpretation to Correct Synchronization Faults (PF, OT, PL0, EK), pp. 187–208.
- VMCAI-2017-GuW #analysis #float #source code
- Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
- VMCAI-2017-MonatM #abstract interpretation #abstraction #concurrent #precise #relational #source code #thread
- Precise Thread-Modular Abstract Interpretation of Concurrent Programs Using Relational Interference Abstractions (RM, AM), pp. 386–404.
- VMCAI-2017-OzeriPRS #abstract interpretation
- Conjunctive Abstract Interpretation Using Paramodulation (OO, OP, NR, MS), pp. 442–461.
- CBSE-2016-CrnkovicMMS #architecture #component #cyber-physical #on the
- On the Use of Component-Based Principles and Practices for Architecting Cyber-Physical Systems (IC, IM, HM, MS), pp. 23–32.
- CBSE-2016-StevaneticZ #architecture #component #experience #metric #modelling
- Exploring the Understandability of Components in Architectural Component Models Using Component Level Metrics and Participants' Experience (SS, UZ), pp. 1–6.
- ECSA-2016-ErsoyKAS #architecture #clustering #re-engineering
- Using Hypergraph Clustering for Software Architecture Reconstruction of Data-Tier Software (EE, KK, MA, HS), pp. 326–333.
- QoSA-2016-LehrigB #as a service #case study #modelling #performance
- Using Performance Models for Planning the Redeployment to Infrastructure-as-a-Service Environments: A Case Study (SL, SB0), pp. 11–20.
- WICSA-2016-KazmanCHH #architecture #design #summary #tutorial
- Tutorial Summary for Designing Software Architectures Using ADD 3.0 (RK, HC, SH, OH), p. 253.
- WICSA-2016-SobernigZ #architecture #design
- Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets (SS, UZ), pp. 61–70.
- JCDL-2016-BornandBS #classification
- Routing Memento Requests Using Binary Classifiers (NJB, LB, HVdS), pp. 63–72.
- JCDL-2016-Frick #framework #library #platform #research
- The State of Practice and Use of Digital Collections: The Digital Public Library of America as a platform for research (RF), p. 3.
- JCDL-2016-JettNCPD #comparative #library #metadata #ontology #overview
- Enhancing Scholarly Use of Digital Libraries: A Comparative Survey and Review of Bibliographic Metadata Ontologies (JJ, TNF, TWC, KRP, JSD), pp. 35–44.
- CSEET-2016-FreitasSM #learning #student
- Using an Active Learning Environment to Increase Students' Engagement (SAAdF, WCMPS, GM), pp. 232–236.
- CSEET-2016-GeorgasPM #architecture #learning #runtime #visualisation
- Supporting Software Architecture Learning Using Runtime Visualization (JCG, JDP, MJM), pp. 101–110.
- CSEET-2016-LiebelHS #education #industrial #modelling #tool support
- Impact of the Use of Industrial Modelling Tools on Modelling Education (GL, RH, JPS), pp. 18–27.
- CSEET-2016-SrinivasanLY #comprehension #diagrams #object-oriented #programming #sequence chart
- Enhancing Object-Oriented Programming Comprehension Using Optimized Sequence Diagram (MS, YL, JY), pp. 81–85.
- EDM-2016-ChenDP #diagrams #problem
- Examining the necessity of problem diagrams using MOOC AB experiments (ZC, ND, DEP), pp. 579–580.
- EDM-2016-FouhFHKS #data analysis #data type #topic
- Investigating Difficult Topics in a Data Structures Course Using Item Response Theory and Logged Data Analysis (EF, MFF, SH, KHK, CAS), pp. 370–375.
- EDM-2016-Kyrilov #automation #feedback #programming #reasoning
- Using Case-Based Reasoning to Automatically Generate High-Quality Feedback for Programming Exercises (AK), pp. 669–671.
- EDM-2016-LiuDS #data type #data-driven #multi #towards
- Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement (RL0, JLD, JCS), pp. 436–441.
- EDM-2016-Mojarad #performance #student
- Studying Assignment Size and Student Performance Using Propensity Score Matching (SM), pp. 701–702.
- EDM-2016-NgHLK #learning #modelling #sequence
- Modelling the way: Using action sequence archetypes to differentiate learning pathways from learning outcomes (KHRN, KH, KL, AWHK), pp. 167–174.
- EDM-2016-NogaitoYK #automation #case study #similarity #testing
- Study on Automatic Scoring of Descriptive Type Tests using Text Similarity Calculations (IN, KY, HK), pp. 616–617.
- EDM-2016-Penteado #assessment #data mining #estimation #mining #scalability #semantics
- Estimation of prerequisite skills model from large scale assessment data using semantic data mining (BEP), pp. 675–677.
- EDM-2016-RaffertyJG #feedback #personalisation
- Using Inverse Planning for Personalized Feedback (ANR, RJ, TLG), pp. 472–477.
- EDM-2016-RenRJ #modelling #multi #performance #predict
- Predicting Performance on MOOC Assessments using Multi-Regression Models (ZR, HR, AJ), pp. 484–489.
- EDM-2016-Yee-KingGd #collaboration #learning #metric #online #predict #social #student
- Predicting student grades from online, collaborative social learning metrics using K-NN (MYK, AGR, Md), pp. 654–655.
- EDM-2016-ZhengKTG #clustering #concept #physics
- Soft Clustering of Physics Misconceptions Using a Mixed Membership Model (GZ, SK, YT, AG), pp. 658–659.
- ICPC-2016-MetcalfFYF #interactive #parametricity #static analysis
- Extracting configuration parameter interactions using static analysis (CAM, FF, TY, JF), pp. 1–4.
- ICSME-2016-AndersonDS #testing
- Customized Regression Testing Using Telemetry Usage Patterns (JA, HD, SS), pp. 572–581.
- ICSME-2016-GopinathWHK #fault #machine learning
- Repairing Intricate Faults in Code Using Machine Learning and Path Exploration (DG, KW, JH, SK), pp. 453–457.
- ICSME-2016-KargenS #towards
- Towards Accurate Binary Correspondence Using Runtime-Observed Values (UK, NS), pp. 438–442.
- ICSME-2016-KhourySH #comprehension #principle
- Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle (RK, LS, AHL), pp. 478–482.
- ICSME-2016-LevinY #developer #maintenance #predict #process #semantics
- Using Temporal and Semantic Developer-Level Information to Predict Maintenance Activity Profiles (SL, AY), pp. 463–467.
- ICSME-2016-NguyenNN #fine-grained #source code #topic
- Using Topic Model to Suggest Fine-Grained Source Code Changes (HAN, ATN0, TNN), pp. 200–210.
- ICSME-2016-PalombaZFLO #debugging #performance #predict #smell
- Smells Like Teen Spirit: Improving Bug Prediction Performance Using the Intensity of Code Smells (FP, MZ, FAF, ADL, RO), pp. 244–255.
- ICSME-2016-XiaBLL #automation #case study #debugging #fault #harmful #locality #scalability #user study
- “Automated Debugging Considered Harmful” Considered Harmful: A User Study Revisiting the Usefulness of Spectra-Based Fault Localization Techniques with Professionals Using Real Bugs from Large Systems (XX0, LB, DL0, SL), pp. 267–278.
- MSR-2016-DamevskiCSP #developer #interactive #markov
- Interactive exploration of developer interaction traces using a hidden markov model (KD, HC0, DCS, LLP), pp. 126–136.
- MSR-2016-KikasDP #git #predict
- Using dynamic and contextual features to predict issue lifetime in GitHub projects (RK, MD, DP), pp. 291–302.
- MSR-2016-RolfsnesMABB #recommendation
- Improving change recommendation using aggregated association rules (TR, LM, SDA, RB, DWB), pp. 73–84.
- SANER-2016-0029BKT #android #library
- An Investigation into the Use of Common Libraries in Android Apps (LL0, TFB, JK, YLT), pp. 403–414.
- SANER-2016-BorckBSHHJSS #named #source code
- Frankencode: Creating Diverse Programs Using Code Clones (HB, MSB, IJDS, SAH, KH, SJ, AS, MS), pp. 604–608.
- SANER-2016-MazinanianT #css #empirical #preprocessor
- An Empirical Study on the Use of CSS Preprocessors (DM, NT), pp. 168–178.
- SANER-2016-MendesVHS #identification #random
- Identifying Utility Functions Using Random Forests (TM, MTV, ACH, AS), pp. 614–618.
- SANER-2016-NishimuraM #fine-grained
- Supporting Merge Conflict Resolution by Using Fine-Grained Code Change History (YN, KM), pp. 661–664.
- SANER-2016-PanichellaDOPPL #algorithm #search-based
- Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms (AP, BD, RO, MDP, DP, ADL), pp. 314–325.
- SANER-2016-RahmanRL #api #automation #crowdsourcing #named #recommendation
- RACK: Automatic API Recommendation Using Crowdsourced Knowledge (MMR0, CKR, DL0), pp. 349–359.
- SANER-2016-ZhengRSLSJBCQB #analysis #hybrid #named
- AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
- CIAA-2016-StasioMPV #algorithm #game studies
- Solving Parity Games Using an Automata-Based Algorithm (ADS, AM, GP, MYV), pp. 64–76.
- CIAA-2016-WeidemanMBW #ambiguity #automaton #backtracking #behaviour #nondeterminism #regular expression
- Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA (NW, BvdM, MB, BWW), pp. 322–334.
- DLT-2016-Basten #ambiguity #automaton #detection #multi
- Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
- FM-2016-CavadaCCRT #design #embedded #energy #modelling
- Model-Based Design of an Energy-System Embedded Controller Using Taste (RC, AC, LC, MR, ST), pp. 741–747.
- FM-2016-StoenescuSPI #analysis #execution #framework #named #symbolic computation
- RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
- FM-2016-VakiliD #finite #logic #similarity
- Finite Model Finding Using the Logic of Equality with Uninterpreted Functions (AV, NAD), pp. 677–693.
- IFM-2016-AntoninoGR #analysis #performance #satisfiability
- Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
- IFM-2016-KumarBLDUB #verification
- CloudSDV Enabling Static Driver Verifier Using Microsoft Azure (RK, TB, JL, ND, AU, CB), pp. 523–536.
- IFM-2016-Preoteasa #invariant #logic #pointer #programming #source code #verification
- Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
- IFM-2016-SchutsHV #case study #equivalence #experience #industrial #learning #legacy #refactoring
- Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report (MS, JH, FWV), pp. 311–325.
- SEFM-2016-FeistMP #control flow #execution #symbolic computation
- Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information (JF, LM, MLP), pp. 76–81.
- SEFM-2016-HusienS #generative #model checking
- Program Generation Using Simulated Annealing and Model Checking (IH, SS), pp. 155–171.
- Haskell-2016-WangNF #algorithm #named #search-based #strict
- Autobahn: using genetic algorithms to infer strictness annotations (YRW, DN, KF), pp. 114–126.
- ICFP-2016-CastroHS #morphism #parallel #pipes and filters #process #reasoning
- Farms, pipes, streams and reforestation: reasoning about structured parallel processes using types and hylomorphisms (DC, KH, SS), pp. 4–17.
- AIIDE-2016-DebkowskiMYYYFK #behaviour #collaboration #game studies #multi #named #online
- Contained: Using Multiplayer Online Games to Quantify Success of Collaborative Group Behavior (DD, AM, NY, LY, YY, SF, MK), pp. 149–154.
- AIIDE-2016-GeibWMKCP #recognition
- Building Helpful Virtual Agents Using Plan Recognition and Planning (CWG, JW, SM, PK, BGWC, RPAP), pp. 162–168.
- AIIDE-2016-GunesSAES #approach #modelling
- A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
- AIIDE-2016-HarrisonR #crowdsourcing #learning
- Learning From Stories: Using Crowdsourced Narratives to Train Virtual Agents (BH, MOR), pp. 183–189.
- AIIDE-2016-SinghDHJPM #network
- Recognizing Actions in Motion Trajectories Using Deep Neural Networks (KYS, NMD, CPH, MJ, KP, BM), pp. 211–217.
- AIIDE-2016-SooLC #monte carlo
- Generate Believable Causal Plots with User Preferences Using Constrained Monte Carlo Tree Search (VWS, CML, THC), pp. 218–224.
- CHI-PLAY-2016-ReinschluesselM #game studies #self
- Using Positive or Negative Reinforcement in Neurofeedback Games for Training Self-Regulation (AVR, RLM), pp. 186–198.
- CHI-PLAY-2016-SavardBW #challenge #collaboration #game studies
- Collaborative Solving in a Human Computing Game Using a Market, Skills and Challenges (OTS, AB, JW), pp. 130–141.
- CHI-PLAY-2016-SharmaTDKJ #artificial reality #game studies
- Evaluating Display Modalities Using a Mixed Reality Game (HNS, ZOT, ID, AK, AJ), pp. 65–77.
- CHI-PLAY-2016-ZayerTF #mobile #named
- PAWdio: Hand Input for Mobile VR using Acoustic Sensing (MAZ, ST, EF), pp. 154–158.
- CIG-2016-Bursztein #learning #statistics
- I am a legend: Hacking hearthstone using statistical learning methods (EB), pp. 1–8.
- CIG-2016-CazenaveLTT #game studies #learning #random
- Learning opening books in partially observable games: Using random seeds in Phantom Go (TC, JL0, FT, OT), pp. 1–7.
- CIG-2016-KiourtK #modelling #social
- Using opponent models to train inexperienced synthetic agents in social environments (CK, DK), pp. 1–4.
- CIG-2016-ParkK #visual notation
- Deep Q-learning using redundant outputs in visual doom (HSP, KJK), pp. 1–2.
- CIG-2016-SephtonCDHS #android #mining #predict
- Using association rule mining to predict opponent deck content in android: Netrunner (NS, PIC, SD, VJH, NHS), pp. 1–8.
- CIG-2016-StanescuBHB #game studies #network #realtime
- Evaluating real-time strategy game states using convolutional neural networks (MS, NAB, AH, MB), pp. 1–7.
- CIG-2016-YooK #algorithm #game studies #video
- Changing video game graphic styles using neural algorithms (BY, KJK), pp. 1–2.
- DiGRA-FDG-2016-GoddardM #assembly #design #game studies
- Designing Unconventional Use of Conventional Displays in Games: Some Assembly Required (WG, AM).
- DiGRA-FDG-2016-LimLH #approach #bottom-up #category theory #clustering #image #social
- Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
- DiGRA-FDG-2016-ZhuKCL #education #game studies #interactive #social
- Using Interactive Social Story Games to Teach Social Skills to Children with Autism (JZ, CK, JC, NL).
- VS-Games-2016-AyedGJAVM #game studies #people
- Fall Prevention Serious Games for Elderly People Using RGBD Devices (IA, AG, AJiC, BMA, JV, PMB), pp. 1–3.
- VS-Games-2016-LopeM #education #game studies #uml
- Using UML to Model Educational Games (RPdL, NMM), pp. 1–4.
- VS-Games-2016-NicolaouLL #artificial reality
- Stroke Event Simulator Using Virtual Reality (PN, ML, FL), pp. 1–2.
- VS-Games-2016-PaliokasS #game studies
- The Use of Serious Games in Museum Visits and Exhibitions: A Systematic Mapping Study (IP, SS), pp. 1–8.
- VS-Games-2016-Piedra-Fernandez #artificial reality #communication #people
- Sign Communication for People with Disabilities Using Kinect Technology at Home (JAPF, JJOC, CBB, LIM), pp. 1–2.
- VS-Games-2016-VosinakisKMS #approach #artificial reality
- A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
- CIKM-2016-0001H #adaptation #interactive #learning #multi #named
- aptMTVL: Nailing Interactions in Multi-Task Multi-View Multi-Label Learning using Adaptive-basis Multilinear Factor Analyzers (XL0, JH), pp. 1171–1180.
- CIKM-2016-AgrawalC #data mining #mining #predict
- A Fatigue Strength Predictor for Steels Using Ensemble Data Mining: Steel Fatigue Strength Predictor (AA, ANC), pp. 2497–2500.
- CIKM-2016-Balaneshinkordan #concept #graph #query
- Sequential Query Expansion using Concept Graph (SB, AK), pp. 155–164.
- CIKM-2016-CheemaKALWCR #analysis #health #monitoring #on the
- On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
- CIKM-2016-ChenWPT #community #network #performance
- Efficient Computation of Importance Based Communities in Web-Scale Networks Using a Single Machine (SC, RW, DP, AT), pp. 1553–1562.
- CIKM-2016-HanadaPCL #effectiveness #fault #type system
- Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution (RH, MdGCP, MC, FAL), pp. 1723–1732.
- CIKM-2016-HansenLM #predict #query #web
- Ensemble Learned Vaccination Uptake Prediction using Web Search Queries (NDH, CL, KM), pp. 1953–1956.
- CIKM-2016-JatowtKT #predict #wiki
- Predicting Importance of Historical Persons using Wikipedia (AJ, DK, KT), pp. 1909–1912.
- CIKM-2016-KuziSK #query #word
- Query Expansion Using Word Embeddings (SK, AS, OK), pp. 1929–1932.
- CIKM-2016-LiCL #approximate #graph #query
- Approximating Graph Pattern Queries Using Views (JL, YC0, XL), pp. 449–458.
- CIKM-2016-LiuKL #predict #social #social media
- Collective Traffic Prediction with Partially Observed Traffic History using Location-Based Social Media (XL, XK, YL), pp. 2179–2184.
- CIKM-2016-ManotumruksaMO #modelling #recommendation
- Regularising Factorised Models for Venue Recommendation using Friends and their Comments (JM, CM, IO), pp. 1981–1984.
- CIKM-2016-MartinoBR0M #community #learning
- Learning to Re-Rank Questions in Community Question Answering Using Advanced Features (GDSM, ABC, SR, AU0, AM), pp. 1997–2000.
- CIKM-2016-Najork #email #experience #machine learning
- Using Machine Learning to Improve the Email Experience (MN), p. 891.
- CIKM-2016-RoyGMJ #composition #estimation #feedback #kernel #word
- Word Vector Compositionality based Relevance Feedback using Kernel Density Estimation (DR, DG, MM, GJFJ), pp. 1281–1290.
- CIKM-2016-RuanSXTFLZ #network
- Forecasting Seasonal Time Series Using Weighted Gradient RBF Network based Autoregressive Model (WR, QZS, PX, NKT0, NJGF, XL0, WEZ), pp. 2021–2024.
- CIKM-2016-SinghC #aspect-oriented #query
- Iterative Search using Query Aspects (MS, WBC), pp. 2037–2040.
- CIKM-2016-TongKIKSV
- Deep Match between Geology Reports and Well Logs Using Spatial Information (BT, MK, MI, YK, AS, RV), pp. 1833–1842.
- CIKM-2016-TutekGSMB #concept #detection #knowledge base #ranking
- Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
- CIKM-2016-WangJYJM #learning
- Learning to Extract Conditional Knowledge for Question Answering using Dialogue (PW, LJ, JY0, LJ, WYM), pp. 277–286.
- CIKM-2016-WangOWWLPG #concept
- Using Prerequisites to Extract Concept Maps fromTextbooks (SW, AO, ZW0, KW, CL0, BP, CLG), pp. 317–326.
- CIKM-2016-WangWZ #distributed #graph #partial evaluation #performance #query #rdf
- Efficient Distributed Regular Path Queries on RDF Graphs Using Partial Evaluation (XW0, JW, XZ), pp. 1933–1936.
- CIKM-2016-Wu0XTL #named #recommendation #word
- Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation (YW, YY0, FX0, HT, JL0), pp. 2287–2292.
- CIKM-2016-XuCLMM #personalisation #recommendation #semantics #similarity
- Tag-Aware Personalized Recommendation Using a Deep-Semantic Similarity Model with Negative Sampling (ZX, CC0, TL, YM, XM), pp. 1921–1924.
- CIKM-2016-YuanGJCYZ #learning #named #ranking
- LambdaFM: Learning Optimal Ranking with Factorization Machines Using Lambda Surrogates (FY, GG, JMJ, LC0, HY, WZ0), pp. 227–236.
- CIKM-2016-ZhangDH #ambiguity #case study #classification #online
- Bayesian Non-Exhaustive Classification A Case Study: Online Name Disambiguation using Temporal Record Streams (BZ, MD, MAH), pp. 1341–1350.
- CIKM-2016-ZhangLDCKS #big data #locality #privacy #scalability
- Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
- CIKM-2016-ZhengWPYFX #big data #predict
- Urban Traffic Prediction through the Second Use of Inexpensive Big Data from Buildings (ZZ, DW0, JP, YY, CF, LFX), pp. 1363–1372.
- ECIR-2016-0002B #information retrieval
- Diversifying Search Results Using Time - An Information Retrieval Method for Historians (DG0, KB), pp. 789–795.
- ECIR-2016-ArguelloAD #performance #predict #query
- Using Query Performance Predictors to Improve Spoken Queries (JA, SA, FD0), pp. 309–321.
- ECIR-2016-BalikasA #classification #multi
- Multi-label, Multi-class Classification Using Polylingual Embeddings (GB, MRA), pp. 723–728.
- ECIR-2016-WangME #category theory #fine-grained #image #visual notation
- Harvesting Training Images for Fine-Grained Object Categories Using Visual Descriptions (JW, KM, ME), pp. 549–560.
- ICML-2016-AroraMM #learning #multi #optimisation #probability #representation
- Stochastic Optimization for Multiview Representation Learning using Partial Least Squares (RA, PM, TVM), pp. 1786–1794.
- ICML-2016-BuiHHLT #approximate #process
- Deep Gaussian Processes for Regression using Approximate Expectation Propagation (TDB, DHL, JMHL, YL, RET), pp. 1472–1481.
- ICML-2016-GonenOS #sketching
- Solving Ridge Regression using Sketched Preconditioned SVRG (AG, FO, SSS), pp. 1397–1405.
- ICML-2016-GuanRW #learning #markov #multi #performance #process #recognition
- Efficient Multi-Instance Learning for Activity Recognition from Time Series Data Using an Auto-Regressive Hidden Markov Model (XG, RR, WKW), pp. 2330–2339.
- ICML-2016-JasinskaDBPKH #probability
- Extreme F-measure Maximization using Sparse Probability Estimates (KJ, KD, RBF, KP, TK, EH), pp. 1435–1444.
- ICML-2016-JohnsonZ #categorisation
- Supervised and Semi-Supervised Text Categorization using LSTM for Region Embeddings (RJ, TZ0), pp. 526–534.
- ICML-2016-JunN #multi
- Anytime Exploration for Multi-armed Bandits using Confidence Information (KSJ, RDN), pp. 974–982.
- ICML-2016-LarsenSLW #encoding #metric #similarity
- Autoencoding beyond pixels using a learned similarity metric (ABLL, SKS, HL, OW), pp. 1558–1566.
- ICML-2016-NiuRFH #parametricity #performance
- Fast Parameter Inference in Nonlinear Dynamical Systems using Iterative Gradient Matching (MN, SR, MF, DH), pp. 1699–1707.
- ICML-2016-RoychowdhuryKP #monte carlo #robust
- Robust Monte Carlo Sampling using Riemannian Nosé-Poincaré Hamiltonian Dynamics (AR, BK, SP0), pp. 2673–2681.
- ICML-2016-SangnierGR #detection #proximity #reliability #representation
- Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
- ICML-2016-SiHD #approximate #performance
- Computationally Efficient Nyström Approximation using Fast Transforms (SS, CJH, ISD), pp. 2655–2663.
- ICML-2016-ZhuQRY #coordination #performance
- Even Faster Accelerated Coordinate Descent Using Non-Uniform Sampling (ZAZ, ZQ, PR, YY), pp. 1110–1119.
- ICPR-2016-AhmedCSNN #image #smarttech
- Using fusion of iris code and periocular biometric for matching visible spectrum iris images captured by smart phone cameras (NUA, SC, EHS, AN, IN), pp. 176–180.
- ICPR-2016-Al-DulaimiBTC #automation #geometry #image #segmentation #set
- Automatic segmentation of HEp-2 cell Fluorescence microscope images using level set method via geometric active contours (KAD, JB, ITR, VC), pp. 81–83.
- ICPR-2016-Alonso-Fernandez #multi #recognition
- Compact multi-scale periocular recognition using SAFE features (FAF, AM, JB), pp. 1455–1460.
- ICPR-2016-AntonyMOM #network
- Quantifying radiographic knee osteoarthritis severity using deep convolutional neural networks (JA, KM, NEO, KM), pp. 1195–1200.
- ICPR-2016-AydinKAA #automation #predict #random
- Automatic personality prediction from audiovisual data using random forest regression (BA, AAK, OA, LA), pp. 37–42.
- ICPR-2016-BachaAB #probability #recognition #visual notation
- Event recognition in photo albums using probabilistic graphical model and feature relevance (SB, MSA, NB), pp. 2819–2823.
- ICPR-2016-BartoliLSB #estimation #profiling
- User interest profiling using tracking-free coarse gaze estimation (FB, GL, LS, ADB), pp. 1839–1844.
- ICPR-2016-BertoliniOS #difference #identification #multi
- Multi-script writer identification using dissimilarity (DB, LSO, RS), pp. 3025–3030.
- ICPR-2016-BhagavatulaAS #estimation
- Pose estimation using Spectral and Singular Value recomposition (CB, RA, MS), pp. 4095–4100.
- ICPR-2016-Brandtberg #analysis #classification #fourier #fuzzy #multi #order #rank
- Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
- ICPR-2016-BrownF #detection #smarttech
- Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
- ICPR-2016-BSSH #approach #classification #network
- HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
- ICPR-2016-BullingerBWA #bound #generative #re-engineering #video
- Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
- ICPR-2016-CamgozHKB #3d #gesture #independence #network #recognition
- Using Convolutional 3D Neural Networks for User-independent continuous gesture recognition (NCC, SH, OK, RB), pp. 49–54.
- ICPR-2016-CarbonneauGG #identification #learning #multi #random
- Witness identification in multiple instance learning using random subspaces (MAC, EG, GG), pp. 3639–3644.
- ICPR-2016-ChakrabortyPK #information management #recognition #speech
- Spontaneous speech emotion recognition using prior knowledge (RC, MP, SKK), pp. 2866–2871.
- ICPR-2016-ChowdhuryBMKS #image #network #performance #retrieval
- An efficient radiographic Image Retrieval system using Convolutional Neural Network (MC, SRB, RM, MKK, ÖS), pp. 3134–3139.
- ICPR-2016-Chun #adaptation #authentication
- Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information (SYC), pp. 3043–3048.
- ICPR-2016-DaiDCLY #multi #rank #representation #segmentation
- Object segmentation using low-rank representation with multiple block-diagonal priors (LD, JD, JC, JL0, JY0), pp. 1959–1964.
- ICPR-2016-DaoodRB #classification #multi #recognition
- Pollen recognition using a multi-layer hierarchical classifier (AD, ER, MB), pp. 3091–3096.
- ICPR-2016-DutaNAIS #recognition
- Boosting VLAD with double assignment using deep features for action recognition in videos (ICD, TAN0, KA, BI, NS), pp. 2210–2215.
- ICPR-2016-EichhardtH
- Improvement of camera calibration using surface normals (IE, LH), pp. 3745–3750.
- ICPR-2016-ElTantawyS #matrix #novel #physics
- A novel method for segmenting moving objects in aerial imagery using matrix recovery and physical spring model (AE, MSS), pp. 3898–3903.
- ICPR-2016-EumD #evaluation #multi
- Content selection using frontalness evaluation of multiple frames (SE, DSD), pp. 3404–3409.
- ICPR-2016-FariaCLI #dependence #recognition
- Information fusion for cocaine dependence recognition using fMRI (FAF, FAMC, CsRL, JSI), pp. 1107–1112.
- ICPR-2016-FengLL #effectiveness #learning
- Learning effective Gait features using LSTM (YF0, YL, JL), pp. 325–330.
- ICPR-2016-FoareLT16a #calculus #functional #image #segmentation
- Image restoration and segmentation using the Ambrosio-Tortorelli functional and Discrete Calculus (MF, JOL, HT), pp. 1418–1423.
- ICPR-2016-GaoCZFZ #image #segmentation
- Texture image segmentation using fused features and active contour (MG, HC, SZ, BF0, LZ), pp. 2036–2041.
- ICPR-2016-GaoYGC #approach #constraints #network
- Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
- ICPR-2016-GhoraiMC #image #kernel #statistics
- Patch sparsity based image inpainting using local patch statistics and steering kernel descriptor (MG, SM, BC), pp. 781–786.
- ICPR-2016-GiraudTP #linear #named
- SCALP: Superpixels with Contour Adherence using Linear Path (RG, VTT, NP), pp. 2374–2379.
- ICPR-2016-GrimmMBS #classification
- Sleep position classification from a depth camera using Bed Aligned Maps (TG, MM, AB, RS), pp. 319–324.
- ICPR-2016-GuoDFS #detection #robust
- A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
- ICPR-2016-HafemannSO #verification
- Analyzing features learned for Offline Signature Verification using Deep CNNs (LGH, RS, LSO), pp. 2989–2994.
- ICPR-2016-HajduHBLEHT #algorithm #approximate #grid #network
- Measuring regularity of network patterns by grid approximations using the LLL algorithm (AH, BH, RB, IL, GE, LH, RT), pp. 1524–1529.
- ICPR-2016-HasegawaH #classification #image #named #network
- PLSNet: A simple network using Partial Least Squares regression for image classification (RH, KH), pp. 1601–1606.
- ICPR-2016-HsuCH #representation #verification
- Object verification in two views using Sparse representation (SCH, ICC, CLH), pp. 504–509.
- ICPR-2016-HuangY #3d #network
- Point cloud labeling using 3D Convolutional Neural Network (JH0, SY), pp. 2670–2675.
- ICPR-2016-ItoA #authentication
- A score calculation method using positional information of feature points for biometric authentication (KI, TA), pp. 3049–3054.
- ICPR-2016-JafariKNSSWN #image #learning #segmentation
- Skin lesion segmentation in clinical images using deep learning (MHJ, NK, ENE, SS, SMRS, KRW, KN), pp. 337–342.
- ICPR-2016-JhuangLT #3d #network #verification
- Face verification with three-dimensional point cloud by using deep belief networks (DHJ, DTL, CHT), pp. 1430–1435.
- ICPR-2016-JiaoZ #learning #multi #taxonomy
- Multiple Instance Dictionary Learning using Functions of Multiple Instances (CJ, AZ), pp. 2688–2693.
- ICPR-2016-JohnKGNMI #learning #modelling #performance #segmentation
- Fast road scene segmentation using deep learning and scene-based models (VJ, KK, CG, HTN, SM, KI), pp. 3763–3768.
- ICPR-2016-JoyR0V #big data #optimisation
- Hyperparameter tuning for big data using Bayesian optimisation (TTJ, SR, SG0, SV), pp. 2574–2579.
- ICPR-2016-KalraSRT #learning #network
- Learning opposites using neural networks (SK, AS, SR, HRT), pp. 1213–1218.
- ICPR-2016-Kamkar0LPV #graph #predict
- Stable clinical prediction using graph support vector machines (IK, SG0, CL0, DQP, SV), pp. 3332–3337.
- ICPR-2016-KhanH #adaptation #learning #polynomial
- Adapting instance weights for unsupervised domain adaptation using quadratic mutual information and subspace learning (MNAK, DRH), pp. 1560–1565.
- ICPR-2016-KilicarslanZ #video
- Bridge motion to collision alarming using driving video (MK, JYZ), pp. 1870–1875.
- ICPR-2016-KimP #approach #detection #network
- A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
- ICPR-2016-KimP16a #network
- Discovering characteristic landmarks on ancient coins using convolutional networks (JK, VP), pp. 1595–1600.
- ICPR-2016-KimV #classification #semantics
- Deep Action Unit classification using a binned intensity loss and semantic context model (EK, SV), pp. 4136–4141.
- ICPR-2016-KondratevS #automation #constraints #detection #geometry #image
- Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
- ICPR-2016-LeiT #modelling
- Modeling human-skeleton motion patterns using conditional deep Boltzmann machine (PL, ST), pp. 1845–1850.
- ICPR-2016-Lezoray #image
- High dynamic range image processing using manifold-based ordering (OL), pp. 289–294.
- ICPR-2016-LiaoLL #classification #multi #network #robust
- Skin disease classification versus skin lesion characterization: Achieving robust diagnosis using multi-label deep neural networks (HL, YL, JL), pp. 355–360.
- ICPR-2016-LiuHWLL #image #performance #retrieval #segmentation
- Efficient segmentation for Region-based Image Retrieval using Edge Integrated Minimum Spanning Tree (YL0, LH0, SW, XL, BL), pp. 1929–1934.
- ICPR-2016-LuoGPWY #locality #mobile #multi
- Accurate localization for mobile device using a multi-planar city model (YL, TG, HP, YW, JY), pp. 3733–3738.
- ICPR-2016-MarronePFPSS #fuzzy #segmentation
- Breast segmentation using Fuzzy C-Means and anatomical priors in DCE-MRI (SM0, GP, RF, AP, MS, CS), pp. 1472–1477.
- ICPR-2016-Martinez-DiazCH #encoding #performance #recognition #video
- Efficient video face recognition by using Fisher Vector encoding of binary features (YMD, LC, NH, HMV, LES), pp. 1436–1441.
- ICPR-2016-MatsukawaS #identification
- Person re-identification using CNN features learned from combination of attributes (TM, ES), pp. 2428–2433.
- ICPR-2016-MatsuzakiUSS #2d #3d #constraints #geometry #retrieval #verification
- Geometric verification using semi-2D constraints for 3D object retrieval (KM, YU, SS, SS), pp. 2338–2343.
- ICPR-2016-MohagheghKSSN #estimation #image
- Single image depth estimation using joint local-global features (HM, NK, SMRS, SS, KN), pp. 727–732.
- ICPR-2016-MollerNN16a #clustering #detection #image
- Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
- ICPR-2016-MontenegroA #artificial reality #estimation #human-computer
- Gaze estimation using EEG signals for HCI in augmented and virtual reality headsets (JMFM, VA), pp. 1159–1164.
- ICPR-2016-NahaW16a #learning #segmentation
- Object figure-ground segmentation using zero-shot learning (SN, YW0), pp. 2842–2847.
- ICPR-2016-NairKNG #documentation #network #segmentation
- Segmentation of highly unstructured handwritten documents using a neural network technique (RRN, BUK, IN, VG), pp. 1291–1296.
- ICPR-2016-Nakazawa #image #random
- Noise stable image registration using RANdom RESAmple Consensus (AN), pp. 853–858.
- ICPR-2016-NaminAP #2d #3d #higher-order #segmentation #semantics
- 2D-3D semantic segmentation using cardinality as higher-order loss (SRN, JMA, LP), pp. 3775–3780.
- ICPR-2016-Nguyen #automation #generative #image
- Automatic generation of a realistic looking single image stereogram using stereo vision (MN), pp. 3826–3831.
- ICPR-2016-NishiyamaNYYIS #identification #physics
- Person re-identification using co-occurrence attributes of physical and adhered human characteristics (MN, SN, TY, HY, YI, KS), pp. 2085–2090.
- ICPR-2016-OnZEB #multi #pattern matching #pattern recognition #recognition
- Spatio-temporal pattern recognition of dendritic spines and protein dynamics using live multichannel fluorescence microscopy (VO, AZ, IE, BB), pp. 2042–2047.
- ICPR-2016-OrriteRM #distance #learning #process #sequence
- One-shot learning of temporal sequences using a distance dependent Chinese Restaurant Process (CO, MR, CM), pp. 2694–2699.
- ICPR-2016-OrueG #graph #process #recognition
- Face recognition using activities of directed graphs in spatial pyramid (JPMO, WNG), pp. 3162–3167.
- ICPR-2016-Oskarsson
- Characterizing the structure tensor using gamma distributions (MO), pp. 763–768.
- ICPR-2016-PalaniappanPAVF #detection
- Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
- ICPR-2016-PalCGCC #learning #multi
- Severity grading of psoriatic plaques using deep CNN based multi-task learning (AP, AC, UG, AC, RC), pp. 1478–1483.
- ICPR-2016-PengRP #learning #network #recognition
- Learning face recognition from limited training data using deep neural networks (XP, NKR, SP), pp. 1442–1447.
- ICPR-2016-Ponce-Hinestroza #adaptation
- Using a MRF-BP model with color adaptive training for underwater color restoration (ANPH, LATM, PDJ), pp. 787–792.
- ICPR-2016-PrasathKOGHSP #classification #random #segmentation
- HEp-2 cell classification and segmentation using motif texture patterns and spatial features with random forests (VBSP, YMK, ZAO, JBG, AH, GS, KP), pp. 90–95.
- ICPR-2016-QinJYW #image #recognition
- Building facade recognition from aerial images using Delaunay Triangulation induced feature perceptual grouping (XQ, MJ, XY, JW0), pp. 3368–3373.
- ICPR-2016-QuachtranHS #detection #learning
- Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
- ICPR-2016-QuWL #recognition #representation
- In-air handwritten Chinese character recognition using discriminative projection based on locality-sensitive sparse representation (XQ, WW, KL), pp. 1137–1140.
- ICPR-2016-RaiNCD #clustering #graph #multi
- Partial Multi-View Clustering using Graph Regularized NMF (NR, SN, SC, OD), pp. 2192–2197.
- ICPR-2016-RaytchevKTK #kernel #recognition #representation
- Higher-level representation of local spatio-temporal features for human action recognition using Subspace Matching Kernels (BR, HK, TT, KK), pp. 3862–3867.
- ICPR-2016-Robles-KellyW #graph #image
- Semi-supervised image labelling using barycentric graph embeddings (ARK, RW), pp. 1518–1523.
- ICPR-2016-Rowekamp #performance
- Fast thresholding of high dimensional Euclidean distances using binary squaring (JHR), pp. 3103–3108.
- ICPR-2016-SagawaSHOKF #automation #feature model #robust
- Automatic feature extraction using CNN for robust active one-shot scanning (RS, YS, TH, SO, HK, RF), pp. 234–239.
- ICPR-2016-SahooA0 #approach #automation #clustering #generative #multi
- Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
- ICPR-2016-SaikiaSSKG #analysis #kernel #learning #multi
- Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
- ICPR-2016-SerinoB #3d
- Using local convexities as anchor points for 3D curve skeletonization (LS, GSdB), pp. 2854–2859.
- ICPR-2016-ShigetaMKSTMI #segmentation
- A bone marrow cavity segmentation method using wavelet-based texture feature (HS, TM, JK, SS, HT, HM, MI), pp. 2133–2138.
- ICPR-2016-ShiWXW #adaptation #image
- OTSU guided adaptive binarization of CAPTCHA image using gamma correction (CS, YW, BX, CW), pp. 3962–3967.
- ICPR-2016-SidibeRM #detection #multi #on the
- On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
- ICPR-2016-SuCHH #detection #image #modelling #recognition #symmetry
- Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
- ICPR-2016-SunBTTH #detection #learning #locality
- Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
- ICPR-2016-SunHL #detection #image
- Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
- ICPR-2016-TakabeTKSMNY #consistency #detection
- Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
- ICPR-2016-TakadaHJ
- Human tracking in crowded scenes using target information at previous frames (HT, KH, PJ), pp. 1809–1814.
- ICPR-2016-TakahashiIKOM #multi #robust
- Robust volleyball tracking system using multi-view cameras (MT, KI, MK, HO, TM), pp. 2740–2745.
- ICPR-2016-TakezawaHT #detection #documentation #image
- Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
- ICPR-2016-TianMO #detection #embedded #low cost #recognition
- Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
- ICPR-2016-TizhooshMZD #image #retrieval
- Barcodes for medical image retrieval using autoencoded Radon transform (HRT, CM, SZ, SD), pp. 3150–3155.
- ICPR-2016-ToyamaMS #clustering #performance
- Fast template matching using Brick Partitioning and initial threshold (FT, HM, KS), pp. 687–691.
- ICPR-2016-VinhEPBLR #modelling #random #robust
- Training robust models using Random Projection (XVN, SME, SP, JB0, CL, KR), pp. 531–536.
- ICPR-2016-WangLLGTO #gesture #network #recognition #scalability
- Large-scale Isolated Gesture Recognition using Convolutional Neural Networks (PW, WL, SL, ZG, CT, PO), pp. 7–12.
- ICPR-2016-WangLLZGO #gesture #network #recognition #scalability
- Large-scale Continuous Gesture Recognition Using Convolutional Neural Networks (PW, WL, SL, YZ, ZG, PO), pp. 13–18.
- ICPR-2016-WangWH #analysis #network
- Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
- ICPR-2016-WarisIG
- Object proposals using CNN-based edge filtering (MAW, AI, MG), pp. 627–632.
- ICPR-2016-Williams #classification #network
- Underwater target classification in synthetic aperture sonar imagery using deep convolutional neural networks (DPW), pp. 2497–2502.
- ICPR-2016-WuLZN #modelling #re-engineering
- Model-based face reconstruction using SIFT flow registration and spherical harmonics (FW, SL, TZ, KNN), pp. 1774–1779.
- ICPR-2016-XuLHWLWHC #3d #image #multi #retrieval #word
- Bag of temporal co-occurrence words for retrieval of focal liver lesions using 3D multiphase contrast-enhanced CT images (YX, LL, HH, DW, YL, JW0, XHH, YWC), pp. 2282–2287.
- ICPR-2016-YamashitaFYF #detection #multi #network
- Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
- ICPR-2016-YangJNL #network #normalisation #online #recognition
- Rotation-free online handwritten character recognition using dyadic path signature features, hanging normalization, and deep neural network (WY, LJ, HN, TL), pp. 4083–4088.
- ICPR-2016-YangL #learning #nondeterminism
- Active learning using uncertainty information (YY, ML), pp. 2646–2651.
- ICPR-2016-YB #3d #optimisation #video
- Rate distortion optimization using SSIM for 3D video coding (HY, PKB), pp. 1261–1266.
- ICPR-2016-YeWH #generative #graph
- Analyzing graph time series using a generative model (CY, RCW0, ERH), pp. 3338–3343.
- ICPR-2016-YildizU #classification #incremental #order
- Incremental construction of rule ensembles using classifiers produced by different class orderings (OTY, AU), pp. 492–497.
- ICPR-2016-YodaNTKYK #image #multi
- Dynamic photometric stereo method using multi-tap CMOS image sensor (TY, HN, RiT, KK, KY, SK), pp. 2356–2361.
- ICPR-2016-YuLC #multi
- Recognizing text in historical maps using maps from multiple time periods (RY, ZL, YYC), pp. 3993–3998.
- ICPR-2016-YuWSH #invariant #recognition
- View invariant gait recognition using only one uniform model (SY, QW, LS, YH), pp. 889–894.
- ICPR-2016-ZemeneTPP #clustering #detection #set
- Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
- ICPR-2016-ZhangGSSL #robust
- Robust tensor factorization using maximum correntropy criterion (MZ, YG, CS, JLS, JL), pp. 4184–4189.
- ICPR-2016-ZhangLQ #network
- Wake-up-word spotting using end-to-end deep neural network system (SZ, WL, YQ0), pp. 2878–2883.
- ICPR-2016-ZhangWY #correlation #image
- Theoretical criterion for image matching using GPT correlation (SZ, TW, YY), pp. 555–560.
- ICPR-2016-ZhaoIBJ #fault #predict
- Wind turbine fault prediction using soft label SVM (RZ, MRAI, KPB, QJ), pp. 3192–3197.
- ICPR-2016-ZhaoMFQH #performance #predict
- Fast motion deblurring using gyroscopes and strong edge prediction (JZ, JM, BF, SQ, FH), pp. 739–744.
- ICPR-2016-ZhengCZZL #independence #network
- Text-independent voice conversion using deep neural network based phonetic level features (HZ, WC, TZ, SZ, ML0), pp. 2872–2877.
- ICPR-2016-ZhengLZW #image #multi
- Multi-focus image fusion using quaternion wavelet transform (XNZ, XL, ZZ, XJW), pp. 883–888.
- ICPR-2016-ZhugeHNY #clustering #feature model #graph
- Unsupervised feature extraction using a learned graph with clustering structure (WZ, CH, FN, DY), pp. 3597–3602.
- ICPR-2016-ZhuZMSSS #3d #gesture #network #recognition #scalability
- Large-scale Isolated Gesture Recognition using pyramidal 3D convolutional networks (GZ, LZ0, LM, JS, JS, PS), pp. 19–24.
- KDD-2016-AgostaGHIKZ #clustering #data analysis #scalability
- Scalable Data Analytics Using R: Single Machines to Hadoop Spark Clusters (JMA, DG, RH, MI, SK, MZ), p. 2115.
- KDD-2016-BrooksKG #data-driven #predict #ranking
- Developing a Data-Driven Player Ranking in Soccer Using Predictive Model Weights (JB, MK, JVG), pp. 49–55.
- KDD-2016-ChakrabortyVJS #predict
- Predicting Socio-Economic Indicators using News Events (SC, AV, SJ, LS), pp. 1455–1464.
- KDD-2016-ChenLHYGG
- City-Scale Map Creation and Updating using GPS Collections (CC0, CL, QH, QY0, DG, LJG), pp. 1465–1474.
- KDD-2016-HaarenSDF #machine learning
- Analyzing Volleyball Match Data from the 2014 World Championships Using Machine Learning Techniques (JVH, HBS, JD, PF), pp. 627–634.
- KDD-2016-HaPK #categorisation #e-commerce #multi #network #scalability
- Large-Scale Item Categorization in e-Commerce Using Multiple Recurrent Neural Networks (JH, HP, JK), pp. 107–115.
- KDD-2016-HuoNH #effectiveness #learning #metric #robust
- Robust and Effective Metric Learning Using Capped Trace Norm: Metric Learning via Capped Trace Norm (ZH, FN, HH), pp. 1605–1614.
- KDD-2016-KuangTCPSP #self
- Computational Drug Repositioning Using Continuous Self-Controlled Case Series (ZK, JAT, MC, PLP, RMS, DP), pp. 491–500.
- KDD-2016-NandiMADB #control flow #detection #execution #graph #mining
- Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
- KDD-2016-ReisFMB #detection #incremental #online #performance
- Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
- KDD-2016-SinghSA #independence #machine learning
- Question Independent Grading using Machine Learning: The Case of Computer Program Grading (GS, SS, VA), pp. 263–272.
- KDD-2016-TaghaviLK #machine learning #memory management #recommendation
- Compute Job Memory Recommender System Using Machine Learning (TT, ML, YK), pp. 609–616.
- KDD-2016-TingZCZZ #difference
- Overcoming Key Weaknesses of Distance-based Neighbourhood Methods using a Data Dependent Dissimilarity Measure (KMT, YZ, MJC, YZ, ZHZ), pp. 1205–1214.
- KDD-2016-YinW #algorithm #clustering #online
- A Text Clustering Algorithm Using an Online Clustering Scheme for Initialization (JY, JW), pp. 1995–2004.
- KDD-2016-ZhangZYZHH #modelling #named #social #social media
- GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media (CZ0, KZ, QY0, LZ, TH, JH0), pp. 1305–1314.
- KDD-2016-ZhaoATBDBKD #approach #detection #parametricity #strict
- A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
- BX-2016-SemerathDHV #co-evolution #logic #modelling #satisfiability #synthesis
- Change Propagation of View Models by Logic Synthesis using SAT solvers (OS, CD, ÁH0, DV), pp. 40–44.
- ECMFA-2016-HeimNRW #composition #static typing #type safety
- Compositional Language Engineering Using Generated, Extensible, Static Type-Safe Visitors (RH, PMSN, BR, AW), pp. 67–82.
- ECMFA-2016-KessentiniSW #approach #automation #co-evolution #metamodelling #multi #optimisation
- Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
- ICMT-2016-MooijJEJR #industrial #open source #parsing
- Industrial Software Rejuvenation Using Open-Source Parsers (AJM, MMJ, GE, PJ, AR), pp. 157–172.
- ICMT-2016-RoccoRPCLG #atl #collaboration #framework #modelling #platform
- Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform (JDR, DDR, AP, JSC, JdL, EG), pp. 70–78.
- ICMT-2016-SalayZC #reuse
- Correct Reuse of Transformations is Hard to Guarantee (RS, SZ, MC), pp. 107–122.
- MoDELS-2016-BergmannDRV #bidirectional #collaboration #data access #modelling
- Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
- MoDELS-2016-Blache #bound #c #development #embedded #modelling #safety
- Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
- MoDELS-2016-GolraBDGG #agile #modelling
- Using free modeling as an agile method for developing domain specific modeling languages (FRG, AB, FD, SG, CG), pp. 24–34.
- MoDELS-2016-KalenkovaALR #mining #modelling #process
- Process mining using BPMN: relating event logs and process models (AAK, WMPvdA, IAL, VAR), p. 123.
- MoDELS-2016-SzvetitsZ #comprehension #design #empirical #modelling #runtime
- Controlled experiment on the comprehension of runtime phenomena using models created at design time (MS, UZ), pp. 151–161.
- Onward-2016-MarterBLH #identifier #lightweight #programming #readability #similarity #source code
- Lightweight programming experiments without programmers and programs: an example study on the effect of similarity and number of object identifiers on the readability of source code using natural texts (TM, PB, PL, SH), pp. 1–14.
- OOPSLA-2016-GollamudiC #automation #policy #security
- Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
- OOPSLA-2016-Itzhaky0SYLLC #algorithm #divide and conquer #programming
- Deriving divide-and-conquer dynamic programming algorithms using solver-aided transformations (SI, RS0, ASL, KY, YL, CEL, RAC), pp. 145–164.
- OOPSLA-2016-SteimannHU #attribute grammar #constraints #source code
- Computing repair alternatives for malformed programs using constraint attribute grammars (FS, JH, BU), pp. 711–730.
- OOPSLA-2016-WangGS #named #spreadsheet
- FIDEX: filtering spreadsheet data using examples (XW0, SG, RS), pp. 195–213.
- AdaEurope-2016-LaaliLHSS #detection #fault #online #testing
- Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
- AdaEurope-2016-MohaqeqiAY #analysis #data flow #graph #modelling #realtime
- Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
- AdaEurope-2016-Wittiger #csp
- Eliminating Data Race Warnings Using CSP (MW), pp. 30–43.
- LOPSTR-2016-AngelisFMPP #horn clause #process #verification
- Verification of Time-Aware Business Processes Using Constrained Horn Clauses (EDA, FF, MCM, AP, MP), pp. 38–55.
- PADL-2016-CaretteS #algebra #probability #source code
- Simplifying Probabilistic Programs Using Computer Algebra (JC, CcS), pp. 135–152.
- PADL-2016-JelinekB #array #constraints #logic programming
- Using Constraint Logic Programming to Schedule Solar Array Operations on the International Space Station (JJ, RB), pp. 3–12.
- PLDI-2016-KimJJKL #distributed #framework #replication
- A distributed OpenCL framework using redundant computation and data replication (JK, GJ, JJ, JK, JL), pp. 553–569.
- PLDI-2016-LaurenzanoHSMMT #approximate #latency
- Input responsiveness: using canary inputs to dynamically steer approximation (MAL, PH, MS, SAM, JM, LT), pp. 161–176.
- POPL-2016-0001NMR #invariant #learning
- Learning invariants using decision trees and implication counterexamples (PG0, DN, PM, DR), pp. 499–512.
- POPL-2016-AltenkirchK #induction #type system
- Type theory in type theory using quotient inductive types (TA, AK), pp. 18–29.
- POPL-2016-KatzEY #modelling #predict
- Estimating types in binaries using predictive modeling (OK, REY, EY), pp. 313–326.
- POPL-2016-PlotkinBLRV #network #scalability #symmetry #verification
- Scaling network verification using symmetry and surgery (GDP, NB, NPL, AR, GV), pp. 69–83.
- POPL-2016-SinghG #data type #spreadsheet
- Transforming spreadsheet data types using examples (RS, SG), pp. 343–356.
- PPDP-2016-AlbertAG #concurrent #imperative #testing
- Testing of concurrent and imperative software using CLP (EA, PA, MGZ), pp. 1–8.
- SAS-2016-GharatKM #analysis #graph #points-to
- Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
- ASE-2016-AbdessalemNBS #multi #network #testing
- Testing advanced driver assistance systems using multi-objective search and neural networks (RBA, SN, LCB, TS), pp. 63–74.
- ASE-2016-AlmhanaMK0 #debugging #multi #recommendation
- Recommending relevant classes for bug reports using multi-objective search (RA, WM, MK, AO), pp. 286–295.
- ASE-2016-AlshanqitiHK #contract #dynamic analysis #reverse engineering #visual notation
- Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis (AMA, RH, TK), pp. 816–821.
- ASE-2016-BaekB #android #automation #comparison #modelling #multi #testing #user interface
- Automated model-based Android GUI testing using multi-level GUI comparison criteria (YMB, DHB), pp. 238–249.
- ASE-2016-FengJCF #comprehension #image #multi
- Multi-objective test report prioritization using image understanding (YF, JAJ, ZC, CF), pp. 202–213.
- ASE-2016-MoonenABR #guidelines #mining #recommendation
- Practical guidelines for change recommendation using association rule mining (LM, SDA, DB, TR), pp. 732–743.
- ASE-2016-Mougouei #dependence #graph #integer #programming #requirements
- Factoring requirement dependencies in software requirement selection using graphs and integer programming (DM), pp. 884–887.
- ASE-2016-Nishi #bound #model checking #programming #towards
- Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
- ASE-2016-PatrickCSG #automation #generative #image
- Automatic test image generation using procedural noise (MP, MDC, ROJHS, CAG), pp. 654–659.
- ASE-2016-PeldszusKLS #design #detection #evolution #incremental #multi #object-oriented #pattern matching #source code
- Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
- ASE-2016-RahmanR #automation #concept #crowdsourcing #named #query
- QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge (MMR, CKR), pp. 220–225.
- ASE-2016-YamadaBAKC #combinator #generative #satisfiability #testing
- Greedy combinatorial test case generation using unsatisfiable cores (AY, AB, CA, TK, EHC), pp. 614–624.
- FSE-2016-Alexandru #network #synthesis
- Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
- FSE-2016-Hammoudi #testing #tool support #web
- Regression testing of web applications using Record/Replay tools (MH), pp. 1079–1081.
- FSE-2016-Luo16a #automation #performance #profiling #testing
- Automatic performance testing using input-sensitive profiling (QL), pp. 1139–1141.
- FSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics
- API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
- FSE-2016-NiuWG #requirements #traceability
- Gray links in the use of requirements traceability (NN, WW0, AG), pp. 384–395.
- FSE-2016-Rolim #automation
- Automating repetitive code changes using examples (RR), pp. 1063–1065.
- ICSE-2016-BersaniBGKP #performance #pipes and filters #scalability
- Efficient large-scale trace checking using mapreduce (MMB, DB, CG, SK, PSP), pp. 888–898.
- ICSE-2016-CheungCLX #automation #clustering #detection #named #smell #spreadsheet
- CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
- ICSE-2016-DesaiGHJKMRR #natural language #synthesis
- Program synthesis using natural language (AD, SG, VH, NJ, AK, MM, SR, SR), pp. 345–356.
- ICSE-2016-MullerF #metric #online #predict #quality
- Using (bio)metrics to predict code quality online (SCM, TF0), pp. 452–463.
- ICSE-2016-NearJ #data access #debugging #security #web
- Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
- ICSE-2016-Rubio-Gonzalez0 #analysis #float #precise
- Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
- ICSE-2016-SuRT #evaluation #model checking #parametricity #reliability #runtime
- Reliability of Run-Time Quality-of-Service evaluation using parametric model checking (GS, DSR, GT), pp. 73–84.
- ICSE-2016-ZhangZZH #classification #fault #predict
- Cross-project defect prediction using a connectivity-based unsupervised classifier (FZ0, QZ, YZ0, AEH), pp. 309–320.
- GPCE-2016-Al-HajjajiKTLS #incremental #named #performance #product line #testing
- IncLing: efficient product-line testing using incremental pairwise sampling (MAH, SK, TT, ML, GS), pp. 144–155.
- SLE-2016-AmorimEWV #code completion
- Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
- SLE-2016-VoelterSLKEB #consistency #development #editing #performance #projectional
- Efficient development of consistent projectional editors using grammar cells (MV, TS, SL, BK, SE, TB), pp. 28–40.
- ASPLOS-2016-BrownNE #how #order #static analysis
- How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
- ASPLOS-2016-GuoSCM #approximate #image #memory management
- High-Density Image Storage Using Approximate Memory Cells (QG, KS, LC, HSM), pp. 413–426.
- ASPLOS-2016-ZhangLJ #concurrent #detection #hardware #memory management #named #performance #transaction
- TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
- CASE-2016-AndreJT #assembly #modelling #reliability
- Reliable robot assembly using haptic rendering models in combination with particle filters (RA, MJ, UT), pp. 1134–1139.
- CASE-2016-ChengZWCJL #case study #data mining #energy #fault #mining
- Case studies of fault diagnosis and energy saving in buildings using data mining techniques (ZC, QZ, FW, ZC, YJ, YL), pp. 646–651.
- CASE-2016-DuH #petri net #robust
- Robust control of Backward Conflict Free Systems with Resources using Petri nets (ND, HH), pp. 1034–1041.
- CASE-2016-GargSKJMMG #adaptation #automation #locality #process
- Tumor localization using automated palpation with Gaussian Process Adaptive Sampling (AG, SS, RK, YJ, SM, LM, KG), pp. 194–200.
- CASE-2016-HsuYL #analysis #process
- Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
- CASE-2016-IrieST #dependence
- Target-less camera-LiDAR extrinsic calibration using a bagged dependence estimator (KI, MS, MT), pp. 1340–1347.
- CASE-2016-LaskeyLCGHPDG #learning
- Robot grasping in clutter: Using a hierarchy of supervisors for learning from demonstrations (ML, JL, CC, DVG, WYSH, FTP, ADD, KG), pp. 827–834.
- CASE-2016-LiSXSL #framework #hybrid #low cost
- A hybrid model and kinematic-free control framework for a low-cost deformable manipulator using in home service (GL, LS0, SX, DS, JL), pp. 1002–1007.
- CASE-2016-LiuT #distributed #hybrid #multi #network
- Distributed vision network for multiple target tracking using a dynamic hybrid consensus filter (GL, GT), pp. 805–808.
- CASE-2016-MahadevKRFB #grid
- Collecting a swarm in a grid environment using shared, global inputs (AVM, DK, JMR, SPF, ATB), pp. 1231–1236.
- CASE-2016-ShahrokhiB
- Object manipulation and position control using a swarm with global inputs (SS, ATB), pp. 561–566.
- CASE-2016-SrinivasanC #approach #approximate #orthogonal
- Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
- CASE-2016-TanCPT #automation #design #diagrams #evaluation #layout
- Automated design evaluation on layout of Piping and Instrumentation Diagram using Histogram of Connectivity (WCT, IMC, SJP, HKT), pp. 1295–1300.
- CASE-2016-TsaiWPXLFZ #behaviour #predict #process #smarttech
- Context-aware activity prediction using human behavior pattern in real smart home environments (MJT, CLW, SKP, YX, TYL, LCF, YCZ), pp. 168–173.
- CASE-2016-WiebeRRV #approach #automation #composition #delivery #fault #generative #injection #simulation #testing
- Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
- CASE-2016-YangH #distributed #petri net
- Mono-T-semiflow systems with resources and their distributed control using Petri nets (YY, HH), pp. 1042–1048.
- CASE-2016-ZouFP #estimation #metric #network
- Psychoacoustic impacts estimation in manufacturing based on accelerometer measurement using artificial neural networks (MZ, LF, JP), pp. 1203–1208.
- CAV-2016-KafleGM #abstract interpretation #automaton #finite #horn clause #named #verification
- Rahft: A Tool for Verifying Horn Clauses Using Abstract Interpretation and Finite Tree Automata (BK, JPG, JFM), pp. 261–268.
- CAV-2016-MuellerSS #automation #execution #symbolic computation #verification
- Automatic Verification of Iterated Separating Conjunctions Using Symbolic Execution (PM, MS, AJS), pp. 405–425.
- CAV-2016-PernsteinerLTTW #modelling #safety
- Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
- ICST-2016-HuoC
- Interpreting Coverage Information Using Direct and Indirect Coverage (CH, JC), pp. 234–243.
- ICST-2016-MahajanLBH #debugging #visual notation #web
- Using Visual Symptoms for Debugging Presentation Failures in Web Applications (SM, BL, PB, WGJH), pp. 191–201.
- ICST-2016-MarculescuFT #evaluation #search-based #testing
- Using Exploration Focused Techniques to Augment Search-Based Software Testing: An Experimental Evaluation (BM, RF, RT), pp. 69–79.
- ICTSS-2016-EnoiuSCFP #embedded #generative #model checking #testing
- Mutation-Based Test Generation for PLC Embedded Software Using Model Checking (EPE, DS, AC, RF, PP), pp. 155–171.
- ICTSS-2016-PradhanWAYL #industrial #multi #named #testing
- STIPI: Using Search to Prioritize Test Cases Based on Multi-objectives Derived from Industrial Practice (DP, SW0, SA0, TY0, ML), pp. 172–190.
- ICTSS-2016-ReichstallerEKR #learning #testing
- Risk-Based Interoperability Testing Using Reinforcement Learning (AR, BE, AK, WR, MG), pp. 52–69.
- IJCAR-2016-AthanasiouLW #bound #equation #thread #verification
- Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
- IJCAR-2016-DawsonBG #calculus #logic #theorem
- Machine-Checked Interpolation Theorems for Substructural Logics Using Display Calculi (JED, JB, RG), pp. 452–468.
- TAP-2016-ReichlFT #formal method #validation #verification
- Using Formal Methods for Verification and Validation in Railway (KR, TF, PT), pp. 3–13.
- VMCAI-2016-MarechalFKMP #approximate #multi #theorem
- Polyhedral Approximation of Multivariate Polynomials Using Handelman's Theorem (AM, AF, TK0, DM, MP), pp. 166–184.
- CBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented
- Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
- ECSA-2015-AgrawalP #adaptation #framework #towards #web
- Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
- ECSA-2015-GalsterA #agile #architecture #comprehension #development
- Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
- ECSA-2015-HansenM #automation #community #composition #detection
- (Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
- ECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech
- Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
- QoSA-2015-HofigZS #automation #dependence
- Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
- DocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary
- Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
- DocEng-2015-LesnikovaDE #rdf
- Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
- DRR-2015-BideaultMCP #architecture #regular expression #word
- Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
- DRR-2015-MehriSHGAM #documentation #image #segmentation
- Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
- DRR-2015-PengCN #approach
- Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
- DRR-2015-RabaevCEK #documentation #programming
- Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
- DRR-2015-SitaramHPSK #recognition #word
- Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
- DRR-2015-StalnakerZ #retrieval
- Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
- HT-2015-Bayomi #adaptation #corpus #framework #reuse
- A Framework to Provide Customized Reuse of Open Corpus Content for Adaptive Systems (MB), pp. 315–318.
- HT-2015-BlountMW #logic #social #web
- An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
- JCDL-2015-CuongCKL #documentation #higher-order #information management #performance
- Scholarly Document Information Extraction using Extensible Features for Efficient Higher Order Semi-CRFs (NVC, MKC, MYK, WSL), pp. 61–64.
- PODS-2015-CateCST #ontology
- High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
- SIGMOD-2015-BarthelsLAK #in memory
- Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
- SIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media
- DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
- SIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability
- Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
- SIGMOD-2015-TuR #named #query
- DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
- SIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel
- Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
- SIGMOD-2015-XiaoBME #metadata #summary
- Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
- SIGMOD-2015-YanZHSMZM #detection #distributed
- Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
- SIGMOD-2015-ZhangCPSX #graph #statistics
- Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
- VLDB-2015-DeutchGM #datalog #query #source code
- Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
- VLDB-2015-HeCMPS #named #synthesis
- DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
- VLDB-2015-HeGC #corpus #named #semantics
- SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
- VLDB-2015-LazersonSKSGS #distributed #monitoring
- Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
- VLDB-2015-ParkMS #pipes and filters #probability #query
- Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
- VLDB-2015-ShinWWSZR #incremental #knowledge base
- Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
- CSEET-2015-SedanoP #experience #student
- Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
- EDM-2015-AlHarbiH #automation #modelling #segmentation #topic
- Using Topic Segmentation Models for the Automatic Organisation of MOOCs resources (GA, TH), pp. 524–527.
- EDM-2015-AnayaGLH #analysis #approach #collaboration #diagrams #network #social
- An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
- EDM-2015-BorjiginMSZ #assessment #behaviour
- Skill Assessment Using Behavior Data in Virtual World (AB, CM, ZS, ZZ), pp. 570–571.
- EDM-2015-BotelhoAWH #performance #predict #student
- Predicting Student Aptitude Using Performance History (AFB, SAA, HW, NTH), pp. 622–623.
- EDM-2015-EmondB #classification #process #sequence #student
- Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification (BE, SB), pp. 412–415.
- EDM-2015-Fancsali #algebra #behaviour #learning #modelling #visual notation
- Confounding Carelessness? Exploring Causal Relationships Between Carelessness, Affect, Behavior, and Learning in Cognitive Tutor Algebra Using Graphical Causal Models (SF), pp. 508–511.
- EDM-2015-Feild #performance #student
- Improving Student Performance Using Nudge Analytics (JLF), pp. 464–467.
- EDM-2015-GandhiBD #education #topic #visual notation #word
- Topic Transition in Educational Videos Using Visually Salient Words (AG, AB, OD), pp. 289–296.
- EDM-2015-Geryk #comprehension #visual notation
- Using Visual Analytics Tool for Improving Data Comprehension (JG), pp. 327–334.
- EDM-2015-InwegenAWH
- Using Partial Credit and Response History to Model User Knowledge (EVI, SA, YW0, NTH), pp. 313–319.
- EDM-2015-LuoSMG #predict #student #word
- Predicting Student Grade based on Free-style Comments using Word2Vec and ANN by Considering Prediction Results Obtained in Consecutive Lessons (JL, SES, TM, KG), pp. 396–399.
- EDM-2015-MacHardyP #big data #education
- Evaluating Educational Videos using Bayesian Knowledge Tracing and Big Data (ZM, ZAP), pp. 424–427.
- EDM-2015-NicolajsenP #adaptation #collaboration #component
- Using Knowledge Components for Collaborative Filtering in Adaptive Tutoring Systems (PHN, BP), pp. 536–539.
- EDM-2015-Rihak #adaptation #modelling
- Use of Time Information in Models behind Adaptive Practice System for Building Fluency in Mathematics (JR), pp. 642–644.
- ITiCSE-2015-Dickson #development #education #game studies
- Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
- ITiCSE-2015-Harms15a #java
- Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
- ITiCSE-2015-KirkpatrickP #assurance #operating system #process
- Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
- ITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student
- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
- ITiCSE-2015-TarmazdiVSFF #learning #visualisation
- Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
- ITiCSE-2015-WangMSLCW #data access #education #named #visualisation
- RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
- SIGITE-2015-ZhouCKNCUG #collaboration #feedback #scalability #student
- M-CAFE 1.0: Motivating and Prioritizing Ongoing Student Feedback During MOOCs and Large on-Campus Courses using Collaborative Filtering (MZ, AC, SK, BN, CC, KU, KG), pp. 153–158.
- ICPC-2015-CosmaM #component #comprehension #visual notation #web
- Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
- ICPC-2015-Escobar-AvilaVH #bytecode #categorisation
- Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
- ICPC-2015-HillSP #evaluation #feature model
- Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
- ICPC-2015-JbaraF #empirical #eye tracking #how
- How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
- ICPC-2015-LafetaMR #dynamic analysis #framework
- Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
- ICPC-2015-MacLeodSB #developer #documentation #how
- Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
- ICPC-2015-SaiedABS #api #library #question #source code
- Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
- ICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary
- Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
- ICSME-2015-CorleyDK #feature model #learning
- Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
- ICSME-2015-DongAS #fault #static analysis
- Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
- ICSME-2015-DorningerPK #industrial #static analysis #user interface
- Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
- ICSME-2015-HardtM #empirical #evaluation #maintenance
- An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
- ICSME-2015-MedicherlaKN #specification #verification
- Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
- ICSME-2015-ValeM #architecture #dynamic analysis #mining #named
- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
- MSR-2015-BlincoeHD #ecosystem #git #identification
- Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
- MSR-2015-DonadelliZR #case study #fault #replication
- Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
- MSR-2015-WangPWG #comprehension #git #what
- What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
- MSR-2015-ZanjaniKB #developer
- Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
- MSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic
- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
- SANER-2015-BezemerPG #comprehension #difference #graph #performance
- Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
- SANER-2015-CabotICR #open source
- Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
- SANER-2015-HuSLL #development #evolution #modelling #topic
- Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
- SANER-2015-LaverdiereBM #analysis #composition #graph
- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
- SANER-2015-NayrollesHTL #approach #debugging #model checking #named
- JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
- SANER-2015-QiuSM #graph #identification #library #morphism
- Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
- SCAM-2015-BonifacioCRKC #c++ #exception
- The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
- SCAM-2015-ChochlovEB #data flow #feature model
- Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
- SCAM-2015-LemosPSL #code search #query #question #scalability
- Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
- SCAM-2015-PanditaJSW #api #mining
- Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
- SCAM-2015-RahmanRK #crowdsourcing #recommendation #source code
- Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
- SCAM-2015-RenatusBE #modelling #security
- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
- SCAM-2015-UddinGGR #comprehension #eye tracking #on the #visualisation
- On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
- ICALP-v1-2015-KhotS #approximate
- Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
- FM-2015-0001K #bound #model checking
- Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
- FM-2015-AlTurkiA #distributed #framework #towards #verification #𝕂
- Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
- FM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis
- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
- FM-2015-MirandaMR #automation #design #generative #testing #verification
- Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
- FM-2015-Nakajima #behaviour #energy #maude #realtime
- Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
- RTA-2015-AvanziniST #certification #complexity #proving
- Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
- SEFM-2015-JonesY #abstraction #reasoning
- Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
- SEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing
- Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
- SEFM-2015-SavaryFLL #modelling #robust #testing
- Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
- ICFP-2015-SteuwerFLD #functional #generative #performance
- Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
- AIIDE-2015-StanescuBB #predict
- Using Lanchester Attrition Laws for Combat Prediction in StarCraft (MAS, NAB, MB), pp. 86–92.
- CHI-PLAY-2015-CollinsELG #2d #artificial reality #game studies #platform
- Alaska Steve: Using Virtual Reality to Enhance a 2D Platforming Game (LC, SE, JL, TCNG), pp. 767–770.
- CHI-PLAY-2015-HarpsteadA #analysis #design #education #empirical #game studies #learning
- Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
- CHI-PLAY-2015-HicksG #game studies
- Exploring Casual Exergames with Kids Using Wheelchairs (KH, KG), pp. 541–546.
- CHI-PLAY-2015-KeumRMCLBC #composition #development #game studies
- Exergame Development Using Body Composition Data for Obesity Care (JK, JHR, YJM, HC, NL, BCB, JDC), pp. 577–582.
- CHI-PLAY-2015-Schwind0HK #generative
- Determining the Characteristics of Preferred Virtual Faces Using an Avatar Generator (VS, KW0, NH, OK), pp. 221–230.
- CIG-2015-Garcia-SanchezT #automation #generative #programming #search-based #towards
- Towards automatic StarCraft strategy generation using genetic programming (PGS, APT, AMM, GS, JJMG), pp. 284–291.
- CIG-2015-OliveiraM #game studies #performance #realtime
- Creating efficient walls using potential fields in real-time strategy games (CFdO, CAGM), pp. 138–145.
- CIG-2015-RunarssonL #approximate #evaluation #game studies #on the
- On imitating Connect-4 game trajectories using an approximate n-tuple evaluation function (TPR, SML), pp. 208–213.
- CIG-2015-SatoIW #estimation #monte carlo #multi
- Estimation of player's preference for cooperative RPGs using multi-strategy Monte-Carlo method (NS, KI, TW), pp. 51–59.
- DiGRA-2015-BartonSQMKK #bias #design #game studies #reduction
- The Use of Theory in Designing a Serious Game for the Reduction of Cognitive Biases (MB, CS, MMQ, CKM, KSK, JK).
- DiGRA-2015-MarczakSH #comprehension #experience #matrix #similarity
- Understanding Player Experience Through the Use of Similarity Matrix (RM, GS, PH).
- DiGRA-2015-Warpefelt #visual notation
- Cues and insinuations: Indicating affordances of non-player character using visual indicators (HW).
- FDG-2015-IsaksenGN #analysis #game studies
- Exploring Game Space Using Survival Analysis (AI, DG, AN).
- FDG-2015-KaoH15b #game studies #learning
- Exploring the Construction, Play, Use of Virtual Identities in a STEM Learning Game (DK, DFH).
- FDG-2015-Martens #game studies #proving
- Using Proof Theory to Study Game Mechanics (CM).
- FDG-2015-ReuterGS #automation #detection #game studies #multi #petri net
- Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
- FDG-2015-RyanKMW15a #analysis #game studies #semantics #tool support
- Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
- VS-Games-2015-BrichRFWBMDRS0 #game studies #named #research
- LiverDefense: Using a Tower Defense Game as a Customisable Research Tool (JB, KR, JF, MW, AB, SM, TD, VR, CS, MW0), pp. 1–8.
- VS-Games-2015-Cejka #detection
- Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
- VS-Games-2015-DiazDHS #development #game studies #learning #multi #online #video
- Explicit Fun, Implicit Learning in Multiplayer Online Battle Arenas: Methodological Proposal for Studying the Development of Cognitive Skills Using Commercial Video Games (CMCD, BD, HH, JWS), pp. 1–3.
- VS-Games-2015-DiazWLT #game studies #visitor
- Your Answer Will Make an Impression. Using Quiz Game Mechanics for the Collection of Visitor Data at an Exhibition (MGAD, UW, ML, MT), pp. 1–4.
- VS-Games-2015-RobbWW #design #development #game studies
- The Development of TASTER, a Cognitive Training Game Using Human-Centered Design, Tailored for Children with Global and Specific Cognitive Impairments (NR, AW, KW), pp. 1–2.
- VS-Games-2015-WilhelmssonEBO #design #game studies #visual notation
- Accessible Game Culture Using Inclusive Game Design - Participating in a Visual Culture That You Cannot See (UW, HE, JB, PAÖ), pp. 1–8.
- GCM-2015-BottoniNP #constraints #contract #modelling #policy
- Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
- ICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination
- Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
- ICGT-2015-Stuckrath #analysis #graph transformation #named #verification
- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
- ICGT-2015-WeberDP #formal method #graph transformation #monitoring
- Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
- CHI-2015-AsenieroWLRTC #named #release planning #visualisation
- STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
- CHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation
- Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
- CHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer
- A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
- CHI-2015-BentleyC #composition #mobile
- The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
- CHI-2015-DaltonCM
- Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
- CHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social
- Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
- CHI-2015-FleckCR #bound #multi
- Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
- CHI-2015-GerlingML #game studies #video
- Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
- CHI-2015-GoelZVP #detection #flexibility #gesture #named
- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
- CHI-2015-GrevetG #prototype #scalability #social
- Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
- CHI-2015-GunaratneN #behaviour #performance #user interface
- Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
- CHI-2015-HaqueNV #named
- Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
- CHI-2015-HiguchiCCZL #experience #named
- ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
- CHI-2015-HolzBK #identification #mobile #named
- Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
- CHI-2015-HourcadeMWP #analysis #exclamation
- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
- CHI-2015-HydeCKH #interactive #persuasion
- Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
- CHI-2015-JonesCDTPDH #delphi #information management
- “For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
- CHI-2015-KatanGF #development #interactive #interface #machine learning #people
- Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
- CHI-2015-KosmallaDK #automation #metric #named #recognition
- ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
- CHI-2015-LeeLCWSK #education #interactive #online #social
- Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
- CHI-2015-LugerURG #design #game studies #process
- Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
- CHI-2015-MaiorPSW #human-computer #reliability
- Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
- CHI-2015-MariakakisGAPW #mobile #named
- SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
- CHI-2015-ParkPN
- The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
- CHI-2015-PatelO
- Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
- CHI-2015-PfeifferDSAR
- Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
- CHI-2015-PreistJ #education #game studies #motivation
- The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
- CHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics
- Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
- CHI-2015-SlegersRVD #elicitation #game studies #research #user interface
- Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
- CHI-2015-TholanderN #experience #performance
- Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
- CHI-2015-VertanenMERK #mobile #named #performance
- VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
- CHI-2015-WangGXZYB #interactive #named #privacy #visualisation
- VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
- CHI-2015-ZugerF #developer #predict
- Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
- CSCW-2015-ChangHT #recommendation
- Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
- CSCW-2015-FreitasD15a #detection #multi
- Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
- CSCW-2015-KaziunasBJCHA #health
- Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
- CSCW-2015-MaddockSASOM #behaviour #multi #online
- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
- CSCW-2015-ProstMT #design #energy #towards
- From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
- CSCW-2015-XuRDB #design #feedback #process
- A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
- DHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition
- Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
- DHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition
- Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
- DHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process
- Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
- DHM-EH-2015-MeryS #modelling #requirements
- Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
- DHM-EH-2015-NakamuraKKMK #development #self #student
- Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
- DHM-EH-2015-UchidaHKEMOUG #analysis #process
- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
- DHM-EH-2015-ZhengBISEL #behaviour #monitoring
- Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
- DHM-HM-2015-FurukawaTKG #evaluation #image
- Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
- DUXU-DD-2015-AsthanaS #modelling #named #testing #usability #xml
- Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
- DUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media
- Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
- DUXU-IXD-2015-DasBRD #co-evolution #design #generative
- The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
- DUXU-IXD-2015-HalbeyKZ
- Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
- DUXU-IXD-2015-IwamotoKM #analysis #case study
- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
- DUXU-UI-2015-AyanogluBTD #artificial reality #case study
- Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
- DUXU-UI-2015-DuWDXJ #case study #metric
- Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
- DUXU-UI-2015-LiHF #quality #requirements #scalability #user interface
- Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
- HCI-DE-2015-Hensely-Schinkinger #design
- The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
- HCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #visualisation
- Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
- HCI-DE-2015-SantosST #interactive #open source #visualisation
- Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
- HCI-DE-2015-SchutzSO
- Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
- HCI-DE-2015-SugiuraSO #implementation #metric #security
- Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
- HCI-DE-2015-WatsonS #assessment
- Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
- HCI-IT-2015-BandeiraCXK #gesture #interface
- Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
- HCI-IT-2015-FukumotoTE #detection
- Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
- HCI-IT-2015-GuXCZ
- To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
- HCI-IT-2015-HakodaKSST #bound #gesture #mobile #named
- AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
- HCI-IT-2015-KondoTT #communication #smarttech
- Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
- HCI-IT-2015-KuribaraST
- Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
- HCI-IT-2015-MullerLBSKSW #data-driven #network #overview #predict
- Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
- HCI-IT-2015-MurataM #analysis #eye tracking
- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
- HCI-IT-2015-Nagaraju #framework #gesture
- Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
- HCI-UC-2015-AzhariF #approach #experience #social #social media #user interface
- Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
- HCI-UC-2015-ClarkeBK #experience #question #what
- What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
- HCI-UC-2015-OhJK #approach #human-computer #simulation
- Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
- HCI-UC-2015-Ujita #analysis #reliability
- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
- HIMI-IKC-2015-FilhoHTJM #smarttech
- Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
- HIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix
- A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
- HIMI-IKC-2015-ItaiM #development #interactive
- Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
- HIMI-IKC-2015-KajitaTMI #3d #design
- Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
- HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing
- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
- HIMI-IKC-2015-MayerBPGV #automation #generative #process #visualisation
- Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
- HIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation
- A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
- HIMI-IKC-2015-SturreCVS #assessment #eye tracking
- Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
- HIMI-IKC-2015-TogawaK #collaboration #framework
- Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
- HIMI-IKC-2015-UeokaK #interactive
- Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
- HIMI-IKC-2015-UjitokoH #interface
- Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
- HIMI-IKD-2015-AraiOM #web
- A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
- HIMI-IKD-2015-ChouSW #case study #quality
- Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
- HIMI-IKD-2015-ItouNM #information management #twitter
- Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
- HIMI-IKD-2015-IwamotoH #induction
- Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
- HIMI-IKD-2015-KalkattawiN #ubiquitous
- Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
- HIMI-IKD-2015-KastratiIY #classification #documentation #framework
- A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
- HIMI-IKD-2015-KotaniIAS #interface #variability
- Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
- HIMI-IKD-2015-MatsunoAIMM
- Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
- HIMI-IKD-2015-MorizumiA #analysis
- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
- HIMI-IKD-2015-SasajimaOOS #communication #twitter #visualisation
- Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
- HIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour
- Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
- HIMI-IKD-2015-YoshinoO
- Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
- LCT-2015-BoonbrahmKB #artificial reality #learning #student
- Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
- LCT-2015-DalipiYK #analysis #performance #semantics
- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
- LCT-2015-HiramatsuIISS #case study #communication #mobile
- A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
- LCT-2015-IbanezN #design #implementation #multi
- Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
- LCT-2015-PyperLWJ #mobile #personalisation
- The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
- LCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous
- Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
- LCT-2015-SebilloTVPG #artificial reality #interface
- The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
- LCT-2015-Sein-EchaluceBG #education #information management #social
- A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
- SCSM-2015-KastratiIYD #analysis #network #online #social
- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
- SCSM-2015-ManssourSSFS #image #network #social #visualisation
- Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
- CAiSE-2015-Francescomarino #workflow
- Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
- CAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability
- Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
- ICEIS-v1-2015-BorgesDRAS #approach #generative
- An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
- ICEIS-v1-2015-BouakkazLO #distance #named #similarity
- GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
- ICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile
- Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
- ICEIS-v1-2015-Marques-LucenaA #framework #information management
- Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
- ICEIS-v1-2015-MpindaMSR #database #graph #simulation
- Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
- ICEIS-v1-2015-RezendeJ #concurrent #process #workflow
- Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
- ICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation
- Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
- ICEIS-v1-2015-SarmentoCG #network #streaming
- Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
- ICEIS-v1-2015-VaroneA #multi
- Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
- ICEIS-v2-2015-AizebojeP #approach #pointer
- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
- ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling
- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
- ICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #web
- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
- ICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process
- On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
- ICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #web
- Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
- ICEIS-v2-2015-KamalKVB #delivery #performance
- Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
- ICEIS-v2-2015-MagnavitaNM #evolution
- Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
- ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance
- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
- ICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #visualisation
- VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
- ICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml
- Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
- ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
- ICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing
- Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
- ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #validation
- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
- ICEIS-v3-2015-NyameB #information management
- The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
- ICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface
- Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
- ICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process
- BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
- ICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling
- An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
- CIKM-2015-BagdouriO #microblog #set
- Profession-Based Person Search in Microblogs: Using Seed Sets to Find Journalists (MB, DWO), pp. 593–602.
- CIKM-2015-BuchA #approximate #learning #string
- Approximate String Matching by End-Users using Active Learning (LB, AA0), pp. 93–102.
- CIKM-2015-JeongKL #on the fly
- A Flash-aware Buffering Scheme using On-the-fly Redo (KSJ, SWK, SL), pp. 1683–1686.
- CIKM-2015-MaGWLW #detection #information management #microblog #social
- Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
- CIKM-2015-MishraH #clustering #learning #multi
- Learning Task Grouping using Supervised Task Space Partitioning in Lifelong Multitask Learning (MM, JH), pp. 1091–1100.
- CIKM-2015-ParkHL #nearest neighbour #performance
- A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection (YP, HH, SgL), pp. 1883–1886.
- CIKM-2015-RoychoudhuryKB #documentation #ontology #process
- Analyzing Document Intensive Business Processes using Ontology (SR, VK, NB), pp. 1899–1902.
- CIKM-2015-SiersdorferKAZ #how #network #scalability #social
- Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
- CIKM-2015-Teevan #information retrieval
- Slow Search: Improving Information Retrieval Using Human Assistance (JT), p. 1.
- CIKM-2015-TuarobTSR #modelling #network #social
- Modeling Individual-Level Infection Dynamics Using Social Network Information (ST, CST, MS, NR), pp. 1501–1510.
- CIKM-2015-WangSL #distance #learning #summary
- Update Summarization using Semi-Supervised Learning Based on Hellinger Distance (DW0, SS, TL0), pp. 1907–1910.
- CIKM-2015-ZhangSWFW #crowdsourcing #quality
- Improving Label Quality in Crowdsourcing Using Noise Correction (JZ0, VSS, JW0, XF, XW0), pp. 1931–1934.
- ECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread
- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
- ECIR-2015-ChongDL #modelling #predict #topic
- Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
- ECIR-2015-Dutta #approximate #mining #named #statistics #string
- MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
- ECIR-2015-GogMP #identification #on the #statistics
- On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
- ECIR-2015-HagenPBS #classification #detection #sentiment #twitter
- Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
- ECIR-2015-JameelLB #modelling #parametricity #topic
- Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
- ECIR-2015-LiC #effectiveness
- Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
- ECIR-2015-LimCLK #community #constraints #detection
- Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
- ECIR-2015-LuoZDY #design
- Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
- ECIR-2015-MaddalenaMST #estimation
- Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
- ICML-2015-AvronH #community #detection #personalisation #rank
- Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
- ICML-2015-ChangYXY #detection #semantics
- Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
- ICML-2015-LeC #learning #metric
- Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
- ICML-2015-SnoekRSKSSPPA #network #optimisation #scalability
- Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
- ICML-2015-Sohl-DicksteinW #learning
- Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
- ICML-2015-SrivastavaMS #learning #video
- Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
- ICML-2015-SunQW #optimisation #taxonomy
- Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
- ICML-2015-UbaruMS #approximate #fault #matrix #rank
- Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
- ICML-2015-ZhuE #approach #hybrid #probability #random
- A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
- KDD-2015-AhnKLRW #distributed #matrix #probability #scalability
- Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
- KDD-2015-GleichM #algorithm #graph #learning
- Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
- KDD-2015-IkonomovskaJD #predict #realtime
- Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
- KDD-2015-JohanssonD #geometry #graph #learning #similarity
- Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
- KDD-2015-KotziasDFS
- From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
- KDD-2015-MayaMMAY #clustering
- Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
- KDD-2015-MomtazpourZRSR #cyber-physical #invariant
- Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
- KDD-2015-Ojjeh #open source #realtime
- Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
- KDD-2015-PengKLC #approximate #clustering #rank
- Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
- KDD-2015-SethiYRVR #classification #machine learning #scalability
- Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
- KDD-2015-ShanahanD #distributed #scalability
- Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
- KDD-2015-SomanchiALEG #predict
- Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
- KDD-2015-WangYLXXCR #predict
- Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
- KDD-2015-WeiLMCRS #predict
- Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
- KDD-2015-YuanBM #process #re-engineering
- Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
- KDD-2015-ZhengYX #composition #linear #modelling #topic
- Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
- MLDM-2015-Babu #classification #identification
- Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
- MLDM-2015-CostaFK #multi
- Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
- MLDM-2015-GovadaJMS #approach #hybrid #induction #learning
- Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
- MLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity
- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
- MLDM-2015-MoldovanM #data mining #learning #mining #performance
- Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
- MLDM-2015-PatchalaBG #email
- Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
- MLDM-2015-TreechalongRW #clustering
- Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
- RecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation
- Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
- RecSys-2015-BanksRS #game studies #recommendation
- The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
- RecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social
- A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
- RecSys-2015-MagnusonDM #process #recommendation #twitter
- Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
- SEKE-2015-CaoHH #design #evaluation #quality
- Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
- SEKE-2015-ChavezM #information retrieval #ontology #query
- An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
- SEKE-2015-DingZ #modelling #petri net
- Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
- SEKE-2015-GoswamiWS #learning #performance
- Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
- SEKE-2015-ManiPW #co-evolution #modelling #performance
- Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
- SEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based
- A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
- SEKE-2015-NetoSZD #network
- Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
- SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer
- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
- SEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards
- Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
- SEKE-2015-Tasse #analysis #identification #metric
- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
- SEKE-2015-TrinkenreichSCS #metric #process #towards
- Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
- SEKE-2015-TunnellA #fault #modelling #predict #release planning
- Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
- SEKE-2015-XuB #multi #reliability
- A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
- SIGIR-2015-AlbakourMO #data type #identification #metadata #topic
- Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
- SIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial
- Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
- SIGIR-2015-CapraACV #complexity #difference
- Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
- SIGIR-2015-HaraSKF #recommendation
- Reducing Hubness: A Cause of Vulnerability in Recommender Systems (KH, IS, KK, KF), pp. 815–818.
- SIGIR-2015-Kiseleva #behaviour #information management
- Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
- SIGIR-2015-LiLZS #matrix #modelling #multi #retrieval
- Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
- SIGIR-2015-LiuAH #information retrieval #probability
- Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
- SIGIR-2015-Lu #statistics
- Improving Search using Proximity-Based Statistics (XL), p. 1065.
- SIGIR-2015-MehrotraY #learning #query #rank
- Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
- SIGIR-2015-Mitra #distributed #query
- Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
- SIGIR-2015-NovakBZ #image #retrieval #scalability
- Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
- SIGIR-2015-ParkC #concept #retrieval
- Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
- SIGIR-2015-WeiG #summary #twitter
- Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
- SIGIR-2015-YaoSQWSH #recommendation #social
- Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
- SKY-2015-Oliveira #learning
- Learning the Meaning of Language and using It Creatively (HGO), p. 3.
- ECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism
- Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
- AMT-2015-HilkenBGV #development #modelling
- Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
- ICMT-2015-CriadoMIC #model transformation #reuse
- Enabling the Reuse of Stored Model Transformations Through Annotations (JC, SMP, LI, JC), pp. 43–58.
- ICMT-2015-MooijEHW #effectiveness #industrial #modelling
- Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models (AJM, GE, JH, HvW), pp. 66–81.
- MoDELS-2015-Fernandez-SaezC #documentation #industrial #maintenance #on the #overview #uml
- On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
- MoDELS-2015-LuddeckeSSS #modelling #network
- Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
- MoDELS-2015-SchottleK #api #modelling #reuse
- Concern-oriented interfaces for model-based reuse of APIs (MS, JK), pp. 286–291.
- MoDELS-2015-StephanC #clone detection #detection #identification
- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
- SPLC-2015-BeekFGM #analysis #product line
- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
- SPLC-2015-BeucheH #lifecycle #product line
- Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
- SPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi
- Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
- SPLC-2015-DimovskiABW #model checking #off the shelf
- Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
- SPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #variability
- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
- SPLC-2015-DudderRH #composition #design #staged #type safety
- Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
- SPLC-2015-PatelS #as a service #automation #testing #variability
- Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
- Onward-2015-CitoLGDKR #developer #feedback #metric #runtime
- Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
- OOPSLA-2015-VoelterDKE #c #case study #embedded
- Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
- PLATEAU-2015-KristenssonL #lightweight #visualisation
- Aiding programmers using lightweight integrated code visualization (POK, CLL), pp. 17–24.
- AdaEurope-2015-JaradatBP #analysis #maintenance #safety
- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
- LOPSTR-2015-CaballeroMKH #automation #generative #java #testing
- Checking Java Assertions Using Automated Test-Case Generation (RC0, MM, HK, VvH), pp. 221–226.
- LOPSTR-2015-MantelMPW #analysis #automaton #composition #data flow #network
- Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
- PADL-2015-BassedaK #logic #transaction
- State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
- PLDI-2015-BarowyGHZ #named #relational #spreadsheet
- FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
- PLDI-2015-CraryS #peer-to-peer
- Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
- PLDI-2015-GonnordMR #ranking #synthesis
- Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
- POPL-2015-BastaniAA #context-free grammar #reachability #specification
- Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
- PPDP-2015-RondogiannisT #logic programming
- Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
- SAS-2015-AdjeGM #generative #invariant #optimisation #polynomial
- Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
- ASE-2015-CarinoA #optimisation #testing #user interface
- Dynamically Testing GUIs Using Ant Colony Optimization (T) (SC, JHA), pp. 138–148.
- ASE-2015-ChoetkiertikulD #classification #predict
- Predicting Delays in Software Projects Using Networked Classification (T) (MC, HKD, TT, AG), pp. 353–364.
- ASE-2015-DeweyRH #fuzzing #rust
- Fuzzing the Rust Typechecker Using CLP (T) (KD, JR, BH), pp. 482–493.
- ASE-2015-KhatchadourianR #detection
- Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
- ASE-2015-LemieuxB #behaviour #ltl #mining #specification
- Investigating Program Behavior Using the Texada LTL Specifications Miner (CL, IB), pp. 870–875.
- ASE-2015-MaAZSGR15a #automation #generative #named #program analysis
- GRT: An Automated Test Generator Using Orchestrated Program Analysis (LM, CA, CZ, HS, JG, RR), pp. 842–847.
- ASE-2015-MercerAVS #model checking #parallel #source code
- Model Checking Task Parallel Programs Using Gradual Permissions (N) (EGM, PA, NV, VS), pp. 535–540.
- ASE-2015-NardoPAB #modelling #robust #testing
- Evolutionary Robustness Testing of Data Processing Systems Using Models and Data Mutation (T) (DDN, FP, AA, LCB), pp. 126–137.
- ASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics
- Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
- ASE-2015-SohanAM #api #automation #documentation #named #rest
- SpyREST: Automated RESTful API Documentation Using an HTTP Proxy Server (N) (SMS, CA, FM), pp. 271–276.
- ASE-2015-Vargas-Baldrich #automation #bytecode #dependence
- Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
- ASE-2015-WangD #architecture #behaviour #message passing
- A Message-Passing Architecture without Public Ids Using Send-to-Behavior (ESSW, ZD), pp. 902–905.
- ESEC-FSE-2015-HammoudiBBR #debugging #on the #web
- On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
- ESEC-FSE-2015-KargenS #slicing #source code
- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
- ESEC-FSE-2015-NorthBSC #developer #named
- GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
- ESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation
- MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
- ESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing
- Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
- ESEC-FSE-2015-XuKB #ubiquitous
- Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
- ICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability
- Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
- ICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing
- Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
- ICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source
- Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
- ICSE-v1-2015-PetrosyanRM #api #classification #information management
- Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
- ICSE-v1-2015-YangXALXE #behaviour #mobile #named
- AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
- ICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named
- ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
- ICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval
- The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
- ICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #video
- scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
- ICSE-v2-2015-CamilloniVA #evaluation #re-engineering
- Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
- ICSE-v2-2015-Cornu #debugging #named #null
- Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
- ICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library
- Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
- ICSE-v2-2015-GveroK #interactive #query #synthesis
- Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
- ICSE-v2-2015-HerzigN #detection #empirical
- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
- ICSE-v2-2015-LutellierCGTRMK #architecture #dependence
- Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
- ICSE-v2-2015-MaleticC #analysis #semiparsing #source code
- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
- ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance
- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
- ICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering
- Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
- ICSE-v2-2015-SadeghiBM #analysis #android #security
- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
- SAC-2015-BarrosCMP #education #learning #repository #reuse
- Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
- SAC-2015-BolockA #automation #constraints #generative #towards
- Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
- SAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse
- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
- SAC-2015-ByunC #automation #constraints #operating system #safety #testing
- Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
- SAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social
- Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
- SAC-2015-ChaudhuriMG #network #predict
- QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
- SAC-2015-CorcoglionitiRM #rdf #sorting #streaming
- Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
- SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability
- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
- SAC-2015-DabainMT #design pattern #detection
- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
- SAC-2015-DarabiG #personalisation #summary #video
- Personalized video summarization using sift (KD, GG), pp. 1252–1256.
- SAC-2015-DasK
- Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
- SAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring
- A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
- SAC-2015-GouthamLY #authentication #protocol #smarttech
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- SAC-2015-HamataniUH #smarttech
- Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
- SAC-2015-HozanoFSFC #detection #developer #feedback #smell
- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
- SAC-2015-HublerRFS #data flow #named
- P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
- SAC-2015-JeongYAYP #algorithm #interactive #network #search-based
- Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
- SAC-2015-Jo #algorithm #image #interactive #search-based
- Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
- SAC-2015-KimK #scalability
- Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
- SAC-2015-KimL #diagrams #qvt #sequence chart
- Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
- SAC-2015-KrutzMS #analysis #detection #effectiveness
- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
- SAC-2015-LeTN #requirements #verification
- Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
- SAC-2015-LiuI #clustering #framework #optimisation #parallel
- An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
- SAC-2015-MainiS #communication #distributed #multi
- Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
- SAC-2015-OliveiraQMM #community #complexity #detection
- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
- SAC-2015-PintoMCS #process
- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
- SAC-2015-Rekha #big data #detection #performance
- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
- SAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance
- G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
- SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy
- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
- SAC-2015-RodriguesJD #recommendation
- Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
- SAC-2015-SilvaBAR #clustering #multi #prototype
- Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
- SAC-2015-SilvaMR #algorithm #approach #problem
- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
- SAC-2015-SilvaSBVS #assessment #framework #process
- Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
- SAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability
- pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
- SAC-2015-TizzeiABC #architecture #case study #product line #tool support
- Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
- SAC-2015-XuanLXT #empirical #fault #metric #predict #set
- Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
- SAC-2015-XuYYHHK #multi #predict
- Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
- GPCE-2015-InostrozaS #algebra #composition
- Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
- GPCE-2015-SeidlSS #design pattern #development #generative #product line #variability
- Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
- SLE-2015-GammaitoniKG #design
- Designing languages using lightning (LG, PK, CG), pp. 77–82.
- SLE-2015-OchoaRT #feature model #modelling
- Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
- ASPLOS-2015-OrrCYBHW
- Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
- ASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer
- Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
- ASPLOS-2015-TanQCAP #named #network
- DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
- CASE-2015-AmriBARF #multi #robust
- Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
- CASE-2015-ArdakaniORJ #generative #predict #realtime
- Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
- CASE-2015-BergagardF #automation #on the
- On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
- CASE-2015-CarliDEAV #automation #evaluation
- Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
- CASE-2015-CarliDPR #energy #multi #optimisation #performance
- Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
- CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- CASE-2015-ChengHL #automation #petri net #robust #synthesis
- Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
- CASE-2015-ChenH #assembly #automation #distributed #petri net
- Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
- CASE-2015-DobslawGZ #challenge #industrial #network
- Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
- CASE-2015-FarhanPWL #algorithm #machine learning #predict
- Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
- CASE-2015-FeiAR #bound #clustering #resource management #symbolic computation
- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
- CASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism
- A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
- CASE-2015-FerreiraBGV #framework
- Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
- CASE-2015-ForstnerM #optimisation #safety
- Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
- CASE-2015-GiulianiC #optimisation #problem
- Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
- CASE-2015-JiaJCS #locality #named
- SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
- CASE-2015-KaipaTSKLG #automation
- Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
- CASE-2015-KeroglouH #communication #constraints #distributed
- Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
- CASE-2015-KimCLJ #design #estimation
- Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
- CASE-2015-KreutzerRREL #automation #detection #metric
- Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
- CASE-2015-LeeKK #online #parametricity
- Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
- CASE-2015-LiangSQLY #agile #assessment #development
- Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
- CASE-2015-LinZW #predict #realtime
- Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
- CASE-2015-LiuC #algorithm #evaluation #performance #quality
- A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
- CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict
- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
- CASE-2015-MillerM #locality
- Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
- CASE-2015-ParisACAR #behaviour #learning #markov #smarttech
- Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
- CASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming
- Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
- CASE-2015-QuangTH #adaptation
- FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
- CASE-2015-RoyelYLLH #identification #optimisation #parametricity
- A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
- CASE-2015-SaksenaNKK #2d #assembly #automation #parametricity
- Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
- CASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling
- Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
- CASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network
- Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
- CASE-2015-TorresP #multi
- Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
- CASE-2015-WahrburgMCMD #estimation
- Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
- CASE-2015-WareS #synthesis
- Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
- CASE-2015-Yen #realtime
- Optimize the flight path for airlines using real-time information (JRY), p. 1649.
- CASE-2015-ZafarKSMJA #health #monitoring #process
- Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
- CASE-2015-ZhangTYL #assessment #markov #reliability
- CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
- CASE-2015-ZhuCS #energy #linear #process #recognition
- Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
- CASE-2015-ZonEHJVSB #delivery #detection #multi #realtime
- Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
- CGO-2015-NagarajG #analysis #approximate #mining #pointer
- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
- DAC-2015-AsadJ #programming #verification
- Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
- DAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #validation
- Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
- DAC-2015-Engblom #integration #platform
- Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
- DAC-2015-HanKL #design #evaluation
- Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
- DAC-2015-HelalBH #parallel #simulation
- Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
- DAC-2015-HerdtLD #simulation #verification
- Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
- DAC-2015-LahiouelZT #smt #towards
- Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
- DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security
- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
- DAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based
- Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
- DAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis
- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
- DAC-2015-TashjianD #identification #on the
- On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
- DAC-2015-TsaiYPLTCC #design #energy #in memory #memory management
- Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
- DAC-2015-XuLP #adaptation #modelling #physics #statistics
- Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
- DAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime
- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
- DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware
- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
- DAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation
- An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
- DATE-2015-AhsanK #architecture #optimisation #quantum
- Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
- DATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
- Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
- DATE-2015-BaldwinBRPB #analysis #array #predict
- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
- DATE-2015-BarraganL #case study #feature model
- Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
- DATE-2015-BillointSRVBFRC #2d #3d #design
- A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
- DATE-2015-CakirM #clustering #correlation #detection #hardware
- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
- DATE-2015-ChangD #analysis #model checking #modelling
- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
- DATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics
- Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
- DATE-2015-CuiZSW #towards
- Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
- DATE-2015-DarkeCVSM #approximate #bound #model checking
- Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
- DATE-2015-ErolOSPB #metric
- On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
- DATE-2015-FernandoWNKC #agile #algorithm #design #synthesis
- (AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
- DATE-2015-HashemianSWWCP #array #authentication #robust
- A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
- DATE-2015-HerberRWH #realtime #scheduling
- Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
- DATE-2015-JiRML #hardware #implementation #logic #network #probability
- A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
- DATE-2015-KauerNLSC #geometry #optimisation #programming
- Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
- DATE-2015-LiaperdosSATAL #deployment #performance
- Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
- DATE-2015-LiJHWCGLKW #design #optimisation
- Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
- DATE-2015-LiXWNP #fine-grained #multi #power management #reduction
- Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
- DATE-2015-LourencoMH
- Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
- DATE-2015-MadhukarSWKM #abstraction #lazy evaluation #verification
- Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
- DATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability
- MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
- DATE-2015-PaulinoFBC #configuration management #execution #hardware
- Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
- DATE-2015-RanjanRVPRR #configuration management #memory management #named
- DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
- DATE-2015-SaifhashemiHBB #equivalence #logic #tool support
- Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
- DATE-2015-SalfelderH #adaptation #evaluation #simulation
- Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
- DATE-2015-ShutoYS #architecture #case study #comparative
- Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
- DATE-2015-StrobelBOSP #named
- Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
- DATE-2015-SunKPE #algebra #geometry #verification
- Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
- DATE-2015-TanLF #memory management #reliability
- Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
- DATE-2015-TeysseyreNOCCG #performance #set #simulation
- Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
- DATE-2015-VenkataramanKSE #design #heuristic
- Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
- DATE-2015-WengCCHW
- Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
- DATE-2015-YuSHEAB #library #multi #statistics
- Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
- DATE-2015-ZhuM #linear #machine learning #optimisation #programming
- Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
- HPCA-2015-HungerKRDVT #comprehension
- Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
- HPCA-2015-LoCIS #monitoring #runtime
- Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
- HPCA-2015-WuGLJC #estimation #machine learning #performance
- GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
- HPDC-2015-HeSSI #cost analysis #online
- Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
- ISMM-2015-OsterlundL #concurrent #protocol
- Concurrent compaction using a field pinning protocol (EÖ, WL), pp. 56–69.
- LCTES-2015-BardizbanyanSWL #data access #performance
- Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
- PDP-2015-El-KazzazE #detection #framework #scalability #ubiquitous
- A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
- PDP-2015-GianariaG #image #realtime #simulation
- Real-Time Simulation of Radiological Images Using CUDA Technology (EG, EG), pp. 669–673.
- PDP-2015-HernandezCBTA #case study #experience #simulation
- Experiences of Using Cassandra for Molecular Dynamics Simulations (RH, CC, YB, JT, EA), pp. 288–295.
- PDP-2015-MiwaN #thread
- Progression of MPI Non-blocking Collective Operations Using Hyper-Threading (MM, KN), pp. 163–171.
- PDP-2015-SimonetCFF
- Using Active Data to Provide Smart Data Surveillance to E-Science Users (AS, KC, GF, ITF), pp. 269–273.
- PDP-2015-TrahayBBL
- Selecting Points of Interest in Traces Using Patterns of Events (FT, EB, MMB, JL), pp. 70–77.
- PPoPP-2015-RamachandranM #concurrent #named #performance
- CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
- SOSP-2015-ChenZCCKZ #file system #hoare #logic
- Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
- SOSP-2015-RaychevMM #execution #symbolic computation
- Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
- SOSP-2015-WeiSCCC #in memory #performance #transaction
- Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
- FASE-2015-AndriescuMI #automaton #data type
- Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
- STOC-2015-AggarwalDRS #problem
- Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
- STOC-2015-Czumaj #network #permutation #random
- Random Permutations using Switching Networks (AC), pp. 703–712.
- TACAS-2015-BransenBCD #attribute grammar #order #scheduling
- Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
- TACAS-2015-HolikHLRSV #analysis #automaton #contest #named
- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
- TACAS-2015-KriouileS #formal method #verification
- Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
- TACAS-2015-Thierry-Mieg #model checking
- Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
- CADE-2015-GransdenWR #automaton #named #proving
- SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
- CADE-2015-MaricJM #correctness #higher-order #proving
- Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
- CADE-2015-Paulson #automaton #finite #formal method #set
- A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
- CADE-2015-TiwariGD #synthesis
- Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
- CAV-2015-BacchusK #satisfiability #set
- Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
- CAV-2015-CernyCHRRST #scheduling #synthesis
- From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
- CAV-2015-DeshmukhMP #consistency #metric
- Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
- CAV-2015-ErezN #automation #bound #graph #smt
- Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
- ICLP-2015-Charwat #diagrams #programming #research #summary
- Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC), pp. 301–310.
- ICLP-2015-LeeWZ #automation #programming #reasoning #set
- Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ), pp. 247–259.
- ICLP-2015-LiVPSB #debugging
- Debugging ASP using ILP (TL, MDV, JP, KS, TB), pp. 100–113.
- ICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code
- Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
- ICLP-J-2015-KoponenOJS #optimisation #programming #set
- Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
- ICST-2015-0001YPGS #analysis #generative #testing
- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
- ICST-2015-BaiSP #fault #named
- NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
- ICST-2015-Felbinger #assessment #model inference #quality #testing
- Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
- ICST-2015-LeottaSRT #multi #robust #testing #web
- Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
- ICST-2015-MahajanH #detection #html #locality
- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
- ICST-2015-NoguchiWFSO #black box #optimisation #testing
- History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
- ICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml
- Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
- ICST-2015-SantosC #agile #challenge #industrial #mobile #testing
- Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
- ICTSS-2015-GrozSPO #finite #identification #sequence #state machine
- Inferring Finite State Machines Without Reset Using State Identification Sequences (RG, AdSS, AP, CO), pp. 161–177.
- ICTSS-2015-GunicenJY #adaptation #generative #multi #sequence
- Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation (CG, GVJ, HY), pp. 19–34.
- ICTSS-2015-HentzVM #cost analysis #grammarware #testing
- Reducing the Cost of Grammar-Based Testing Using Pattern Coverage (CH, JJV, AMM), pp. 71–85.
- ISSTA-2015-JiaGY #constraints #execution #reuse #symbolic computation
- Enhancing reuse of constraint solutions to improve symbolic execution (XJ, CG, SY), pp. 177–187.
- ISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based
- Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
- SAT-2015-AnsoteguiGLS #community #detection
- Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
- TAP-2015-AthanasiouLS #concurrent #generative #testing
- Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
- TAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #verification
- Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
- VMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing
- Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
- VMCAI-2015-NagarS #analysis
- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
- CBSE-2014-BenedittoW #configuration management #runtime
- Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
- CBSE-2014-MateescuSY #model checking #parallel #process
- Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
- ECSA-2014-FreudenreichAFB #architecture #complexity #policy
- Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
- QoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance
- Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
- QoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution
- Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
- DocEng-2014-Fan0N
- Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
- DocEng-2014-KolbergFRF #analysis #documentation #performance #throughput
- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
- DocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #wiki
- An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
- DocEng-2014-SouzaMH #metadata #named
- ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
- DRR-2014-BanerjeeC #locality #video
- Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
- DRR-2014-JainOD #documentation #image #retrieval #scalability
- Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
- DRR-2014-KleberDS #classification #retrieval #word
- Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
- DRR-2014-LemaitreCC #image #segmentation
- Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
- DRR-2014-ParkerFF #documentation #heuristic #image #robust
- Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
- DRR-2014-TaoTX #documentation #learning #random
- Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
- HT-2014-AbbasiTL #learning #scalability
- Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
- HT-2014-NoorianMV #adaptation #feedback #self
- Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
- JCDL-2014-BatjargalKKM #database #identification #image #multi
- Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages (BB, TK, FK, AM), pp. 193–196.
- JCDL-2014-ChenF #education #metadata
- Using ACM DL paper metadata as an auxiliary source for building educational collections (YC, EAF), pp. 137–140.
- JCDL-2014-ChoiLD #automation #classification #what
- What is this song about anyway?: Automatic classification of subject using user interpretations and lyrics (KC, JHL, JSD), pp. 453–454.
- JCDL-2014-DibieMS #approach #behaviour #comprehension #education #online #predict
- A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
- JCDL-2014-GuoGL #education
- Using affective embodied agents in information literacy education (YG, DHLG, BL), pp. 389–398.
- JCDL-2014-KellyNW14a #experience #named #web
- Mink: Integrating the live and archived web viewing experience using web browsers and memento (MK, MLN, MCW), pp. 469–470.
- JCDL-2014-MeuschkeG #detection #retrieval
- Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
- JCDL-2014-PereiraSE
- Disambiguating publication venue titles using association rules (DAP, EEBdS, AAAE), pp. 77–86.
- SIGMOD-2014-DyresonBG #query
- Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
- SIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters
- SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
- SIGMOD-2014-HeMD #policy #privacy #trade-off
- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
- SIGMOD-2014-KalininCZ #data analysis #interactive #semantics
- Interactive data exploration using semantic windows (AK, UÇ, SBZ), pp. 505–516.
- SIGMOD-2014-LevinK #network #pipes and filters #social
- Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
- SIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation
- Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
- VLDB-2014-FuOPZ #component #declarative #javascript #named
- FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
- VLDB-2014-SarmaHC #clustering #framework #named #similarity
- ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
- VLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability
- Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
- VLDB-2014-YangDCC #keyword #knowledge base
- Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
- VLDB-2014-YuMS #random
- Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
- VLDB-2014-ZhangJSR #big data #recommendation
- Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
- VLDB-2015-Li0QYZ014 #query #set
- Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
- VLDB-2015-WangZZLW14 #correlation #estimation #streaming
- Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
- VLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability
- MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
- CSEET-2014-AkpolatS #gamification #programming #re-engineering #student
- Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
- CSEET-2014-Lethbridge #development #education #effectiveness #modelling
- Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
- CSEET-2014-SedelmaierL #modelling #process #requirements
- Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
- CSEET-2014-ShankararamanD #challenge #delivery #design #education #re-engineering
- Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
- CSEET-2014-Steppe #analysis #dependence #design #education #graph
- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
- EDM-2014-EaglePMB #logic #student
- Exploration of Student's Use of Rule Application References in a Propositional Logic Tutor (ME, VP, BM, TB), pp. 249–252.
- EDM-2014-FuentesRGV #data mining #mining #self #student
- Accepting or Rejecting Students_ Self-grading in their Final Marks by using Data Mining (JF, CR, CGM, SV), pp. 327–328.
- EDM-2014-GerykP #analysis #student #visual notation
- Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
- EDM-2014-KimPSJ #comparison #learning #linear #online #predict #student
- Predicting students' learning achievement by using online learning patterns in blended learning environments: Comparison of two cases on linear and non-linear model (JK, YP, JS, IHJ), pp. 407–408.
- EDM-2014-Lang #predict #student
- The Use of Student Confidence for Prediction & Resolving Individual Student Knowledge Structure (CL), pp. 438–440.
- EDM-2014-NiznanPR #detection #problem
- Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
- EDM-2014-PeddycordHB #generative #problem #programming
- Generating Hints for Programming Problems Using Intermediate Output (BWPI, AH, TB), pp. 92–98.
- EDM-2014-RayBR #data mining #mining
- Using Data Mining to Automate ADDIE (FR, KWB, RR), pp. 429–430.
- EDM-2014-SaarelaK #education
- Discovering Gender-Specific Knowledge from Finnish Basic Education using PISA Scale Indices (MS, TK), pp. 60–67.
- EDM-2014-SchneiderB #gesture #interactive #interface #recognition #student
- Unraveling Students' Interaction Around a Tangible Interface Using Gesture Recognition (BS, PB), pp. 320–323.
- EDM-2014-ToussaintLT #automation #behaviour #detection #similarity #towards
- Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
- EDM-2014-WorsleyB #learning #multimodal
- Using Multimodal Learning Analytics to Study Learning Mechanisms (MW, PB), pp. 431–432.
- EDM-2014-XuCYM
- Using EEG in Knowledge Tracing (YX, KmC, YY, JM), pp. 361–362.
- EDM-2014-ZhengP #algorithm #learning
- Dynamic Re-Composition of Learning Groups Using PSO-Based Algorithms (ZZ, NP), pp. 357–358.
- ITiCSE-2014-BenottiMS #student
- Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
- ITiCSE-2014-FerreiraM #algorithm #analysis #design #education
- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
- ITiCSE-2014-GibsonM #collaboration #tool support
- A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
- ITiCSE-2014-Kann
- Using reflections in a program integrating course (VK), p. 350.
- ITiCSE-2014-MedinaSGG #learning #student
- Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
- ITiCSE-2014-MI14a #principle #problem
- Problem-solving using the extremality principle (JM, SI), pp. 87–92.
- ITiCSE-2014-StrieweG14a #runtime
- Code reading exercises using run time traces (MS, MG), p. 346.
- ITiCSE-2014-WangCMSW #data access #education #multi #named #security #visualisation
- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
- SIGITE-2014-DekhaneJ #mobile #programming #student
- Using mobile apps to support novice programming students (SD, CJ), pp. 133–134.
- SIGITE-2014-Halper #android #education #framework #platform #programming
- Using android as a platform for programming in the IT curriculum (MH), pp. 127–132.
- SIGITE-2014-Trabelsi #approach #comprehension #education #network #security
- Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
- CSMR-WCRE-2014-Grosjean #biology #maintenance #question
- Using biology and ecology as inspiration for software maintenance? (PG), p. 1.
- CSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation
- Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
- CSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support
- Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
- CSMR-WCRE-2014-SantosVA #analysis #clustering #semantics
- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
- ICPC-2014-KulkarniM #framework #obfuscation
- A code obfuscation framework using code clones (AK, RM), pp. 295–299.
- ICPC-2014-SuzukiSIH #approach #modelling #n-gram
- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
- ICPC-2014-ThungLOC #classification #design #diagrams #metric #network
- Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
- ICSME-2014-EddyK #code search #query #source code
- Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
- ICSME-2014-MorenoTMS #debugging #locality #on the #stack
- On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
- ICSME-2014-Reiss #code search #testing #towards
- Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
- ICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based
- Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
- ICSME-2014-ShangNHJ #comprehension #development
- Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
- ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing
- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
- ICSME-2014-StevensR #query
- Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
- ICSME-2014-VieiraFC #embedded #maintenance #metric #performance
- Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
- ICSME-2014-WangG #design #recommendation #refactoring
- Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
- ICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #visualisation
- Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
- MSR-2014-FukushimaKMYU #empirical #fault #modelling #predict
- An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
- MSR-2014-LazarRS #debugging #detection #metric #similarity
- Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
- SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question
- Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
- SCAM-2014-KallenHH #object-oriented #refactoring
- Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
- SCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code
- Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
- SCAM-2014-RahmanR14a #exception #on the #recommendation
- On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
- CIAA-2014-AmorimMR #canonical #finite #linear #transducer
- Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
- ICALP-v1-2014-Lampis #approximate #graph
- Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
- ICALP-v1-2014-PrabhakaranSW
- Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
- FM-2014-LakshmiAK #analysis #liveness #reachability
- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
- FM-2014-SanatiMM #decidability #guidelines #logic #metric
- Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
- FM-2014-ShanWFZZWQC #verification
- Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
- HOFM-2014-BagheriSH #development #maintenance #modelling
- Using Z in the Development and Maintenance of Computational Models of Real-World Systems (SMB, GS, JH), pp. 36–53.
- HOFM-2014-BeckertGB #evaluation #interactive #proving #theorem proving #usability
- A Usability Evaluation of Interactive Theorem Provers Using Focus Groups (BB, SG, FB), pp. 3–19.
- IFM-2014-BrideKP #constraints #specification #theorem proving #verification #workflow
- Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
- SEFM-2014-BianculliGK #logic #metric #pipes and filters
- Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
- SEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction
- Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
- SEFM-2014-DuboisR #functional
- Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
- SEFM-2014-HajisheykhiEK #fault #modelling
- Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
- SEFM-2014-ReicherdtG #matlab #modelling #verification
- Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
- FLOPS-2014-Bahr #compilation #correctness #graph #proving
- Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
- FLOPS-2014-Riesco #debugging #declarative #maude #semantics
- Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
- ICFP-2014-Fisher #formal method
- Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
- AIIDE-2014-Abou-ZleikhaS #authoring #design #matrix #named
- PaTux: An Authoring Tool for Level Design through Pattern Customisation Using Non-Negative Matrix Factorization (MAZ, NS).
- AIIDE-2014-CernyBBA #constraints #exclamation #simulation
- Spice It Up! Enriching Open World NPC Simulation Using Constraint Satisfaction (MC0, CB, RB, MA).
- AIIDE-2014-SnodgrassO #approach #generative #markov
- A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
- AIIDE-2014-ZhaoS #behaviour #game studies #scheduling
- Using Cyclic Scheduling to Generate Believable Behavior in Games (RZ, DS).
- CHI-PLAY-2014-BahamonLWGLY #game studies #generative
- IC-CRIME snapshots: training crime scene photographers using procedural content generation in games (JCB, ML, PW, RG, KL, RMY), pp. 403–404.
- CHI-PLAY-2014-GaoGMS #behaviour #game studies
- Decreasing sedentary behaviours in pre-adolescents using casual exergames at school (YG, KMG, RLM, KGS), pp. 97–106.
- CHI-PLAY-2014-GerlingB #game studies
- Last tank rolling: exploring shared motion-based play to empower persons using wheelchairs (KMG, LB), pp. 415–416.
- CHI-PLAY-2014-GoldmanLZ #comprehension #game studies #video
- Using video games to facilitate understanding of attention deficit hyperactivity disorder: a feasibility study (TAG, FJL, JZ), pp. 115–120.
- CHI-PLAY-2014-MoranMG #game studies
- IRC quest: using the commons dilemma to support a single-screen game for hundreds of players (DJM, CM, TCNG), pp. 359–362.
- CHI-PLAY-2014-Richards #game studies
- Using an invisible coach to help players achieve fitness goals in exergames while retaining immersion (CR), pp. 299–302.
- CHI-PLAY-2014-SajjadiGTT #artificial reality #collaboration #game studies
- Maze commander: a collaborative asynchronous game using the oculus rift & the sifteo cubes (PS, EOCG, ST, ODT), pp. 227–236.
- CHI-PLAY-2014-SheininG #contest #game studies
- Jelly polo: increasing richness and competition in sports games using small-scale exertion (MS, CG), pp. 367–370.
- CHI-PLAY-2014-SmithJ #game studies #quote
- “Toru”: a game that reverses the wisdom of age using mosquito sound (JS, KJ), pp. 375–378.
- CHI-PLAY-2014-Wood #game studies #lens #physics
- Using play as a lens to bridge the physical with the digital (GW), pp. 307–310.
- CIG-2014-BauckhageSDTH #behaviour #clustering #game studies #heatmap
- Beyond heatmaps: Spatio-temporal clustering using behavior-based partitioning of game levels (CB, RS, AD, CT, FH), pp. 1–8.
- CIG-2014-KimYK #geometry #graph #monte carlo #representation
- Solving Geometry Friends using Monte-Carlo Tree Search with directed graph representation (HTK, DMY, KJK), pp. 1–2.
- CIG-2014-LabrancheSCB #automation #game studies #simulation
- Using partial satisfaction planning to automatically select NPCs' goals and generate plans in a simulation game (SL, NS, SC, EB), pp. 1–8.
- CIG-2014-LanctotWPS #heuristic #monte carlo
- Monte Carlo Tree Search with heuristic evaluations using implicit minimax backups (ML, MHMW, TP, NRS), pp. 1–8.
- CIG-2014-LeeceJ #game studies #markov #modelling #random
- Opponent state modeling in RTS games with limited information using Markov random fields (MAL, AJ), pp. 1–7.
- CIG-2014-LimH #approach #automation #evaluation #game studies #generative
- An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
- CIG-2014-ParkK #game studies #learning
- Learning to play fighting game using massive play data (HSP, KJK), pp. 1–2.
- CIG-2014-PenaVMLP #3d
- Designer-driven 3D buildings generated using Variable Neighborhood Search (JMPS, JV, SM, AL, LP), pp. 1–8.
- CIG-2014-SanseloneSSPD #game studies #monte carlo
- Constrained control of non-playing characters using Monte Carlo Tree Search (MS, SS, CS, DP, YD), pp. 1–8.
- CIG-2014-YamamotoMCT #algorithm #deduction #game studies #nearest neighbour
- Deduction of fighting-game countermeasures using the k-nearest neighbor algorithm and a game simulator (KY, SM, CYC, RT), pp. 1–5.
- DiGRA-2014-SchottMN #experience #game studies #what
- Exploring the Cause of Game (Derived) Arousal: What biometric accounts of player experience revealed (GS, RM, LN).
- FDG-2014-BroeckhovenT #aspect-oriented #game studies #learning #specification
- Specifying the pedagogical aspects of narrative-based digital learning games using annotations (FVB, ODT).
- FDG-2014-CanossaBN #design pattern #game studies #named
- X-COM: UFO Defense vs. XCOM: Enemy Unknown - Using gameplay design patterns to understand game remakes (AC, SB, MJN).
- FDG-2014-GeishauserCN #prototype #simulation #social
- A prototype using territories and an affordance tree for social simulation gameplay (TG, YGC, MJN).
- FDG-2014-SchutterA #design #game studies
- Gradequest - Evaluating the impact of using game design techniques in an undergraduate course (BDS, VVA).
- FDG-2014-SnodgrassO #generative #markov
- Experiments in map generation using Markov chains (SS, SO).
- FDG-2014-TomaiF #adaptation #behaviour #learning
- Adapting in-game agent behavior by observation of players using learning behavior trees (ET, RF).
- FDG-2014-ZhaoS #architecture #behaviour #scheduling
- Virtual character behavior architecture using cyclic scheduling (RZ, DS).
- VS-Games-2014-BugejaDSC #distributed
- High-Fidelity Graphics for Dynamically Generated Environments Using Distributed Computing (KB, KD, SS, AC), pp. 1–8.
- VS-Games-2014-CassolaPFMACCM #artificial reality #multi #named
- Online-Gym: Multiuser Virtual Gymnasium Using RINIONS and Multiple Kinect Devices (FC, HP, BF, PM0, SA, FC, FdC, LM), pp. 1–4.
- VS-Games-2014-NinausKFNW #learning
- The Potential Use of Neurophysiological Signals for Learning Analytics (MN, SEK, EVCF, CN, GW), pp. 1–5.
- GT-VMT-2014-WangBL #alloy #graph #model transformation #verification
- Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
- CHI-2014-AferganPSJHBCJ #metric
- Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
- CHI-2014-BalataCM #2d #on the
- On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
- CHI-2014-DancuFF #navigation
- Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
- CHI-2014-FeinbergCB #database #design #interactive
- Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
- CHI-2014-FritzHMZ #case study #persuasion #process
- Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
- CHI-2014-GerlingMBMO #game studies #people #persuasion #towards
- The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
- CHI-2014-GoelLAPBHB #interactive #multi #named
- SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
- CHI-2014-HachisuF #feedback #interactive #interface #named
- VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
- CHI-2014-HarbachHWS #communication #privacy #security
- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
- CHI-2014-HarpsteadMAM #design #education #game studies
- Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
- CHI-2014-HayashiMH #gesture #identification
- Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
- CHI-2014-HeoGL
- Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
- CHI-2014-HongA #modelling #performance #predict #recommendation #user interface
- Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
- CHI-2014-HuangTTTYCHC #named
- TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
- CHI-2014-HuangYWZLMLZS #named
- FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
- CHI-2014-KihmGKM #interactive #power management #symmetry
- Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
- CHI-2014-LaseckiWFB #dependence
- Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
- CHI-2014-LiR #online
- Using annotations in online group chats (NL, MBR), pp. 863–866.
- CHI-2014-LuFL #gesture
- Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
- CHI-2014-MarananASPSB #design #modelling
- Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
- CHI-2014-MorrisSGK #named #smarttech
- RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
- CHI-2014-MottW #lens
- Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
- CHI-2014-NielsenH #case study
- Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
- CHI-2014-PasqualW #predict
- Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
- CHI-2014-PedersenSH #scalability
- Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
- CHI-2014-PikeMPSW #protocol
- Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
- CHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #video
- Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
- CHI-2014-PuciharCA #visual notation
- The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
- CHI-2014-SchildLM #3d #behaviour #design #game studies #video
- Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
- CHI-2014-SchwarzXMHH #classification #probability
- Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
- CHI-2014-SerranoEI
- Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
- CHI-2014-Smith-ClarkeMC #communication #mobile #network
- Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
- CHI-2014-SoloveyZPRM #performance
- Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
- CHI-2014-SuhPHK #design #evaluation #twitter
- @BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
- CHI-2014-SunDLLG #case study
- Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
- CHI-2014-TanSLC #collaboration #visual notation
- Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
- CHI-2014-UzorB #game studies
- Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
- CHI-2014-WangL #communication #gesture #similarity
- Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
- CHI-2014-WeiMZ #social
- Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
- CSCW-2014-CastilloEPS #lifecycle #online #social #social media
- Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
- CSCW-2014-LiuJPP #feedback #visual notation
- Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
- CSCW-2014-NakazatoYSNTH #realtime #video
- Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
- CSCW-2014-XuHB #design #feedback #generative #named #visual notation
- Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
- CSCW-2014-YueHH #collaboration #modelling #process #web
- Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
- DHM-2014-DuWZHM #evolution #image
- Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
- DHM-2014-Kull
- Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
- DHM-2014-Luo #artificial reality #case study #metric #re-engineering
- Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
- DHM-2014-MamessierDO #artificial reality #assessment #online
- Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
- DHM-2014-RasoolSPK #image
- Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
- DHM-2014-SantosST #information management #ontology #semantics #web
- Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
- DHM-2014-YoganathanK
- ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
- DUXU-DI-2014-BarrosSF
- Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
- DUXU-DI-2014-EschrichKKHG #mobile
- Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
- DUXU-DI-2014-SchusterHBRJ #experience #how
- Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
- DUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation
- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
- DUXU-DP-2014-ItoHN #design #interface #social
- Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
- DUXU-DP-2014-SilvaPS #analysis #concept
- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
- DUXU-ELAS-2014-Chunpir0B #comprehension
- Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
- DUXU-ELAS-2014-GeabelJHABA #identification
- Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
- DUXU-ELAS-2014-KamiyaKASNMF #design
- Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
- DUXU-ELAS-2014-MontAlvao #health #overview
- Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
- DUXU-ELAS-2014-VilarDRNV #artificial reality #case study
- A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
- DUXU-TMT-2014-HeimgartnerS #agile #design #human-computer
- Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
- DUXU-TMT-2014-HeimgartnerSH #agile #usability
- Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
- DUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface
- Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
- HCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition
- The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
- HCI-AIMT-2014-ChakravartyC #artificial reality #identification
- Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
- HCI-AIMT-2014-KuribaraMOST #named
- HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
- HCI-AIMT-2014-Man #hardware #video
- Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
- HCI-AIMT-2014-NiLF #interactive
- Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
- HCI-AIMT-2014-ReddyC #artificial reality #process #recognition
- Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
- HCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov
- View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
- HCI-AIMT-2014-TsurudaHYI #mobile
- Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
- HCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive
- “Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
- HCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality
- Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
- HCI-AS-2014-DotencoGG #smarttech
- Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
- HCI-AS-2014-KadomuraITRS #named #visualisation
- AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
- HCI-AS-2014-LeeYJ #predict
- Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
- HCI-AS-2014-OgataII #smarttech
- Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
- HCI-TMT-2014-BrownTBKLMCEGA #design
- Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
- HCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability
- ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
- HCI-TMT-2014-HankiewiczB #performance #quality #source code #word
- Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
- HCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface
- Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
- HCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net
- PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
- HCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface
- Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
- HIMI-AS-2014-AlkhateebHH #comprehension
- The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
- HIMI-AS-2014-IizukaG #mobile
- Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
- HIMI-AS-2014-MakiY #3d #image #multi
- 3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
- HIMI-AS-2014-TanakaTH #development #education
- Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
- HIMI-AS-2014-TogawaK #collaboration #framework #smarttech
- Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
- HIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards
- Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
- HIMI-DE-2014-HottaOM #user interface
- Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
- HIMI-DE-2014-JungAK #interface #web
- A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
- HIMI-DE-2014-KatoM #deployment #modelling #quality
- Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
- HIMI-DE-2014-KhodaskarL #image #retrieval #semantics
- Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
- HIMI-DE-2014-SakaguchiIH #development #performance
- Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
- HIMI-DE-2014-SakuraiKNTH #pseudo
- Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
- HIMI-DE-2014-SugayaNT #clustering #recognition
- Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
- HIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining
- User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
- HIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support
- Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
- LCT-NLE-2014-NicolaouC
- Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
- LCT-NLE-2014-OrehovackiBJ #education #quality #web
- Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
- LCT-TRE-2014-HafnerHO #artificial reality #physics
- Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
- LCT-TRE-2014-HiramatsuIFS #development #learning
- Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
- LCT-TRE-2014-SofticVMWE #research
- Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
- LCT-TRE-2014-TzanavariMCP #experience #performance #user interface
- User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
- SCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named
- Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
- SCSM-2014-AbdallaY #network #online #overview #process #social
- A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
- SCSM-2014-Ahangama #detection #realtime #social #social media #twitter
- Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
- SCSM-2014-HuangG #empirical #health #network #social
- Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
- SCSM-2014-MendesFFC #analysis #classification #how #social
- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
- SCSM-2014-OtakeSOSUS #gamification #motivation
- A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
- SCSM-2014-PensasVGKKCV #communication #network #social
- Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
- SCSM-2014-RayaRRP #adaptation #game studies
- Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
- SCSM-2014-SchaarVZELJ #motivation #network #social
- Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
- VISSOFT-2014-SchotsW #framework #visualisation
- Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
- CAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics
- Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
- CAiSE-2014-PikaWFHLA #behaviour #framework
- An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
- CAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval
- Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
- CAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #variability
- Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
- CAiSE-2014-VergneS #community #markov #network #open source
- Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
- ICEIS-v1-2014-CoelhoAABB #network
- Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
- ICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap
- Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
- ICEIS-v1-2014-KleinSRF #formal method #integration #on the
- On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
- ICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based
- The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
- ICEIS-v1-2014-MamcenkoG #mobile #predict
- Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
- ICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel
- An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
- ICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring
- Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
- ICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters
- Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
- ICEIS-v2-2014-BarretoFSJ #formal method #petri net
- A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
- ICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation
- Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
- ICEIS-v2-2014-FonsecaC #concept #reuse
- Reuse of Service Concepts Based on Service Patterns (WRF, PLPC), pp. 290–297.
- ICEIS-v2-2014-GippMBPN #detection #semantics #similarity #visualisation
- Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
- ICEIS-v2-2014-HernandesTTF #analysis #mining #visualisation
- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
- ICEIS-v2-2014-JulianoTS #detection #metric #object-oriented
- Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
- ICEIS-v2-2014-KaramtiTG #image #network #process #retrieval
- Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
- ICEIS-v2-2014-MeloS #design #modelling #uml
- Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
- ICEIS-v2-2014-OtonBGGB #learning #metadata
- Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
- ICEIS-v2-2014-ThommazoRROHWF #traceability
- Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
- ICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy
- Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
- ICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process
- Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
- ICEIS-v3-2014-NunoG #in the cloud #outsourcing
- Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
- ICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process
- A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
- ICEIS-v3-2014-RibeiroS #case study #evaluation #usability
- A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
- ICEIS-v3-2014-ZacepinsBA
- Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
- CIKM-2014-AgrawalGKK #concept #graph #similarity
- Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
- CIKM-2014-CarmelMPS #analysis #community
- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
- CIKM-2014-DavletovAC #predict
- High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
- CIKM-2014-FangQHZ #composition #overview #ranking #sentiment #summary
- Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
- CIKM-2014-HanWP #classification
- Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
- CIKM-2014-HustonC #comparison #dependence #modelling #retrieval
- A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
- CIKM-2014-LiuLK #classification #information management #performance
- Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
- CIKM-2014-NguyenTT #crowdsourcing #similarity
- Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
- CIKM-2014-PfeifferNB #learning #network #probability
- Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
- CIKM-2014-RahmanH #network #strict
- Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
- CIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability
- Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
- CIKM-2014-YangLLLH #automation #clustering #detection #multi #social
- Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
- CIKM-2014-ZhuMHZC #social #social media #topic
- Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
- ECIR-2014-Aly #normalisation #parametricity
- Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
- ECIR-2014-GaoWO #comparison
- Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
- ECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #video
- Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
- ECIR-2014-KapteinKVB #semantics #web
- Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
- ECIR-2014-LefortierSRR #case study #video #web
- Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
- ECIR-2014-Lommatzsch #realtime #recommendation
- Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
- ECIR-2014-PanemBGV #detection #realtime #topic #twitter
- Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
- ECIR-2014-SchuthSWR #case study #optimisation
- Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
- ECIR-2014-YangPSS #case study #e-commerce #query #scalability
- A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
- ICML-c1-2014-LiuJL #approximate #kernel #performance
- Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
- ICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics
- Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
- ICML-c2-2014-ChagantyL #modelling #visual notation
- Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
- ICML-c2-2014-Chen0 #big data #learning #modelling #topic
- Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
- ICML-c2-2014-Cherian #nearest neighbour
- Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
- ICML-c2-2014-GalG #parallel #process
- Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
- ICML-c2-2014-JohanssonJDB #geometry #graph #kernel
- Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
- ICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random
- A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
- ICML-c2-2014-SatoN #analysis #approximate #equation #probability #process
- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
- ICML-c2-2014-SchwingHPU #algorithm #convergence #parallel
- Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
- ICML-c2-2014-ShamirS0 #approximate #distributed #optimisation
- Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
- ICML-c2-2014-TamarMX #approximate #robust #scalability
- Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
- ICPR-2014-AlathariNB #segmentation
- Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
- ICPR-2014-AlemdarKNME #behaviour #modelling
- A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
- ICPR-2014-AlmogahedK #game studies #named
- NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
- ICPR-2014-AzizWH #graph #kernel
- Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
- ICPR-2014-BashbaghiGSB #multi
- Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
- ICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning
- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
- ICPR-2014-BekhetA #video
- Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
- ICPR-2014-BeraM #multi #realtime
- Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
- ICPR-2014-BicegoRFRG #behaviour
- Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
- ICPR-2014-BiswasZLMV #analysis #detection #image
- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
- ICPR-2014-BogunKCR #interactive #recognition
- Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
- ICPR-2014-BorgiLEA14a #multi #recognition
- Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
- ICPR-2014-BrownFP #detection #self
- Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
- ICPR-2014-BuiNK #graph #music
- Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
- ICPR-2014-BuiNLYK #detection #order #statistics
- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
- ICPR-2014-ByeonLB #2d #classification #network
- Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
- ICPR-2014-CaliskanA
- Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
- ICPR-2014-ChanK #geometry #identification #image
- Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
- ICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry
- Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
- ICPR-2014-ChenK #gesture #recognition
- Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
- ICPR-2014-ChenLHLLH #detection
- Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
- ICPR-2014-ChenWLHI #image #robust #segmentation
- Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
- ICPR-2014-ChevallierCA #estimation #image #metric #orthogonal
- Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
- ICPR-2014-ChironGM #behaviour #parametricity
- Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
- ICPR-2014-Climent-PerezMR #detection #multi
- Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
- ICPR-2014-DahlCB #image #multi #segmentation
- Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
- ICPR-2014-DominguesMMSR #information management #recommendation #topic
- Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
- ICPR-2014-DongPHLDJ #classification #network
- Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
- ICPR-2014-DuanHZCZ #image #segmentation
- A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
- ICPR-2014-DuCZ #aspect-oriented #identification
- A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
- ICPR-2014-DuDA #modelling #topic
- Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
- ICPR-2014-DuHZWD #case study #classification #design #network #online #recognition
- A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
- ICPR-2014-ElmikatyS #detection #image #multi
- Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
- ICPR-2014-EvangelidisSH #recognition
- Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
- ICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech
- Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
- ICPR-2014-GavriilidisT #classification #kernel #random
- Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
- ICPR-2014-GeXYS #image #synthesis
- Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
- ICPR-2014-GhoraiC #algorithm #composition #higher-order #image
- An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
- ICPR-2014-GiordanoPS #estimation #kernel #modelling
- Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
- ICPR-2014-GognaSM #matrix
- Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
- ICPR-2014-Gonzalez-CastroDC #adaptation #classification
- Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
- ICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition
- Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
- ICPR-2014-GuptaBVS #on the
- On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
- ICPR-2014-HafemannOC #network #recognition
- Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
- ICPR-2014-HaoXPSK #automation #semantics #topic
- Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
- ICPR-2014-HaqBBA #modelling #segmentation
- Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
- ICPR-2014-HasnatAT #clustering #image
- Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
- ICPR-2014-HeDY0PJ #multi #random #visual notation
- Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
- ICPR-2014-HuangZPZ #canonical #correlation #recognition #robust
- Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
- ICPR-2014-HusainDT #random
- Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
- ICPR-2014-HuWSC #detection #framework #robust
- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
- ICPR-2014-HuynhCM #3d #constraints #geometry #video
- Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
- ICPR-2014-IoannidisCL #clustering #modelling #multi
- Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
- ICPR-2014-ItohIS #2d #image #linear
- Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
- ICPR-2014-JangLSK #automation #classification #multi #video
- Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
- ICPR-2014-JinIHS #approach
- A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
- ICPR-2014-JoshiGG #automation #predict #visual notation
- Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
- ICPR-2014-JudV
- Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
- ICPR-2014-KacheleZMS #feature model #quality #recognition
- Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
- ICPR-2014-KapsourasN #approach #recognition
- Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
- ICPR-2014-KarM #fuzzy
- Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
- ICPR-2014-KeceliC #approach #multimodal
- A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
- ICPR-2014-KimP14a #3d #interactive #physics
- Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
- ICPR-2014-KramarevZWL #categorisation #composition #image #representation
- Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
- ICPR-2014-KuangOA #estimation
- Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, KÅ), pp. 2419–2423.
- ICPR-2014-KumarA2 #stack
- Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
- ICPR-2014-KumarK #adaptation #multimodal #recognition #security #set
- Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
- ICPR-2014-KurtekS #analysis #segmentation
- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
- ICPR-2014-LaiSTH #3d
- 3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
- ICPR-2014-LandgrenOH #image #segmentation
- A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
- ICPR-2014-LeeSL #3d #invariant #recognition #self
- View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
- ICPR-2014-LeNVOT #documentation #retrieval
- Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
- ICPR-2014-LiCGW #hybrid #interactive #recognition
- A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
- ICPR-2014-LinH #analysis
- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
- ICPR-2014-LiRPV #modelling #topic
- Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
- ICPR-2014-LuoZW #image #segmentation
- Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
- ICPR-2014-LuYXYWP #recognition
- Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
- ICPR-2014-MaHXP #3d #approach #robust
- A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
- ICPR-2014-MatsuoSY #detection #image
- Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
- ICPR-2014-MittalKKK #recognition
- Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
- ICPR-2014-MiyanS #consistency #image
- Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
- ICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition
- Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
- ICPR-2014-MoilanenZP #agile #analysis #difference
- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
- ICPR-2014-MolderCCH #automation #detection #reduction
- Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
- ICPR-2014-MollerPB #analysis #quantifier
- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
- ICPR-2014-MoriKNK #detection #video
- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
- ICPR-2014-MoyouIP #3d #estimation #performance #retrieval
- LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
- ICPR-2014-MuddamsettySTM #detection
- Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
- ICPR-2014-NakashikaHTA #3d #recognition
- 3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
- ICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval
- Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
- ICPR-2014-NguyenGVP #framework #parametricity #process #recognition
- A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
- ICPR-2014-NguyenP #linear #multi
- Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
- ICPR-2014-NieJ #learning #linear
- Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
- ICPR-2014-NieKZ #learning #recognition
- Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
- ICPR-2014-Nilsson #polynomial
- Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
- ICPR-2014-NilssonAGF #detection
- Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
- ICPR-2014-NishimuraOAN #image #modelling #speech #web
- Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
- ICPR-2014-OhyamaYWK #recognition
- Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
- ICPR-2014-OtteSZ #algorithm #named
- ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
- ICPR-2014-PandaKC #graph #random #scalability #summary #video
- Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
- ICPR-2014-PaudelDHV #2d #3d #locality
- Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
- ICPR-2014-PerinaKB #array #classification #kernel
- Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
- ICPR-2014-QureshiHA #probability
- A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
- ICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #video
- Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
- ICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance
- Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
- ICPR-2014-RazavianASC #smarttech
- Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
- ICPR-2014-RenL #gender #recognition
- Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
- ICPR-2014-RingLRE #assessment
- A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
- ICPR-2014-RosaCJPFT #clustering #network #on the
- On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
- ICPR-2014-SaitoAFRSGC #learning
- Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
- ICPR-2014-SamantaC #classification
- Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
- ICPR-2014-SariE #analysis #detection #fault #independence
- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
- ICPR-2014-SavakisRP #difference #gesture #learning
- Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
- ICPR-2014-SaygiliMH #metric #similarity
- Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
- ICPR-2014-SeckDT #3d #analysis #geometry
- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
- ICPR-2014-Shirakawa #multi #performance #similarity
- Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
- ICPR-2014-SlitiHBA #analysis #robust
- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
- ICPR-2014-SongLZC #adaptation #performance
- Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
- ICPR-2014-SuLTLT #recognition
- Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
- ICPR-2014-SunTL #online
- Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
- ICPR-2014-TabiaV #3d #classification
- 3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
- ICPR-2014-TaniH #detection #robust
- Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
- ICPR-2014-TegenWHOJMNA #image #segmentation #semantics
- Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, KÅ), pp. 2281–2286.
- ICPR-2014-TerissiPG #classification #random
- Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
- ICPR-2014-VuEIYY #image
- Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
- ICPR-2014-WangCH #hybrid #markov #multi #random #video
- Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
- ICPR-2014-WangGJ #learning
- Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
- ICPR-2014-WangS #automation #dataset #multi #segmentation
- Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
- ICPR-2014-WangWJ14a #markov #modelling #recognition
- Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
- ICPR-2014-WangYLZF #independence #recognition
- Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
- ICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition
- View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
- ICPR-2014-XiaoCJF #recognition
- Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
- ICPR-2014-XuS #learning #network
- Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
- ICPR-2014-YamadaM #approach #behaviour
- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
- ICPR-2014-YamashitaW #classification
- k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
- ICPR-2014-YangD #identification #novel
- Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
- ICPR-2014-YangTL #energy #image #recognition
- Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
- ICPR-2014-YingWMYZ #problem
- The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
- ICPR-2014-YuCK #distance #recognition #set
- Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
- ICPR-2014-YuGZ #3d #recognition
- Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
- ICPR-2014-YuncuHB #automation #modelling #recognition #speech
- Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
- ICPR-2014-ZhangLWZ #image #modelling #multi #statistics
- Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
- ICPR-2014-ZhangT #recognition #word
- Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
- ICPR-2014-ZhangWGZZ #analysis #verification
- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
- ICPR-2014-ZhangWL #video
- Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
- KDD-2014-GaddeAO #graph #learning
- Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
- KDD-2014-JinKSDGCPR #community #geometry #modelling #network #social
- Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
- KDD-2014-QianHJPZ #approach #distance #learning #metric
- Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
- KDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source
- “Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
- KDD-2014-SintosT #network #social
- Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
- KDD-2014-SrikantA #machine learning #programming
- A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
- KDD-2014-TayebiEGB #embedded #learning #predict
- Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
- KDD-2014-WangZQZ
- Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
- KDD-2014-WangZX #estimation
- Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
- KDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #video
- Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
- KDD-2014-Yoshida #adaptation #algorithm #linear #sketching
- Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
- KDIR-2014-AbdallahI #classification #modelling #n-gram #web
- URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
- KDIR-2014-AlahmadiJM #classification #concept #representation
- Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
- KDIR-2014-BarcanteJDCCS #identification #mining
- Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
- KDIR-2014-BatistaCRF #ambiguity #wiki
- Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
- KDIR-2014-Bleiweiss #execution #machine learning
- SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
- KDIR-2014-KudamaL #random #semantics
- Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
- KDIR-2014-MorenoGV #data mining #mining #recognition #word
- Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
- KDIR-2014-NagwanshiM #detection #semantics #sentiment
- Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
- KDIR-2014-SatoNS #classification #kernel
- A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
- KEOD-2014-DogduKG #information management #ontology
- Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
- KEOD-2014-OlszewskaSM #design #ontology #owl #uml
- Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
- KEOD-2014-TarakciC #recommendation
- Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
- KMIS-2014-FrancoisMA #communication #design #email #problem #traceability
- Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
- KMIS-2014-Grim-Yefsah #case study #information management #process #requirements
- A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
- KR-2014-ClercqBSCN #game studies #programming #set
- Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
- KR-2014-Dyrkolbotn #how #set
- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
- MLDM-2014-AbdullahiCM #approach #identification #novel
- A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
- MLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition
- Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
- MLDM-2014-JavedA #classification #dataset #network #social
- Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
- MLDM-2014-KhasnabishSDS #detection #learning #programming language #source code
- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
- MLDM-2014-LarinSKKHC #classification #parametricity #representation
- Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
- MLDM-2014-SandovalH #learning #network
- Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
- MLDM-2014-SchraagenK #consistency #graph
- Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
- RecSys-2014-BachrachFGKKNP #recommendation
- Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
- RecSys-2014-BhagatWIT #learning #matrix #recommendation
- Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
- RecSys-2014-LercheJ #feedback #personalisation #ranking
- Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
- RecSys-2014-LiuGWB #power of
- Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
- SEKE-2014-ChenHQJ #performance #static analysis
- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
- SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process
- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
- SEKE-2014-GuimaraesSALC #alloy #consistency #verification
- A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
- SEKE-2014-GuptaAWD #empirical #modelling #verification
- Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
- SEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime
- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
- SEKE-2014-JiangCKZD #model transformation #source code #testing
- Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
- SEKE-2014-KaurKF #low cost #mining #web
- Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
- SEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named
- CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
- SEKE-2014-ParkSHSHB #algorithm #resource management #search-based
- Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
- SEKE-2014-SalmanSD14a #concept analysis #impact analysis
- Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
- SEKE-2014-SatapathyPR #agile #approach #estimation #kernel
- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
- SEKE-2014-SinghS #machine learning #requirements
- Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
- SEKE-2014-SouzaRS #empirical #predict
- A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
- SEKE-2014-TianWHZG #feedback #recommendation #web #web service
- Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
- SEKE-2014-Wang #composition #web #web service
- QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
- SEKE-2014-WangGZ #network #predict
- Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
- SEKE-2014-XuL #approach #architecture #automation #synthesis
- Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
- SEKE-2014-XuL14a #ontology #reasoning #semantics
- Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
- SIGIR-2014-AnilSS #evolution #kernel #modelling #network #social
- Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
- SIGIR-2014-CeroniTKN
- Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
- SIGIR-2014-DaltonDA #knowledge base #query
- Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
- SIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation
- Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
- SIGIR-2014-Ifada #modelling #personalisation #recommendation #topic
- A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
- SIGIR-2014-KeikhaPC #metric #summary
- Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
- SIGIR-2014-KharazmiSSV #difference
- Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
- SIGIR-2014-KumarJF #detection #twitter
- Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
- SIGIR-2014-LivneGTDA #difference #named #recommendation
- CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
- SIGIR-2014-RoitmanHK
- Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
- SIGIR-2014-RoyVGC #query #segmentation #sequence
- Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
- SIGIR-2014-Sebastian #clustering #predict #semantics
- Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
- SIGIR-2014-WuKS #behaviour #online
- Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
- SKY-2014-Ben-Av #algebra #generative #multi #ontology
- Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
- SKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy
- Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
- AMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards
- Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
- MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
- MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml
- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
- SPLC-2014-KnappRS #development #modelling #on the #product line #testing
- On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
- SPLC-2014-Lantz #agile #case study #development #modelling
- Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
- ECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #virtual machine
- Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
- OOPSLA-2014-Desai0M #proving #reduction #source code
- Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
- OOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based
- Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
- OOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #web
- Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
- OOPSLA-2014-VoraKG #algorithm #consistency #named #parallel
- ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
- PEPM-J-2013-Simon14 #type inference
- Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
- PADL-2014-CampeottoPDFP #constraints #theorem proving
- Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
- PADL-2014-LakinP #compilation #functional #programming language
- Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
- PLDI-2014-DeVitoRFAH #generative #runtime
- First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
- PLDI-2014-PekQM #c #data type #logic #proving
- Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
- POPL-2014-ChaudhuriCS #proving #synthesis
- Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
- PPDP-2014-Schopp #low level #source code
- Organising Low-Level Programs using Higher Types (US), pp. 199–210.
- QAPL-2014-Feng #distributed #hybrid #modelling #probability
- Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
- SAS-2014-ChenHTWW #recursion #source code #verification
- Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
- RE-2014-AntonelliRLO
- Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
- RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety
- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
- RE-2014-PorterLS #case study #experience #feedback #framework #requirements
- Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
- RE-2014-SlavinLNB #diagrams #feature model #requirements #security
- Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
- REFSQ-2014-OjameruayeB #requirements
- Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
- ASE-2014-Borg #debugging #re-engineering
- Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
- ASE-2014-CaiS #dependence #impact analysis #named #precise
- Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
- ASE-2014-DeweyRH #constraints #fuzzing #logic programming
- Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
- ASE-2014-DingesA #execution #generative
- Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
- ASE-2014-HamidiAL #adaptation
- Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
- ASE-2014-LutzD #comparison #data flow #difference #interactive #programming #visual notation
- Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
- ASE-2014-MaezawaNWH #ajax #validation
- Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
- ASE-2014-MahajanH #comparison #html #image
- Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
- ASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing
- MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
- ASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring
- Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
- ASE-2014-OsterlundL #component #concurrent
- Concurrent transformation components using contention context sensors (EÖ, WL), pp. 223–234.
- ASE-2014-RajanSSK #execution
- Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
- ASE-2014-RanganathVG #comparison #testing
- Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
- ASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management
- Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
- FSE-2014-LalQ #verification
- Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
- FSE-2014-VakiliD #infinity #modelling #smt #verification
- Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
- FSE-2014-YeBL #debugging #learning #rank
- Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
- ICSE-2014-ChenSJHNF #anti #detection #performance
- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
- ICSE-2014-FritzBMYZ #development #metric
- Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
- ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling
- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
- ICSE-2014-MinkuY #estimation #how #question
- How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
- ICSE-2014-MiyashitaTA #modelling #spreadsheet
- Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
- ICSE-2014-NguyenKWF #dynamic analysis #invariant
- Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
- ICSE-2014-SingerFS #developer #how #re-engineering #twitter
- Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
- ICSE-2014-YaoHJ #analysis #case study #equivalence
- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
- ICSE-2014-ZayanAC #comprehension #empirical
- Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
- SAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech
- A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
- SAC-2014-Al-RefaiCF #modelling #runtime
- Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
- SAC-2014-AnderssonDA #artificial reality #identification
- Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
- SAC-2014-BergamascoN #3d #approach #feature model #retrieval
- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
- SAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming
- Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
- SAC-2014-BoghratiHK #framework #process
- Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
- SAC-2014-ChangHL #adaptation #clustering #optimisation
- Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
- SAC-2014-ChoiKK #modelling #ontology
- Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
- SAC-2014-Daniel #communication #protocol
- Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
- SAC-2014-EngielCL #approach #concept #elicitation
- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
- SAC-2014-GomesACHS #agile #development #framework #game studies #platform
- Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
- SAC-2014-HoritaHSNTO #approach #modelling #refinement
- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
- SAC-2014-HuergoPD #approach #identification #modelling
- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
- SAC-2014-JunAK #detection
- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
- SAC-2014-KawsarAL #detection #multimodal #process #smarttech
- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
- SAC-2014-KrikavaCF14a #domain-specific language #modelling
- Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
- SAC-2014-LiMZ #visualisation
- Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
- SAC-2014-ManhaesCZ #architecture #named #predict
- WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
- SAC-2014-OmatuY #classification #smell
- Smell classification using weakly responding data (SO, MY), pp. 213–214.
- SAC-2014-PalVCS #detection #smarttech
- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
- SAC-2014-ParkKC #framework #kernel #memory management #online #platform
- Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
- SAC-2014-PedrosaP
- Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
- SAC-2014-PengYYHKH #3d #detection #multi
- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
- SAC-2014-RossiLR #algorithm #classification #network
- A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
- SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management
- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
- SAC-2014-SypeS #case study #online #requirements #social
- Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
- SAC-2014-TragatschnigTZ #impact analysis
- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
- SAC-2014-WijenayakeP #estimation #visual notation
- Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
- SAC-2014-YokoyamaKM
- Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
- SAC-2014-YoonY #authentication #network
- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
- SAC-2014-ZardariBE
- Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
- SAC-2014-Zheng #matrix
- Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
- SLE-J-2012-GuizzardiZ #concept #modelling #ontology
- Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
- GPCE-2014-Asai #compilation
- Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
- SLE-2014-Ridge #combinator #context-free grammar #parsing #performance
- Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
- ASPLOS-2014-RuanVLS #case study #experience #legacy #transaction
- Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
- ASPLOS-2014-SantosRSW #mobile #runtime
- Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
- CASE-2014-ChenLL #adaptation #design #predict
- Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
- CASE-2014-ChenS #approach #markov #modelling #novel
- Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
- CASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming
- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
- CASE-2014-FeyzabadiC #markov #process
- Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
- CASE-2014-GaoLWA #monitoring #petri net #problem #sequence
- A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
- CASE-2014-GlorieuxDSL #approach #optimisation
- Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
- CASE-2014-HsiehHP #generative #predict
- Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
- CASE-2014-HuCLY #approach #automation #comparative #petri net
- A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
- CASE-2014-JiangCWWS #3d #analysis #fault #re-engineering
- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
- CASE-2014-KernWGBM #estimation #machine learning
- COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
- CASE-2014-LeePP #locality
- Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
- CASE-2014-LinHC #gesture #network #recognition
- Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
- CASE-2014-LinWF
- Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
- CASE-2014-LiWC
- Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
- CASE-2014-MahlerKLSMKPWFAG #learning #process
- Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
- CASE-2014-NagataO #approach #multi
- Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
- CASE-2014-ParkLH #generative #performance
- Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
- CASE-2014-WahrburgZMD #assembly #estimation
- Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
- CC-2014-Dinechin #code generation
- Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
- CC-2014-SurendranBZS #array
- Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
- DAC-2014-AdirGGS #generative #network #testing
- Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
- DAC-2014-AthavaleMHV #analysis #source code #test coverage
- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
- DAC-2014-ChangJC #configuration management #functional
- Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
- DAC-2014-GebalaMMRT #on the
- On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
- DAC-2014-KhosraviRGT #multi #optimisation #reliability
- Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
- DAC-2014-LiuCTKD #component #realtime
- Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
- DAC-2014-LiuFC #process #self
- Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
- DAC-2014-LuCCSHTC #named
- ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
- DAC-2014-MaoWZCL #architecture #memory management
- Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
- DAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art
- Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
- DAC-2014-PrussKE #abstraction #equivalence #scalability #verification
- Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
- DAC-2014-RaoEST #multi
- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
- DAC-2014-RenMRZ #fault tolerance #network
- Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
- DAC-2014-RoyKCBC #streaming
- Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
- DAC-2014-StoermerT #functional #interface #mockup #standard
- Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
- DAC-2014-TsaiCYYHCCC #energy
- Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
- DAC-2014-VaidyanathanDP #detection #reliability #stack
- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
- DAC-2014-WeiWNP #physics #reverse engineering
- Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
- DAC-2014-YuSHEAB #metric #parametricity
- Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
- DATE-2014-AhariAKT #architecture #configuration management #power management
- A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
- DATE-2014-AlaghiH #performance #probability
- Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
- DATE-2014-BalckGP #generative #modelling #protocol #testing
- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
- DATE-2014-Braak #adaptation #embedded #scalability
- Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
- DATE-2014-CannellaBS #approach #realtime #scheduling #streaming
- System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
- DATE-2014-CasparLH #automation #strict #testing
- Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
- DATE-2014-ConosMDP #coordination #energy #power management
- Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
- DATE-2014-DoanJP #flexibility #implementation #multi #scalability
- Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
- DATE-2014-FerentD #comparison #mining #novel #synthesis
- Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
- DATE-2014-FriedlerKMNS #effectiveness #locality #slicing
- Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
- DATE-2014-KamalGAP #approximate #performance
- Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
- DATE-2014-LagraaTP #data mining #mining #scalability #simulation
- Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
- DATE-2014-LeeA #architecture #hybrid #novel #power management
- A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
- DATE-2014-MahmoodPM #performance #reduction
- Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
- DATE-2014-MarianiPZS #design #named #predict #scheduling #simulation
- DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
- DATE-2014-MoralesHBHV #energy #implementation
- Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
- DATE-2014-NarayananDCCLW #video
- Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
- DATE-2014-ReimerSSB
- Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
- DATE-2014-Sadri0WWB #3d #energy #optimisation
- Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
- DATE-2014-SarafBLR #probability
- IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
- DATE-2014-ShinPM #architecture #hybrid
- Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
- DATE-2014-TurkyilmazCRBC #3d #integration
- 3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
- DATE-2014-VartziotisKCPJ #multi #optimisation
- Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
- DATE-2014-VijaykumarV #analysis #canonical #statistics
- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
- DATE-2014-YangMPOP #logic
- Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
- DATE-2014-ZangenehJ #design #feedback #logic
- Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
- HPCA-2014-KhanAWMJ #clustering #performance
- Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
- HPCA-2014-KimLJK #architecture #gpu #memory management #named
- GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
- HPDC-2014-XiangMA #matrix #pipes and filters #scalability
- Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
- ISMM-2014-LiDL #liveness #modelling
- Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
- ISMM-2014-Printezis #perspective #twitter #virtual machine
- Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
- LCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence
- Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
- PDP-2014-AshrafP #multi #web
- Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment (AA, IP), pp. 482–489.
- PDP-2014-BrownJHSIG #parallel #performance #refactoring #tool support
- Agricultural Reform: More Efficient Farming Using Advanced Parallel Refactoring Tools (CB, VJ, KH, HS, KI, CWG), pp. 36–43.
- PDP-2014-BuiFVHHLPH #parallel #scalability
- Scalable Parallel I/O on a Blue Gene/Q Supercomputer Using Compression, Topology-Aware Data Aggregation, and Subfiling (HB, HF, VV, SH, KH, JL, MEP, KH), pp. 107–111.
- PDP-2014-BuonoMMV #architecture #hardware #manycore #message passing #optimisation #thread
- Optimizing Message-Passing on Multicore Architectures Using Hardware Multi-threading (DB, TDM, GM, MV), pp. 262–270.
- PDP-2014-ChervenakSGSH #adaptation #performance #resource management #staging
- Efficient Data Staging Using Performance-Based Adaptation and Policy-Based Resource Allocation (ALC, AS, JG, RS, NH), pp. 244–247.
- PDP-2014-DalKT #graph #performance #scalability
- Fast Diameter Computation of Large Sparse Graphs Using GPUs (GHD, WAK, FWT), pp. 632–639.
- PDP-2014-DavtyanPGS #coordination
- Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast (SD, RDP, CG, AAS), pp. 17–26.
- PDP-2014-FarahnakianLP #energy #learning #virtual machine
- Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning (FF, PL, JP), pp. 500–507.
- PDP-2014-ItoF #analysis #hardware #problem #resource management
- An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
- PDP-2014-KerteszMD #distributed #logic #multi
- Multi-job Meta-brokering in Distributed Computing Infrastructures Using Pliant Logic (AK, GM, JDD), pp. 138–145.
- PDP-2014-Kwedlo #algorithm #modelling #parallel
- A Parallel EM Algorithm for Gaussian Mixture Models Implemented on a NUMA System Using OpenMP (WK), pp. 292–298.
- PDP-2014-NaughtonEVB #development #message passing #simulation
- Supporting the Development of Resilient Message Passing Applications Using Simulation (TN, CE, GV, SB), pp. 271–278.
- PDP-2014-ONeillMMK #named #platform #scheduling
- SHEPARD: Scheduling on Heterogeneous Platforms Using Application Resource Demands (EO, JM, PM, PK), pp. 213–217.
- PPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing
- Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
- PPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management
- Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
- ESOP-2014-MatosGR #fault #named
- REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
- ESOP-2014-PercontiA #compilation #multi #semantics #verification
- Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
- FASE-2014-AnjorinSLS #graph grammar #refinement
- Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
- FASE-2014-MasciZJCT #user interface #verification
- Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
- FASE-2014-MudduluruR #abstraction #incremental #performance #static analysis
- Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
- FASE-2014-StruberRTC #crawling #information retrieval #modelling
- Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
- STOC-2014-MillerS #protocol #quantum #robust
- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
- TACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic
- Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
- TACAS-2014-SalemDKT #automaton #invariant #model checking #testing
- Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
- TACAS-2014-WijsB #manycore #named #on the fly
- GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
- WRLA-2014-BaeM #infinity #model checking
- Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
- WRLA-2014-Genet #automaton #functional #source code #static analysis #towards
- Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
- CAV-2014-0001A #invariant #random
- From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
- CAV-2014-BinghamL #bound #fault #simulation #verification
- Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
- CAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability
- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
- CAV-2014-LarrazNORR #proving
- Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
- ICLP-J-2014-BartakZ #logic programming #problem
- Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
- ICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation
- Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
- ICLP-J-2014-CominiTV #linear #logic
- Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
- ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
- ICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing
- Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
- IJCAR-2014-GoreOT #calculus #implementation
- Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
- IJCAR-2014-GoreTW #logic #proving #theorem proving
- A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
- ISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread
- Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
- ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off
- Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
- ISSTA-2014-YandrapallyTSC #automation #robust #testing
- Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
- ISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing
- Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
- SAT-2014-BelovHM #proving
- MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
- SAT-2014-HeymanSMLA
- Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
- SAT-2014-WetzlerHH #named #performance #proving
- DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
- TAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml
- Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
- VMCAI-2014-GustavssonGL #analysis #execution #parallel
- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
- VMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis
- Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
- CBSE-2013-BurtonS #correctness #data type #mixin
- Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
- CBSE-2013-GortonLLED #case study #component #delivery #experience #platform
- Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
- QoSA-2013-DurdikR #design pattern #documentation #on the
- On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
- DocEng-2013-DoTT #documentation #taxonomy
- Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
- DocEng-2013-NourashrafeddinMA #clustering #documentation #interactive
- Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
- DocEng-2013-SatkhozhinaAA #random #recognition
- Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
- DocEng-2013-TorabiDT
- Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
- DocEng-2013-Vion-Dury #documentation #integration #owl #semantics
- Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
- DRR-2013-AriesON #algorithm #automation #classification #clustering #summary
- Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
- DRR-2013-KumarPR13a #composition #documentation #evaluation
- Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
- DRR-2013-KumarWGS #framework #keyword
- Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
- DRR-2013-MedjkouneMPV #approach #online #recognition
- Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
- DRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation
- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
- DRR-2013-SrihariKTB #verification
- Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
- DRR-2013-ZhuHZ #image #recognition #retrieval
- Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
- HT-2013-WolffMC #data flow #named
- Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
- HT-2013-WuCH #recommendation
- Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
- ICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval
- Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
- ICDAR-2013-AhmedSLD #segmentation
- A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
- ICDAR-2013-AlaeiDG #detection #probability #representation
- Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
- ICDAR-2013-BaechlerLI #classification
- Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
- ICDAR-2013-BaiYL #correlation #locality
- Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
- ICDAR-2013-BaroniaN #reduction
- Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
- ICDAR-2013-BouillonLAR #gesture #learning
- Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
- ICDAR-2013-BreuelUAS #network
- High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
- ICDAR-2013-ChengSAT #classification #data fusion #image #visual notation
- Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
- ICDAR-2013-ChowdhuryBP #distance #metric #online #recognition
- Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
- ICDAR-2013-DuAD #multi #scalability
- Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
- ICDAR-2013-FeildLS #probability #recognition
- Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
- ICDAR-2013-FielS #identification #retrieval #visual notation
- Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
- ICDAR-2013-Furukawa #composition
- A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
- ICDAR-2013-GebhardtGSD #authentication #detection #documentation
- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
- ICDAR-2013-GotoIFU #graph #scalability #set
- Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
- ICDAR-2013-HamdaniMN #composition #recognition
- Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
- ICDAR-2013-HerzogSN #graph #retrieval
- Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
- ICDAR-2013-HuC #classification #pseudo #verification
- Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
- ICDAR-2013-HuZ #multi
- Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features (LH, RZ), pp. 1180–1184.
- ICDAR-2013-ItaniHI
- Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
- ICDAR-2013-JainD13a #identification
- Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
- ICDAR-2013-KasarBACP #detection #documentation #image #learning
- Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
- ICDAR-2013-KieuJVMD #3d #documentation #generative #image
- Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes (VCK, NJ, MV, RM, JPD), pp. 489–493.
- ICDAR-2013-KimLT #classification #heuristic #identification
- Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
- ICDAR-2013-KirbyH #analysis
- Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
- ICDAR-2013-KrayemSEO #recognition #word
- Holistic Arabic Whole Word Recognition Using HMM and Block-Based DCT (AK, NS, LJE, TO), pp. 1120–1124.
- ICDAR-2013-KunzeKYK #documentation #eye tracking #image #mobile #retrieval #word
- The Wordometer — Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking (KK, HK, KY, KK), pp. 25–29.
- ICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition
- Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
- ICDAR-2013-LuoOWK #approach #automation #classification
- Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
- ICDAR-2013-MalikRPK #documentation #retrieval
- Handwritten Musical Document Retrieval Using Music-Score Spotting (RM, PPR, UP, FK), pp. 832–836.
- ICDAR-2013-Martin-AlboRV #feedback #interactive #online
- Interactive Off-Line Handwritten Text Transcription Using On-Line Handwritten Text as Feedback (DMA, VR, EV), pp. 1280–1284.
- ICDAR-2013-MiyoshiNS #image
- Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
- ICDAR-2013-OpreanLPM #recognition #web #word
- Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition (CO, LLS, AP, CM), pp. 989–993.
- ICDAR-2013-ParvezM #recognition #reduction
- Lexicon Reduction Using Segment Descriptors for Arabic Handwriting Recognition (MTP, SAM), pp. 1265–1269.
- ICDAR-2013-PrumVFO #approach #modelling #online #recognition
- A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
- ICDAR-2013-RayCC #random #recognition
- Character Recognition Using Conditional Random Field Based Recognition Engine (AR, AC, SC), pp. 18–22.
- ICDAR-2013-RazaSDE #detection #multi
- Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
- ICDAR-2013-RoeM #documentation #image
- Binarization of Color Historical Document Images Using Local Image Equalization and XDoG (ER, CABM), pp. 205–209.
- ICDAR-2013-RoySSJ #documentation #n-gram #segmentation
- Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
- ICDAR-2013-Saabni #distance #embedded #image #performance #retrieval #word
- Efficient Word Image Retrieval Using Earth Movers Distance Embedded to Wavelets Coefficients Domain (RS), pp. 314–318.
- ICDAR-2013-SunBOK #detection
- Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
- ICDAR-2013-TatawRK #clustering
- Clustering of Symbols Using Minimal Description Length (OMT, TR, EJK), pp. 180–184.
- ICDAR-2013-TianLST #recognition
- Scene Text Recognition Using Co-occurrence of Histogram of Oriented Gradients (ST, SL, BS, CLT), pp. 912–916.
- ICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo
- Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
- ICDAR-2013-WemhoenerYM #multi
- Creating an Improved Version Using Noisy OCR from Multiple Editions (DW, IZY, RM), pp. 160–164.
- ICDAR-2013-YadavCK
- Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
- ICDAR-2013-ZagorisP #detection #image #modelling
- Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
- ICDAR-2013-ZhouTLW #markov #random #recognition
- Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
- ICDAR-2013-ZhuSSGN #2d #online #recognition #word
- Online Handwritten Cursive Word Recognition Using Segmentation-Free MRF in Combination with P2DBMN-MQDF (BZ, AS, SS, VG, MN), pp. 349–353.
- ICDAR-2013-ZhuZ #detection #image #recognition
- Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
- ICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation
- A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
- JCDL-2013-BeckerD #benchmark #corpus #metric #modelling #set
- Free benchmark corpora for preservation experiments: using model-driven engineering to generate data sets (CB, KD), pp. 349–358.
- JCDL-2013-GollapalliMG #graph #ranking #topic
- Ranking experts using author-document-topic graphs (SDG, PM, CLG), pp. 87–96.
- JCDL-2013-HeMNS #identification
- Identification of works of manga using LOD resources: an experimental FRBRization of bibliographic data of comic books (WH, TM, MN, SS), pp. 253–256.
- JCDL-2013-SchererLS #multi #query #repository #research
- Visual-interactive querying for multivariate research data repositories using bag-of-words (MS, TvL, TS), pp. 285–294.
- JCDL-2013-TuarobPG #automation #metadata #modelling #probability #recommendation #topic
- Automatic tag recommendation for metadata annotation using probabilistic topic modeling (ST, LCP, CLG), pp. 239–248.
- SIGMOD-2013-AbiteboulAMST #development #rule-based
- Rule-based application development using Webdamlog (SA, ÉA, GM, JS, JT), pp. 965–968.
- SIGMOD-2013-CaiVPAHJ #markov #simulation
- Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
- SIGMOD-2013-Cohen #distance #edit distance
- Indexing for subtree similarity-search using edit distance (SC), pp. 49–60.
- SIGMOD-2013-DeshpandeLTDSRHD #knowledge base #maintenance
- Building, maintaining, and using knowledge bases: a report from the trenches (OD, DSL, MT, SD, SS, AR, VH, AD), pp. 1209–1220.
- SIGMOD-2013-FernandezMKP #fault tolerance
- Integrating scale out and fault tolerance in stream processing using operator state management (RCF, MM, EK, PP), pp. 725–736.
- SIGMOD-2013-GiannikisMAK #optimisation
- Workload optimization using SharedDB (GG, DM, GA, DK), pp. 1045–1048.
- SIGMOD-2013-WhangYYSKK #approach #named #parallel
- ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
- SIGMOD-2013-YangWQWL #string
- Improving regular-expression matching on strings using negative factors (XY, BW, TQ, YW, CL), pp. 361–372.
- SIGMOD-2013-ZhangGBFRP #named #statistics
- GeoDeepDive: statistical inference using familiar data-processing languages (CZ, VG, JB, TF, CR, SP), pp. 993–996.
- SIGMOD-2013-ZhangXYZW #algorithm #named #search-based
- PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
- TPDL-2013-CauteruccioI
- A Domain Meta-wrapper Using Seeds for Intelligent Author List Extraction in the Domain of Scholarly Articles (FC, GI), pp. 309–314.
- TPDL-2013-FedoryszakTB #scalability
- Large Scale Citation Matching Using Apache Hadoop (MF, DT, LB), pp. 362–365.
- TPDL-2013-HallC #library #scalability #visualisation
- Exploring Large Digital Library Collections Using a Map-Based Visualisation (MMH, PDC), pp. 216–227.
- TPDL-2013-KemmanKM #eye tracking #interface
- Eye Tracking the Use of a Collapsible Facets Panel in a Search Interface (MK, MK, JM), pp. 405–408.
- TPDL-2013-KohnckeB #library #ranking
- Context-Sensitive Ranking Using Cross-Domain Knowledge for Chemical Digital Libraries (BK, WTB), pp. 285–296.
- TPDL-2013-MenesesBSFS #documentation #semantics
- Restoring Semantically Incomplete Document Collections Using Lexical Signatures (LM, HB, SS, RF, FS), pp. 321–332.
- TPDL-2013-SalahEldeenN #social #web
- Resurrecting My Revolution — Using Social Link Neighborhood in Bringing Context to the Disappearing Web (HS, MLN), pp. 333–345.
- VLDB-2013-0002GJ #correlation #markov #modelling
- Travel Cost Inference from Sparse, Spatio-Temporally Correlated Time Series Using Markov Models (BY, CG, CSJ), pp. 769–780.
- VLDB-2013-DengJLLY #concept #knowledge base #scalability #web
- Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases (DD, YJ, GL, JL, CY), pp. 1606–1617.
- VLDB-2013-KondaKRS #data analysis #enterprise #feature model
- Feature Selection in Enterprise Analytics: A Demonstration using an R-based Data Analytics System (PK, AK, CR, VS), pp. 1306–1309.
- VLDB-2013-KotsakosSKG #health #monitoring #named #smarttech
- SmartMonitor: Using Smart Devices to Perform Structural Health Monitoring (DK, PS, VK, DG), pp. 1282–1285.
- VLDB-2013-MahmoudNPAA #commit #database #multi
- Low-Latency Multi-Datacenter Databases using Replicated Commit (HAM, FN, AP, DA, AEA), pp. 661–672.
- VLDB-2013-OgdenTP #automaton #parallel #query #scalability #transducer #xml
- Scalable XML Query Processing using Parallel Pushdown Transducers (PO, DBT, PP), pp. 1738–1749.
- VLDB-2013-ParkMS #parallel #pipes and filters #query
- Parallel Computation of Skyline and Reverse Skyline Queries Using MapReduce (YP, JKM, KS), pp. 2002–2013.
- VLDB-2013-SimoesGG #algorithm #approximate #information management #performance
- When Speed Has a Price: Fast Information Extraction Using Approximate Algorithms (GS, HG, LG), pp. 1462–1473.
- VLDB-2013-StoicaA #performance
- Improving Flash Write Performance by Using Update Frequency (RS, AA), pp. 733–744.
- VLDB-2013-SundaramTSMIMD #parallel #similarity #streaming #twitter
- Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing (NS, AT, NS, TM, PI, SM, PD), pp. 1930–1941.
- VLDB-2013-YuanL013a
- Making Updates Disk-I/O Friendly Using SSDs (MS, KAR, MC, BB), pp. 997–1008.
- CSEET-2013-ArdisBCVI #education #re-engineering #source code
- Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
- CSEET-2013-CookDSSCH #ide #reasoning #specification #web
- Specification and reasoning in SE projects using a Web IDE (CTC, SDS, YSS, MS, JCC, JEH), pp. 229–238.
- CSEET-2013-FortalezaVJPC #collaboration #communication #development #distributed
- Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study (LLF, SRCV, OOMJ, RP, TC), pp. 139–148.
- ITiCSE-2013-Alabdulqader #visualisation
- Visualizing computer ethics using infographics (EA), p. 355.
- ITiCSE-2013-Baumgartner #approach #case study #delivery #design #education #information management
- Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
- ITiCSE-2013-BeltranGP #architecture #concept #in the cloud
- Using CloudSim to learn cloud computing architecture/system concepts in a graduate course (MB, AG, MP), pp. 82–87.
- ITiCSE-2013-BuckD #authentication #education #modelling
- Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
- ITiCSE-2013-EllisHD
- Developing HFOSS projects using integrated teams across levels and institutions (HJCE, GWH, JD), p. 349.
- ITiCSE-2013-Law #interactive
- Interactive lectures using quick response codes (RL), p. 317.
- ITiCSE-2013-Law13a #feedback #game studies #programming #student
- Using screencasts to enhance coursework feedback for game programming students (RL), p. 329.
- ITiCSE-2013-MedinaPGR #data mining #education #learning #mining #programming
- Assistance in computer programming learning using educational data mining and learning analytics (CFM, JRPP, VMÁG, MdPPR), pp. 237–242.
- ITiCSE-2013-MellodgeR #arduino #case study #experience #framework #learning #platform #student
- Using the arduino platform to enhance student learning experiences (PM, IR), p. 338.
- ITiCSE-2013-RowanD #learning #mobile #overview
- A systematic literature review on using mobile computing as a learning intervention (MR, JD), p. 339.
- ITiCSE-2013-TrabelsiA #education #generative #network
- Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
- ITiCSE-2013-VihavainenVLP #learning #student
- Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
- SIGITE-2013-BrannockN #android #development
- An early introduction to android app development for CS1 using sofia (EB, NPN), pp. 135–136.
- SIGITE-2013-Cold #case study #experience
- Partially flipped: experiences using POGIL (SJC), pp. 133–134.
- SIGITE-2013-EllisJBHD
- Developing HFOSS projects using integrated teams across levels and institutions (HJCE, SJ, DB, GWH, JD), pp. 139–140.
- SIGITE-2013-GasparLBT #overview #programming #student #testing
- A preliminary review of undergraduate programming students’ perspectives on writing tests, working with others, & using peer testing (AG, SL, NRB, RT), pp. 109–114.
- SIGITE-2013-HeinonenHLV #agile #learning #re-engineering
- Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
- SIGITE-2013-HillC #development #education #framework #hardware #low cost #open source #platform #programming #student
- Using a low-cost open source hardware development platform in teaching young students programming skills (LWH, SC), pp. 63–68.
- SIGITE-2013-KawashD #assembly #development #game studies #programming #student #video
- Using video game development to engage undergraduate students of assembly language programming (JK, RDC), pp. 71–76.
- SIGITE-2013-LiG #communication #empirical #social #social media #student
- Can you hear me now?: an empirical study on using social media to improve student-instructor communication (LL, RG), pp. 147–148.
- SIGITE-2013-Lutz #3d #education
- Enhancing information technology education (ITE) with the use of 3D printer technology (RL), pp. 157–158.
- SIGITE-2013-PackR #student
- Training cyber-defense and securing information assets using student blue teams (SJP, DCR), pp. 3–6.
- SIGITE-2013-StokerAM #learning #virtual machine
- Using virtual machines to improve learning and save resources in an introductory IT course (GS, TA, PM), pp. 91–96.
- CSMR-2013-AsgharMSS #metric #requirements #traceability
- Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
- CSMR-2013-NerellaMW #approach #optimisation #query
- An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
- CSMR-2013-OuniKS #refactoring #search-based
- Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
- CSMR-2013-PanichellaMMPOPL #how #traceability
- When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
- CSMR-2013-ScannielloECG #gpu
- Using the GPU to Green an Intensive and Massive Computation System (GS, UE, GC, CG), pp. 384–387.
- CSMR-2013-SnajberkHB #component #visualisation
- Visualization of Component-Based Applications Structure Using AIVA (JS, LH, PB), pp. 409–412.
- CSMR-2013-TothNFS #source code #version control
- Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
- ICPC-2013-DiazBMOTL #traceability
- Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
- ICSM-2013-CruzIP #development #empirical #validation
- An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves (AECC, HI, NP), pp. 468–471.
- ICSM-2013-DitMVP #component #library #maintenance #research
- Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library (BD, EM, MLV, DP), pp. 330–339.
- ICSM-2013-KhanBEL #evolution #named
- eCITY: A Tool to Track Software Structural Changes Using an Evolving City (TK, HB, AE, PL), pp. 492–495.
- ICSM-2013-NordOSDGK #architecture
- Variations on Using Propagation Cost to Measure Architecture Modifiability Properties (RLN, IO, RSS, JD, MAG, PK), pp. 400–403.
- ICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics
- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
- ICSM-2013-TabaKZHN #debugging #predict
- Predicting Bugs Using Antipatterns (SEST, FK, YZ, AEH, MN), pp. 270–279.
- ICSM-2013-WrightJKCW #automation #refactoring #scalability
- Large-Scale Automated Refactoring Using ClangMR (HKW, DJ, MK, CC, ZW), pp. 548–551.
- MSR-2013-AlaliBNM #detection #distance #metric
- A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
- MSR-2013-AllamanisS13a #mining #modelling #repository #source code
- Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
- MSR-2013-CampbellZXHM #analysis #detection #documentation #topic
- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
- MSR-2013-HuW #fault #predict
- Using citation influence to predict software defects (WH, KW), pp. 419–428.
- MSR-2013-NaguibNBH #debugging #process #recommendation
- Bug report assignee recommendation using activity profiles (HN, NN, BB, DH), pp. 22–30.
- MSR-2013-RobbesR #developer #interactive #metric
- Using developer interaction data to compare expertise metrics (RR, DR), pp. 297–300.
- MSR-2013-VasquezDP #analysis #development #mobile #stack overflow
- An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
- MSR-2013-WangKZ #correlation #debugging #locality
- Improving bug localization using correlations in crash reports (SW, FK, YZ), pp. 247–256.
- SCAM-2013-NicolayNRM #javascript #type inference
- Determining dynamic coupling in JavaScript using object type inference (JN, CN, CDR, WDM), pp. 126–135.
- SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named
- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
- WCRE-2013-KomondoorBDK #domain model #modelling
- Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
- WCRE-2013-SalesTMV #dependence #recommendation #refactoring #set
- Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
- CIAA-2013-BelliB #testing
- Using Regular Grammars for Event-Based Testing (FB, MB), pp. 48–59.
- ICALP-v2-2013-BachrachP #big data #performance #pseudo #recommendation #sketching
- Sketching for Big Data Recommender Systems Using Fast Pseudo-random Fingerprints (YB, EP), pp. 459–471.
- IFM-2013-MorgensternGS #game studies #incremental #induction
- Solving Games Using Incremental Induction (AM, MG, KS), pp. 177–191.
- IFM-2013-SavaryFL #bytecode #detection #modelling #testing #verification
- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
- IFM-2013-VekrisLDM #specification #verification
- Verification of EB3 Specifications Using CADP (DV, FL, CD, RM), pp. 61–76.
- RTA-2013-BaeEM #infinity #logic #model checking
- Abstract Logical Model Checking of Infinite-State Systems Using Narrowing (KB, SE, JM), pp. 81–96.
- SEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt
- Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
- SEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis
- Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
- SEFM-2013-SuryadevaraSMP #behaviour #verification
- Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
- TLCA-2013-SalvatiW #modelling #recursion
- Using Models to Model-Check Recursive Schemes (SS, IW), pp. 189–204.
- Haskell-2013-ClaessenP #encryption #generative #pseudo
- Splittable pseudorandom number generators using cryptographic hashing (KC, MHP), pp. 47–58.
- ICFP-2013-AxelssonC #functional #higher-order #source code #syntax
- Using circular programs for higher-order syntax: functional pearl (EA, KC), pp. 257–262.
- ICFP-2013-Dolan #algebra #functional #linear
- Fun with semirings: a functional pearl on the abuse of linear algebra (SD), pp. 101–110.
- AIIDE-2013-ComanM #automation #generative #nondeterminism
- Automated Generation of Diverse NPC-Controlling FSMs Using Nondeterministic Planning Techniques (AC, HMA).
- AIIDE-2013-DragertKV #composition #game studies #reuse
- Scythe AI: A Tool for Modular Reuse of Game AI (CD, JK, CV).
- AIIDE-2013-SchenkLCGDMDZSCS #framework #independence #platform
- ScriptEase II: Platform Independent Story Creation Using High-Level Patterns (KS, AL, MC, EG0, JD, RM, ND, RZ, DS, MC, JS).
- CIG-2013-AdrianL #approach #design #generative
- An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
- CIG-2013-AlayedFN #behaviour #detection #machine learning #online
- Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
- CIG-2013-AlhejaliL #heuristic #monte carlo #programming #search-based
- Using genetic programming to evolve heuristics for a Monte Carlo Tree Search Ms Pac-Man agent (AMA, SML), pp. 1–8.
- CIG-2013-BallingerL #injection #robust
- Finding robust strategies to defeat specific opponents using case-injected coevolution (CAB, SJL), pp. 1–8.
- CIG-2013-EfthymiadisK
- Using plan-based reward shaping to learn strategies in StarCraft: Broodwar (KE, DK), pp. 1–8.
- CIG-2013-Harrell #case study #modelling #network #social
- Modeling player preferences in avatar customization using social network data: A case-study using virtual items in Team Fortress 2 (CUL, DFH), pp. 1–8.
- CIG-2013-LiuLN #behaviour #effectiveness #game studies
- Using CIGAR for finding effective group behaviors in RTS game (SL0, SJL, MNN), pp. 1–8.
- CIG-2013-MaycockT #navigation
- Enhancing touch-driven navigation using informed search in Ms. Pac-Man (SM, TT), pp. 1–2.
- CIG-2013-Polceanu #behaviour #named
- MirrorBot: Using human-inspired mirroring behavior to pass a turing test (MP), pp. 1–8.
- DiGRA-2013-SiG #interactive #social
- Embodied Interactive Characters using Social Robots (MS, MGB).
- DiGRA-2013-WarpefeltJV #behaviour #game studies #matrix
- Analyzing the believability of game character behavior using the Game Agent Matrix (HW, MJ, HV).
- FDG-2013-PapahristouR #game studies #named
- AnyGammon: Playing backgammon variants using any board size (NP, IR), pp. 410–412.
- FDG-2013-RyanSVC #education #game studies #network #security
- Network Nightmares: Using games to teach networks and security (WR, JS, DV, JC), pp. 413–416.
- VS-Games-2013-ParaskevopoulosT #artificial reality #framework #game studies
- Use of Gaming Sensors and Customised Exergames for Parkinson's Disease Rehabilitation: A Proposed Virtual Reality Framework (IP, ET), pp. 1–5.
- VS-Games-2013-Pignot #design #game studies #logic
- Is Serious Games Design Political? The Competing Logics When Using a Game Engine (EP), pp. 1–2.
- GT-VMT-2013-RungeKH #contract #generative #testing #visual notation
- Test Case Generation Using Visual Contracts (OR, TAK, RH).
- CHI-2013-BanNFSITH #artificial reality
- Augmented endurance: controlling fatigue while handling objects by affecting weight perception using augmented reality (YB, TN, TF, SS, JI, TT, MH), pp. 69–78.
- CHI-2013-BirnbaumBFDK #behaviour #identification
- Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
- CHI-2013-BranzelHHSKLM0B13a #named #smarttech
- GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor (AB, CH, DH, DS, MK, PL, RM, SR, PB), pp. 725–734.
- CHI-2013-CassidyAR #game studies #mobile
- Using an open card sort with children to categorize games in a mobile phone application store (BC, DSA, JCR), pp. 2287–2290.
- CHI-2013-ChenGS #multi #student
- Graduate student use of a multi-slate reading system (NC, FG, AS), pp. 1799–1808.
- CHI-2013-CoughlanPM #collaboration #education #reuse
- Building open bridges: collaborative remixing and reuse of open educational resources across organisations (TC, RP, PM), pp. 991–1000.
- CHI-2013-DoornSG #design #experience #research #user interface
- Design research by proxy: using children as researchers to gain contextual knowledge about user experience (FvD, PJS, MG), pp. 2883–2892.
- CHI-2013-DowGW #case study
- A pilot study of using crowds in the classroom (SD, EG, AW), pp. 227–236.
- CHI-2013-GoelJMPW #mobile #named
- ContextType: using hand posture information to improve mobile touch screen text entry (MG, AJ, TM, SNP, JOW), pp. 2795–2798.
- CHI-2013-GuHHKL #named
- LongPad: a touchpad using the entire area below the keyboard of a laptop computer (JG, SH, JH, SK, GL), pp. 1421–1430.
- CHI-2013-HeklerKFB #behaviour #human-computer #research
- Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
- CHI-2013-HongYKAA #independence #network #social
- Investigating the use of circles in social networks to support independence of individuals with autism (HH, SY, JGK, GDA, RIA), pp. 3207–3216.
- CHI-2013-HuFM #community #social #social media
- Whoo.ly: facilitating information seeking for hyperlocal communities using social media (YH, SDF, AMH), pp. 3481–3490.
- CHI-2013-LomasPFK #challenge #design #education #game studies #optimisation #scalability
- Optimizing challenge in an educational game using large-scale design experiments (DL, KP, JF, KRK), pp. 89–98.
- CHI-2013-LucaZPH
- Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
- CHI-2013-MankoffRF #research
- Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
- CHI-2013-MassungCCJP #community #crowdsourcing
- Using crowdsourcing to support pro-environmental community activism (EM, DC, KFC, MJ, CP), pp. 371–380.
- CHI-2013-MollersDLB #scalability
- Improving touch accuracy on large tabletops using predecessor and successor (MM, ND, SL, JOB), pp. 755–758.
- CHI-2013-NancelCPYIB #scalability
- High-precision pointing on large wall displays using small handheld devices (MN, OC, EP, XDY, PPI, MBL), pp. 831–840.
- CHI-2013-OneyHOW #named
- ZoomBoard: a diminutive qwerty soft keyboard using iterative zooming for ultra-small devices (SO, CH, AO, JW), pp. 2799–2802.
- CHI-2013-Ortega #3d #automation
- 3D object position using automatic viewpoint transitions (MO), pp. 193–196.
- CHI-2013-ParkBN
- The roles of touch during phone conversations: long-distance couples’ use of POKE in their homes (YP, KMB, TJN), pp. 1679–1688.
- CHI-2013-PeckYOJC #interface #visualisation
- Using fNIRS brain sensing to evaluate information visualization interfaces (EMP, BFY, AO, RJKJ, RC), pp. 473–482.
- CHI-2013-PriorWBK #agile #development
- Use of an agile bridge in the development of assistive technology (SP, AW, RB, TK), pp. 1579–1588.
- CHI-2013-RoudautRSPLB #feedback #gesture
- Gesture output: eyes-free output using a force feedback touch surface (AR, AR, CS, MP, PL, PB), pp. 2547–2556.
- CHI-2013-ShiXC #bound #network #social
- Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
- CHI-2013-SpauldingF #design #prototype
- Design-driven narrative: using stories to prototype and build immersive design worlds (ES, HF), pp. 2843–2852.
- CHI-2013-SutcliffeIFPSG
- Improving digital handoff using the space above the table (SWTS, ZI, DRF, AP, IS, CG), pp. 735–744.
- CHI-2013-TausczikP #feedback #realtime
- Improving teamwork using real-time language feedback (YRT, JWP), pp. 459–468.
- CHI-2013-WisemanCBGO #detection #fault
- Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
- CSCW-2013-Barlow #chat
- Emergent roles in decision-making tasks using group chat (JBB), pp. 1505–1514.
- CSCW-2013-BatemanGM #navigation #social
- Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear (SB, CG, GIM), pp. 955–966.
- CSCW-2013-BurkeK #difference #facebook
- Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
- CSCW-2013-ChoiHHLS #communication #mining #social
- Mining social relationship types in an organization using communication patterns (JC, SH, JH, GL, JS), pp. 295–302.
- CSCW-2013-GeigerH #wiki
- Using edit sessions to measure participation in wikipedia (RSG, AH), pp. 861–870.
- CSCW-2013-HuangF #consistency #evaluation #reliability
- Enhancing reliability using peer consistency evaluation in human computation (SWH, WTF), pp. 639–648.
- CSCW-2013-JungLDAHB
- Engaging robots: easing complex human-robot teamwork using backchanneling (MFJ, JJL, ND, SOA, PJH, CB), pp. 1555–1566.
- CSCW-2013-RobsonHKP #network #social
- Comparing the use of social networking and traditional media channels for promoting citizen science (CR, MAH, CK, JSP), pp. 1463–1468.
- CSCW-2013-SmithQC #analysis #identification
- Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
- CSCW-2013-ThayerSL
- Recalibrating the ratio: enacting accountability in intimate relationships using shared calendars (AT, BS, CPL), pp. 203–214.
- CSCW-2013-YaroshTMA #communication #quote
- “Almost touching”: parent-child remote communication using the sharetable system (SY, AT, SM, GDA), pp. 181–192.
- DHM-HB-2013-CaoJHK #assessment #modelling
- Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
- DHM-HB-2013-HuhK #estimation #image
- Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
- DHM-HB-2013-KeyvaniLBO #database #metric
- Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, RÖ), pp. 343–352.
- DHM-HB-2013-KuzMMS #human-computer #industrial #interactive #morphism
- Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part I) (SK, MPM, SM, CMS), pp. 76–85.
- DHM-HB-2013-MayerKS #human-computer #industrial #interactive #morphism
- Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part II) (MPM, SK, CMS), pp. 93–100.
- DHM-HB-2013-NakamuraKOOHNAKMK #artificial reality #learning #self #student #towards
- The Relationship between Nursing Students’ Attitudes towards Learning and Effects of Self-learning System Using Kinect (MN, YK, JO, TO, ZH, AN, KA, NK, JM, MKP), pp. 111–116.
- DHM-SET-2013-BaptistaSVQCD #interactive
- Using Digital Interactive Television to Promote Healthcare and Wellness Inclusive Services (AB, ÁDS, IV, CQ, MC, MJD), pp. 150–156.
- DHM-SET-2013-BrooksB #game studies #video
- Facilitators’ Intervention Variance and Outcome Influence When Using Video Games with Fibromyalgia Patients (ALB, EPB), pp. 163–172.
- DHM-SET-2013-KosugeIM #case study #multi
- A Study for Conducting Waves by Using the Multi-channel Surface EMG (TK, NI, KM), pp. 223–231.
- DHM-SET-2013-MurataKEH #behaviour #metric #predict
- Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
- DHM-SET-2013-MurataKMH
- Proposal of Automotive 8-directional Warning System That Makes Use of Tactile Apparent Movement (AM, SK, MM, TH), pp. 98–107.
- DHM-SET-2013-PuchWFP #evaluation #interactive #simulation
- Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
- DHM-SET-2013-YangYF #safety
- Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
- DUXU-CXC-2013-BamasakBAAAA #artificial reality #social
- Improving Autistic Children’s Social Skills Using Virtual Reality (OB, RB, HAT, SAH, GAS, MAH), pp. 342–351.
- DUXU-CXC-2013-LawrenceMPFSB #interactive #visualisation
- Investigation of Interaction Modalities Designed for Immersive Visualizations Using Commodity Devices in the Classroom (KL, AM, NP, TF, JS, AUB), pp. 209–218.
- DUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management
- Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
- DUXU-CXC-2013-Said #network #social
- Young Egyptians Use of Social Networks and the January 2011 Revolution (GRES), pp. 38–43.
- DUXU-NTE-2013-AyanogluRDNT #artificial reality #design
- Using Virtual Reality to Examine Hazard Perception in Package Design (HA, FR, ED, PN, LT), pp. 30–39.
- DUXU-NTE-2013-DinisDNTVR #artificial reality #case study #design
- Evaluating Emotional Responses to the Interior Design of a Hospital Room: A Study Using Virtual Reality (SD, ED, PN, LT, EV, FR), pp. 475–483.
- DUXU-NTE-2013-FeijsKSL #design
- Design for Relaxation during Milk Expression Using Biofeedback (LMGF, JK, NHvS, MvL), pp. 494–503.
- DUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive
- Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
- DUXU-NTE-2013-KulkarniW #energy
- Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
- DUXU-NTE-2013-Lam #interactive
- Creating Instantly Disappearing Prints Using Thermochromic Paint and Thermal Printer in an Interactive Art Installation (MLL), pp. 290–295.
- DUXU-NTE-2013-ReisDR #usability
- Main Usability Issues in Using Virtual Environments for Older Population Warning Studies (LR, ED, FR), pp. 189–198.
- DUXU-NTE-2013-Shieh #design #segmentation
- Designing a Product Satisfaction Model Using Customer Segmentation and Information Consolidation (MDS), pp. 568–577.
- DUXU-PMT-2013-BuchdidPB #design
- Designing iDTV Applications from Participatory Use of Patterns (SBB, RP, MCCB), pp. 459–468.
- DUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability
- Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
- DUXU-PMT-2013-JiangL #adaptation #effectiveness #matrix
- Understand System’s Relative Effectiveness Using Adapted Confusion Matrix (NJ, HL), pp. 294–302.
- DUXU-PMT-2013-KitamuraKNSYM #community
- Community Participation Support Using an ICF-Based Community Map (SK, KK, YN, KIS, JY, HM), pp. 516–524.
- DUXU-PMT-2013-PrisacariH #design
- Using Eye-Tracking to Test and Improve Website Design (AP, TH), pp. 389–398.
- DUXU-WM-2013-GencerBZV #framework #machine learning #mobile
- A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
- DUXU-WM-2013-Iitaka
- ARS Module of Contents Management System Using Cell Phones (TI), pp. 682–690.
- DUXU-WM-2013-KondoK #development #evaluation #image #interactive #prototype #visual notation
- Trial of Diagnostic to Find Preferable Job Using the Visual Image Information Interaction: Prototype Development and Evaluation in Global Human Resources Matching Site (AK, NK), pp. 525–532.
- DUXU-WM-2013-MinJ #functional #named
- TRIGGER: Maximizing Functional Effect of Using Products (KBM, ECJ), pp. 385–391.
- HCI-AMTE-2013-AkiyoshiT #estimation #eye tracking #framework #interface #learning
- An Estimation Framework of a User Learning Curve on Web-Based Interface Using Eye Tracking Equipment (MA, HT), pp. 159–165.
- HCI-AMTE-2013-Bevan #documentation #industrial
- Using the Common Industry Format to Document the Context of Use (NB), pp. 281–289.
- HCI-AMTE-2013-GuWYL #design #interactive
- A Color Schemer for Webpage Design Using Interactive Mood Board (ZG, ZW, JY, JL), pp. 555–564.
- HCI-AMTE-2013-HirataY #design pattern #logic #user interface
- A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
- HCI-AMTE-2013-HumayounEE #case study #framework #mobile #platform
- Developing Mobile Apps Using Cross-Platform Frameworks: A Case Study (SRH, SE, AE), pp. 371–380.
- HCI-AS-2013-BergmansS #behaviour #mobile #persuasion
- Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
- HCI-AS-2013-CharoenpitO #biology
- A New E-learning System Focusing on Emotional Aspect Using Biological Signals (SC, MO), pp. 343–350.
- HCI-AS-2013-DePaloPS #documentation #summary
- Healthcare Interoperability: CDA Documents Consolidation Using Transport Record Summary (TRS) Construction (PD, KEP, YTS), pp. 56–65.
- HCI-AS-2013-HarunBON #learning
- Refining Rules Learning Using Evolutionary PD (AFH, SB, CO, NLMN), pp. 376–385.
- HCI-AS-2013-HuseyinovT #algebra #evaluation #fuzzy
- Evaluation of Computer Algebra Systems Using Fuzzy AHP at the Universities of Cyprus (IH, FST), pp. 391–397.
- HCI-AS-2013-KrauseB #information management #process
- Subjective Ratings in an Ergonomic Engineering Process Using the Example of an In-Vehicle Information System (MK, KB), pp. 596–605.
- HCI-AS-2013-KroesS #mobile #persuasion
- Empowering Young Adolescents to Choose the Healthy Lifestyle: A Persuasive Intervention Using Mobile Phones (LK, SS), pp. 117–126.
- HCI-AS-2013-LimaRSBSO #learning
- Innovation in Learning — The Use of Avatar for Sign Language (TL, MSR, TAS, AB, ES, HSdO), pp. 428–433.
- HCI-AS-2013-MatsumotoAK #development #email #learning #word
- Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
- HCI-AS-2013-Rauch #enterprise #gamification
- Best Practices for Using Enterprise Gamification to Engage Employees and Customers (MR), pp. 276–283.
- HCI-AS-2013-TakahashiISUSHO #biology #eye tracking
- Proposal for Driver Distraction Indexes Using Biological Signals Including Eye Tracking (NT, SI, HS, SU, YS, KH, MO), pp. 647–653.
- HCI-AS-2013-TsumoriN #design #evaluation
- Design and Evaluation of Training System for Numerical Calculation Using Questions in SPI2 (ST, KN), pp. 511–520.
- HCI-AS-2013-YajimaG
- The Proposal of the Remote Consultation Service System Using the Outline Function for Consultation (HY, TG), pp. 216–225.
- HCI-III-2013-AnKK #development #interface #usability
- Development of a Virtual Keyboard System Using a Bio-signal Interface and Preliminary Usability Test (KOA, DHK, JK), pp. 3–9.
- HCI-III-2013-HeLWG #image #segmentation
- Semi-supervised Remote Sensing Image Segmentation Using Dynamic Region Merging (NH, KL, YW, YG), pp. 153–162.
- HCI-III-2013-IteyaMK #analysis #visual notation
- Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
- HCI-III-2013-MiwaWS #feedback #recognition #reliability #robust
- Robust Face Recognition System Using a Reliability Feedback (SM, SW, MS), pp. 178–185.
- HCI-III-2013-SakamotoSYO #3d #metric
- Evaluating Emotional State during 3DTV Viewing Using Psychophysiological Measurements (KS, SS, KY, AO), pp. 353–361.
- HCI-III-2013-ShinKS #image #probability #retrieval
- Affect-Based Retrieval of Landscape Images Using Probabilistic Affective Model (YS, EYK, TES), pp. 362–371.
- HCI-III-2013-TsurudaHYI #generative #mobile
- Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
- HCI-III-2013-Yang-MaoLLZW #evaluation #image
- Evaluation of Mono/Binocular Depth Perception Using Virtual Image Display (SFYM, YTL, MHL, WJZ, YlW), pp. 483–490.
- HCI-III-2013-YangZZJXW #detection #multi #realtime
- Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
- HCI-III-2013-ZhanZSY #image #multi #re-engineering #visual notation
- Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders (YZ, JZ, SS, LY), pp. 491–497.
- HCI-IMT-2013-EbisawaF #detection #video
- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
- HCI-IMT-2013-HammerB #realtime #robust
- Robust Hand Tracking in Realtime Using a Single Head-Mounted RGB Camera (JHH, JB), pp. 252–261.
- HCI-IMT-2013-LeeBN #visual notation
- Use of Reference Frame in Haptic Virtual Environments: Implications for Users with Visual Impairments (JYL, SB, CSN), pp. 610–617.
- HCI-IMT-2013-LeeT #gesture #interactive
- Finger Controller: Natural User Interaction Using Finger Gestures (UL, JT), pp. 281–290.
- HCI-IMT-2013-MurataHMH #case study #interface
- Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
- HCI-IMT-2013-PinoTIK #2d #3d #artificial reality #evaluation #performance
- Using Kinect for 2D and 3D Pointing Tasks: Performance Evaluation (AP, ET, NI, GK), pp. 358–367.
- HCI-IMT-2013-SakairiTKG #editing #multi #visual notation
- Multi-layer Control and Graphical Feature Editing Using Server-Side Rendering on Ajax-GIS (TS, TT, KK, YG), pp. 722–729.
- HCI-IMT-2013-SakamotoTT #music
- A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
- HCI-IMT-2013-ShimizuNS #algorithm #generative #search-based
- System of Generating Japanese Sound Symbolic Expressions Using Genetic Algorithm (YS, TN, MS), pp. 126–134.
- HCI-IMT-2013-SrivastavaT #analysis #realtime
- Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
- HCI-IMT-2013-TungGKM #human-computer #interactive #multimodal
- Multi-party Human-Machine Interaction Using a Smart Multimodal Digital Signage (TT, RG, TK, TM), pp. 408–415.
- HCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech
- A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
- HCI-IMT-2013-YoshikawaMKST
- A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
- HCI-UC-2013-ItouTM #communication #development #interface
- Development of Communication Support System at Mealtimes Using Tabletop Interface (JI, ST, JM), pp. 174–182.
- HCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter
- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
- HCI-UC-2013-LinHW #learning #visual notation
- Establishing a Cognitive Map of Public Place for Blind and Visual Impaired by Using IVEO Hands-On Learning System (QWL, SLH, JLW), pp. 193–198.
- HCI-UC-2013-OkiTS #named
- AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
- HCI-UC-2013-TsaiHCL #communication #named #network #online #product line #social
- Memotree: Using Online Social Networking to Strengthen Family Communication (THT, YLH, HTC, YWL), pp. 359–367.
- HIMI-D-2013-AsaoSK #estimation
- Estimation of Driver’s Steering Intention by Using Mechanical Impedance (TA, SS, KK), pp. 3–11.
- HIMI-D-2013-EnokidaKSAII #information management #metric
- Assessing Mental Workload of In-Vehicle Information Systems by Using Physiological Metrics (SE, KK, SS, TA, TI, KI), pp. 584–593.
- HIMI-D-2013-IizukaNG #case study #interactive #scalability
- A Study for Personal Use of the Interactive Large Public Display (SI, WN, KG), pp. 55–61.
- HIMI-D-2013-KotaniKSA #analysis #development #memory management
- Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
- HIMI-D-2013-ManiwaKSA
- Changes in Posture of the Upper Extremity Through the Use of Various Sizes of Tablets and Characters (HM, KK, SS, TA), pp. 89–96.
- HIMI-D-2013-MorodomeSAK #biology #metric
- Non-contact Measurement of Biological Signals Using Microwave Radar (HM, SS, TA, KK), pp. 117–125.
- HIMI-D-2013-NakanoOM #3d #artificial reality
- Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
- HIMI-D-2013-ShengLD #comprehension #eye tracking
- Eyes Don’t Lie: Understanding Users’ First Impressions on Websites Using Eye Tracking (HS, NSL, SD), pp. 635–641.
- HIMI-D-2013-SugayaSNT #recognition
- Basic Investigation into Hand Shape Recognition Using Colored Gloves Taking Account of the Peripheral Environment (TS, TS, HN, HT), pp. 133–142.
- HIMI-D-2013-UedaA #people #predict
- Prediction of the Concern of People Using CGM (YU, YA), pp. 284–292.
- HIMI-D-2013-YanagimotoSY #classification #estimation #network #sentiment #word
- Word Classification for Sentiment Polarity Estimation Using Neural Network (HY, MS, AY), pp. 669–677.
- HIMI-HSM-2013-Campbell #safety #simulation
- Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
- HIMI-HSM-2013-ChunJHJSLCJ #natural language
- Pathway Construction and Extension Using Natural Language Processing (HWC, SJJ, MNH, CHJ, SKS, SL, SPC, HJ), pp. 32–38.
- HIMI-HSM-2013-DamrongratKI #multi #ontology #representation #simulation
- Increasing Situational Awareness of Indoor Emergency Simulation Using Multilayered Ontology-Based Floor Plan Representation (CD, HK, MI), pp. 39–45.
- HIMI-HSM-2013-KimuraHTN #evaluation #performance
- Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
- HIMI-HSM-2013-LeeJ #analysis #simulation
- Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
- HIMI-HSM-2013-MiyataWI #development
- Development of a Chest X-ray Examination Support System for Foreigners Using a Personal Digital Assistant (MM, CW, MI), pp. 285–290.
- HIMI-HSM-2013-SaitohI #detection #learning #visualisation
- Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
- HIMI-HSM-2013-SakuradaH #interface #physics
- A New Presence Display System Using Physical Interface Running on IP-Phones (TS, YH), pp. 411–420.
- HIMI-HSM-2013-SasakiHAI #simulation
- Train Ride Simulation Using Assist Strap Device (TS, KH, TA, YI), pp. 189–197.
- HIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation
- Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
- HIMI-LCCB-2013-AntolosLLV #analysis
- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
- HIMI-LCCB-2013-BrynielssonJL #communication #design #process #prototype #social #social media #video
- Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool (JB, FJ, SL), pp. 559–568.
- HIMI-LCCB-2013-ItaiEM #design
- Design of Space for Expression Media with the Use of Fog (SI, YE, YM), pp. 210–218.
- HIMI-LCCB-2013-KometaniTFA #education #feedback #student #video
- Video Feedback System for Teaching Improvement Using Students’ Sequential and Overall Teaching Evaluations (YK, TT, TF, TA), pp. 79–88.
- HIMI-LCCB-2013-NahTRV #education #game studies #gamification
- Gamification of Education Using Computer Games (FFHN, VRT, SR, PRV), pp. 99–107.
- HIMI-LCCB-2013-NakaI #3d #communication #gesture #web
- Consideration of the Effect of Gesture Exaggeration in Web3D Communication Using 3DAgent (TN, TI), pp. 511–520.
- HIMI-LCCB-2013-TakahashiA #mining
- User Needs Search Using Text Mining (YT, YA), pp. 607–615.
- HIMI-LCCB-2013-YoshidaOSNSH #assessment #comprehension #concept
- Instantaneous Assessment of Learners’ Comprehension for Lecture by Using Kit-Build Concept Map System (KY, TO, KS, YN, MS, TH), pp. 175–181.
- OCSC-2013-BourimiK #case study #collaboration #community #experience #online
- Experiences by Using AFFINE for Building Collaborative Applications for Online Communities (MB, DK), pp. 345–354.
- OCSC-2013-FardounZC #collaboration #education #facebook #process
- Using Facebook for Collaborative Academic Activities in Education (HMF, BZ, APC), pp. 137–146.
- OCSC-2013-KashimaMM #content management
- Effects of Sharing Farmers’ Information Using Content Management System (TK, SM, TM), pp. 296–303.
- OCSC-2013-WangA #network #social
- Adult Learners and Their Use of Social Networking Sites (Y(W, JA), pp. 222–229.
- OCSC-2013-YuanOXS #classification #overview #sentiment #web
- Sentiment Classification of Web Review Using Association Rules (MY, YO, ZX, HS), pp. 442–450.
- VISSOFT-2013-GouveiaCA #fault #html #locality #visualisation
- Using HTML5 visualizations in software fault localization (CG, JC, RA), pp. 1–10.
- VISSOFT-2013-Wehrwein #lightweight #matrix #reverse engineering #visualisation
- Lightweight software reverse engineering using augmented matrix visualizations (BW), pp. 1–4.
- CAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net
- Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
- EDOC-2013-GallegeGHR #contract #monitoring #trust
- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
- EDOC-2013-PlataniotisKP #architecture #design #enterprise #graph
- Relating Decisions in Enterprise Architecture Using Decision Design Graphs (GP, SdK, HAP), pp. 139–146.
- EDOC-2013-SelwayGMS #approach #formal method #natural language #specification
- Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
- EDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management
- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
- ICEIS-J-2013-KalsingITN13a #incremental #legacy #mining #modelling #process
- Re-learning of Business Process Models from Legacy System Using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 314–330.
- ICEIS-v1-2013-DombiD #modelling
- Modelling Complex Systems using the Pliant Cognitive Map (JDD, JD), pp. 506–512.
- ICEIS-v1-2013-IsmailHQDE #clustering #evaluation #query #simulation
- Clustering using Hypergraph for P2P Query Routing — Simulation and Evaluation (AI, MH, MQ, ND, MES), pp. 247–254.
- ICEIS-v1-2013-MaghrabyFRA #grid #image #retrieval
- A Grid based Medical Image Retrieval System using Alchemi (FM, HMF, MR, MA), pp. 224–230.
- ICEIS-v1-2013-MoritaN #classification
- Classification Model using Contrast Patterns (HM, MN), pp. 334–339.
- ICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear
- Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
- ICEIS-v1-2013-SimrinAD #heuristic #problem
- A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
- ICEIS-v2-2013-KalsingITN #incremental #learning #legacy #mining #modelling #process
- Evolutionary Learning of Business Process Models from Legacy Systems using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 58–69.
- ICEIS-v2-2013-LiL #agile #network #object-oriented #predict #process
- Predicting Fault-proneness of Object-Oriented System Developed with Agile Process using Learned Bayesian Network (LL, HL), pp. 5–16.
- ICEIS-v2-2013-Milosz #case study #enterprise #legacy #performance #testing
- Performance Testing of New Enterprise Applications using Legacy Load Data — A HIS Case Study (MM), pp. 151–156.
- ICEIS-v2-2013-OliveiraS #aspect-oriented #modelling #requirements
- Modeling Aspects in Requirements using SysML Extensions (KSdO, MdSS), pp. 126–133.
- ICEIS-v2-2013-PradoB #evolution
- Perspectives on using Actor-Network Theory and Organizational Semiotics to Address Organizational Evolution (ABP, MCCB), pp. 173–181.
- ICEIS-v2-2013-SantaN #framework #learning #modelling
- Modeling the Creation of a Learning Organization by using the Learning Organization Atlas Framework (MS, SN), pp. 278–285.
- ICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework
- Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, AÁ), pp. 427–434.
- ICEIS-v2-2013-TounsiHKKD #design pattern #modelling #specification
- Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns (IT, ZH, MHK, AHK, KD), pp. 294–301.
- ICEIS-v3-2013-ChinoRAOGTT #collaboration #framework #gesture #information management #interactive
- The NInA Framework — Using Gesture to Improve Interaction and Collaboration in Geographical Information Systems (DYTC, LASR, LPSA, WDO, RRdVG, CTJ, AJMT), pp. 58–66.
- ICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #web
- Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
- ICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling
- A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
- ICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #web
- Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
- CIKM-2013-AyadiTDJH #correlation #image #modelling #query #retrieval
- Correlating medical-dependent query features with image retrieval models using association rules (HA, MT, MD, MBJ, JXH), pp. 299–308.
- CIKM-2013-ChanLKLBR #graph #matrix
- Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation (JC, WL, AK, CL, JB, KR), pp. 811–816.
- CIKM-2013-ChenMLHCG #topic
- Discovering coherent topics using general knowledge (ZC, AM, BL, MH, MC, RG), pp. 209–218.
- CIKM-2013-ChuklinSHSR
- Evaluating aggregated search using interleaving (AC, AS, KH, PS, MdR), pp. 669–678.
- CIKM-2013-HermanssonKJJD #ambiguity #graph #kernel
- Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
- CIKM-2013-KharitonovMSO
- Using historical click data to increase interleaving sensitivity (EK, CM, PS, IO), pp. 679–688.
- CIKM-2013-NguyenLT #code review #performance #set
- Using micro-reviews to select an efficient set of reviews (TSN, HWL, PT), pp. 1067–1076.
- CIKM-2013-ShirakawaNHN #metric #probability #semantics #similarity #wiki
- Probabilistic semantic similarity measurements for noisy short texts using Wikipedia entities (MS, KN, TH, SN), pp. 903–908.
- CIKM-2013-SordoniHN #information retrieval #interactive #modelling #quantum #topic
- Modeling latent topic interactions using quantum interference for information retrieval (AS, JH, JYN), pp. 1197–1200.
- CIKM-2013-VanderbauwhedeFACM #throughput
- High throughput filtering using FPGA-acceleration (WV, AF, LA, SRC, MM), pp. 1245–1248.
- CIKM-2013-WijayaTM #named #ontology #web
- PIDGIN: ontology alignment using web text as interlingua (DTW, PPT, TMM), pp. 589–598.
- ECIR-2013-AlhindiKF #case study #interactive #summary
- A Pilot Study on Using Profile-Based Summarisation for Interactive Search Assistance (AA, UK, CF), pp. 672–675.
- ECIR-2013-AnderssonMHR #retrieval
- Exploring Patent Passage Retrieval Using Nouns Phrases (LA, PM, AH, AR), pp. 676–679.
- ECIR-2013-ChenC #analysis #multi #network #topic
- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
- ECIR-2013-ChuklinSR #behaviour
- Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
- ECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics
- Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
- ECIR-2013-JeongM #classification #dependence #recognition
- Using WordNet Hypernyms and Dependency Features for Phrasal-Level Event Recognition and Type Classification (YJ, SHM), pp. 267–278.
- ECIR-2013-LagnierDGG #information management #network #predict #social
- Predicting Information Diffusion in Social Networks Using Content and User’s Profiles (CL, LD, ÉG, PG), pp. 74–85.
- ECIR-2013-MorenoD #clustering #image #interface #mobile #web
- Using Text-Based Web Image Search Results Clustering to Minimize Mobile Devices Wasted Space-Interface (JGM, GD), pp. 532–544.
- ECIR-2013-NguyenTT #classification #learning #rank
- Folktale Classification Using Learning to Rank (DN, DT, MT), pp. 195–206.
- ECIR-2013-RaiberK #effectiveness #metric #predict
- Using Document-Quality Measures to Predict Web-Search Effectiveness (FR, OK), pp. 134–145.
- ICML-c1-2013-ChenLYY #functional #matrix
- General Functional Matrix Factorization Using Gradient Boosting (TC, HL, QY, YY), pp. 436–444.
- ICML-c1-2013-GilboaSCG #approximate #multi #process #scalability
- Scaling Multidimensional Gaussian Processes using Projected Additive Approximations (EG, YS, JPC, EG), pp. 454–461.
- ICML-c1-2013-LiLSHD #generative #learning
- Learning Hash Functions Using Column Generation (XL, GL, CS, AvdH, ARD), pp. 142–150.
- ICML-c1-2013-WulsinFL #correlation #markov #parsing #process
- Parsing epileptic events using a Markov switching process model for correlated time series (DW, EBF, BL), pp. 356–364.
- ICML-c3-2013-HockingRVB #detection #learning
- Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
- ICML-c3-2013-IshtevaPS #order
- Unfolding Latent Tree Structures using 4th Order Tensors (MI, HP, LS), pp. 316–324.
- ICML-c3-2013-WanZZLF #network
- Regularization of Neural Networks using DropConnect (LW, MDZ, SZ, YL, RF), pp. 1058–1066.
- KDD-2013-AltinigneliPB #parallel
- Massively parallel expectation maximization using graphics processing units (MCA, CP, CB), pp. 838–846.
- KDD-2013-JhaSP #algorithm #performance #streaming
- A space efficient streaming algorithm for triangle counting using the birthday paradox (MJ, CS, AP), pp. 589–597.
- KDD-2013-JinSSBWR #modelling #named
- Forex-foreteller: currency trend modeling using news articles (FJ, NS, PS, PB, WW, NR), pp. 1470–1473.
- KDD-2013-KuoYHKL #network #predict #social #statistics
- Unsupervised link prediction using aggregative statistics on heterogeneous social networks (TTK, RY, YYH, PHK, SDL), pp. 775–783.
- KDD-2013-LeeAC #realtime #twitter
- Real-time disease surveillance using Twitter data: demonstration on flu and cancer (KL, AA, ANC), pp. 1474–1477.
- KDD-2013-LiuYK #adaptation #modelling #process
- Adaptive collective routing using gaussian process dynamic congestion models (SL, YY, RK), pp. 704–712.
- KDD-2013-LuceyOCRM
- Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
- KDD-2013-MukherjeeKLWHCG #behaviour
- Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
- KDD-2013-Neumann #big data #problem
- Using “big data” to solve “small data” problems (CN), p. 1140.
- KDD-2013-RaederPDSP #clustering #reduction #scalability
- Scalable supervised dimensionality reduction using clustering (TR, CP, BD, OS, FJP), pp. 1213–1221.
- KDD-2013-StitelmanPDHRP #detection #network #online #scalability
- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
- KDD-2013-Vatsavai #approach #learning #multi
- Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
- KDD-2013-WangS #classification #multi #relational #social
- Multi-label relational neighbor classification using social context features (XW, GS), pp. 464–472.
- KDIR-KMIS-2013-BaliBBG #information management #tool support
- Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
- KDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax
- Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
- KDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security
- Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
- KDIR-KMIS-2013-DuarteFD #clustering #constraints #validation
- Data Clustering Validation using Constraints (JMMD, ALNF, FJFD), pp. 17–27.
- KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management
- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
- KDIR-KMIS-2013-ItalaH #behaviour #diagrams #process
- Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
- KDIR-KMIS-2013-Lindner #constraints #parsing #random
- Using Conditional Random Fields with Constraints to Train Support Vector Machines — Locating and Parsing Bibliographic References (SL), pp. 28–36.
- KDIR-KMIS-2013-NartTF #automation #personalisation #recommendation
- Personalized Recommendation and Explanation by using Keyphrases Automatically extracted from Scientific Literature (DDN, CT, FF), pp. 96–103.
- KDIR-KMIS-2013-RauchS #case study #mining
- Using Domain Knowledge in Association Rules Mining — Case Study (JR, MS), pp. 104–111.
- KDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification
- Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
- KDIR-KMIS-2013-SousaM #tool support #web
- Diagnosis of the Use of Web 2.0 Tools in the Portuguese Financial Institutions (CS, PM), pp. 368–372.
- KDIR-KMIS-2013-SucaS #approach #documentation #ontology
- An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
- KEOD-2013-AlirezaieL #abduction #automation #data type #reasoning
- Automatic Annotation of Sensor Data Streams using Abductive Reasoning (MA, AL), pp. 345–354.
- KEOD-2013-CostaFML #approach #classification #information management #ontology
- Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
- KEOD-2013-DaramolaAAO #information management #ontology
- Using Ontology-based Information Extraction for Subject-based Auto-grading (JOD, IA, IA, OOO), pp. 373–378.
- KEOD-2013-TimonenPT #fuzzy #modelling #ontology #safety
- Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
- KEOD-2013-ZouhaierDA #automation #generative #reasoning
- Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
- MLDM-2013-AmalamanER #detection
- Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
- MLDM-2013-CastroSAE #automation #classification #database #web
- Automatic Classification of Web Databases Using Domain-Dictionaries (HMMC, VJSS, ILA, HJEB), pp. 340–351.
- MLDM-2013-DincA #classification #evaluation #image #random
- Evaluation of Hyperspectral Image Classification Using Random Forest and Fukunaga-Koontz Transform (SD, RSA), pp. 234–245.
- MLDM-2013-GaoD #data mining #distributed #mining #performance
- Improving the Efficiency of Distributed Data Mining Using an Adjustment Work Flow (JG, JD), pp. 69–83.
- MLDM-2013-LeeBZ #fuzzy #logic #multi #summary #topic
- Multi-document Text Summarization Using Topic Model and Fuzzy Logic (SL, SB, YZ), pp. 159–168.
- MLDM-2013-ParraL #clustering #dataset
- Unsupervised Tagging of Spanish Lyrics Dataset Using Clustering (FLP, EL), pp. 130–143.
- MLDM-2013-PohlZ #automation #n-gram #recognition #speech
- Using Part of Speech N-Grams for Improving Automatic Speech Recognition of Polish (AP, BZ), pp. 492–504.
- MLDM-2013-PrieditisL #bound #classification #performance #problem
- When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
- RecSys-2013-AdamopoulosT #collaboration #predict #recommendation
- Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
- RecSys-2013-AlanaziB #markov #modelling #recommendation
- A people-to-people content-based reciprocal recommender using hidden markov models (AA, MB), pp. 303–306.
- RecSys-2013-HammarKN #e-commerce #recommendation
- Using maximum coverage to optimize recommendation systems in e-commerce (MH, RK, BJN), pp. 265–272.
- RecSys-2013-KaminskasRS #hybrid #music #recommendation
- Location-aware music recommendation using auto-tagging and hybrid matching (MK, FR, MS), pp. 17–24.
- RecSys-2013-KhroufT #hybrid #linked data #open data #recommendation
- Hybrid event recommendation using linked data and user diversity (HK, RT), pp. 185–192.
- RecSys-2013-LiuAYB #generative
- Generating supplemental content information using virtual profiles (HL, MSA, BY, AB), pp. 295–302.
- RecSys-2013-OstrikovRS #collaboration #metadata
- Using geospatial metadata to boost collaborative filtering (AO, LR, BS), pp. 423–426.
- RecSys-2013-SchelterBSAM #distributed #matrix #pipes and filters
- Distributed matrix factorization with mapreduce using a series of broadcast-joins (SS, CB, MS, AA, VM), pp. 281–284.
- RecSys-2013-TianJ #graph #recommendation
- Recommending scientific articles using bi-relational graph-based iterative RWR (GT, LJ), pp. 399–402.
- RecSys-2013-ZhangSKH #artificial reality #recommendation
- Improving augmented reality using recommender systems (ZZ, SS, SRK, PH), pp. 173–176.
- SEKE-2013-Al-JamimiA #design pattern #detection #prolog
- Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
- SEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code
- Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
- SEKE-2013-AlviD #classification #fuzzy #image
- Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
- SEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface
- Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
- SEKE-2013-AsuncionSPPDM #information management
- Using Change Entries to Collect Software Project Information (HUA, MS, RP, KP, ND, WJMJ), pp. 184–189.
- SEKE-2013-CorralSS #mobile #quality
- Using a Partially Instantiated GQM to Measure the Quality of Mobile Applications (LC, AS, GS), pp. 520–524.
- SEKE-2013-DelfimG #coordination #mining #multi #slicing
- Multiple Coordinated Views to Support Aspect Mining Using Program Slicing (FMD, REG), pp. 531–536.
- SEKE-2013-DengWH #algorithm #combinator #identification #multi
- Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
- SEKE-2013-Lou0 #artificial reality #gesture #interactive #personalisation #realtime
- A Real-time Personalized Gesture Interaction System Using Wii Remote and Kinect for Tiled-Display Environment (YL, WW), pp. 131–136.
- SEKE-2013-MaffortVBHAM #design pattern #mining
- Mining Architectural Patterns Using Association Rules (CAM, MTV, RdSB, AH, NA, JM), pp. 375–380.
- SEKE-2013-MarcalGCJ #identification #mining #repository
- Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (IM, REG, RCMC, COJ), pp. 338–343.
- SEKE-2013-MoshirpourEF #approach #automation #ontology
- Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
- SEKE-2013-ShahinLL #architecture #concept #documentation
- Recovering Software Architectural Knowledge from Documentation using Conceptual Model (MS, PL, ZL), pp. 556–561.
- SEKE-2013-ShamsHK #estimation #network
- Software Effort Estimation using Regularized Radial Basis Function Neural Networks (KMS, HSH, AK), pp. 473–478.
- SEKE-2013-SouzaSPFF #case study #generative
- Generation of Thematic Maps using WPS-Cartographer: An experimental study (FCMS, ACCdS, VP, EF, VRTF), pp. 500–503.
- SEKE-2013-SunSJ #architecture #maintenance
- Using Architecture to Support the Collaborations in Software Maintenance (YS, HS, WJ), pp. 362–357.
- SEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing
- Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
- SEKE-2013-ZhangLK #debugging #on the #statistics
- On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
- SIGIR-2013-AgeevLA #behaviour #summary
- Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
- SIGIR-2013-AlyHD #named
- Taily: shard selection using the tail of score distributions (RA, DH, TD), pp. 673–682.
- SIGIR-2013-BouadjenekHBV #documentation #personalisation #representation #social
- Using social annotations to enhance document representation for personalized search (MRB, HH, MB, AV), pp. 1049–1052.
- SIGIR-2013-GaoXX #query #random
- Query expansion using path-constrained random walks (JG, GX, JX), pp. 563–572.
- SIGIR-2013-HassanWW #query #self #towards
- Toward self-correcting search engines: using underperforming queries to improve search (AHA, RWW, YMW), pp. 263–272.
- SIGIR-2013-LeeC #social #social media #web
- Building a web test collection using social media (CJL, WBC), pp. 757–760.
- SIGIR-2013-MahdabiGHC #ambiguity #concept #proximity #query #retrieval
- Leveraging conceptual lexicon: query disambiguation using proximity information for patent retrieval (PM, SG, JXH, FC), pp. 113–122.
- SIGIR-2013-MaxwellC #query #topic
- Compact query term selection using topically related text (KTM, WBC), pp. 583–592.
- SIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback
- An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
- SIGIR-2013-RaiberK #clustering #documentation #markov #random #ranking
- Ranking document clusters using markov random fields (FR, OK), pp. 333–342.
- SIGIR-2013-Rodriguez-VaamondeTF #documentation #image #web #what
- What can pictures tell us about web pages?: improving document search using images (SRV, LT, AWF), pp. 849–852.
- SIGIR-2013-RossiMCS #performance #query
- Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
- SIGIR-2013-SappelliVK #personalisation #recommendation
- Recommending personalized touristic sights using google places (MS, SV, WK), pp. 781–784.
- SIGIR-2013-SekiM #feedback #social
- Finding impressive social content creators: searching for SNS illustrators using feedback on motifs and impressions (YS, KM), pp. 1041–1044.
- SIGIR-2013-WangZS #modelling #semantics #topic
- Semantic hashing using tags and topic modeling (QW, DZ, LS), pp. 213–222.
- SIGIR-2013-Wu #behaviour #how #online #predict
- How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
- SIGIR-2013-Yeniterzi #effectiveness #social #social media
- Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
- SKY-2013-Gomes #how #ontology #recommendation #representation
- Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
- SKY-2013-RineF #complexity #information management #metric #quality #representation #requirements
- Requirements Quality Knowledge Representation using Chunking Complexity Measurement: Prior to Formal Inspections (DCR, AF), pp. 3–13.
- SKY-2013-SuarezMFM #automation #generative #natural language #semantics
- Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
- AMT-2013-FinotMSD #metamodelling #testing
- Using Meta-model Coverage to Qualify Test Oracles (OF, JMM, GS, TD), pp. 12–21.
- ECMFA-2013-SunCDF
- Using Model Types to Support Contract-Aware Model Substitutability (WS, BC, SD, RBF), pp. 118–133.
- ICMT-2013-HermannGNBMPE #automation #graph grammar #on the
- On an Automated Translation of Satellite Procedures Using Triple Graph Grammars (FH, SG, NN, BB, GM, AP, TE), pp. 50–51.
- MoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml
- Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
- MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- MoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving
- Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
- MoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology
- Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
- MoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing
- Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
- MoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml
- Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
- OOPSLA-2013-ShiBH #optimisation
- Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
- AdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety
- Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
- HILT-2013-CourtieuACZRBHG #coq #formal method #runtime #semantics #towards
- Towards the formalization of SPARK 2014 semantics with explicit run-time checks using coq (PC, MVA, TC, ZZ, R, JB, JH, JG, TJ), pp. 21–22.
- HILT-2013-LarsonHFD #fault #modelling #safety
- Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
- HILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability
- Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
- PADL-2013-MachadoAD #declarative #parallel #performance #programming
- Parallel Performance of Declarative Programming Using a PGAS Model (RM, SA, DD), pp. 244–260.
- PADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi
- A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
- PEPM-2013-AlpuenteFV #automation #logic #specification
- Automatic inference of specifications using matching logic (MA, MAF, AV), pp. 127–136.
- PEPM-2013-Simon #type inference
- Deriving a complete type inference for hindley-milner and vector sizes using expansion (AS), pp. 13–22.
- PLDI-2013-GaoSBMBL #runtime #smarttech
- Using managed runtime systems to tolerate holes in wearable memories (TG, KS, SMB, KSM, DB, JRL), pp. 297–308.
- PLDI-2013-GveroKKP
- Complete completion using types and weights (TG, VK, IK, RP), pp. 27–38.
- POPL-2013-UpadrastaC #scheduling
- Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
- PPDP-2013-MontenegroPS #analysis #functional #regular expression
- Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
- SAS-2013-WhiteM #algebra #analysis #memory management #optimisation
- Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
- RE-2013-Cleland-HuangCH #design #empirical #requirements
- Using tracelab to design, execute, and baseline empirical requirements engineering experiments (JCH, AC, JHH), pp. 338–339.
- RE-2013-FeldererB #fault #industrial #requirements #taxonomy #validation
- Using defect taxonomies for requirements validation in industrial projects (MF, AB), pp. 296–301.
- REFSQ-2013-BreauxG #analysis #requirements #specification #traceability
- Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
- REFSQ-2013-FerrariGT #clustering #documentation #natural language #requirements
- Using Clustering to Improve the Structure of Natural Language Requirements Documents (AF, SG, GT), pp. 34–49.
- ASE-2013-AvazpourGG #automation #model transformation #specification #tool support #visualisation
- Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
- ASE-2013-Fard #behaviour #detection #distributed #independence
- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
- ASE-2013-HuangMM #proving #smt
- Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
- ASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing
- Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
- ASE-2013-KukrejaHT #game studies #testing
- Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
- ASE-2013-PalombaBPOLP #detection #smell #source code
- Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
- ASE-2013-SaadaHNS #model transformation #multi #optimisation
- Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
- ASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing
- Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
- ASE-2013-SahaLKP #debugging #information retrieval #locality
- Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
- ASE-2013-ScannielloGMM #clustering #fault #predict
- Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
- ASE-2013-Servant #analysis #debugging
- Supporting bug investigation using history analysis (FS), pp. 754–757.
- ASE-2013-VanciuA #architecture #constraints
- Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
- ASE-2013-Wu0LD #analysis #automation #component #dependence
- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
- ESEC-FSE-2013-ClaretRNGB #analysis #data flow
- Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
- ESEC-FSE-2013-InozemtsevaHH #fault #reduction
- Using fault history to improve mutation reduction (LI, HH, RH), pp. 639–642.
- ESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation
- Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
- ESEC-FSE-2013-Lopez #ecosystem #evolution #modelling #topic
- Using topic models to understand the evolution of a software ecosystem (NL), pp. 723–726.
- ICSE-2013-AlmorsyGI #analysis #architecture #automation #security
- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
- ICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis
- Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
- ICSE-2013-GargIBMG #c #c++ #execution #generative #testing
- Feedback-directed unit test generation for C/C++ using concolic execution (PG, FI, GB, NM, AG), pp. 132–141.
- ICSE-2013-HaoLHG #energy #mobile #program analysis
- Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
- ICSE-2013-Jonsson #machine learning #performance #scalability
- Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
- ICSE-2013-PaasivaaraLDRS #agile #distributed #education #re-engineering #student
- Teaching students global software engineering skills using distributed scrum (MP, CL, DD, PR, AS), pp. 1128–1137.
- ICSE-2013-Rimba #assurance #platform #security
- Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
- ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql
- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
- ICSE-2013-Souza #predict
- A proposal for the improvement of project’s cost predictability using EVM and historical data of cost (ADdS), pp. 1447–1449.
- ICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing
- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
- SAC-2013-AlnusairZY #automation #design #recognition #semantics
- Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
- SAC-2013-AraujoGA #artificial reality #identification #towards
- Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
- SAC-2013-BanerjeeSS #detection #monitoring
- Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
- SAC-2013-BlondelSU #classification #constraints #learning
- Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
- SAC-2013-CamposFHV #personalisation #query #ranking #xml
- XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
- SAC-2013-CapelleHHF #recommendation #semantics
- Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
- SAC-2013-ChanHN #layout #semantics #wiki #word
- Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
- SAC-2013-ChocklerIMRS #satisfiability
- Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
- SAC-2013-CohenA #composition #refactoring
- Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
- SAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements
- On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
- SAC-2013-HeckelerSK #component #execution #robust #testing
- Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
- SAC-2013-InzingerHSLD #identification #implementation
- Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
- SAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling
- Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
- SAC-2013-JungWKO #architecture #automation #interactive
- Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
- SAC-2013-KalyanC #analysis #navigation
- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
- SAC-2013-KannanMDS #navigation #predict
- Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
- SAC-2013-KimHCYWNPC #similarity
- Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
- SAC-2013-KimM #algorithm #detection #hybrid #search-based
- Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
- SAC-2013-LeitaoC #adaptation #detection #optimisation #performance #xml
- Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
- SAC-2013-LeoniA #mining #process
- Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
- SAC-2013-MadeoLP #gesture #rest #segmentation
- Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
- SAC-2013-MartinaP #induction #multi #protocol #security #verification
- Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
- SAC-2013-MehtaRCN #approach #dependence
- Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
- SAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech
- A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
- SAC-2013-MendesW #navigation #realtime
- Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
- SAC-2013-PapadakisT #classification #mutation testing #testing
- Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
- SAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #video
- Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
- SAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction
- Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
- SAC-2013-Sobieski0 #maude #sql #term rewriting
- Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
- SAC-2013-SrivastavaSM #clustering #graph
- Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
- SAC-2013-TeixeiraRG #detection #locality #parallel
- Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
- SAC-2013-TragatschnigZ #enterprise #integration
- Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
- GPCE-2013-GerakiosBS #java #parametricity
- Reified type parameters using Java annotations (PG, AB, YS), pp. 61–64.
- GPCE-2013-KramerOKC #product line #user interface
- Using document-oriented GUIs in dynamic software product lines (DK, SO, PK, TC), pp. 85–94.
- SLE-2013-DialloCL #approach #formal method #modelling
- A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
- ASPLOS-2013-AhnDT #alias #named
- DeAliaser: alias speculation using atomic region support (WA, YD, JT), pp. 167–180.
- ASPLOS-2013-CuiHWY #execution #symbolic computation #verification
- Verifying systems rules using rule-directed symbolic execution (HC, GH, JW, JY), pp. 329–342.
- ASPLOS-2013-KadavRS #fault tolerance #fine-grained
- Fine-grained fault tolerance using device checkpoints (AK, MJR, MMS), pp. 473–484.
- ASPLOS-2013-SahooCGA #automation #fault #invariant #locality
- Using likely invariants for automated software fault localization (SKS, JC, CG, VSA), pp. 139–152.
- CASE-2013-BagchiBNVSS
- Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
- CASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #visualisation
- Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
- CASE-2013-BjorkenstamGBCL #energy #industrial #performance
- Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
- CASE-2013-ChenZS #metric
- A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
- CASE-2013-FerreiraL #generative #multi #tool support
- A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
- CASE-2013-FerreiraR #comparison #design #layout #performance #simulation
- Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
- CASE-2013-Fries #agile #automation #fault #fuzzy #multi
- Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
- CASE-2013-Geldmann #image #monte carlo #simulation
- Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
- CASE-2013-GrosbardKTR #composition #network
- A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
- CASE-2013-HuZL #automation #performance #petri net #synthesis
- Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
- CASE-2013-IsmailH #3d #anti #higher-order
- Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
- CASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning
- Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
- CASE-2013-LanzaKPSS #analysis #automation #detection #fault
- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
- CASE-2013-LingoR #design
- A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
- CASE-2013-LuSXPO #automation #graph #multi
- Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
- CASE-2013-MarturiDP #image #performance
- Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
- CASE-2013-MohajeraniMF #automaton #composition #finite #verification
- Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
- CASE-2013-NammotoKH #assembly #modelling
- Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
- CASE-2013-PanHJ #concurrent #flexibility #petri net #policy
- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
- CASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation
- Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
- CASE-2013-ShisheieJBC #design #string
- Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
- CASE-2013-SoviziK #matrix #nondeterminism #parallel #random
- Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
- CASE-2013-WangBR #modelling #monitoring
- Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
- CASE-2013-XuJLYL #energy #optimisation
- Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
- CASE-2013-YueH #concurrent #robust
- Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
- CASE-2013-ZhangPJST #energy #interface #monitoring #scalability
- A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
- CASE-2013-ZhangYZH #design
- Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
- CC-2013-MooreC #automation #generative #machine learning #policy
- Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
- CGO-2013-BardizbanyanGWSLMS #data access #performance
- Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
- CGO-2013-HuangJBJA #automation #parallel #runtime
- Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
- CGO-2013-KulkarniCWS #automation #heuristic #machine learning
- Automatic construction of inlining heuristics using machine learning (SK, JC, CW, DS), p. 12.
- DAC-2013-DevWR #3d #integration #testing
- High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
- DAC-2013-GaillardonMABSLM #towards
- Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
- DAC-2013-KarthikR #approximate #linear #modelling #named
- ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
- DAC-2013-LeGHD #simulation #verification
- Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
- DAC-2013-LiuYLC #named
- DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
- DAC-2013-MillerVG #modelling #physics #statistics
- Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
- DAC-2013-SchurmansZALACW #architecture #automation #communication #modelling
- Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
- DAC-2013-SekitaniYTSS
- Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
- DAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics
- Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
- DAC-2013-WangK #control flow #detection #hardware #kernel #named #performance
- NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
- DAC-2013-YuLJC #classification #detection #feature model
- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
- DATE-2013-AhmadyanKV #algorithm #incremental #runtime #verification
- Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
- DATE-2013-AnanthanarayananGP #detection #fault #low cost #set
- Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
- DATE-2013-BackesR #reachability
- Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
- DATE-2013-BakshiH #reduction #smt
- LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
- DATE-2013-BernasconiCTV
- Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
- DATE-2013-BertaccoCBFVKP #on the
- On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
- DATE-2013-BrandonW
- Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
- DATE-2013-BraojosAA #classification #embedded #random
- A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
- DATE-2013-ChenD #parallel #predict #simulation
- Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
- DATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis
- On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
- DATE-2013-DeutschC #multi
- Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
- DATE-2013-EbrahimiDP #3d #algorithm #fault tolerance
- Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
- DATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards
- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
- DATE-2013-GaoGB #fault tolerance #scheduling
- Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
- DATE-2013-Gomez-PradoCT #latency #optimisation
- FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
- DATE-2013-HasanA #analysis #fault #feedback #formal method
- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
- DATE-2013-HelmstetterCGMV #performance #simulation
- Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
- DATE-2013-HuNRK #detection #hardware #multimodal
- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
- DATE-2013-JooyaB #power management
- Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
- DATE-2013-LotfianJ #architecture #hardware #power management #smarttech
- An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
- DATE-2013-LukasiewyczSC #programming
- Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
- DATE-2013-MaricAV #architecture #hybrid #performance #reliability
- Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
- DATE-2013-PaternaR #problem
- Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
- DATE-2013-PontarelliOEW #detection #fault
- Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
- DATE-2013-QianJBTMM #analysis #named #performance
- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
- DATE-2013-RaminiGBB #3d #analysis #manycore #power management
- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
- DATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy
- Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
- DATE-2013-RustLP #architecture #complexity
- Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
- DATE-2013-ShreejithVFL #approach #configuration management #network
- An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
- DATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering
- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
- DATE-2013-TzouBHC #bound #composition
- Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
- DATE-2013-UnutulmazDF #optimisation
- Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
- DATE-2013-VenkatesanSRR #energy #named #performance
- DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
- DATE-2013-WangXZWYWNW
- Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
- DATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction
- FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
- DATE-2013-ZakharenkoAM #cpu #gpu #performance
- Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
- DATE-2013-ZhouZY #design #energy #memory management #network
- The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
- HPCA-2013-ArdestaniR #manycore #named #performance
- ESESC: A fast multicore simulator using Time-Based Sampling (EKA, JR), pp. 448–459.
- HPCA-2013-GoswamiCL #architecture #memory management #throughput
- Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
- HPCA-2013-KhanAWKJ #architecture #manycore #performance
- Improving multi-core performance using mixed-cell cache architecture (SMK, ARA, CW, JK, DAJ), pp. 119–130.
- HPCA-2013-KrishnaCKP #latency
- Breaking the on-chip latency barrier using SMART (TK, CHOC, WCK, LSP), pp. 378–389.
- HPCA-2013-SudanBLXMLB #architecture #lightweight #novel #web
- A novel system architecture for web scale applications using lightweight CPUs and virtualized I/O (KS, SB, SL, MX, DM, GL, RB), pp. 167–178.
- HPDC-2013-SuAWMWA #dataset #distributed
- Taming massive distributed datasets: data sampling using bitmap indices (YS, GA, JW, KM, JW, JPA), pp. 13–24.
- HPDC-2013-YinLBGN #dataset #order #performance #pipes and filters
- Efficient analytics on ordered datasets using MapReduce (JY, YL, MB, LG, AN), pp. 125–126.
- LCTES-2013-HuberPP #analysis #control flow #graph
- Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
- LCTES-2013-KhudiaM #control flow #low cost
- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
- LCTES-2013-WangCSCH #api #embedded #manycore
- Portable mapping of openMP to multicore embedded systems using MCA APIs (CW, SC, PS, BMC, JH), pp. 153–162.
- PDP-2013-ColmenaresODFR #equation
- Solving the Linearized Poisson-Boltzmann Equation on GPUs Using CUDA (JC, JO, SD, AF, WR), pp. 420–426.
- PDP-2013-DemirizBA #architecture #constraints #design #named #programming
- CPNoC: On Using Constraint Programming in Design of Network-on-Chip Architecture (AD, NB, AA), pp. 486–493.
- PDP-2013-EskandariKBJ #algorithm #constraints #optimisation #quality
- Quality of Service Optimization for Network-on-Chip Using Bandwidth-Constraint Mapping Algorithm (AE, AK, NB, MJ), pp. 504–508.
- PDP-2013-GuptaGV #3d #gpu #linear #simulation
- 3D Bubbly Flow Simulation on the GPU — Iterative Solution of a Linear System Using Sub-domain and Level-Set Deflation (RG, MBvG, CV), pp. 359–366.
- PDP-2013-LavilleMLPM #gpu #multi #simulation
- Using GPU for Multi-Agent Soil Simulation (GL, KM, CL, LP, NM), pp. 392–399.
- PDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #protocol
- Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
- PPoPP-2013-DiceLLLM #algorithm #hardware #memory management #transaction
- Using hardware transactional memory to correct and simplify and readers-writer lock algorithm (DD, YL, YL, VL, MM), pp. 261–270.
- PPoPP-2013-EdmondsWL #algorithm #graph
- Expressing graph algorithms using generalized active messages (NE, JW, AL), pp. 289–290.
- SOSP-2013-RoyMZ #graph #named #streaming
- X-Stream: edge-centric graph processing using streaming partitions (AR, IM, WZ), pp. 472–488.
- FASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards
- Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
- FASE-2013-MacedoC #alloy #bidirectional #implementation #model transformation #qvt
- Implementing QVT-R Bidirectional Model Transformations Using Alloy (NM, AC), pp. 297–311.
- STOC-2013-JainNS #matrix #rank
- Low-rank matrix completion using alternating minimization (PJ, PN, SS), pp. 665–674.
- STOC-2013-LeeRS #approach
- A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
- STOC-2013-LenzenP #performance
- Fast routing table construction using small messages: extended abstract (CL, BPS), pp. 381–390.
- STOC-2013-Miller #graph #optimisation #problem #scalability
- Solving large optimization problems using spectral graph theory (GLM), p. 981.
- STOC-2013-Sherstov #bound #communication
- Communication lower bounds using directional derivatives (AAS), pp. 921–930.
- TACAS-2013-FalkeMS #bound #c #contest #model checking #named #source code
- LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
- TACAS-2013-VizelGS #analysis #reachability
- Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
- CADE-2013-ClaessenJRS #automation #induction #proving
- Automating Inductive Proofs Using Theory Exploration (KC, MJ, DR, NS), pp. 392–406.
- CADE-2013-HawblitzelKLR #automation #proving #source code #theorem proving #towards
- Towards Modularly Comparing Programs Using Automated Theorem Provers (CH, MK, SKL, HR), pp. 282–299.
- CAV-2013-BrimCDS #model checking #parametricity #probability
- Exploring Parameter Space of Stochastic Biochemical Systems Using Quantitative Model Checking (LB, MC, SD, DS), pp. 107–123.
- CAV-2013-ChagantyLNR #learning #relational #smt
- Combining Relational Learning with SMT Solvers Using CEGAR (ATC, AL, AVN, SKR), pp. 447–462.
- CAV-2013-ColangeBKT #diagrams #distributed #model checking #towards
- Towards Distributed Software Model-Checking Using Decision Diagrams (MC, SB, FK, YTM), pp. 830–845.
- CAV-2013-LaarmanODLP #abstraction #automaton #manycore
- Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction (AL, MCO, AED, KGL, JvdP), pp. 968–983.
- CAV-2013-PiskacWZ #automation #logic #smt
- Automating Separation Logic Using SMT (RP, TW, DZ), pp. 773–789.
- CAV-2013-SosnovichGN #network #protocol #security
- Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
- CSL-2013-Rieg
- Extracting Herbrand trees in classical realizability using forcing (LR), pp. 597–614.
- ICLP-J-2013-ArbelaezTC #parallel #predict #runtime #satisfiability
- Using sequential runtime distributions for the parallel speedup prediction of SAT local search (AA, CT, PC), pp. 625–639.
- ICST-2013-AfshanMS #evolution #natural language #string #testing
- Evolving Readable String Test Inputs Using a Natural Language Model to Reduce Human Oracle Cost (SA, PM, MS), pp. 352–361.
- ICST-2013-ArafeenD #clustering #testing
- Test Case Prioritization Using Requirements-Based Clustering (MJA, HD), pp. 312–321.
- ICST-2013-LinD #concurrent #java
- CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
- ICST-2013-MossigeGM #constraints #generative #integration #programming #testing
- Test Generation for Robotized Paint Systems Using Constraint Programming in a Continuous Integration Environment (MM, AG, HM), pp. 489–490.
- ICST-2013-TangHYW #metric #quality
- Test Quality Measurement Using TBPP-R (JT, RH, JY, SW), pp. 48–55.
- ICST-2013-Torsel #domain-specific language #model checking #modelling #testing #web
- A Testing Tool for Web Applications Using a Domain-Specific Modelling Language and the NuSMV Model Checker (AMT), pp. 383–390.
- ICST-2013-YeolekarUAKV #generative #model checking #scalability #testing
- Scaling Model Checking for Test Generation Using Dynamic Inference (AY, DU, VA, SK, RV), pp. 184–191.
- ICTSS-2013-EnoiuSP #diagrams #logic #testing
- Using Logic Coverage to Improve Testing Function Block Diagrams (EPE, DS, PP), pp. 1–16.
- ICTSS-2013-MauserKH #programming #towards #user interface
- Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
- ICTSS-2013-SapraMCGC #execution #fault #python #source code #symbolic computation
- Finding Errors in Python Programs Using Dynamic Symbolic Execution (SS, MM, SC, AG, EMC), pp. 283–289.
- ICTSS-2013-StepienP #challenge #testing
- Challenges of Testing Periodic Messages in Avionics Systems Using TTCN-3 (BS, LP), pp. 207–222.
- ISSTA-2013-Buda #database #generative #testing
- Generation of test databases using sampling methods (TSB), pp. 366–369.
- ISSTA-2013-GligoricGZSAM #test coverage #testing
- Comparing non-adequate test suites using coverage criteria (MG, AG, CZ, RS, MAA, DM), pp. 302–313.
- ISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair
- Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
- LICS-2013-Colcombet #logic #monad #set #word
- Magnitude Monadic Logic over Words and the Use of Relative Internal Set Theory (TC), p. 123.
- LICS-2013-Halpern #first-order #logic #proving #security
- From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
- SAT-2013-FingerLGS #constraints #probability #satisfiability
- Solutions for Hard and Soft Constraints Using Optimized Probabilistic Satisfiability (MF, RL, CPG, BS), pp. 233–249.
- TAP-2013-InsaSR #algorithm #debugging #execution
- Speeding Up Algorithmic Debugging Using Balanced Execution Trees (DI, JS, AR), pp. 133–151.
- VMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support
- Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
- VMCAI-2013-ZhengS0LD0 #network #partial order #reduction
- State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
- QoSA-2012-EklundB #architecture #ecosystem #framework #multi #platform
- Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
- WICSA-ECSA-2012-ElorantaHVK #architecture #documentation #generative #knowledge base #named #topic
- TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents (VPE, OH, TV, KK), pp. 191–195.
- WICSA-ECSA-2012-HilliardMMP #architecture #composition #framework #on the #reuse
- On the Composition and Reuse of Viewpoints across Architecture Frameworks (RH, IM, HM, PP), pp. 131–140.
- WICSA-ECSA-2012-MiesbauerW #architecture #information management #maintenance
- Capturing and Maintaining Architectural Knowledge Using Context Information (CM, RW), pp. 206–210.
- WICSA-ECSA-2012-RathfelderBKR #email #monitoring #performance #predict #scalability
- Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
- WICSA-ECSA-2012-ThatSO #design pattern
- Using Architectural Patterns to Define Architectural Decisions (MTTT, SS, FO), pp. 196–200.
- WICSA-ECSA-2012-WoodsB #architecture #case study #experience #industrial #information management #scalability
- Using an Architecture Description Language to Model a Large-Scale Information System — An Industrial Experience Report (EW, RB), pp. 239–243.
- DocEng-2012-MahlowGHS #framework #retrieval #xquery
- A framework for retrieval and annotation in digital humanities using XQuery full text and update in BaseX (CM, CG, AH, MHS), pp. 195–204.
- DocEng-2012-PeroniSV #documentation #lens #semantics
- Faceted documents: describing document characteristics using semantic lenses (SP, DS, FV), pp. 191–194.
- DRR-2012-ChandaFP #clustering #documentation
- Clustering document fragments using background color and texture information (SC, KF, UP).
- DRR-2012-FengY #component #composition #detection #documentation
- Using connected component decomposition to detect straight line segments in documents (XF, AY).
- DRR-2012-LinGTHL #documentation #embedded #identification
- Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
- DRR-2012-RashwanRAAK #2d #pseudo #robust
- A robust omnifont open-vocabulary arabic OCR system using pseudo-2D-HMM (AMR, MR, AAH, SA, AHK).
- DRR-2012-Silva #algorithm #detection #evaluation
- Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
- DRR-2012-TangSS #distance
- Handwriting individualization using distance and rarity (YT, SNS, HS).
- HT-2012-CravinoDF #clustering #community #network
- Using the overlapping community structure of a network of tags to improve text clustering (NC, JLD, ÁF), pp. 239–244.
- HT-2012-LevacherLW #adaptation #hypermedia #named #reuse
- Slicepedia: providing customized reuse of open-web resources for adaptive hypermedia (KL, SL, VW), pp. 23–32.
- HT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social
- A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
- HT-2012-WeningerZH #web
- Building enriched web page representations using link paths (TW, CZ, JH), pp. 53–62.
- JCDL-2012-LeeH #classification #generative #music
- Generating ground truth for music mood classification using mechanical turk (JHL, XH), pp. 129–138.
- JCDL-2012-OhLMY #ranking
- Evaluating and ranking patents using weighted citations (SO, ZL, PM, JY), pp. 281–284.
- JCDL-2012-TuarobMG #algorithm #network
- Improving algorithm search using the algorithm co-citation network (ST, PM, CLG), pp. 277–280.
- SIGMOD-2012-El-HelwFI #information management
- Just-in-time information extraction using extraction views (AEH, MHF, IFI), pp. 613–616.
- SIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance
- Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
- TPDL-2012-DamnjanovicH #content management #generative #interactive #library
- Generating Content for Digital Libraries Using an Interactive Content Management System (UD, SH), pp. 474–479.
- TPDL-2012-GeelNN #approach #named
- PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
- TPDL-2012-HallCS #automation #clustering #library
- Evaluating the Use of Clustering for Automatically Organising Digital Library Collections (MMH, PDC, MS), pp. 323–334.
- TPDL-2012-KapidakisMP #query
- Query Expansion of Zero-Hit Subject Searches: Using a Thesaurus in Conjunction with NLP Techniques (SK, AM, MP), pp. 433–438.
- TPDL-2012-LlewellynGOH #analysis #tool support
- Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
- TPDL-2012-LoizidesVIZ #interactive #repository
- Collaboratively Creating a Thematic Repository Using Interactive Table-Top Technology (FL, CV, AI, PZ), pp. 512–516.
- TPDL-2012-TryfouT #image #semantics #visual notation #web
- Using Visual Cues for the Extraction of Web Image Semantic Information (GT, NT), pp. 396–401.
- TPDL-2012-ZhangKB #metadata #tool support
- The CMDI MI Search Engine: Access to Language Resources and Tools Using Heterogeneous Metadata Schemas (JZ, MKS, HB), pp. 492–495.
- TPDL-2012-ZhouLW #personalisation #social #web
- Web Search Personalization Using Social Data (DZ, SL, VW), pp. 298–310.
- VLDB-2012-CandanRSW #constraints #named
- sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments (KSC, RR, MLS, XW), pp. 1519–1530.
- VLDB-2012-CautisK #complexity #probability #query #xml
- Answering Queries using Views over Probabilistic XML: Complexity and Tractability (BC, EK), pp. 1148–1159.
- VLDB-2012-IseleB #learning #programming #search-based
- Learning Expressive Linkage Rules using Genetic Programming (RI, CB), pp. 1638–1649.
- VLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy
- Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
- VLDB-2012-LiKNC #estimation #query #robust #sql #statistics
- Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
- VLDB-2012-LuSCO #nearest neighbour #performance #pipes and filters
- Efficient Processing of k Nearest Neighbor Joins using MapReduce (WL, YS, SC, BCO), pp. 1016–1027.
- VLDB-2012-PimplikarS #keyword #query #web
- Answering Table Queries on the Web using Column Keywords (RP, SS), pp. 908–919.
- VLDB-2012-SachanB #mining #statistics #string
- Mining Statistically Significant Substrings using the Chi-Square Statistic (MS, AB), pp. 1052–1063.
- VLDB-2012-ZhangCW #multi #performance #pipes and filters
- Efficient Multi-way Theta-Join Processing Using MapReduce (XZ, LC, MW), pp. 1184–1195.
- CSEET-2012-BollinHS #concept #education #experience #project management #simulation
- Teaching Software Project Management using Simulations — The AMEISE Environment: from Concepts to Class Room Experience (AB, EH, LS), pp. 85–86.
- CSEET-2012-TillmannMHFX #education #mobile #student
- Engage Your Students by Teaching Computer Science Using Only Mobile Devices with TouchDevelop (NT, MM, JdH, MF, TX), pp. 87–89.
- ITiCSE-2012-CooperNS
- Initial results of using an intelligent tutoring system with Alice (SC, YJN, LS), pp. 138–143.
- ITiCSE-2012-GoldweberDJ #hardware #operating system
- Supporting operating systems projects using the μMPS2 hardware simulator (MG, RD, TJ), pp. 63–68.
- ITiCSE-2012-Impagliazzo
- Using professional and ethical themes (JI), p. 374.
- ITiCSE-2012-Law #interactive #student
- Using quick response codes for student interaction during lectures (RL), p. 401.
- ITiCSE-2012-Santos12a #education #java
- Developing contexts for teaching Java using AGUIA/J (ALS), p. 378.
- SIGITE-2012-AhmadzadehM #algorithm #clustering #education #programming #research
- A feasibility study on using clustering algorithms in programming education research (MA, EM), pp. 145–150.
- SIGITE-2012-AndersonG #case study #experience #programming #student
- Engaging undergraduate programming students: experiences using lego mindstorms NXT (MA, CG), pp. 139–144.
- SIGITE-2012-BrannockN #development #testing
- Real-world testing: using FOSS for software development courses (EB, NPN), pp. 87–88.
- SIGITE-2012-GirtonGMY #development #overview #perspective #student
- Using student professional development planning to inform program review (AG, SG, JRM, DWY), pp. 71–74.
- SIGITE-2012-KercherR #risk management #student
- Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
- SIGITE-2012-SeolSK #learning #mobile #student #towards
- Use of a mobile application to promote scientific discovery learning: students’ perceptions towards and practical adoption of a mobile application (SS, AS, PK), pp. 121–126.
- TFPIE-2012-ODonnell #education #functional #hardware
- Connecting the Dots: Computer Systems Education using a Functional Hardware Description Language (JTO), pp. 20–39.
- CSMR-2012-BettenburgTH #code search #fuzzy #source code
- Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
- CSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict
- Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
- CSMR-2012-GrantCS #maintenance #modelling #topic
- Using Topic Models to Support Software Maintenance (SG, JRC, DBS), pp. 403–408.
- CSMR-2012-HosseiniNG #debugging #predict
- A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes (HH, RN, MWG), pp. 149–158.
- CSMR-2012-JaszSBOG #impact analysis
- Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
- CSMR-2012-Koschke #clone detection #detection #scalability
- Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
- CSMR-2012-MoghadamC #automation #design #difference #refactoring
- Automated Refactoring Using Design Differencing (IHM, MÓC), pp. 43–52.
- CSMR-2012-PetersZ #mining #repository #smell
- Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
- ICPC-2012-LuciaPOPP #information retrieval #question #source code
- Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
- ICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters
- Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
- ICSM-2012-AliSGA #empirical #requirements #traceability
- An empirical study on requirements traceability using eye-tracking (NA, ZS, YGG, GA), pp. 191–200.
- ICSM-2012-KobayashiKKYM #clustering #composition #dependence
- Feature-gathering dependency-based software clustering using Dedication and Modularity (KK, MK, KK, KY, AM), pp. 462–471.
- ICSM-2012-KoutersVSB #gnome #repository
- Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
- ICSM-2012-QiML #automation #performance #scalability #source code
- Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
- ICSM-2012-QuAR #impact analysis #testing
- Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
- ICSM-2012-RupakhetiH #constraints #fault #modelling #similarity #theorem proving
- Finding errors from reverse-engineered equality models using a constraint solver (CRR, DH), pp. 77–86.
- MSR-2012-ChenTNH #fault #modelling #topic
- Explaining software defects using topic models (THC, SWT, MN, AEH), pp. 189–198.
- SCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support
- Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
- SCAM-2012-AliSGA #debugging
- Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
- SCAM-2012-HillRK #debugging #java #locality #on the
- On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
- SCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis
- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
- WCRE-2012-DaviesRW #debugging #locality #similarity
- Using Bug Report Similarity to Enhance Bug Localisation (SD, MR, MW), pp. 125–134.
- WCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #variability
- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
- WCRE-2012-JanaN #detection #dynamic analysis #precise
- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
- WCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository
- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
- WCRE-2012-RomanoRPK #fine-grained #source code
- Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
- WCRE-2012-SteidlHJ #analysis #network #recommendation
- Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
- WCRE-2012-ZiftciK #data mining #feature model #mining
- Feature Location Using Data Mining on Existing Test-Cases (CZ, IK), pp. 155–164.
- ICALP-v1-2012-JefferyKM #complexity #graph #matrix #multi #quantum #query
- Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision (SJ, RK, FM), pp. 522–532.
- ICALP-v1-2012-KrauthgamerZ
- Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
- FM-2012-BenkiraneNSS #algebra #process
- Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra (SB, RN, ES, CS), pp. 101–115.
- FM-2012-HieronsMN #distributed #order #testing
- Using Time to Add Order to Distributed Testing (RMH, MGM, MN), pp. 232–246.
- FM-2012-OsaiweranFGR #case study #component #design #experience #formal method
- Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
- FM-2012-PlaggeL #validation
- Validating B, Z and TLA + Using ProB and Kodkod (DP, ML), pp. 372–386.
- FM-2012-SongT #detection #model checking #performance
- Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
- FM-2012-YangKK #formal method #lightweight
- Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
- IFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling
- Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
- IFM-2012-RochaBCN #bound #comprehension #debugging #model checking #programming
- Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
- SEFM-2012-BicknellRBCS #approach #verification
- A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
- SEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing
- An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
- SEFM-2012-MatichukM #automation #proving #specification
- Extensible Specifications for Automatic Re-use of Specifications and Proofs (DM, TCM), pp. 333–341.
- Haskell-2012-AdamsD #haskell #performance #programming
- Template your boilerplate: using template haskell for efficient generic programming (MDA0, TD), pp. 13–24.
- ICFP-2012-Danielsson #monad #semantics
- Operational semantics using the partiality monad (NAD), pp. 127–138.
- AIIDE-2012-DesaiS #behaviour
- Enhancing the Believability of Character Behaviors Using Non-Verbal Cues (ND, DS).
- AIIDE-2012-MullerHBS #game studies
- Glengarry Glen Ross: Using BDI for Sales Game Dialogues (TJM, AH, KvdB, IS).
- AIIDE-2012-ShakerYTNO #evolution #personalisation
- Evolving Personalized Content for Super Mario Bros Using Grammatical Evolution (NS, GNY, JT, MN, MO0).
- CIG-2012-BenbassatS #evolution #programming #search-based
- Evolving both search and strategy for Reversi players using genetic programming (AB, MS), pp. 47–54.
- CIG-2012-BrandstetterA #information retrieval #programming #search-based
- Reactive control of Ms. Pac Man using information retrieval based on Genetic Programming (MFB, SA), pp. 250–256.
- CIG-2012-ShakerNYTO #evolution
- Evolving levels for Super Mario Bros using grammatical evolution (NS, MN, GNY, JT, MO0), pp. 304–311.
- FDG-2012-IsbisterKF #exclamation
- Scoop!: using movement to reduce math anxiety and affect confidence (KI, MK, JF), pp. 228–230.
- FDG-2012-ScerboB #design #game studies
- Design issues when using commodity gaming devices for virtual object manipulation (SS, DAB), pp. 294–295.
- FDG-2012-SimmonsDG #development #game studies #programming
- Using game development to reveal programming competency (SS, BJD, MG), pp. 89–96.
- FDG-2012-YinRB #interactive #novel #visual notation
- Using an interactive visual novel to promote patient empowerment through engagement (LY, LR, TWB), pp. 41–48.
- VS-Games-2012-AsteriadisKSY #behaviour #clustering #detection #towards #visual notation
- Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
- VS-Games-2012-HaugePR #education #game studies
- Workshop on the Use of Serious Games in the Education of Engineers (JBH, BP, JckhR), pp. 341–342.
- VS-Games-2012-OostendorpK #3d #navigation
- Using a Cognitive Model of Web-Navigation to Generate Support for 3D Virtual Navigation (HvO, SK), pp. 283–284.
- ICGT-2012-Ong #graph transformation #multi #programming language #rule-based
- Multi-scale Rule-Based Graph Transformation Using the Programming Language XL (YO), pp. 417–419.
- CHI-2012-AndrewsBEK #branch #interactive
- Creating and using interactive narratives: reading and writing branching comics (DA, CB, SE, MK), pp. 1703–1712.
- CHI-2012-Barkhuus #human-computer #privacy
- The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
- CHI-2012-BullingAS #security #visual notation
- Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
- CHI-2012-CohnMPT #interactive #named #realtime
- Humantenna: using the body as an antenna for real-time whole-body interaction (GC, DM, SP, DST), pp. 1901–1910.
- CHI-2012-DearmanGT #mobile
- Determining the orientation of proximate mobile devices using their back facing camera (DD, RTG, KNT), pp. 2231–2234.
- CHI-2012-DearmanT
- Evaluating the implicit acquisition of second language vocabulary using a live wallpaper (DD, KNT), pp. 1391–1400.
- CHI-2012-DixonFW #analysis #interface #visual notation
- A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
- CHI-2012-FallahABF #navigation #visual notation
- The user as a sensor: navigating users with visual impairments in indoor spaces using tactile landmarks (NF, IA, KEB, EF), pp. 425–432.
- CHI-2012-GhomiFHCB
- Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
- CHI-2012-GoelFW #mobile #named
- WalkType: using accelerometer data to accomodate situational impairments in mobile touch screen text entry (MG, LF, JOW), pp. 2687–2696.
- CHI-2012-GuptaMPT #gesture #named
- SoundWave: using the doppler effect to sense gestures (SG, DM, SP, DST), pp. 1911–1914.
- CHI-2012-HarrisonH #2d #interactive
- Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
- CHI-2012-HayashiPOH #named
- WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
- CHI-2012-HenzeRB #behaviour #mobile #type system
- Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
- CHI-2012-HietanenSAL #image
- : helping the legal use of creative commons images (HH, AS, KA, YL), pp. 599–608.
- CHI-2012-HuhnKLK #evaluation #on the
- On the use of virtual environments for the evaluation of location-based applications (AEH, VJK, AL, PK), pp. 2569–2578.
- CHI-2012-KjeldskovSPP #case study #mobile
- Using mobile phones to support sustainability: a field study of residential electricity consumption (JK, MBS, JP, RP), pp. 2347–2356.
- CHI-2012-KlempererLMSUBCGR #data access #exclamation
- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
- CHI-2012-KumarRTAK #game studies #mobile #speech
- Improving literacy in developing countries using speech recognition-supported games on mobile devices (AK, PR, AT, RA, MK), pp. 1149–1158.
- CHI-2012-LicoppeI #case study #mobile #quote
- “Timid encounters”: a case study in the use of proximity-based mobile technologies (CL, YI), pp. 2759–2768.
- CHI-2012-LindsayJSO #design #people
- Engaging older people using participatory design (SL, DJ, GS, PO), pp. 1199–1208.
- CHI-2012-NicolauJ #comprehension #type system
- Touch typing using thumbs: understanding the effect of mobility and hand posture (HN, JAJ), pp. 2683–2686.
- CHI-2012-QiB #memory management
- Animating paper using shape memory alloys (JQ, LB), pp. 749–752.
- CHI-2012-SchwarzKHDW #ad hoc #mobile #scalability
- Phone as a pixel: enabling ad-hoc, large-scale displays using mobile devices (JS, DK, CH, PD, AW), pp. 2235–2238.
- CHI-2012-TangMHRIZC #interactive #lightweight #video
- Time travel proxy: using lightweight video recordings to create asynchronous, interactive meetings (JCT, JM, AH, AR, KI, CZ, XC), pp. 3111–3120.
- CHI-2012-VardoulakisKMSGT #mobile
- Using mobile phones to present medical information to hospital patients (LPV, AKK, DM, GS, JG, DST), pp. 1411–1420.
- CHI-2012-YataniBT #feedback #named #people #representation #visual notation
- SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback (KY, NB, KNT), pp. 415–424.
- CHI-2012-YemKYSYY
- Assisting hand skill transfer of tracheal intubation using outer-covering haptic display (VY, HK, NY, RS, HY, JY), pp. 3177–3180.
- CSCW-2012-BoltonKV #comparison #performance
- A comparison of competitive and cooperative task performance using spherical and flat displays (JB, KK, RV), pp. 529–538.
- CSCW-2012-FollmerBRSI #interactive #people
- People in books: using a FlashCam to become part of an interactive book for connected reading (SF, RB, HR, MS, HI), pp. 685–694.
- CSCW-2012-JuAL #game studies #low cost
- Using low cost game controllers to capture data for 6th grade science labs (WJ, UA, SL), pp. 1115–1124.
- CSCW-2012-NagpalHJL #personalisation #social #web
- Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search (AN, SH, RRJ, MSL), pp. 461–470.
- CSCW-2012-RobinsonJVM #authoring #collaboration #named
- PicoTales: collaborative authoring of animated stories using handheld projectors (SR, MJ, EV, GM), pp. 671–680.
- CAiSE-2012-SchalerLRS #database #information management
- Building Information System Variants with Tailored Database Schemas Using Features (MS, TL, MR, GS), pp. 597–612.
- CAiSE-2012-ZawawyKMM #analysis #logic #markov #network
- Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
- ICEIS-J-2012-FabbriHTBZS12a #mining #visualisation
- Using Information Visualization and Text Mining to Facilitate the Conduction of Systematic Literature Reviews (SF, EMH, ADT, AB, AZ, CS), pp. 243–256.
- ICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse
- Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
- ICEIS-v1-2012-AmarGMHLN #concept analysis
- Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
- ICEIS-v1-2012-AyresS #fuzzy #mining #ontology #similarity
- Mining Generalized Association Rules using Fuzzy Ontologies with Context-based Similarity (RMJA, MTPS), pp. 74–83.
- ICEIS-v1-2012-KosorusBK #query #semantics #similarity #taxonomy
- Semantic Similarity between Queries in QA System using a Domain-specific Taxonomy (HK, AB, JK), pp. 241–246.
- ICEIS-v1-2012-TertiltBK #algorithm #enterprise #modelling #performance #scalability
- Modeling the Performance and Scalability of a SAP ERP System using an Evolutionary Algorithm (DT, AB, HK), pp. 112–118.
- ICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process
- Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
- ICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification
- Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
- ICEIS-v2-2012-FonteBCGH #evaluation #program analysis
- Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
- ICEIS-v2-2012-FrancaS #aspect-oriented #evaluation #metric #overview #programming
- A Systematic Review on Evaluation of Aspect Oriented Programming using Software Metrics (JMSF, MdSS), pp. 77–83.
- ICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics
- Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
- ICEIS-v2-2012-PantojaC #approach #development
- A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
- ICEIS-v2-2012-ReichelR #process #requirements
- Prioritization of Product Requirements using the Analytic Hierarchy Process (TR, GR), pp. 70–76.
- ICEIS-v2-2012-YiasemisA #automation #fault #locality #mutation testing #testing
- Dynamic Localisation and Automatic Correction of Software Faults using Evolutionary Mutation Testing (PSY, ASA), pp. 15–26.
- ICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface
- Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
- ICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi
- Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
- ICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy
- A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
- CIKM-2012-AgarwalCW #multi #ranking
- Multi-faceted ranking of news articles using post-read actions (DA, BCC, XW), pp. 694–703.
- CIKM-2012-BaeJKL #detection
- Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
- CIKM-2012-BambaSGBF #concept #recommendation #scalability
- The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function (PB, JS, CG, NB, JF), pp. 2275–2278.
- CIKM-2012-BannourH #image #semantics
- Hierarchical image annotation using semantic hierarchies (HB, CH), pp. 2431–2434.
- CIKM-2012-CheungSM #recommendation #social #synthesis
- Using program synthesis for social recommendations (AC, ASL, SM), pp. 1732–1736.
- CIKM-2012-ChiangWD #clustering #network #normalisation #scalability
- Scalable clustering of signed networks using balance normalized cut (KYC, JJW, ISD), pp. 615–624.
- CIKM-2012-ChongCZSQZ #pattern matching #rdf
- RDF pattern matching using sortable views (ZC, HC, ZZ, HS, GQ, AZ), pp. 315–324.
- CIKM-2012-Chung
- Finding food entity relationships using user-generated data in recipe service (YjC), pp. 2611–2614.
- CIKM-2012-CosciaR #how #web
- Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
- CIKM-2012-GopalakrishnanIMRS
- Matching product titles using web-based enrichment (VG, SPI, AM, RR, SHS), pp. 605–614.
- CIKM-2012-HuangCLL #predict #probability #process #social
- Predicting aggregate social activities using continuous-time stochastic process (SH, MC, BL, DL), pp. 982–991.
- CIKM-2012-HwangLKL #on the #performance #recommendation
- On using category experts for improving the performance and accuracy in recommender systems (WSH, HJL, SWK, ML), pp. 2355–2358.
- CIKM-2012-KhabsaTG
- Entity resolution using search engine results (MK, PT, CLG), pp. 2363–2366.
- CIKM-2012-KimYK #equation #query #retrieval #word
- Mathematical equation retrieval using plain words as a query (SK, SY, YK), pp. 2407–2410.
- CIKM-2012-LinDH0S #automation #image #random #visual notation
- Automatic image annotation using tag-related random search over visual neighbors (ZL, GD, MH, JW, JS), pp. 1784–1788.
- CIKM-2012-LinTCXS #effectiveness #performance #sentiment
- Effective and efficient?: bilingual sentiment lexicon extraction using collocation alignment (ZL, ST, XC, XX, WS), pp. 1542–1546.
- CIKM-2012-LongCZZ #classification #named
- TCSST: transfer classification of short & sparse text using external data (GL, LC, XZ, CZ), pp. 764–772.
- CIKM-2012-LongGXK #approach #design
- A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
- CIKM-2012-McCreadieMOGJ #crowdsourcing #web
- An examination of content farms in web search using crowdsourcing (RM, CM, IO, JG, FJ), pp. 2551–2554.
- CIKM-2012-MendesMZB #graph #similarity
- Measuring website similarity using an entity-aware click graph (PNM, PM, HZ, RB), pp. 1697–1701.
- CIKM-2012-NegahbanRG #learning #multi #performance #scalability #statistics
- Scaling multiple-source entity resolution using statistically efficient transfer learning (SN, BIPR, JG), pp. 2224–2228.
- CIKM-2012-NoroziAV #documentation #wiki
- Contextualization using hyperlinks and internal hierarchical structure of Wikipedia documents (MAN, PA, APdV), pp. 734–743.
- CIKM-2012-QureshiOP #n-gram #wiki
- Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
- CIKM-2012-RaiberKT #estimation #web
- Content-based relevance estimation on the web using inter-document similarities (FR, OK, MT), pp. 1769–1773.
- CIKM-2012-SiposSSJ #corpus #summary #word
- Temporal corpus summarization using submodular word coverage (RS, AS, PS, TJ), pp. 754–763.
- CIKM-2012-SrinivasanBC #modelling
- Segmenting web-domains and hashtags using length specific models (SS, SB, RC), pp. 1113–1122.
- CIKM-2012-TsatsaronisVN #documentation #named #semantics
- SemaFor: semantic document indexing using semantic forests (GT, IV, KN), pp. 1692–1696.
- CIKM-2012-WangQD #automation #clustering #documentation
- Improving document clustering using automated machine translation (XW, BQ, ID), pp. 645–653.
- CIKM-2012-WangWLL #graph #keyword #ranking #wiki
- Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
- CIKM-2012-WangZCM #network #retrieval
- Top-k retrieval using conditional preference networks (HW, XZ, WC, PM), pp. 2075–2079.
- CIKM-2012-WeiFLC #canonical #dependence
- Model the complex dependence structures of financial variables by using canonical vine (WW, XF, JL, LC), pp. 1382–1391.
- CIKM-2012-WongCTP #web
- Mixed-initiative conversational system using question-answer pairs mined from the web (WW, LC, JT, LP), pp. 2707–2709.
- CIKM-2012-YanGLCW #clustering #matrix
- Clustering short text using Ncut-weighted non-negative matrix factorization (XY, JG, SL, XC, YW), pp. 2259–2262.
- CIKM-2012-YangZW #collaboration #incremental #predict #scalability
- Scalable collaborative filtering using incremental update and local link prediction (XY, ZZ, KW), pp. 2371–2374.
- CIKM-2012-YuSNMH #network #similarity
- User guided entity similarity search using meta-path selection in heterogeneous information networks (XY, YS, BN, TM, JH), pp. 2025–2029.
- ECIR-2012-BoudinND #predict #query
- Using a Medical Thesaurus to Predict Query Difficulty (FB, JYN, MD), pp. 480–484.
- ECIR-2012-MantrachR12a #multi #query
- A Mailbox Search Engine Using Query Multi-modal Expansion and Community-Based Smoothing (AM, JMR), pp. 576–577.
- ECIR-2012-NawabSC #documentation #query
- Retrieving Candidate Plagiarised Documents Using Query Expansion (RMAN, MS, PDC), pp. 207–218.
- ECIR-2012-OghinaBTR #predict #social #social media
- Predicting IMDB Movie Ratings Using Social Media (AO, MB, MT, MdR), pp. 503–507.
- ECIR-2012-TholpadiDBS #clustering #corpus #multi
- Cluster Labeling for Multilingual Scatter/Gather Using Comparable Corpora (GT, MKD, CB, SKS), pp. 388–400.
- ECIR-2012-ZucconAZW #analysis #retrieval
- Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
- ICML-2012-Araya-LopezBT
- Near-Optimal BRL using Optimistic Local Transitions (MAL, OB, VT), p. 70.
- ICML-2012-Ben-DavidLSS #classification #fault
- Minimizing The Misclassification Error Rate Using a Surrogate Convex Loss (SBD, DL, NS, KS), p. 16.
- ICML-2012-BoukouvalasBC #process
- Gaussian Process Quantile Regression using Expectation Propagation (AB, RB, DC), p. 123.
- ICML-2012-Busa-FeketeBK #classification #graph #performance
- Fast classification using sparse decision DAGs (RBF, DB, BK), p. 99.
- ICML-2012-DhillonRFU #modelling #word
- Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
- ICML-2012-HaiderS #clustering #graph
- Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
- ICML-2012-JalaliS12a #clustering #optimisation
- Clustering using Max-norm Constrained Optimization (AJ, NS), p. 205.
- ICML-2012-JiangLS #3d #learning
- Learning Object Arrangements in 3D Scenes using Human Context (YJ, ML, AS), p. 119.
- ICML-2012-LeRMDCCDN #learning #scalability
- Building high-level features using large scale unsupervised learning (QVL, MR, RM, MD, GC, KC, JD, AYN), p. 69.
- ICML-2012-SejdinovicGSF #kernel #testing
- Hypothesis testing using pairwise distances and associated kernels (DS, AG, BKS, KF), p. 104.
- ICML-2012-ShanKRBSR #matrix #predict #probability
- Gap Filling in the Plant Kingdom — Trait Prediction Using Hierarchical Probabilistic Matrix Factorization (HS, JK, PBR, AB, FS, MR), p. 47.
- ICML-2012-SilverC #composition #modelling
- Compositional Planning Using Optimal Option Models (DS, KC), p. 165.
- ICML-2012-YuSL #network #speech
- Conversational Speech Transcription Using Context-Dependent Deep Neural Networks (DY, FS, GL), p. 1.
- ICML-2012-ZhaiHBW #image #modelling #process
- Modeling Images using Transformed Indian Buffet Processes (KZ, YH, JLBG, SW), p. 118.
- ICPR-2012-0001ZP #segmentation
- Unsupervised dynamic texture segmentation using local descriptors in volumes (JC, GZ, MP), pp. 3622–3625.
- ICPR-2012-AfzalBKSB #documentation #image #parametricity #robust
- Robust stereo matching for document images using parameter selection of text-line extraction (MZA, SSB, MK, FS, TMB), pp. 331–334.
- ICPR-2012-AhmedA #gesture #modelling
- Flow Modeling and skin-based Gaussian pruning to recognize gestural actions using HMM (ORA, AAH), pp. 3488–3491.
- ICPR-2012-AliGBPNP #biology #classification
- Classification of biological cells using bio-inspired descriptors (WBHA, DG, MB, PP, RN, TP), pp. 3353–3357.
- ICPR-2012-AotoTSMY #estimation
- Position estimation of near point light sources using a clear hollow sphere (TA, TT, TS, YM, NY), pp. 3721–3724.
- ICPR-2012-AryafarJS #automation #classification
- Automatic musical genre classification using sparsity-eager support vector machines (KA, SJ, AS), pp. 1526–1529.
- ICPR-2012-AttamimiNN #markov #multi #recognition
- Hierarchical multilevel object recognition using Markov model (MA, TN, TN), pp. 2963–2966.
- ICPR-2012-AydemirEGK #summary #video
- Video summarization using simple action patterns (MSA, UE, AG, MEK), pp. 2047–2050.
- ICPR-2012-AzizWH
- Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
- ICPR-2012-BaiHHR #clustering #complexity #graph
- Graph clustering using graph entropy complexity traces (LB, ERH, LH, PR), pp. 2881–2884.
- ICPR-2012-BaiHR #graph #kernel
- Jensen-Shannon graph kernel using information functionals (LB, ERH, PR), pp. 2877–2880.
- ICPR-2012-BanerjeeN #kernel #learning #multi #process #recognition
- Pose based activity recognition using Multiple Kernel learning (PB, RN), pp. 445–448.
- ICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation
- 3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
- ICPR-2012-BespalovQBS #classification #image #scalability
- Large-scale image classification using supervised spatial encoder (DB, YQ, BB, AS), pp. 581–584.
- ICPR-2012-BicegoL #2d #biology #recognition #sequence #tool support
- 2D shape recognition using biological sequence alignment tools (MB, PL), pp. 1359–1362.
- ICPR-2012-BoomHHF #clustering #dataset #image
- Supporting ground-truth annotation of image datasets using clustering (BJB, PXH, JH, RBF), pp. 1542–1545.
- ICPR-2012-BougesCBL #classification #nearest neighbour
- Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
- ICPR-2012-BoulmerkaA #segmentation
- Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
- ICPR-2012-BuchholzKWW #3d #image #locality
- 3D object localization using single camera images (DB, DK, SW, FMW), pp. 821–824.
- ICPR-2012-ChangDZDW #representation #sketching #synthesis
- Smoothness-constrained face photo-sketch synthesis using sparse representation (LC, XD, MZ, FD, ZW), pp. 3025–3029.
- ICPR-2012-ChenHCHC #analysis
- Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
- ICPR-2012-ChenLL #artificial reality #image
- Depth image enhancement for Kinect using region growing and bilateral filter (LC, HL, SL), pp. 3070–3073.
- ICPR-2012-ChenXF #approximate
- Compression of GPS trajectories using optimized approximation (MC, MX, PF), pp. 3180–3183.
- ICPR-2012-CheungP #detection
- Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
- ICPR-2012-ChowdhuryBP #detection
- Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
- ICPR-2012-ChowdhuryKPD #design #graph #video
- Video storyboard design using Delaunay graphs (ASC, SKK, RP, MND), pp. 3108–3111.
- ICPR-2012-CrandallFP #modelling #probability #visual notation
- Layer-finding in radar echograms using probabilistic graphical models (DJC, GCF, JP), pp. 1530–1533.
- ICPR-2012-DattaBFP #identification #modelling
- Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
- ICPR-2012-DoTT #multi #representation
- Text/graphic separation using a sparse representation with multi-learned dictionaries (THD, ST, ORT), pp. 689–692.
- ICPR-2012-EdmundsonS #image #performance #retrieval
- Fast JPEG image retrieval using optimised Huffman tables (DE, GS), pp. 3188–3191.
- ICPR-2012-El-GaalyT #kernel #multi #recognition
- RGBD object pose recognition using local-global multi-kernel regression (TEG, MT), pp. 2468–2471.
- ICPR-2012-ElnakibNCPGE #3d #analysis #quantifier
- Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
- ICPR-2012-ErsoyBPP #classification #image
- HEp-2 cell classification in IIF images using Shareboost (IE, FB, JP, KP), pp. 3362–3365.
- ICPR-2012-FernandezT #documentation #segmentation
- Document segmentation using Relative Location Features (FCF, ORT), pp. 1562–1565.
- ICPR-2012-Gao12a #clustering #estimation #multi
- Facial age estimation using Clustered Multi-task Support Vector Regression Machine (PXG), pp. 541–544.
- ICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi
- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
- ICPR-2012-GlodekSPS #classification #markov #multi #network
- Multi-modal Fusion based on classifiers using reject options and Markov Fusion Networks (MG, MS, GP, FS), pp. 1084–1087.
- ICPR-2012-GonfausGGRG #classification #geometry
- Edge classification using photo-geometric features (JMG, TG, AG, FXR, JG), pp. 1497–1500.
- ICPR-2012-GujraniyaM #classification #modelling #performance #topic
- Efficient classification using phrases generated by topic models (DG, MNM), pp. 2331–2334.
- ICPR-2012-HaraKMM #3d #generative #video
- Fast-accurate 3D face model generation using a single video camera (TH, HK, AM, SM), pp. 1269–1272.
- ICPR-2012-HeLL #image
- Single image super-resolution using Gaussian Mixture Model (HH, JL, XL), pp. 1916–1919.
- ICPR-2012-HesseGGE #multi #recognition
- Multi-view facial expression recognition using local appearance features (NH, TG, HG, HKE), pp. 3533–3536.
- ICPR-2012-HsuNWC #component
- Pedestrian tracking in low contrast regions using aggregated background model and Silhouette Components (GSH, HPN, CHW, SLC), pp. 3680–3683.
- ICPR-2012-HuangH #invariant
- Binary invariant cross color descriptor using galaxy sampling (GHH, CRH), pp. 2610–2613.
- ICPR-2012-HuiC #robust #towards
- Towards a robust hand-eye calibration using normal flows (TWH, RC), pp. 2545–2548.
- ICPR-2012-IkemuraF #detection
- Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
- ICPR-2012-Imajo #algorithm #performance
- Fast Gaussian filtering algorithm using splines (KI), pp. 489–492.
- ICPR-2012-InoueSK #representation
- Local intensity compensation using sparse representation (KI, HS, YK), pp. 951–954.
- ICPR-2012-IshidaKKN #generative #recognition
- Road marking recognition for map generation using sparse tensor voting (HI, KK, YK, TN), pp. 1132–1135.
- ICPR-2012-ItohTA #3d #graph #image #sequence
- 3D tracking of soccer players using time-situation graph in monocular image sequence (HI, TT, YA), pp. 2532–2536.
- ICPR-2012-IwamotoHSTXC #image #representation #self
- Super-resolution of MR volumetric images using sparse representation and self-similarity (YI, XHH, SS, KT, WX, YWC), pp. 3758–3761.
- ICPR-2012-KananA #order #pseudo #recognition
- Recognition of facial expressions using locally weighted and adjusted order Pseudo Zernike Moments (HRK, MA), pp. 3419–3422.
- ICPR-2012-KataokaSM #detection
- Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
- ICPR-2012-KawabataK #approach #multi
- Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
- ICPR-2012-KawaiMHIY #identification
- Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
- ICPR-2012-KennardBS #2d #approach #detection #geometry #verification
- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
- ICPR-2012-KrijtheHL #classification
- Improving cross-validation based classifier selection using meta-learning (JHK, TKH, ML), pp. 2873–2876.
- ICPR-2012-KuriharaA #correlation #image
- Motion blur free photometric stereo using correlation image sensor (TK, SA), pp. 1872–1875.
- ICPR-2012-KusumaSLL #recognition #sequence
- Appearance-based object recognition using weighted longest increasing subsequence (GPK, AS, YL, JAL), pp. 3668–3671.
- ICPR-2012-LamSS #image #statistics
- Denoising hyperspectral images using spectral domain statistics (AL, IS, YS), pp. 477–480.
- ICPR-2012-LeeCP #estimation
- Articulated hand configuration and rotation estimation using extended torus manifold embedding (CSL, SYC, SWP), pp. 441–444.
- ICPR-2012-LeeLCY #lightweight #random #representation
- Lightweight Random Ferns using binary representation (SL, SWL, YNC, HSY), pp. 1342–1345.
- ICPR-2012-LinnerS #comparison #normalisation #quality
- Comparison of restoration quality on square and hexagonal grids using normalized convolution (EL, RS), pp. 3046–3049.
- ICPR-2012-LinSCLH #recognition
- Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
- ICPR-2012-LiPMH #classification #email #incremental #learning
- Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
- ICPR-2012-LiST #locality
- Accurate iris localization using contour segments (HL, ZS, TT), pp. 3398–3401.
- ICPR-2012-LiuLS #documentation #image #modelling #probability #visual notation
- Document image matching using probabilistic graphical models (LL, YL, CYS), pp. 637–640.
- ICPR-2012-LiuWZL
- Pan-sharpening using weighted red-black wavelet (QL, YW, ZZ, LL), pp. 1908–1911.
- ICPR-2012-LiuXAR #geometry #recognition
- Hand posture recognition using finger geometric feature (LL, JX, HA, XR), pp. 565–568.
- ICPR-2012-LiVBB #clustering #learning
- Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
- ICPR-2012-LiW #encoding #matrix #recognition
- Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
- ICPR-2012-LiYLKZL #classification #multi
- Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification (KL, JY, ZL, XK, RZ, WL), pp. 170–173.
- ICPR-2012-LuHLC #recognition
- Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
- ICPR-2012-LuLZSCO
- Learning-based deformable registration using weighted mutual information (YL, RL, LZ, YS, CC, SHO), pp. 2626–2629.
- ICPR-2012-LuoKM #3d
- Endoscope 3-D motion tracking using an aggressive particle filtering for boosting electromagnetic guidance endoscopy (XL, TK, KM), pp. 117–120.
- ICPR-2012-MaLXS #detection #image
- Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
- ICPR-2012-MartinezS #monitoring
- Breath rate monitoring during sleep using near-ir imagery and PCA (MM, RS), pp. 3472–3475.
- ICPR-2012-McCloskeyD #detection #metadata #process #video
- Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
- ICPR-2012-MinKCK #approach #detection #higher-order
- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
- ICPR-2012-MoriyamaAS #analysis
- Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
- ICPR-2012-MotlicekSWMM #authentication #mobile #modelling #variability
- Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
- ICPR-2012-MujumdarVK #framework #multi #novel #segmentation
- A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
- ICPR-2012-NaitoKSS
- Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
- ICPR-2012-NakazawaMMNHYY #multi #re-engineering
- Dynamic scene reconstruction using asynchronous multiple Kinects (MN, IM, YM, HN, HH, HY, YY), pp. 469–472.
- ICPR-2012-NarayanR #segmentation
- Motion segmentation using curve fitting on Lagrangian particle trajectories (SN, KRR), pp. 3692–3695.
- ICPR-2012-NegrelPG #categorisation #image
- Using spatial pyramids with compacted VLAT for image categorization (RN, DP, PHG), pp. 2460–2463.
- ICPR-2012-NgC #verification
- Face verification using temporal affective cues (ESN, AYSC), pp. 1249–1252.
- ICPR-2012-NguyenVC #multi #recognition
- Face recognition using Multi-modal Binary Patterns (TPN, NSV, AC), pp. 2343–2346.
- ICPR-2012-NiigakiSM #detection
- Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
- ICPR-2012-NikanA #recognition
- Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
- ICPR-2012-OumerP #3d #estimation #image
- 3D point tracking and pose estimation of a space object using stereo images (NWO, GP), pp. 796–800.
- ICPR-2012-PalenichkaPKL #image #modelling #multi
- Model-based extraction of image area descriptors using a multi-scale attention operator (RMP, MP, YK, AL), pp. 853–856.
- ICPR-2012-PerdigotoA #3d #image #re-engineering
- Reconstruction of 3D lines from a single axial catadioptric image using cross-ratio (LP, HA), pp. 857–860.
- ICPR-2012-PerezMMSV #recognition
- Combining gradient histograms using orientation tensors for human action recognition (EdAP, VFM, LMM, DOS, MBV), pp. 3460–3463.
- ICPR-2012-PhanST #detection #symmetry
- Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
- ICPR-2012-PorwalZG #network #recognition
- Handwritten Arabic text recognition using Deep Belief Networks (UP, YZ, VG), pp. 302–305.
- ICPR-2012-RebagliatiSPS #distance #edit distance #graph #set
- Computing the graph edit distance using dominant sets (NR, ASR, MP, FS), pp. 1080–1083.
- ICPR-2012-ReinbacherRB #game studies #named
- RoμNect: Hand mounted depth sensing using a commodity gaming sensor (CR, MR, HB), pp. 461–464.
- ICPR-2012-RiechertZMK #estimation #hybrid #realtime #recursion
- Real-time disparity estimation using line-wise hybrid recursive matching and cross-bilateral median up-sampling (CR, FZ, MM, PK), pp. 3168–3171.
- ICPR-2012-RodriguesPBPM #image #multi #segmentation #towards
- Towards breast ultrasound image segmentation using multi-resolution pixel descriptors (RR, AMGP, RB, MP, JM), pp. 2833–2836.
- ICPR-2012-RohithK #3d #estimation #modelling
- Augmenting monocular motion estimation using intermittent 3D models from depth sensors (MVR, CK), pp. 473–476.
- ICPR-2012-RoyH #classification #component #detection #documentation #image
- Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
- ICPR-2012-SankaranJ #network #recognition
- Recognition of printed Devanagari text using BLSTM Neural Network (NS, CVJ), pp. 322–325.
- ICPR-2012-SantosPTGPF #classification #image #multi #visual notation #word
- Improving texture description in remote sensing image multi-scale classification tasks by using visual words (JAdS, OABP, RdST, PHG, SPF, AXF), pp. 3090–3093.
- ICPR-2012-SchmeingJ #optimisation
- Faithful Spatio-Temporal disocclusion filling using local optimization (MS, XJ), pp. 3799–3802.
- ICPR-2012-SchuldhausKJESL #classification
- Classification of surfaces and inclinations during outdoor running using shoe-mounted inertial sensors (DS, PK, UJ, BE, HS, ML), pp. 2258–2261.
- ICPR-2012-ShenZ #3d #recognition
- Hyperspectral face recognition using 3D Gabor wavelets (LS, SZ), pp. 1574–1577.
- ICPR-2012-ShibataK #modelling #recognition
- Emotion recognition modeling of sitting postures by using pressure sensors and accelerometers (TS, YK), pp. 1124–1127.
- ICPR-2012-ShinPJB #detection
- Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
- ICPR-2012-SimoesSW #detection #image
- Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
- ICPR-2012-SoranHLS #detection
- Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
- ICPR-2012-SuLT #documentation #framework #image #learning #markov #random
- A learning framework for degraded document image binarization using Markov Random Field (BS, SL, CLT), pp. 3200–3203.
- ICPR-2012-SuYLW #bound #classification #editing
- Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
- ICPR-2012-SvarmSEO #image
- Point track creation in unordered image collections using Gomory-Hu trees (LS, ZS, OE, CO), pp. 2116–2119.
- ICPR-2012-TajimaIA #3d #correlation
- A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
- ICPR-2012-TangS #independence #learning #network #performance #testing
- Efficient and accurate learning of Bayesian networks using chi-squared independence tests (YT, SNS), pp. 2723–2726.
- ICPR-2012-ThanhMNMY #detection #recognition #robust
- Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
- ICPR-2012-TianC12a #image #optimisation
- Depth image up-sampling using ant colony optimization (JT, LC), pp. 3795–3798.
- ICPR-2012-TsuboshitaKFO #adaptation #image
- Image annotation using adapted Gaussian mixture model (YT, NK, MF, MO), pp. 1346–1350.
- ICPR-2012-TsuruKO
- Mixed-reality snapshot system using environmental depth sensors (HT, IK, YO), pp. 97–100.
- ICPR-2012-UddinCKS
- Accurate genomic signal recovery using compressed sensing (BU, MEC, HAK, GS), pp. 3144–3147.
- ICPR-2012-Ugurlu #detection
- Head posture detection using skin and hair information (YU), pp. 1–4.
- ICPR-2012-ValevY #classification #clustering #graph
- Classification using graph partitioning (VV, NY), pp. 1261–1264.
- ICPR-2012-VaradarajanV #semantics #visual notation
- Semantic saliency using k-TR theory of visual perception (KMV, MV), pp. 3676–3679.
- ICPR-2012-VillamizarGSM #learning #online #random
- Online human-assisted learning using Random Ferns (MV, AG, AS, FMN), pp. 2821–2824.
- ICPR-2012-VitaladevuniCPN #detection #documentation #image
- Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
- ICPR-2012-WangCCP #detection #realtime
- Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
- ICPR-2012-WangHWZ #classification #gender
- Facial image-based gender classification using Local Circular Patterns (CW, DH, YW, GZ), pp. 2432–2435.
- ICPR-2012-WangOJBK
- Tracking Tetrahymena pyriformis cells using decision trees (QW, YO, AAJ, KLB, MK), pp. 1843–1847.
- ICPR-2012-WeibelDWR #detection #graph
- Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
- ICPR-2012-WittW #programming
- Sparse stereo by edge-based search using dynamic programming (JW, UW), pp. 3631–3635.
- ICPR-2012-XiaSF #towards #verification #visual notation
- Toward kinship verification using visual attributes (SX, MS, YF), pp. 549–552.
- ICPR-2012-XuanSCS #algorithm
- An Enhanced EM algorithm using maximum entropy distribution as initial condition (GX, YQS, PC, PS), pp. 849–852.
- ICPR-2012-XuGN #image
- Morphological filtering in shape spaces: Applications using tree-based image representations (YX, TG, LN), pp. 485–488.
- ICPR-2012-YagiMM #online #retrieval #robust #similarity
- Robust on-line handwritten object retrieval using a similarity measure based on overlap area of circles (TY, HM, MM), pp. 721–724.
- ICPR-2012-YangZLP #3d #optimisation
- Coupled 3D tracking and pose optimization of rigid objects using particle filter (HY, YZ, XL, IP), pp. 1451–1454.
- ICPR-2012-YlioinasHP #classification
- Age Classification in Unconstrained Conditions Using LBP Variants (JY, AH, MP), pp. 1257–1260.
- ICPR-2012-Yu #locality #video
- Localization and extraction of the four clock-digits using the knowledge of the digital video clock (XY), pp. 1217–1220.
- ICPR-2012-ZarifFR #image #multi #performance #similarity
- Fast and efficient multichannel image completion using local similarity (SZ, IF, DR), pp. 3116–3119.
- ICPR-2012-ZhangFWZJ #image #scalability
- Scalable image co-segmentation using color and covariance features (SZ, WF, LW, JZ, JJ), pp. 3708–3711.
- ICPR-2012-ZhangH #feature model #recognition
- Face recognition using semi-supervised spectral feature selection (ZZ, ERH), pp. 1294–1297.
- ICPR-2012-ZhangH12b #estimation
- Simultaneous reflectance estimation and surface shape recovery using polarisation (LZ, ERH), pp. 1876–1879.
- ICPR-2012-ZhangL #detection
- Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
- ICPR-2012-ZhangLM #composition #multi #recognition
- Multi-subregion face recognition using coarse-to-fine Quad-tree decomposition (CZ, XL, TM), pp. 1004–1007.
- ICPR-2012-ZhangXSS #modelling #process #recognition #representation #smarttech
- Sparse representation for motion primitive-based human activity modeling and recognition using wearable sensors (MZ, WX, AAS, MS), pp. 1807–1810.
- ICPR-2012-ZhuoCQYX #algorithm #classification #image #learning
- Image classification using HTM cortical learning algorithms (WZ, ZC, YQ, ZY, YX), pp. 2452–2455.
- ICPR-2012-ZhuW #gesture #kernel #recognition
- Single-frame hand gesture recognition using color and depth kernel descriptors (XZ, KYKW), pp. 2989–2992.
- ICPR-2012-ZillyRMWSK #multi
- Multi-camera rectification using linearized trifocal tensor (FZ, CR, MM, WW, TS, PK), pp. 2727–2731.
- ICPR-2012-ZouKR #image #segmentation #semantics
- Semantic image segmentation using region bank (WZ, KK, JR), pp. 922–925.
- KDD-2012-BoleyMG #linear
- Linear space direct pattern sampling using coupling from the past (MB, SM, TG), pp. 69–77.
- KDD-2012-CorreaL #clustering #graph
- Locally-scaled spectral clustering using empty region graphs (CDC, PL), pp. 1330–1338.
- KDD-2012-GunnemannFS #clustering #modelling #multi
- Multi-view clustering using mixture models in subspace projections (SG, IF, TS), pp. 132–140.
- KDD-2012-HiraiY #clustering #detection #normalisation
- Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
- KDD-2012-KimLX #image #multi #predict #process #web
- Web image prediction using multivariate point processes (GK, FFL, EPX), pp. 1068–1076.
- KDD-2012-LiLP #coordination #performance
- Fast bregman divergence NMF using taylor expansion and coordinate descent (LL, GL, HP), pp. 307–315.
- KDD-2012-RamG
- Maximum inner-product search using cone trees (PR, AGG), pp. 931–939.
- KDD-2012-YuanZX
- Discovering regions of different functions in a city using human mobility and POIs (JY, YZ, XX), pp. 186–194.
- KDIR-2012-ArbelaitzGLMPP #adaptation #clustering #mining #navigation #profiling
- Adaptation of the User Navigation Scheme using Clustering and Frequent Pattern Mining Techiques for Profiling (OA, IG, AL, JM, JMP, IP), pp. 187–192.
- KDIR-2012-BallEC #named #open source #social
- Undermining — Social Engineering using Open Source Intelligence Gathering (LB, GE, NC), pp. 275–280.
- KDIR-2012-BhattacharjeeBG #data mining #mining #network #optimisation
- Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization (SB, FB, RDG), pp. 319–323.
- KDIR-2012-ChueaphunKMC #nearest neighbour #random #recognition
- Lanna Dharma Printed Character Recognition using k-Nearest Neighbor and Conditional Random Fields (CC, AK, SM, JC), pp. 169–174.
- KDIR-2012-DuarteFD #clustering #constraints
- Evidence Accumulation Clustering using Pairwise Constraints (JMMD, ALNF, FJFD), pp. 293–299.
- KDIR-2012-FormosoFCC #performance #recommendation
- Using Neighborhood Pre-computation to Increase Recommendation Efficiency (VF, DF, FC, VC), pp. 333–335.
- KDIR-2012-IkebeKT #learning #predict #smarttech
- Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
- KDIR-2012-MedinaFRF #semantics #wiki
- Measuring Entity Semantic Relatedness using Wikipedia (LASM, ALNF, RR, JF), pp. 431–437.
- KDIR-2012-Potuzak #algorithm #network #optimisation #search-based
- Issues of Optimization of a Genetic Algorithm for Traffic Network Division using a Genetic Algorithm (TP), pp. 340–343.
- KEOD-2012-AbdelazzizN #ontology #recommendation
- Enhancing the Results of Recommender Systems using Implicit Ontology Relations (LA, KN), pp. 5–14.
- KEOD-2012-DiasMS #enterprise #health #ontology
- Using Enterprise Ontology for Improving the National Health System — Demonstrated in the Case of a Pharmacy and an Emergency Department (DGD, CM, MMdS), pp. 441–451.
- KEOD-2012-GirardiAG #framework #independence #ontology
- An Ontology-based Data Acquisition Infrastructure — Using Ontologies to Create Domain-independent Software Systems (DG, KA, MG), pp. 155–160.
- KEOD-2012-HmidaCBN #3d #logic
- From 9-IM Topological Operators to Qualitative Spatial Relations using 3D Selective Nef Complexes and Logic Rules for Bodies (HBH, CC, FB, CN), pp. 208–213.
- KEOD-2012-KawtrakulMCRPNK #latency #social #social media
- Improving Disaster Responsiveness using a Mix of Social Media and e-Government (AK, IM, HC, SR, KP, MN, VK), pp. 423–426.
- KEOD-2012-KhairMZ #data mining #education #mining #roadmap #student
- Creating an Educational Roadmap for Engineering Students via an Optimal and Iterative Yearly Regression Tree using Data Mining (MK, CEM, WZ), pp. 43–52.
- KEOD-2012-LiangCI #approach #development
- A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
- KEOD-2012-MendesASS
- Using DEMO-based SLAs for Improving City Council Services (CM, MA, NS, MMdS), pp. 431–440.
- KEOD-2012-NogueiraG #programming #set
- Recall-driven Product Tracing and Supply Chain Tracking using Answer Set Programming (MLN, NPG), pp. 125–133.
- KEOD-2012-SchlenoffFB #approach #ontology #recognition
- An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
- KEOD-2012-SuzukiF #overview #segmentation #similarity #word
- Segmentation of Review Texts by using Thesaurus and Corpus-based Word Similarity (YS, FF), pp. 381–384.
- KMIS-2012-Borchardt #information management #social #social media
- Using Social Media for Knowledge Management in SME (UB), pp. 31–39.
- KMIS-2012-HamadaAS #generative #learning
- A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
- KMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #platform #scalability #tool support
- Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
- KMIS-2012-NgocIC #case study #modelling
- Modeling of Indicators using UTL — A Study Case with Hop3x System (DPTN, SI, CC), pp. 269–272.
- KMIS-2012-OtsukiAS
- An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
- KR-2012-ChaudhriS #knowledge base #programming #reasoning #set #specification
- Specifying and Reasoning with Underspecified Knowledge Bases Using Answer Set Programming (VKC, TCS).
- KR-2012-MorettiT #ranking #set
- Ranking Sets of Possibly Interacting Objects Using Shapley Extensions (SM, AT).
- MLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation
- EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
- MLDM-2012-CarvalhoPS #classification #image
- Classification of Breast Tissues in Mammographic Images in Mass and Non-mass Using McIntosh’s Diversity Index and SVM (PMdSC, ACdP, ACS), pp. 482–494.
- MLDM-2012-KalpakisYHMSSS #analysis #permutation #predict
- Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
- MLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining
- A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
- MLDM-2012-Moreira-MatiasMGB #categorisation #classification #matrix
- Text Categorization Using an Ensemble Classifier Based on a Mean Co-association Matrix (LMM, JMM, JG, PB), pp. 525–539.
- MLDM-2012-NascimentoPS #classification #image
- Lung Nodules Classification in CT Images Using Shannon and Simpson Diversity Indices and SVM (LBN, ACdP, ACS), pp. 454–466.
- MLDM-2012-SapkotaBS #grammar inference #principle
- Unsupervised Grammar Inference Using the Minimum Description Length Principle (US, BRB, APS), pp. 141–153.
- MLDM-2012-SinghCS #approach #hybrid #performance #recognition
- A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
- MLDM-2012-TaTB #approach #clustering #data type
- Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
- MLDM-2012-VlaseMI #clustering #metadata
- Improvement of K-means Clustering Using Patents Metadata (MV, DM, AI), pp. 293–305.
- MLDM-2012-XuCG #concept #learning #multi
- Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy (TX, DKYC, IG), pp. 169–182.
- RecSys-2012-BelloginP #clustering #collaboration #graph
- Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
- RecSys-2012-DeDGM #difference #learning
- Local learning of item dissimilarity using content and link structure (AD, MSD, NG, PM), pp. 221–224.
- RecSys-2012-Lathia #health
- Using ratings to profile your health (NL), pp. 303–304.
- RecSys-2012-Ninaus #heuristic #recommendation #requirements
- Using group recommendation heuristics for the prioritization of requirements (GN), pp. 329–332.
- RecSys-2012-PhelanMS #named #realtime #twitter
- Yokie: explorations in curated real-time search & discovery using twitter (OP, KM, BS), pp. 307–308.
- RecSys-2012-YangSGL #network #on the #recommendation #social
- On top-k recommendation using social networks (XY, HS, YG, YL), pp. 67–74.
- SEKE-2012-AlbuquerquePL #approach #case study #experience #natural language #requirements #reuse
- Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
- SEKE-2012-AlvesGBMA #named
- SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
- SEKE-2012-DagninoSR #fault #machine learning
- Forecasting Fault Events in Power Distribution Grids Using Machine Learning (AD, KS, LR), pp. 458–463.
- SEKE-2012-DingS #architecture #collaboration #mobile
- Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
- SEKE-2012-El-SherifFE #concept #learning #multi #network #social
- Using Social Networks for Learning New Concepts in Multi-Agent Systems (SMES, BHF, AE), pp. 261–266.
- SEKE-2012-FarfelederMK #elicitation #locality #requirements #semantics
- Using Semantic Relatedness and Locality for Requirements Elicitation Guidance (SF, TM, AK), pp. 19–24.
- SEKE-2012-FreireCAK #monitoring #process #statistics #workflow
- Software Process Monitoring Using Statistical Process Control Integrated in Workflow Systems (MAF, DAdC, EA, UK), pp. 557–562.
- SEKE-2012-HumayunG #empirical #trust
- An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
- SEKE-2012-JangidPE #analysis #mobile #predict #sentiment
- A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
- SEKE-2012-Lozano-FuentesGBSEWHGT
- Using Cell Phones for Mosquito Vector Surveillance and Control (SLF, SG, JMB, DS, LE, FW, EHG, JGR, DTC), pp. 763–767.
- SEKE-2012-MarchettiG #framework #logic #model transformation
- Model Transformation for Frameworks Using Logical Planning (GAM, ESG), pp. 563–569.
- SEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification
- Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
- SEKE-2012-PittoliSN #monitoring #network
- Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software Projects (FP, ALRdS, DJN), pp. 570–573.
- SEKE-2012-RiveroC #usability #web
- Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
- SEKE-2012-SalamahEO #automaton #consistency #ltl
- Consistency Checks of System Properties Using LTL and Büchi Automata (SS, ME, OO), pp. 39–44.
- SEKE-2012-SalamiA #algorithm #diagrams #framework #retrieval #search-based
- A Framework for Class Diagram Retrieval Using Genetic Algorithm (HOS, MAA), pp. 737–740.
- SEKE-2012-ShinKKJR #configuration management #dependence #impact analysis
- Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
- SEKE-2012-SunLTZ #impact analysis #testing
- Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
- SEKE-2012-VieiraVNC #elicitation #empirical
- Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
- SEKE-2012-ZhuLLCZJ #continuation #difference #logic #verification
- HybridUML Based Verification of CPS Using Differential Dynamic Logic (MZ, BL, JL, QC, XZ, SJ), pp. 235–238.
- SIGIR-2012-BenderskyC #dependence #higher-order #information retrieval #modelling #query
- Modeling higher-order term dependencies in information retrieval using query hypergraphs (MB, WBC), pp. 941–950.
- SIGIR-2012-ChaC #analysis #modelling #topic
- Social-network analysis using topic models (YC, JC), pp. 565–574.
- SIGIR-2012-ChandarC #documentation #novel #retrieval
- Using preference judgments for novel document retrieval (PC, BC), pp. 861–870.
- SIGIR-2012-ChandarC12a #rank
- Using PageRank to infer user preferences (PC, BC), pp. 1167–1168.
- SIGIR-2012-Cummins #modelling #monte carlo #performance #predict #simulation
- Investigating performance predictors using monte carlo simulation and score distribution models (RC), pp. 1097–1098.
- SIGIR-2012-Ghosh #information retrieval
- Improving e-discovery using information retrieval (KG), p. 996.
- SIGIR-2012-HuangWBW #modelling #process
- Improving searcher models using mouse cursor activity (JH, RWW, GB, KW), pp. 195–204.
- SIGIR-2012-HuO #classification #dataset
- Genre classification for million song dataset using confidence-based classifiers combination (YH, MO), pp. 1083–1084.
- SIGIR-2012-Khatiban #mining #trust
- Building reputation and trust using federated search and opinion mining (SK), p. 994.
- SIGIR-2012-Ko #case study #classification
- A study of term weighting schemes using class information for text classification (YK), pp. 1029–1030.
- SIGIR-2012-LieblingBW
- Anticipatory search: using context to initiate search (DJL, PNB, RWW), pp. 1035–1036.
- SIGIR-2012-LiuBC #behaviour #interactive #personalisation
- Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
- SIGIR-2012-MahdabiAKC #automation #concept #predict #query #refinement
- Automatic refinement of patent queries using concept importance predictors (PM, LA, MK, FC), pp. 505–514.
- SIGIR-2012-MarquesL #information retrieval #java #visual notation
- Visual information retrieval using Java and LIRE (OM, ML), p. 1193.
- SIGIR-2012-MinLLSJ #image #multi #platform
- Multi-platform image search using tag enrichment (JM, CL, JL, DS, GJFJ), p. 1018.
- SIGIR-2012-ONeil #ranking #sentiment
- Entity sentiment extraction using text ranking (JO), p. 1024.
- SIGIR-2012-ShuklaLT
- Parallelizing ListNet training using spark (SS, ML, AT), pp. 1127–1128.
- SIGIR-2012-Sun #classification #word
- Short text classification using very few words (AS), pp. 1145–1146.
- SIGIR-2012-TranF #information retrieval #interactive
- Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
- ECMFA-2012-BurtonPRKPS #modelling #problem
- Solving Acquisition Problems Using Model-Driven Engineering (FRB, RFP, LMR, DSK, SMP, SS), pp. 428–443.
- ICMT-2012-SenMTC #model transformation #modelling
- Using Models of Partial Knowledge to Test Model Transformations (SS, JMM, MT, JC), pp. 24–39.
- ICMT-2012-VallecilloG #model transformation #type system
- Typing Model Transformations Using Tracts (AV, MG), pp. 56–71.
- MoDELS-2012-AranegaEM #feature model #model transformation
- Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
- MoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity
- A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
- MoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #verification
- On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
- MoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage
- Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
- PLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards
- Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
- PLEASE-2012-QuintonDHMC #feature model #modelling
- Using feature modelling and automations to select among cloud solutions (CQ, LD, PH, SM, EC), pp. 17–20.
- SPLC-2012-HeiderRGL #impact analysis #modelling #testing #variability
- Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
- OOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management
- Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
- OOPSLA-2012-BocqD #monad #named #network #process #streaming #virtual machine
- Molecule: using monadic and streaming I/O to compose process networks on the JVM (SB, KD), pp. 315–334.
- OOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem
- Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
- OOPSLA-2012-RosuS #logic #reachability
- Checking reachability using matching logic (GR, AS), pp. 555–574.
- OOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation
- Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
- TOOLS-EUROPE-2012-MehnertA #type system #verification
- Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
- TOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language
- Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
- AdaEurope-2012-GregertsenS #execution #hardware #performance
- Improving the Performance of Execution Time Control by Using a Hardware Time Management Unit (KNG, AS), pp. 177–192.
- HILT-2012-BeltCHR #ada #automation #contract #verification
- Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan (JB, PC, JH, R), pp. 3–4.
- HILT-2012-Leino12a #proving #verification #why
- Program proving using intermediate verification languages (IVLs) like boogie and why3 (KRML), pp. 25–26.
- HILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial
- Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
- PADL-2012-BalducciniL #aspect-oriented #tool support
- Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools (MB, YL), pp. 78–92.
- PADL-2012-GillN #logic
- Handshaking in Kansas Lava Using Patch Logic (AG, BN), pp. 212–226.
- PADL-2012-HaveC #performance #program transformation
- Efficient Tabling of Structured Data Using Indexing and Program Transformation (CTH, HC), pp. 93–107.
- PEPM-2012-HirzelG #metaprogramming
- Streams that compose using macros that oblige (MH, BG), pp. 141–150.
- PLDI-2012-DilligDA #abduction #automation #fault
- Automated error diagnosis using abductive inference (ID, TD, AA), pp. 181–192.
- PPDP-2012-SulzmannL #regular expression
- Regular expression sub-matching using partial derivatives (MS, KZML), pp. 79–90.
- QAPL-2012-BelardinelliGL #automation #protocol #quantum #verification
- Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
- SAS-2012-HoweK #analysis #parametricity
- Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
- SAS-2012-SanchezSSC #generative #invariant #self
- Invariant Generation for Parametrized Systems Using Self-reflection — (Extended Version) (AS, SS, CS, BYEC), pp. 146–163.
- RE-2012-BerenbachSN #industrial #modelling #requirements
- The use of a requirements modeling language for industrial applications (BB, FS, HN), pp. 285–290.
- RE-2012-FerrariG #detection
- Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
- RE-2012-Ott #fault #legacy #natural language #specification
- Defects in natural language requirement specifications at Mercedes-Benz: An investigation using a combination of legacy data and expert opinion (DO), pp. 291–296.
- REFSQ-2012-DaramolaMSB #perspective #reasoning #requirements #research #semantics
- Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview (OD, TM, GS, SB), pp. 172–178.
- SAC-PL-J-2009-J-CervelleFLR12 #implementation #parsing
- Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers (JC, RF, GL, GR), pp. 990–1005.
- ASE-2012-AlmorsyGI #analysis #automation
- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
- ASE-2012-AlmorsyGI12a #automation #re-engineering
- Supporting automated software re-engineering using re-aspects (MA, JG, ASI), pp. 230–233.
- ASE-2012-AmalfitanoFTCM #android #automation #testing #user interface
- Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
- ASE-2012-FaunesSB #algorithm #generative #model transformation
- Generating model transformation rules from examples using an evolutionary algorithm (MF, HAS, MB), pp. 250–253.
- ASE-2012-GopinathZK #effectiveness #fault #locality #specification
- Improving the effectiveness of spectra-based fault localization using specifications (DG, RNZ, SK), pp. 40–49.
- ASE-2012-HarmanLJWAC #challenge #programming #search-based #source code
- The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (MH, WBL, YJ, DRW, AA, JAC), pp. 1–14.
- ASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to
- Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
- ASE-2012-KahkonenSH #automation #parallel #source code #testing #thread
- Using unfoldings in automated testing of multithreaded programs (KK, OS, KH), pp. 150–159.
- ASE-2012-LuCC #fault #learning #predict #reduction
- Software defect prediction using semi-supervised learning with dimension reduction (HL, BC, MC), pp. 314–317.
- ASE-2012-Lutz0D #collaboration #mobile #requirements
- Using mobile devices for collaborative requirements engineering (RL, SS, SD), pp. 298–301.
- ASE-2012-NijjarB #bound #smt #verification
- Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
- ASE-2012-RubinC #difference #set
- Locating distinguishing features using diff sets (JR, MC), pp. 242–245.
- FSE-2012-ZaeemK #generative #programming
- Test input generation using dynamic programming (RNZ, SK), p. 34.
- ICSE-2012-AlkhalafBG #analysis #string #validation #verification
- Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
- ICSE-2012-Bavota #refactoring #semantics
- Using structural and semantic information to support software refactoring (GB), pp. 1479–1482.
- ICSE-2012-Chioasca #automation #machine learning #model transformation #requirements
- Using machine learning to enhance automated requirements model transformation (EVC), pp. 1487–1490.
- ICSE-2012-CookHSS #compilation #composition #specification #verification
- Specification engineering and modular verification using a web-integrated verifying compiler (CTC, HKH, HS, MS), pp. 1379–1382.
- ICSE-2012-DevosPDBMA #case study #industrial #performance #reuse #smarttech
- Efficient reuse of domain-specific test knowledge: An industrial case in the smart card domain (ND, CP, JCD, RB, BM, GA), pp. 1123–1132.
- ICSE-2012-Dilshener #concept #information retrieval
- Improving information retrieval-based concept location using contextual relationships (TD), pp. 1499–1502.
- ICSE-2012-Ghardallou #analysis #invariant #termination
- Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
- ICSE-2012-Johnson #case study #question #static analysis #tool support #why
- A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
- ICSE-2012-KimKKJ #approach #case study #industrial #testing
- Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
- ICSE-2012-Mendes #case study #elicitation #estimation #industrial #lessons learnt #web
- Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies (EM), pp. 1112–1121.
- ICSE-2012-NaganoNKAHUF #mining #repository #scalability
- Using the GPGPU for scaling up Mining Software Repositories (RN, HN, YK, BA, KH, NU, AF), pp. 1435–1436.
- ICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial
- Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
- ICSE-2012-SamirniSAMTH #automation #constraints #fault #generative #html #php #string #theorem proving
- Automated repair of HTML generation errors in PHP applications using string constraint solving (HS, MS, SA, TDM, FT, LJH), pp. 277–287.
- ICSE-2012-Shang #developer
- Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
- ICSE-2012-SingerS #re-engineering #social
- Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
- ICSE-2012-SongPF #interactive #named
- iTree: Efficiently discovering high-coverage configurations using interaction trees (CS, AP, JSF), pp. 903–913.
- ICSE-2012-SusB #education #integration #re-engineering
- Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
- ICSE-2012-TreudeGGS #development #interactive #named #visualisation
- WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment (CT, PG, LG, MADS), pp. 1399–1402.
- ICSE-2012-VakilianCNRBJ #automation #refactoring
- Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
- ICSE-2012-Vetro #automation #identification #static analysis #technical debt
- Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
- ICSE-2012-Yu #analysis #identification
- Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
- SAC-2012-AbdullahRTN #performance
- Efficient matching of SPARQL subscriptions using rete (HA, MR, ST, EN), pp. 372–377.
- SAC-2012-BernardiH #contract #modelling
- Modelling session types using contracts (GB, MH), pp. 1941–1946.
- SAC-2012-CarvalhoSG #adaptation #fuzzy #segmentation
- Texture fuzzy segmentation using adaptive affinity functions (BMC, TSS, EG), pp. 51–53.
- SAC-2012-ChenGZG #metric #network #similarity
- Discovering missing links in networks using vertex similarity measures (HHC, LG, X(Z, CLG), pp. 138–143.
- SAC-2012-ChenZD #algorithm #effectiveness #search-based #segmentation
- Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm (ZC, BZ, SD), pp. 54–55.
- SAC-2012-ChhelLGS #biology #multi
- Minimum multiple characterization of biological data using partially defined boolean formulas (FC, FL, AG, FS), pp. 1399–1405.
- SAC-2012-ChoeYYR #algorithm #automation #realtime #scheduling #search-based
- Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm (RC, HY, YY, KRR), pp. 238–243.
- SAC-2012-ChunM #health #integration #semantics #social #web
- Social health data integration using semantic Web (SAC, BM), pp. 392–397.
- SAC-2012-DasguptaK #analysis #precise
- Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
- SAC-2012-DavtyanKMRS #encryption
- Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
- SAC-2012-DayehH #biology #network
- Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
- SAC-2012-DiasDHS #sorting #symmetry
- Sorting genomes using almost-symmetric inversions (ZD, UD, LSH, JCS), pp. 1368–1374.
- SAC-2012-FkiJST #approach #composition #flexibility
- A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
- SAC-2012-FouqueLV #fault
- Using faults for buffer overflow effects (PAF, DL, FV), pp. 1638–1639.
- SAC-2012-HasegawaT #distance #invariant
- Affine invariant shape matching using radon transform and dynamic time warping distance (MH, ST), pp. 777–781.
- SAC-2012-HopRFH #ontology #visualisation
- Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW (WH, SdR, FF, FH), pp. 304–311.
- SAC-2012-JeonC #javascript #jit #reuse
- Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
- SAC-2012-KamieHK #clustering #effectiveness #video #web
- Effective web video clustering using playlist information (MK, TH, HK), pp. 949–956.
- SAC-2012-KangJC #3d #scalability #video
- Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
- SAC-2012-KuttyCN #modelling #recommendation
- A people-to-people recommendation system using tensor space models (SK, LC, RN), pp. 187–192.
- SAC-2012-MaamarFLH #implementation #social #specification #web #web service
- Specifying and implementing social Web services operation using commitments (ZM, NF, ML, SH), pp. 1955–1960.
- SAC-2012-MahdianGTM #smarttech
- Location based routing using smartphones in an infrastructureless environment (AM, HG, ST, SM), pp. 594–599.
- SAC-2012-MajchrzakS #agile #development #testing #web
- Using spring Roo for the test-driven development of Web applications (TAM, AS), pp. 664–671.
- SAC-2012-MaloneG #case study #groovy
- A case study in the use of Groovy and Grails (KM, JG), pp. 1254–1255.
- SAC-2012-MaruhashiTT #identification
- A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
- SAC-2012-MbarekKPA #design #modelling #power management
- Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design (OM, AK, AP, MA), pp. 1580–1587.
- SAC-2012-MenorPB #kernel #predict #probability
- Probabilistic prediction of protein phosphorylation sites using kernel machines (MM, GP, KB), pp. 1393–1398.
- SAC-2012-NagarAB #functional #graph #similarity
- Computing gene functional similarity using combined graphs (AN, HAM, SB), pp. 1381–1386.
- SAC-2012-OliveiraCS #bound #on the
- On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
- SAC-2012-OSullivanWL #design #integer
- Designing data storage tier using Integer Programing (MJO, CGW, DL), pp. 426–433.
- SAC-2012-ParraRMRDS #adaptation #constraints #optimisation #self #variability
- Using constraint-based optimization and variability to support continuous self-adaptation (CAP, DR, SM, RR, LD, LS), pp. 486–491.
- SAC-2012-QiCLHW #collaboration
- Using inferred tag ratings to improve user-based collaborative filtering (QQ, ZC, JL, CH, QW), pp. 2008–2013.
- SAC-2012-RajeDFRR #data access #implementation #ontology
- Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
- SAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
- A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
- SAC-2012-SchluterC #correlation #detection #markov #modelling #predict
- Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
- SAC-2012-SouzaPEMOW #navigation #network
- Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks (JRS, GP, GBE, CCTM, FSO, DFW), pp. 280–285.
- SAC-2012-SwainCNB #analysis #markov #performance
- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
- SAC-2012-WickerPK #classification #composition #matrix #multi
- Multi-label classification using boolean matrix decomposition (JW, BP, SK), pp. 179–186.
- SAC-2012-ZaraketNSJ #architecture #library #parallel #source code
- Portable Parallel Programs using architecture-aware libraries (FAZ, MN, MS, AJ), pp. 1922–1924.
- SLE-2012-AfroozehBBJMMS #gll #grammarware #semiparsing
- Island Grammar-Based Parsing Using GLL and Tom (AA, JCB, MvdB, AJ, MM, PEM, ES), pp. 224–243.
- SLE-2012-Storey #challenge #design #ontology #social
- Addressing Cognitive and Social Challenges in Designing and Using Ontologies in the Biomedical Domain (MADS), pp. 1–3.
- ASPLOS-2012-ClementsKZ #scalability
- Scalable address spaces using RCU balanced trees (ATC, MFK, NZ), pp. 199–210.
- ASPLOS-2012-LeeS #architecture #scheduling
- Region scheduling: efficiently using the cache architectures via page-level affinity (ML, KS), pp. 451–462.
- ASPLOS-2012-LinWLZ #named #power management #smarttech
- Reflex: using low-power processors in smartphones without knowing them (FXL, ZW, RL, LZ), pp. 13–24.
- CASE-2012-Chang #detection #fault #feature model #process
- Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
- CASE-2012-ChowdhuryTWSLG #automation #biology
- Automated indirect transport of biological cells with optical tweezers using planar gripper formations (SC, AT, CW, PS, WL, SKG), pp. 267–272.
- CASE-2012-DinhamF #detection
- Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
- CASE-2012-DotoliFIR #agile #modelling #simulation
- A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
- CASE-2012-FelekisWMRBSN #automation
- Automated stiffness characterization of living tobacco BY2 cells using the Cellular Force Microscope (DF, AW, SM, ALRK, FB, RSS, BJN), pp. 285–290.
- CASE-2012-FrankHEFDV #automation #modelling #realtime #requirements
- Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems (TF, TH, KE, AF, CD, BVH), pp. 851–856.
- CASE-2012-HeZWZ #identification
- Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
- CASE-2012-IsmailDH #higher-order
- Observer-based trajectory tracking for a class of underactuated Lagrangian systems using higher-order sliding modes (RMTRI, TDN, QPH), pp. 1204–1209.
- CASE-2012-JoKOO #feedback
- Contact force control of a robotic hand using F/T sensory feedback with a rigid object (JJ, SKK, YO, SRO), pp. 436–441.
- CASE-2012-JungCKM #detection
- Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
- CASE-2012-KawarazakiY #recognition #speech
- Remote control system of home electrical appliances using speech recognition (NK, TY), pp. 761–764.
- CASE-2012-KimKHHL #framework #platform
- A robot platform for unmanned weeding in a paddy field using sensor fusion (GHK, SCK, YKH, KSH, SGL), pp. 904–907.
- CASE-2012-KimKS #algorithm #detection #recognition
- Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
- CASE-2012-KimKYOO #navigation
- Actionable topological mapping for navigation using nearby objects (JK, JK, SY, YO, SO), pp. 1162–1167.
- CASE-2012-KimYSP #detection #visual notation
- Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
- CASE-2012-KurzDP
- Sampling Decision System in semiconductor manufacturing using Virtual Metrology (DK, CDL, JP), pp. 74–79.
- CASE-2012-LeeB #execution #framework #lifecycle #simulation
- Executable simulation lifecycle management framework using extensible and interoperable simulation language (HL, AB), pp. 237–242.
- CASE-2012-LeeHJKL #matlab #simulation
- Dynamic simulation of radial active magnetic bearing system for high speed rotor using ADAMS and MATLAB co-simulation (KCL, DKH, YHJ, CYK, MCL), pp. 880–885.
- CASE-2012-LiK #automation #automaton #finite #generative #modelling #testing
- Model-based automatic test generation for Simulink/Stateflow using extended finite automaton (ML, RK), pp. 857–862.
- CASE-2012-LuiP #assembly #difference #evolution #flexibility #scheduling
- Scheduling Flexible Assembly Lines using variants of Differential Evolution (WHVL, SGP), pp. 594–599.
- CASE-2012-Ralston #automation
- Automated longwall shearer horizon control using thermal infrared-based seam tracking (JCR), pp. 20–25.
- CASE-2012-RyuOC
- COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
- CASE-2012-ShinPB #2d #3d #estimation
- 6DOF pose estimation using 2D-3D sensor fusion (YDS, JHP, MB), pp. 714–717.
- CASE-2012-TangLY #nondeterminism
- Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
- CASE-2012-WangHDS #agile #analysis #protocol #simulation
- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
- CASE-2012-WuY #estimation #linear #markov #metric
- State estimation for Markovian Jump Linear System using quantized measurements (HW, HY), pp. 527–531.
- CASE-2012-ZhangWZX #fault #memory management
- A dynamic memory model for mechanical fault diagnosis using one-class support vector machine (QZ, JW, JZ, GX), pp. 497–501.
- CASE-2012-ZhaoLKH #data fusion #locality #simulation
- A simulation study of sensor data fusion using UKF for bucket wheel reclaimer localization (SZ, TFL, BK, AH), pp. 1192–1197.
- CGO-2012-ParkCA #graph #modelling #predict
- Using graph-based program characterization for predictive modeling (EP, JC, MAA), pp. 196–206.
- CGO-2012-VankaT #data flow #dependence #performance #profiling
- Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
- DAC-2012-ChangJC #configuration management #optimisation
- Timing ECO optimization using metal-configurable gate-array spare cells (HYC, IHRJ, YWC), pp. 802–807.
- DAC-2012-CropPC #detection #logic #throughput
- Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
- DAC-2012-DonkohLS #adaptation #design #hybrid #predict
- A hybrid and adaptive model for predicting register file and SRAM power using a reference design (ED, AL, ES), pp. 62–67.
- DAC-2012-ForoutanSP #3d #interface #low cost
- Cost-efficient buffer sizing in shared-memory 3D-MPSoCs using wide I/O interfaces (SF, AS, FP), pp. 366–375.
- DAC-2012-HamzehSV #morphism #named
- EPIMap: using epimorphism to map applications on CGRAs (MH, AS, SBKV), pp. 1284–1291.
- DAC-2012-HuangLR #energy #hardware #trade-off
- A methodology for energy-quality tradeoff using imprecise hardware (JH, JL, GR), pp. 504–509.
- DAC-2012-HuLWR #array #hardware
- Hardware realization of BSB recall function using memristor crossbar arrays (MH, HL, QW, GSR), pp. 498–503.
- DAC-2012-JungSB #off the shelf
- Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
- DAC-2012-KumarBKV #analysis #predict #source code
- Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
- DAC-2012-LinMK #logic #satisfiability
- Boolean satisfiability using noise based logic (PCKL, AM, SPK), pp. 1260–1261.
- DAC-2012-MalburgFF #automation #design #hardware #locality #metric
- Automated feature localization for hardware designs using coverage metrics (JM, AF, GF), pp. 941–946.
- DAC-2012-MeirR #analysis #biology #named #network #performance
- BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
- DAC-2012-MorrisBZP #logic #named
- mLogic: ultra-low voltage non-volatile logic circuits using STT-MTJ devices (DM, DB, JG(Z, LTP), pp. 486–491.
- DAC-2012-ParkGMRR #architecture #design #energy #performance
- Future cache design using STT MRAMs for improved energy efficiency: devices, circuits and architecture (SPP, SKG, NNM, AR, KR), pp. 492–497.
- DAC-2012-SasanianWM #quantum
- Realizing reversible circuits using a new class of quantum gates (ZS, RW, DMM), pp. 36–41.
- DAC-2012-Suto #design
- Rule agnostic routing by using design fabrics (GS), pp. 471–475.
- DAC-2012-YuCSJC #design #detection
- Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
- DAC-2012-ZhangTT #identification
- Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
- DATE-2012-0002EGB #performance
- Area efficient asynchronous SDM routers using 2-stage Clos switches (WS, DAE, JDG, WJB), pp. 1495–1500.
- DATE-2012-AridhiZT #order #reduction #simulation #towards
- Towards improving simulation of analog circuits using model order reduction (HA, MHZ, ST), pp. 1337–1342.
- DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security
- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
- DATE-2012-ChatziparaskevasBP #difference #finite #parallel
- An FPGA-based parallel processor for Black-Scholes option pricing using finite differences schemes (GC, AB, IP), pp. 709–714.
- DATE-2012-CordesM #algorithm #parallel #search-based
- Multi-objective aware extraction of task-level parallelism using genetic algorithms (DC, PM), pp. 394–399.
- DATE-2012-Gamatie #design #streaming
- Design of streaming applications on MPSoCs using abstract clocks (AG), pp. 763–768.
- DATE-2012-KatzRZ #csp #generative
- Generating instruction streams using abstract CSP (YK, MR, AZ), pp. 15–20.
- DATE-2012-LeMKV #debugging #satisfiability
- Non-solution implications using reverse domination in a modern SAT-based debugging environment (BL, HM, BK, AGV), pp. 629–634.
- DATE-2012-MarianiSPZSB #architecture #configuration management #design #multi #resource management #runtime
- Using multi-objective design space exploration to enable run-time resource management for reconfigurable architectures (GM, VMS, GP, VZ, CS, KB), pp. 1379–1384.
- DATE-2012-MaricauJG #analysis #learning #multi #reliability
- Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
- DATE-2012-MarinMLB #design #incremental #verification
- Verification of partial designs using incremental QBF solving (PM, CM, MDTL, BB), pp. 623–628.
- DATE-2012-MillerVG #automation #cyber-physical #mockup #named #testing
- MEDS: Mockup Electronic Data Sheets for automated testing of cyber-physical systems using digital mockups (BM, FV, TG), pp. 1417–1420.
- DATE-2012-NarayananDZT #design #verification
- Verifying jitter in an analog and mixed signal design using dynamic time warping (RN, AD, MHZ, ST), pp. 1413–1416.
- DATE-2012-QianTT #configuration management #self
- A flit-level speedup scheme for network-on-chips using self-reconfigurable bi-directional channels (ZQ, YFT, CYT), pp. 1295–1300.
- DATE-2012-RoxEG #analysis #design #network
- Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
- DATE-2012-SabrySA #3d
- Thermal balancing of liquid-cooled 3D-MPSoCs using channel modulation (MMS, AS, DA), pp. 599–604.
- DATE-2012-ShahRK #bound #scheduling
- Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
- DATE-2012-ShoaibJV
- Enabling advanced inference on sensor nodes through direct use of compressively-sensed signals (MS, NKJ, NV), pp. 437–442.
- DATE-2012-StattelmannGCBR #hybrid #modelling #simulation
- Hybrid source-level simulation of data caches using abstract cache models (SS, GG, CC, OB, WR), pp. 376–381.
- DATE-2012-WilleDOO #automation #design #power management #synthesis
- Automatic design of low-power encoders using reversible circuit synthesis (RW, RD, CO, AGO), pp. 1036–1041.
- HPCA-2012-BalakrishnanS #behaviour #named #probability
- WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
- HPCA-2012-BattleHHR #flexibility
- Flexible register management using reference counting (SJB, ADH, MH, AR), pp. 273–284.
- HPDC-2012-DelamareFKL #distributed #named
- SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures (SD, GF, DK, OL), pp. 173–186.
- HPDC-2012-LeeWF #distributed #named #resource management
- PonD: dynamic creation of HTC pool on demand using a decentralized resource discovery system (KL, DW, RJOF), pp. 161–172.
- ISMM-2012-OCallahan #memory management #question #web #why
- Why is your web browser using so much memory? (RO), pp. 1–2.
- LCTES-2012-KhudiaWM #embedded #fault #performance
- Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
- LCTES-2012-KyleBFLT #embedded #manycore #set #simulation
- Efficiently parallelizing instruction set simulation of embedded multi-core processors using region-based just-in-time dynamic binary translation (SCK, IB, BF, HL, NPT), pp. 21–30.
- OSDI-2012-KotlaRRSW #data access #hardware #named
- Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
- PDP-2012-GrutzLFVHDK #parallel
- Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL (RG, BL, NKF, FV, AH, FD, DK), pp. 596–602.
- PDP-2012-HernandezGCGIS #estimation
- Accelerating Fibre Orientation Estimation from Diffusion Weighted Magnetic Resonance Imaging Using GPUs (MH, GDG, JMC, JMG, AI, SNS), pp. 622–626.
- PPoPP-2012-TaoBB #development #gpu #kernel #scalability
- Using GPU’s to accelerate stencil-based computation kernels for the development of large scale scientific applications on heterogeneous systems (JT, MB, SRB), pp. 287–288.
- FASE-2012-SalayFC #independence #modelling #refinement
- Language Independent Refinement Using Partial Modeling (RS, MF, MC), pp. 224–239.
- FASE-2012-ShiCD #composition #execution #integration #product line #symbolic computation #testing
- Integration Testing of Software Product Lines Using Compositional Symbolic Execution (JS, MBC, MBD), pp. 270–284.
- FASE-2012-UsaolaML #reduction #testing
- Reduction of Test Suites Using Mutation (MPU, PRM, BPL), pp. 425–438.
- FoSSaCS-2012-PreugschatW #automaton #effectiveness #logic
- Effective Characterizations of Simple Fragments of Temporal Logic Using Prophetic Automata (SP, TW), pp. 135–149.
- STOC-2012-AbrahamN
- Using petal-decompositions to build a low stretch spanning tree (IA, ON), pp. 395–406.
- STOC-2012-KelnerMP #approximate #multi #performance
- Faster approximate multicommodity flow using quadratically coupled flows (JAK, GLM, RP), pp. 1–18.
- TACAS-2012-FehnkerGHMPT #analysis #automation
- Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
- TACAS-2012-HolzerKSTV #contest #proving #reachability
- Proving Reachability Using FShell — (Competition Contribution) (AH, DK, CS, MT, HV), pp. 538–541.
- TACAS-2012-LangM #equation #lts #model checking #network
- Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems (FL, RM), pp. 141–156.
- TACAS-2012-ZaeemGKM #data type #satisfiability
- History-Aware Data Structure Repair Using SAT (RNZ, DG, SK, KSM), pp. 2–17.
- WRLA-2012-Riesco #maude #specification
- Using Narrowing to Test Maude Specifications (AR), pp. 201–220.
- CAV-2012-EsparzaGK #probability #proving #source code #termination
- Proving Termination of Probabilistic Programs Using Patterns (JE, AG, SK), pp. 123–138.
- CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime
- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
- ICLP-2012-SchandaB #development #programming #set
- Using Answer Set Programming in the Development of Verified Software (FS, MB), pp. 72–85.
- ICLP-2012-ZomboriCS #constraints #logic programming #static typing #type inference
- Static Type Inference for the Q language using Constraint Logic Programming (ZZ, JC, PS), pp. 119–129.
- ICLP-J-2012-AreiasR #concurrent #multi #thread #towards
- Towards multi-threaded local tabling using a common table space (MA, RR), pp. 427–443.
- ICLP-J-2012-BliemMW #declarative #named #problem #programming
- D-FLAT: Declarative problem solving using tree decompositions and answer-set programming (BB, MM, SW), pp. 445–464.
- ICST-2012-AlesioGNB #constraints #optimisation #realtime #testing
- Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
- ICST-2012-BorjessonF #automation #case study #comparative #industrial #testing #tool support #user interface #visual notation
- Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry (EB, RF), pp. 350–359.
- ICST-2012-DucheneGRR #detection #fuzzing #model inference
- XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
- ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- ICST-2012-EnderlinDGB #grammarware #php #testing
- Grammar-Based Testing Using Realistic Domains in PHP (IE, FD, AG, FB), pp. 509–518.
- ICST-2012-GotliebHB #constraints #programming
- Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
- ICST-2012-GrooteOW #formal method
- Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
- ICST-2012-JonssonBSE #automation #scalability #towards
- Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
- ICST-2012-LiuNT #bound #case study #smt #verification
- Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
- ICST-2012-MalikK #analysis #graph
- Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
- ICST-2012-MalzJG #fuzzy #logic #testing
- Prioritization of Test Cases Using Software Agents and Fuzzy Logic (CM, NJ, PG), pp. 483–486.
- ICST-2012-McMinnSS #data type #generative #query #search-based #string #web
- Search-Based Test Input Generation for String Data Types Using the Results of Web Queries (PM, MS, MS), pp. 141–150.
- ICST-2012-Nguyen #comprehension #detection #performance #scalability
- Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
- ICST-2012-PapadakisT #fault
- Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
- ICST-2012-RaposD #execution #generative #incremental #modelling #symbolic computation #testing #uml
- Incremental Test Case Generation for UML-RT Models Using Symbolic Execution (EJR, JD), pp. 962–963.
- ICST-2012-ShakyaXLLKK #classification #combinator #testing
- Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (KS, TX, NL, YL, RK, DRK), pp. 620–623.
- ICST-2012-WehbiOB #monitoring #security
- Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
- ICST-2012-Wotawa #challenge #constraints #fault #open science #research #source code
- Open Research Challenges of Localizing Faults in Programs Using Constraints (FW), pp. 770–771.
- ICTSS-2012-LahamiKBJ #adaptation #architecture #design #distributed #problem
- Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems (ML, MK, MB, MJ), pp. 103–118.
- ICTSS-2012-TaylorHBD #behaviour #testing
- Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
- IJCAR-2012-JacquelBDD #automation #deduction #modulo theories #proving #theorem proving #verification
- Tableaux Modulo Theories Using Superdeduction — An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover (MJ, KB, DD, CD), pp. 332–338.
- ISSTA-2012-SuiYX #analysis #detection #memory management
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- LICS-2012-GrigorieffV #algorithm #bound
- Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
- SAT-2012-TanjoTB #csp #encoding #named #order #satisfiability
- Azucar: A SAT-Based CSP Solver Using Compact Order Encoding — (TT, NT, MB), pp. 456–462.
- TAP-2012-BengoleaAMF #bound #test coverage #testing
- Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
- TAP-2012-SenniF #constraints #data type #generative #logic programming #testing
- Generation of Test Data Structures Using Constraint Logic Programming (VS, FF), pp. 115–131.
- CBSE-2011-TambeG #component #distributed #embedded #realtime
- Rectifying orphan components using group-failover in distributed real-time and embedded systems (ST, ASG), pp. 139–148.
- ECSA-2011-BruckmannGP #architecture #enterprise #monitoring #realtime #towards
- Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers (TB, VG, MP), pp. 287–294.
- ECSA-2011-NavarroCPR #architecture #model transformation
- Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
- ECSA-2011-SilvaB #architecture #specification
- A Model for Specifying Rationale Using an Architecture Description Language (LdS, DB), pp. 319–327.
- ECSA-2011-TibermacineZ #evolution #quality #requirements #web #web service
- Supervising the Evolution of Web Service Orchestrations Using Quality Requirements (CT, TZ), pp. 1–16.
- WICSA-2011-TsakirisKM #case study #evaluation #hybrid #industrial #plugin #quality
- Evaluation of the Use of Quality Attribute Scenarios in a Plug-In Hybrid Electric Vehicle Controls System — Industrial Case Study (AT, JK, RM), pp. 66–72.
- WICSA-2011-Woods #architecture #assessment #industrial
- Industrial Architectural Assessment Using TARA (EW), pp. 56–65.
- DocEng-2011-RossiR #representation #topic
- Building a topic hierarchy using the bag-of-related-words representation (RGR, SOR), pp. 195–204.
- DRR-2011-BallS #automation #statistics #tool support
- Statistical characterization of handwriting characteristics using automated tools (GRB, SNS), pp. 1–10.
- DRR-2011-BukhariSB #algorithm #documentation #image #multi #segmentation
- Improved document image segmentation algorithm using multiresolution morphology (SSB, FS, TMB), pp. 1–10.
- DRR-2011-ChenCL #constraints #identification
- Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
- DRR-2011-CutterBSB #identification
- Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
- DRR-2011-HamdaniAHMA #optimisation #recognition
- Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization (MH, HEA, TMH, VM, AMA), pp. 1–10.
- DRR-2011-KimLT #automation #identification
- Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
- DRR-2011-KunduHBCFJM #online #recognition #tablet
- Online medical symbol recognition using a Tablet PC (AK, QH, SB, CC, RF, SJ, SM), pp. 1–10.
- DRR-2011-LiuZ #image #mobile
- Segmenting texts from outdoor images taken by mobile phones using color features (ZL, HZ), pp. 1–10.
- DRR-2011-PengSGS #approach #documentation
- Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
- DRR-2011-SaabniE #distance #documentation #word
- Word spotting for handwritten documents using Chamfer Distance and Dynamic Time Warping (RS, JES), pp. 1–10.
- HT-2011-Contractor #multi #network #web
- From disasters to WOW: using web science to understand and enable 21st century multidimensional networks (NSC), pp. 1–2.
- HT-2011-GoedeMNW #network #social #summary
- Succinct summaries of narrative events using social networks (BdG, MM, AN, JvW), pp. 299–304.
- HT-2011-SahW #automation #fuzzy #metadata #mining
- Automatic mining of cognitive metadata using fuzzy inference (MS, VW), pp. 37–46.
- HT-2011-SeroussiBZ #modelling #personalisation #predict #rating
- Personalised rating prediction for new users using latent factor models (YS, FB, IZ), pp. 47–56.
- HT-2011-SolisA #experience #hypermedia #wiki
- An experience using a spatial hypertext Wiki (CS, NA), pp. 133–142.
- HT-2011-TakahashiOYIOT #analysis #wiki
- Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
- ICDAR-2011-AbediF #analysis #documentation #image #locality #string
- Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
- ICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition
- Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
- ICDAR-2011-AtanasiuLV #novel #retrieval
- Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
- ICDAR-2011-BaechlerI #analysis #layout #multi
- Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
- ICDAR-2011-BarbozaLP #automation #documentation #summary
- Using Readers’ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization (RdSB, RDL, VMdSP), pp. 212–216.
- ICDAR-2011-BuiVPO #identification #recognition #word
- Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
- ICDAR-2011-BukhariSB #set
- Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters (SSB, FS, TMB), pp. 579–583.
- ICDAR-2011-CaoPN11a #identification #markov #modelling #recognition
- Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
- ICDAR-2011-CelikY #2d #graph grammar #probability #recognition
- Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar (MC, BAY), pp. 161–166.
- ICDAR-2011-ColuttoG #difference #performance #recognition #word
- Efficient Word Recognition Using a Pixel-Based Dissimilarity Measure (SC, BG), pp. 1110–1114.
- ICDAR-2011-CoustatyBBL #algorithm #image #ontology #semantic gap
- Using Ontologies to Reduce the Semantic Gap between Historians and Image Processing Algorithms (MC, AB, KB, GL), pp. 156–160.
- ICDAR-2011-CoustatyO #documentation #image
- Discrimination of Old Document Images Using Their Style (MC, JMO), pp. 389–393.
- ICDAR-2011-DuHSS
- Snap and Translate Using Windows Phone (JD, QH, LS, JS), pp. 809–813.
- ICDAR-2011-EmilieBA #constraints #network #physics #recognition #semantics
- Use of Semantic and Physical Constraints in Bayesian Networks for Form Recognition (EP, YB, AB), pp. 946–950.
- ICDAR-2011-Epshtein #documentation
- Determining Document Skew Using Inter-line Spaces (BE), pp. 27–31.
- ICDAR-2011-GarzSD #analysis #layout
- Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
- ICDAR-2011-HaddadHKA #adaptation #network #online #recognition
- Improvement of On-line Recognition Systems Using a RBF-Neural Network Based Writer Adaptation Module (LH, TMH, MK, AMA), pp. 284–288.
- ICDAR-2011-HamamuraINOS #clustering #concurrent #optimisation #recognition #word
- Concurrent Optimization of Context Clustering and GMM for Offline Handwritten Word Recognition Using HMM (TH, BI, TN, NO, SS), pp. 523–527.
- ICDAR-2011-HassanCG #distance #documentation #edit distance #image
- Document Image Indexing Using Edit Distance Based Hashing (EH, SC, MG), pp. 1200–1204.
- ICDAR-2011-HuangYCL #documentation #keyword #statistics
- Keyword Spotting in Offline Chinese Handwritten Documents Using a Statistical Model (LH, FY, QHC, CLL), pp. 78–82.
- ICDAR-2011-HuZ #online #recognition
- HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature (LH, RZ), pp. 457–462.
- ICDAR-2011-IndermuhleFFB #documentation #keyword #network #online
- Keyword Spotting in Online Handwritten Documents Containing Text and Non-text Using BLSTM Neural Networks (EI, VF, AF, HB), pp. 73–77.
- ICDAR-2011-IwamuraKK #image #multi #recognition
- Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features (MI, TK, KK), pp. 1409–1413.
- ICDAR-2011-JainD #identification
- Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
- ICDAR-2011-JiangDLW #algorithm #markov #novel #segmentation #string
- A Novel Short Merged Off-line Handwritten Chinese Character String Segmentation Algorithm Using Hidden Markov Model (ZJ, XD, CL, YW), pp. 668–672.
- ICDAR-2011-KatoDTIM #recognition
- Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
- ICDAR-2011-KimO #documentation #image #segmentation
- Script-Free Text Line Segmentation Using Interline Space Model for Printed Document Images (MK, ISO), pp. 1354–1358.
- ICDAR-2011-KleberDS #estimation
- Scale Space Binarization Using Edge Information Weighted by a Foreground Estimation (FK, MD, RS), pp. 1180–1184.
- ICDAR-2011-KluznerT
- Page Curling Correction for Scanned Books Using Local Distortion Information (VK, AT), pp. 890–894.
- ICDAR-2011-KonyaES
- Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting (IVK, SE, CS), pp. 936–940.
- ICDAR-2011-KumarD #image #performance
- Fast Rule-Line Removal Using Integral Images and Support Vector Machines (JK, DSD), pp. 584–588.
- ICDAR-2011-KumarPD #classification #documentation #image #learning #multi
- Document Image Classification and Labeling Using Multiple Instance Learning (JK, JP, DSD), pp. 1059–1063.
- ICDAR-2011-KunwarR #geometry #online #recognition
- Online Handwriting Recognition of Tamil Script Using Fractal Geometry (RK, AGR), pp. 1389–1393.
- ICDAR-2011-LeBS #documentation #image
- Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators (THNL, TDB, CYS), pp. 114–118.
- ICDAR-2011-LiuLS #graph #image #retrieval
- Retrieval of Envelope Images Using Graph Matching (LL, YL, CYS), pp. 99–103.
- ICDAR-2011-MandalRP #documentation #random #segmentation
- Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
- ICDAR-2011-MarinaiMS11a #distance #retrieval
- Using Earth Mover’s Distance in the Bag-of-Visual-Words Model for Mathematical Symbol Retrieval (SM, BM, GS), pp. 1309–1313.
- ICDAR-2011-NeumannM #image #locality
- Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search (LN, JM), pp. 687–691.
- ICDAR-2011-PanZSN #invariant
- Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
- ICDAR-2011-PengCPN #random #video
- Text Extraction from Video Using Conditional Random Fields (XP, HC, RP, PN), pp. 1029–1033.
- ICDAR-2011-PinsonB #component
- Connected Component Level Discrimination of Handwritten and Machine-Printed Text Using Eigenfaces (SJP, WAB), pp. 1394–1398.
- ICDAR-2011-RahnemoonfarA #documentation #image
- Restoration of Arbitrarily Warped Historical Document Images Using Flow Lines (MR, AA), pp. 905–909.
- ICDAR-2011-RoyRR #documentation #retrieval #word
- Word Retrieval in Historical Document Using Character-Primitives (PPR, JYR, NR), pp. 678–682.
- ICDAR-2011-SaabniE #independence
- Language-Independent Text Lines Extraction Using Seam Carving (RS, JES), pp. 563–568.
- ICDAR-2011-SaldarriagaC #network #online #word
- Indexing On-line Handwritten Texts Using Word Confusion Networks (SPS, MC), pp. 197–201.
- ICDAR-2011-SituLT #image #locality #probability #web
- Text Localization in Web Images Using Probabilistic Candidate Selection Model (LS, RL, CLT), pp. 1359–1363.
- ICDAR-2011-SunK #retrieval #visual notation
- Similar Manga Retrieval Using Visual Vocabulary Based on Regions of Interest (WS, KK), pp. 1075–1079.
- ICDAR-2011-TaoLJG #learning #locality #recognition
- Similar Handwritten Chinese Character Recognition Using Discriminative Locality Alignment Manifold Learning (DT, LL, LJ, YG), pp. 1012–1016.
- ICDAR-2011-VincentNP #algorithm #documentation
- Document Recto-verso Registration Using a Dynamic Time Warping Algorithm (VR, NJ, JPD), pp. 1230–1234.
- ICDAR-2011-WakaharaK #clustering #image #string
- Binarization of Color Character Strings in Scene Images Using K-Means Clustering and Support Vector Machines (TW, KK), pp. 274–278.
- ICDAR-2011-WangWZ #graph #online #verification
- On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
- ICDAR-2011-XiaWL #clustering #keyword #knowledge-based
- Chinese Keyword Spotting Using Knowledge-Based Clustering (YX, KW, ML), pp. 789–793.
- ICDAR-2011-XuYWL #analysis
- Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
- ICDAR-2011-YouADGT #detection
- Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
- ICDAR-2011-ZanibbiY #documentation #image #query
- Math Spotting: Retrieving Math in Technical Documents Using Handwritten Query Images (RZ, LY), pp. 446–451.
- ICDAR-2011-ZhangLYDW #random #recognition
- An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
- ICDAR-2011-ZhouYWWNL #random
- Transcript Mapping for Handwritten Text Lines Using Conditional Random Fields (XDZ, FY, DHW, QFW, MN, CLL), pp. 58–62.
- ICDAR-2011-ZhuN #online #optimisation #parametricity #recognition
- On-line Handwritten Japanese Characters Recognition Using a MRF Model with Parameter Optimization by CRF (BZ, MN), pp. 603–607.
- ICDAR-2011-ZhuN11b #online #recognition
- Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
- JCDL-2011-FreireJ
- Using national bibliographies for rights clearance (NF, AJ), pp. 167–174.
- JCDL-2011-GippMB #comparative #detection #evaluation
- Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag (BG, NM, JB), pp. 255–258.
- JCDL-2011-KawaseH #classification #folksonomy
- Classification of user interest patterns using a virtual folksonomy (RK, EH), pp. 105–108.
- JCDL-2011-KleinWN #web
- Rediscovering missing web pages using link neighborhood lexical signatures (MK, JW, MLN), pp. 137–140.
- JCDL-2011-LiZYWWW #gpu #recommendation #social
- A social network-aware top-N recommender system using GPU (RL, YZ, HY, XW, JW, BW), pp. 287–296.
- JCDL-2011-MarshallS #reuse #visual notation
- The ownership and reuse of visual media (CCM, FMSI), pp. 157–166.
- JCDL-2011-MartinHRF
- Indexing musical pieces using their major repetition (BM, PH, MR, PF), pp. 153–156.
- JCDL-2011-MurthyLHFPDT #identification
- Use of subimages in fish species identification: a qualitative study (UM, LTL, EH, EAF, MAPQ, LMLD, RdST), pp. 185–194.
- JCDL-2011-SaadG #case study #web
- Archiving the web using page changes patterns: a case study (MBS, SG), pp. 113–122.
- JCDL-2011-SanchezCRNLB #collaboration #library #network #visualisation
- Visualizing collaboration networks implicit in digital libraries using OntoStarFish (JAS, OC, AR, MAMN, JCL, EB), pp. 213–222.
- JCDL-2011-SchererBS #multi #repository #research #retrieval
- Retrieval and exploratory search in multivariate research data repositories using regressional features (MS, JB, TS), pp. 363–372.
- PODS-2011-CohenK
- Get the most out of your sample: optimal unbiased estimators using partial information (EC, HK), pp. 13–24.
- SIGMOD-2011-ArasuKL #constraints #declarative #generative
- Data generation using declarative constraints (AA, RK, JL), pp. 685–696.
- SIGMOD-2011-DoZPDNH
- Turbocharging DBMS buffer pool using SSDs (JD, DZ, JMP, DJD, JFN, AH), pp. 1113–1124.
- SIGMOD-2011-KohlerYZ #parallel #performance
- Efficient parallel skyline processing using hyperplane projections (HK, JY, XZ), pp. 85–96.
- SIGMOD-2011-LiMDMS #framework #pipes and filters #platform #scalability
- A platform for scalable one-pass analytics using MapReduce (BL, EM, YD, AM, PJS), pp. 985–996.
- SIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence
- E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
- SIGMOD-2011-OkcanR #pipes and filters
- Processing theta-joins using MapReduce (AO, MR), pp. 949–960.
- TPDL-2011-BronHR #documentation
- Linking Archives Using Document Enrichment and Term Selection (MB, BH, MdR), pp. 360–371.
- TPDL-2011-CeccarelliGLNT #experience #query
- Improving Europeana Search Experience Using Query Logs (DC, SG, CL, FMN, GT), pp. 384–395.
- TPDL-2011-KnothRZ #mining #repository #semantics
- Connecting Repositories in the Open Access Domain Using Text Mining and Semantic Data (PK, VR, ZZ), pp. 483–487.
- TPDL-2011-SaadPG #crawling #navigation #web
- Coherence-Oriented Crawling and Navigation Using Patterns for Web Archives (MBS, ZP, SG), pp. 421–433.
- TPDL-2011-SmithOG #capacity #case study #named
- CloudCAP: A Case Study in Capacity Planning Using the Cloud (JAS, JFO, JRG), pp. 110–117.
- VLDB-2011-AliCFWDR #online #visualisation
- Online Visualization of Geospatial Stream Data using the WorldWide Telescope (MHA, BC, JF, CW, SMD, BSR), pp. 1379–1382.
- VLDB-2011-AoZWSWLLL #algorithm #parallel #performance
- Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units (NA, FZ, DW, DSS, GW, XL, JL, SL), pp. 470–481.
- VLDB-2011-ArasuKL #constraints #declarative #generative #named
- DataSynth: Generating Synthetic Data using Declarative Constraints (AA, RK, JL), pp. 1418–1421.
- VLDB-2011-DasNAA #database #lightweight #migration #named
- Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration (SD, SN, DA, AEA), pp. 494–505.
- VLDB-2011-KimRA #algebra #pipes and filters
- From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra (HK, PR, KA), pp. 1426–1429.
- VLDB-2011-KocR #classification #incremental #maintenance
- Incrementally maintaining classification using an RDBMS (MLK, CR), pp. 302–313.
- VLDB-2011-LeeNS #estimation #locality #similarity
- Similarity Join Size Estimation using Locality Sensitive Hashing (HL, RTN, KS), pp. 338–349.
- VLDB-2011-NiuRDS #logic #markov #named #network #scalability #statistics
- Tuffy: Scaling up Statistical Inference in Markov Logic Networks using an RDBMS (FN, CR, AD, JWS), pp. 373–384.
- VLDB-2011-RaoST #consistency #scalability
- Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore (JR, EJS, ST), pp. 243–254.
- VLDB-2012-KruegerKGSSCPDZ11 #database #manycore #performance
- Fast Updates on Read-Optimized Databases Using Multi-Core CPUs (JK, CK, MG, NS, DS, JC, HP, PD, AZ), pp. 61–72.
- VLDB-2012-KumarR11 #probability
- Probabilistic Management of OCR Data using an RDBMS (AK, CR), pp. 322–333.
- VLDB-2012-RuttenbergS11 #distance
- Indexing the Earth Mover’s Distance Using Normal Distributions (BER, AKS), pp. 205–216.
- CSEET-2011-BollinHM #education #project management #simulation
- Teaching software project management using simulations (AB, EH, RTM), pp. 81–90.
- CSEET-2011-LethbridgeMFB #education #programming #uml
- Teaching UML using umple: Applying model-oriented programming in the classroom (TCL, GM, AF, OBB), pp. 421–428.
- CSEET-2011-LongstreetC #education #game studies #re-engineering #student
- Using games in software engineering education to increase student success and retention (CSL, KMLC), p. 554.
- CSEET-2011-LuLL #analysis
- Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
- CSEET-2011-OffuttLAX #abstraction #design #education #web
- Using abstraction and Web applications to teach criteria-based test design (JO, NL, PA, WX), pp. 227–236.
- CSEET-2011-RadermacherW #empirical #interactive #programming #student
- Investigating student-instructor interactions when using pair programming: An empirical study (AR, GSW), pp. 41–50.
- CSEET-2011-RoshandelGL #education #re-engineering
- Using community-based projects in software engineering education (RR, JG, RL), pp. 472–476.
- CSEET-2011-Scharff #agile #assurance #development #quality
- Guiding global software development projects using Scrum and Agile with quality assurance (CS), pp. 274–283.
- ITiCSE-2011-BackCMM #case study #modelling #student
- A study in engaging female students in computer science using role models (JB, PC, CM, PWM), pp. 63–67.
- ITiCSE-2011-GuimaraesSA #education #game studies #security #video
- Using video games to teach security (MAMG, HES, RA), p. 346.
- ITiCSE-2011-Harms #api #implementation #java
- A Java implementation of the myro API for using personal robots in CS1 (DEH), p. 338.
- ITiCSE-2011-HarrachA #collaboration #learning #optimisation #process #recommendation
- Optimizing collaborative learning processes by using recommendation systems (SH, MA), p. 389.
- ITiCSE-2011-KleinKT #analysis #assessment #automation #semantics
- Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
- ITiCSE-2011-LangeFL
- An update on the use of community-based non-profit organizations in capstone projects (DKL, RCF, PML), p. 372.
- ITiCSE-2011-Law #development #documentation #student
- Using student blogs for documentation in software development projects (RL), p. 366.
- ITiCSE-2011-MarkhamB #bound #twitter
- Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
- ITiCSE-2011-MesserK #problem #process
- The use of mediating artifacts in embedding problem solving processes in an e-learning environment (OMM, AK), p. 390.
- ITiCSE-2011-StrieweG11a #automation #programming #runtime
- Using run time traces in automated programming tutoring (MS, MG), pp. 303–307.
- ITiCSE-2011-VilnerZT #education #inheritance
- Using greenfoot in teaching inheritance in CS1 (TV, EZ, ST), p. 342.
- ITiCSE-2011-WittmannBK #programming
- Using the SCORE software package to analyse novice computer graphics programming (MRAW, MB, MKT), pp. 118–122.
- SIGITE-2011-Li #concept #framework #open source
- Introducing virtualization management concepts using open source cloud infrastructure managers (PL), pp. 309–310.
- SIGITE-2011-SettleWS #design #evaluation #game studies #student
- Engaging game design students using peer evaluation (AS, CW, CS), pp. 73–78.
- SIGITE-2011-VillaromanRS #artificial reality #education #interactive
- Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor (NV, DR, BS), pp. 227–232.
- CSMR-2011-CorazzaMMS #clustering
- Investigating the Use of Lexical Information for Software System Clustering (AC, SDM, VM, GS), pp. 35–44.
- CSMR-2011-CoutoVF #case study #compilation #product line
- Extracting Software Product Lines: A Case Study Using Conditional Compilation (MVC, MTV, EF), pp. 191–200.
- CSMR-2011-KohlKPDM #analysis #maintenance #multi
- Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
- CSMR-2011-SilvaPAM #execution #on the
- On the Use of Execution Trace Alignment for Driving Perfective Changes (LLS, KRP, SdA, MdAM), pp. 221–230.
- ICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity
- Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
- ICPC-2011-HouL #api #case study #framework
- Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers’ Newsgroup Discussions (DH, LL), pp. 91–100.
- ICPC-2011-LuciaPOPP #traceability
- Improving IR-based Traceability Recovery Using Smoothing Filters (ADL, MDP, RO, AP, SP), pp. 21–30.
- ICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code
- Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
- ICSM-2011-DraganCHM #commit
- Using stereotypes to help characterize commits (ND, MLC, MH, JIM), pp. 520–523.
- ICSM-2011-KhomhCZSD #fault #predict #testing
- Predicting post-release defects using pre-release field testing results (FK, BC, YZ, AS, DD), pp. 253–262.
- ICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability
- Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
- ICSM-2011-PaymalPBS #evolution #graph #metric #process
- Measuring disruption from software evolution activities using graph-based metrics (PP, RP, SB, HPS), pp. 532–535.
- ICSM-2011-QusefBOLB #concept #named #slicing #traceability
- SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
- ICSM-2011-RomanoP #interface #java #metric #predict #source code
- Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
- ICSM-2011-ShternT #clustering #multi
- Evaluating software clustering using multiple simulated authoritative decompositions (MS, VT), pp. 353–361.
- MSR-2011-BinkleyHL #identifier #speech
- Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
- MSR-2011-LiZ #re-engineering #semantics #web
- Integrating software engineering data using semantic web technologies (YFL, HZ), pp. 211–214.
- WCRE-2011-AryaniPLMN #dependence #predict #question
- Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
- WCRE-2011-Beard #debugging #information retrieval #locality
- Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
- WCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse
- Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
- WCRE-2011-GrantCS #analysis #concept #reverse engineering #source code
- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
- WCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code
- Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
- WCRE-2011-MyersS #execution
- Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
- WCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality
- Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
- CIAA-J-2010-YuBI11 #automaton #multi #relational #string #verification
- Relational String Verification Using Multi-Track Automata (FY, TB, OHI), pp. 1909–1924.
- CIAA-2011-CarninoF #automaton #generative #markov #random
- Random Generation of Deterministic Acyclic Automata Using Markov Chains (VC, SDF), pp. 65–75.
- DLT-2011-KuncO #automaton #finite
- Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
- LATA-2011-LabathR #information management
- Simplifying DPDA Using Supplementary Information (PL, BR), pp. 342–353.
- IFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification
- A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
- FM-2011-BartheCK #relational #source code #verification
- Relational Verification Using Product Programs (GB, JMC, CK), pp. 200–214.
- FM-2011-MullerR #verification
- Using Debuggers to Understand Failed Verification Attempts (PM, JNR), pp. 73–87.
- RTA-2011-FalkeKS #analysis #c #compilation #source code #termination
- Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
- RTA-2011-KochemsO #analysis #functional #linear #reachability
- Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
- SEFM-2011-JacquelBDD #automation #proving #theorem proving #verification
- Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving (MJ, KB, DD, CD), pp. 253–268.
- SEFM-2011-OnoHTNH #coq #pipes and filters #specification
- Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications (KO, YH, YT, NN, MH), pp. 350–365.
- SEFM-2011-Sanchez
- Using System Dynamics to Assess the Role of Socio-economic Status in Tuberculosis Incidence (MAS), pp. 464–475.
- ICFP-2011-ChyzakD #generative #ml #runtime #web
- Using camlp4 for presenting dynamic mathematics on the web: DynaMoW, an OCaml language extension for the run-time generation of mathematical contents and their presentation on the web (FC, AD), pp. 259–265.
- IFL-2011-Thomsen #functional #logic #optimisation
- Describing and Optimising Reversible Logic Using a Functional Language (MKT), pp. 148–163.
- AIIDE-2011-FujitaIM #detection #network
- Detecting Real Money Traders in MMORPG by Using Trading Network (AF, HI, HM).
- AIIDE-2011-TastanS #game studies #learning #policy
- Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
- CIG-2011-AgapitosOBT #learning #modelling #programming #search-based
- Learning environment models in car racing using stateful Genetic Programming (AA, MO0, AB, TT), pp. 219–226.
- CIG-2011-AlhejaliL #programming #search-based
- Using a training camp with Genetic Programming to evolve Ms Pac-Man agents (AMA, SML), pp. 118–125.
- CIG-2011-AntonioFCP #algorithm #evaluation #game studies #optimisation #search-based
- Optimization of an evaluation function of the 4-sided dominoes game using a genetic algorithm (NSA, CFFCF, MGFC, RP), pp. 24–30.
- CIG-2011-SarjantPDS #game studies #online #policy #relational
- Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
- CIG-2011-ThawonmasT #automation #evolution #game studies #generative
- Frame selection using iterative grammatical evolution for automatic comic generation from game logs (RT, YT), pp. 31–38.
- CIG-2011-UusitaloJ #approach
- A reactive mutli-agent approach to car driving using artificial potential fields (TU, SJJ), pp. 203–210.
- DiGRA-2011-CederholmHLSE #game studies
- The Aiming Game: Using a Game with Biofeedback for Training in Emotion Regulation (HC, OH, CL, CCS, JE).
- DiGRA-2011-KultimaA #game studies
- Using the VNA Ideation Game at Global Game Jam (AK, KA).
- DiGRA-2011-LacasaBC #game studies #online
- Adolescent thinking and online writing after the use of commercial games in the classroom (PL, RMB, HdC).
- DiGRA-2011-SoppittM #analysis #comprehension #experience
- Understanding Player Experience using Sequential Analysis (MS, GM).
- FDG-2011-Consalvo #game studies #social
- Using your friends: social mechanics in social games (MC), pp. 188–195.
- FDG-2011-FolmerLE #3d #navigation
- Navigating a 3D avatar using a single switch (EF, FL, BE), pp. 154–160.
- FDG-2011-HaleY #detection #navigation
- Using navigation meshes for collision detection (DHH, GMY), pp. 316–318.
- FDG-2011-HarrisonR #behaviour #predict
- Using sequential observations to model and predict player behavior (BEH, DLR), pp. 91–98.
- FDG-2011-LavioleHS #game studies #physics #simulation
- Tabletop games using real environment and physical simulation (JL, MH, CS), pp. 322–324.
- FDG-2011-MorelliF #game studies #gesture #realtime #video
- Real-time sensory substitution to enable players who are blind to play video games using whole body gestures (TM, EF), pp. 147–153.
- FDG-2011-SloanKN #game studies
- Feeling the ambiance: using smart ambiance to increase contextual awareness in game agents (CS, JDK, BMN), pp. 298–300.
- VS-Games-2011-AnagnostouV #artificial reality
- Square AR: Using Augmented Reality for Urban Planning (KA, PV), pp. 128–131.
- VS-Games-2011-BirchallG #development #education #evaluation #game studies #named
- Elemental: An Insight into the Development and Evaluation of a Secondary Education Chemistry Game Using XNA (JB, CG), pp. 32–39.
- VS-Games-2011-Broin #game studies
- Using a Criteria-Based User Model for Facilitating Flow in Serious Games (DO), pp. 63–69.
- VS-Games-2011-ChilcottS #3d #learning #multi #online #web
- Ageing Well and Learning through Online Immersive Participation Using a Multi-user Web 3D Environment (MC, AS), pp. 70–75.
- VS-Games-2011-ChristopoulosMAK
- Using Virtual Environments to Tell the Story: “The Battle of Thermopylae” (DC, PM, AA, JNK), pp. 84–91.
- VS-Games-2011-HulusicR #education
- The Use of Live Virtual Guides in Educational Applications (VH, SR), pp. 92–97.
- VS-Games-2011-NetoSNPF #game studies #interactive
- Solis'Curse - A Cultural Heritage Game Using Voice Interaction with a Virtual Agent (JNN, RS, JPN, JMP, JF), pp. 164–167.
- VS-Games-2011-Schwenk #realtime
- Real-Time Rendering of Dynamic Area and Volume Lights Using Hierarchical Irradiance Volumes (KS), pp. 136–139.
- CHI-2011-ChangL #framework #migration #mobile
- Deep shot: a framework for migrating tasks across devices using mobile phone cameras (THC, YL), pp. 2163–2172.
- CHI-2011-ChiZXYW #authoring #collaboration #coordination #email
- Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
- CHI-2011-CohnMPT #gesture
- Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
- CHI-2011-CowanL #interactive #mobile #named
- ShadowPuppets: supporting collocated interaction with mobile projector phones using hand shadows (LGC, KAL), pp. 2707–2716.
- CHI-2011-CramerHTYH #interactive #student #visual notation
- Classroom-based assistive technology: collective use of interactive visual schedules by students with autism (MC, SHH, MT, MTY, GRH), pp. 1–10.
- CHI-2011-EllingLJ #eye tracking
- Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
- CHI-2011-EppLM #identification
- Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
- CHI-2011-Freeman #eye tracking #protocol #usability
- Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
- CHI-2011-HarrisonHWFH #design #named #user interface #visual notation
- Kineticons: using iconographic motion in graphical user interface design (CH, GH, KDDW, JF, SEH), pp. 1999–2008.
- CHI-2011-HuangWD #problem
- No clicks, no problem: using cursor movements to understand and improve search (JH, RWW, STD), pp. 1225–1234.
- CHI-2011-HutamaSFG #correlation #interactive #multi
- Distinguishing multiple smart-phone interactions on a multi-touch wall display using tilt correlation (WH, PS, CWF, WBG), pp. 3315–3318.
- CHI-2011-John #design #modelling #performance #predict #recommendation #user interface
- Using predictive human performance models to inspire and support UI design recommendations (BEJ), pp. 983–986.
- CHI-2011-JunuzovicIHZTB #multimodal #overview #what
- What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing (SJ, KI, RH, ZZ, JCT, CB), pp. 513–522.
- CHI-2011-KhotSK #authentication #named #novel
- MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
- CHI-2011-KimP #reuse
- Practices in the creative reuse of e-waste (SK, EP), pp. 2395–2404.
- CHI-2011-KimS #community #health #interface #online
- Using interface cues in online health community boards to change impressions and encourage user contribution (HSK, SSS), pp. 599–608.
- CHI-2011-KuhnCQS
- Using tags to encourage reflection and annotation on data during nomadic inquiry (AK, CC, CQ, SS), pp. 667–670.
- CHI-2011-LaheyGBV #comprehension #flexibility #gesture #mobile #named
- PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays (BL, AG, WB, RV), pp. 1303–1312.
- CHI-2011-Light #design #performance
- Democratising technology: making transformation using designing, performance and props (AL), pp. 2239–2242.
- CHI-2011-LuceroHJ #collaboration #mobile #named
- Pass-them-around: collaborative use of mobile phones for photo sharing (AL, JH, TJ), pp. 1787–1796.
- CHI-2011-LuL #gesture #mobile #user interface
- Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
- CHI-2011-MarshallB #case study #experience #interactive #performance
- Using fast interaction to create intense experiences (JM, SB), pp. 1255–1264.
- CHI-2011-MarshallS #social #social media #twitter
- Social media ownership: using twitter as a window onto current attitudes and beliefs (CCM, FMSI), pp. 1081–1090.
- CHI-2011-MatthewsD #mobile
- In the mood: engaging teenagers in psychotherapy using mobile phones (MM, GD), pp. 2947–2956.
- CHI-2011-NackeKLM #design #game studies #interactive
- Biofeedback game design: using direct and indirect physiological control to enhance game interaction (LEN, MK, CL, RLM), pp. 103–112.
- CHI-2011-NiKW #communication #named
- AnatOnMe: facilitating doctor-patient communication using a projection-based handheld device (TN, AKK, DW), pp. 3333–3342.
- CHI-2011-SporkaFKPHM #named #predict
- CHANTI: predictive text entry using non-verbal vocal input (AJS, TF, SHK, OP, PH, ISM), pp. 2463–2472.
- CHI-2011-TamakiMR #named
- PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
- CHI-2011-WeilenmannJ #comprehension #interactive #people
- Understanding people and animals: the use of a positioning system in ordinary human-canine interaction (AW, OJ), pp. 2631–2640.
- CHI-2011-WobbrockFGH #analysis #parametricity #rank
- The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
- CHI-2011-YangGIF #proximity
- TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing (XDY, TG, PI, GWF), pp. 2585–2594.
- CHI-2011-YataniNTT #overview #user interface #word
- Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs (KY, MN, AT, KNT), pp. 1541–1550.
- CHI-2011-ZhaoCB #multi #named #navigation #visual notation
- KronoMiner: using multi-foci navigation for the visual exploration of time-series data (JZ, FC, RB), pp. 1737–1746.
- CSCW-2011-FanLZTSW #game studies #gesture #social
- Surprise Grabber: a co-located tangible social game using phone hand gesture (MF, XL, YZ, LT, YS, HW), pp. 625–628.
- CSCW-2011-GergleC #collaboration #eye tracking #mobile #what
- See what I’m saying?: using Dyadic Mobile Eye tracking to study collaborative reference (DG, ATC), pp. 435–444.
- CSCW-2011-GuibourdencheVGFH #distributed #multi #process #product line
- Using multiple scores for transcribing the distributed activities of a family (JG, JVR, MG, MF, YH), pp. 637–640.
- CSCW-2011-KamranC #collaboration #ontology #social #social media
- Defining ontology by using users collaboration on social media (SK, FC), pp. 657–660.
- CSCW-2011-MarshallRP #interactive #physics
- Using F-formations to analyse spatial patterns of interaction in physical environments (PM, YR, NP), pp. 445–454.
- CSCW-2011-MistryNM11a #named
- SPARSH: passing data using the body as a medium (PM, SN, PM), pp. 689–692.
- CSCW-2011-NewmanLMRM #challenge #facebook #health #network #online #problem #social
- It’s not that I don’t have problems, I’m just not putting them on facebook: challenges and opportunities in using online social networks for health (MWN, DL, SAM, PR, MEM), pp. 341–350.
- DHM-2011-EilersM #composition #learning #modelling
- Learning the Relevant Percepts of Modular Hierarchical Bayesian Driver Models Using a Bayesian Information Criterion (ME, CM), pp. 463–472.
- DHM-2011-OdenthalMKKS #empirical
- An Empirical Study of Disassembling Using an Augmented Vision System (BO, MPM, WK, BK, CMS), pp. 399–408.
- DHM-2011-QinTD #type system
- The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
- DHM-2011-WuHYNH #parametricity
- Using Physiological Parameters to Evaluate Operator’s Workload in Manual Controlled Rendezvous and Docking (RVD) (BW, FH, ZY, JN, WH), pp. 426–435.
- DUXU-v1-2011-BjorndalRM #industrial #lessons learnt #requirements #specification
- Lessons Learned from Using Personas and Scenarios for Requirements Specification of Next-Generation Industrial Robots (PB, MJR, SM), pp. 378–387.
- DUXU-v1-2011-BotellaGT #evaluation #heuristic #interactive
- Using Interaction Patterns in Heuristic Evaluation (FB, JAG, RT), pp. 23–32.
- DUXU-v1-2011-KashiwaseKKFYJ #mobile
- Comparisons on Kansei Factors of Attractiveness between Initial and Long Term Use of Mobile Phone (NK, KK, HK, SF, MY, HJ), pp. 593–601.
- DUXU-v1-2011-OhgiS #case study #enterprise #standard
- ISO Standards and Enterprise Software: A Case Study Using SUMI and SUS in an International Sale (JO, JS), pp. 178–184.
- DUXU-v1-2011-RitterE #segmentation
- An Extensible Tool for the Annotation of Videos Using Segmentation and Tracking (MR, ME), pp. 295–304.
- DUXU-v1-2011-YamagishiJKKF #mobile
- Proposal for Indices to Assess Attractiveness on Initial Use of Mobile Phones (MY, HJ, KK, HK, SF), pp. 696–705.
- DUXU-v2-2011-ChaeKN #experience
- Measuring Drivers’ Dynamic Seating Experience Using Pressure Mats (SC, GK, KN), pp. 368–375.
- DUXU-v2-2011-ChenL11a #2d #3d #design #evaluation #interface
- Design and Evaluation of the Customized Product Color Combination Interfaces Using 3D Model and 2D Illustration Display (CYC, YJL), pp. 269–275.
- DUXU-v2-2011-KhashmanL
- Measuring Cultural Markers in Arabic Government Websites Using Hofstede’s Cultural Dimensions (NK, AL), pp. 431–439.
- DUXU-v2-2011-RubegniML #interactive #scalability #social
- Talking to Strangers: Using Large Public Displays to Facilitate Social Interaction (ER, NM, ML), pp. 195–204.
- DUXU-v2-2011-ShenPC
- A Solution to Revisitation Using Organic Bookmark Management (STS, SDP, KMC), pp. 46–52.
- HCD-2011-BurkhardtNBSK #named #semantics
- SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor (DB, KN, MB, CS, AK), pp. 491–499.
- HCD-2011-Lin #communication #design #research #semantics
- Research in the Use of Product Semantics to Communicate Product Design Information (CHL), pp. 556–565.
- HCI-DDA-2011-DittmarF #implementation #interactive #modelling
- Intertwined Modeling and Implementation of Interactive Systems Using HOPS (AD, PF), pp. 194–203.
- HCI-DDA-2011-HessMT #interactive
- Differentiating between Successful and Less Successful Products by Using MAInEEAC — A Model for Interaction Characterization (SH, AM, MT), pp. 238–247.
- HCI-DDA-2011-IglesiasT #component #representation #user interface
- User Interface Representation Using Simple Components (JRI, PMTF), pp. 278–287.
- HCI-DDA-2011-KimJRWS #behaviour #simulation
- Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
- HCI-DDA-2011-KogaT #recommendation #topic #twitter
- Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics (HK, TT), pp. 461–470.
- HCI-DDA-2011-LuoY #algorithm #clustering #framework #network #novel #parallel
- A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework (RL, QY), pp. 598–607.
- HCI-DDA-2011-ShiraiT #composition #interactive #music
- A Proposal of an Interactive Music Composition System Using Gibbs Sampler (AS, TT), pp. 490–497.
- HCI-ITE-2011-AbushamB #graph #recognition
- Face Recognition Using Local Graph Structure (LGS) (EEAA, HKB), pp. 169–175.
- HCI-ITE-2011-AngeliniCCKM #gesture #interactive #multi #scalability
- Multi-user Pointing and Gesture Interaction for Large Screen Using Infrared Emitters and Accelerometers (LA, MC, SC, OAK, EM), pp. 185–193.
- HCI-ITE-2011-ChoiHK #3d #estimation #gesture #interface
- 3D-Position Estimation for Hand Gesture Interface Using a Single Camera (SHC, JHH, JHK), pp. 231–237.
- HCI-ITE-2011-JayaramanB #interface
- Uni-model Human System Interface Using sEMG (SJ, VB), pp. 446–453.
- HCI-ITE-2011-KimiokaST #multi
- Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
- HCI-ITE-2011-LeeOL #recognition
- Facial Expression Recognition Using AAMICPF (JSL, CMO, CWL), pp. 268–274.
- HCI-ITE-2011-MorieCB #case study
- Report on a Preliminary Study Using Breath Control and a Virtual Jogging Scenario as Biofeedback for Resilience Training (JFM, EC, JGB), pp. 474–480.
- HCI-ITE-2011-NakaI #3d #communication #gesture #interface
- Web-Based Nonverbal Communication Interface Using 3DAgents with Natural Gestures (TN, TI), pp. 565–574.
- HCI-ITE-2011-NebeKJF #interactive #multi
- Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
- HCI-ITE-2011-NebeMK #multi #requirements
- An Investigation on Requirements for Co-located Group-Work Using Multitouch-, Pen-Based- and Tangible-Interaction (KN, TM, FK), pp. 90–99.
- HCI-ITE-2011-OkamotoYW #visual notation
- A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
- HCI-MIIE-2011-ForutanpourR #collaboration #mobile #named
- ProJest: Enabling Higher Levels of Collaboration Using Today’s Mobile Devices (BF, JR), pp. 48–58.
- HCI-MIIE-2011-GaoG #mobile #representation
- The Effect of Time Orientation and Representation of Points of Interests on the Use of Mobile Tour Guide (FG, QG), pp. 59–68.
- HCI-MIIE-2011-KimHJHMJ #analysis #behaviour #video
- Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
- HCI-MIIE-2011-MinKH #recognition
- Spectral Subtraction Based Emotion Recognition Using EEG (JHM, HOK, KSH), pp. 569–576.
- HCI-MIIE-2011-PlocherJC
- Using Sound Patterns to Enhance Directional Sound for Emergency Route Guidance (TP, ZJJ, FYDC), pp. 329–337.
- HCI-MIIE-2011-RattanyuM #biology #recognition
- Emotion Recognition Using Biological Signal in Intelligent Space (KR, MM), pp. 586–592.
- HCI-UA-2011-BellegoBBT #smarttech
- Using a Smart Phone for Information Rendering in Computer-Aided Surgery (GLB, MB, IB, JT), pp. 202–209.
- HCI-UA-2011-ItoIN #bias #information management #parametricity
- Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
- HCI-UA-2011-KimCD #health
- Using Pen-Based Computing in Technology for Health (HK, YSC, EYLD), pp. 192–201.
- HCI-UA-2011-LargeB #comparison #interface #retrieval #visualisation
- A Comparison of Children’s and Adults’ Retrieval Performances and Affective Reactions When Using a Conventional Interface and an Information Visualization Interface (AL, JB), pp. 590–598.
- HCI-UA-2011-Levis #communication #towards #women
- Working toward Women’s Economic Empowerment: Using Information and Communication Technology in Developing Areas to Market Traditional Crafts (MSL), pp. 266–273.
- HCI-UA-2011-LinHLYH #mining
- Using Grounded Theory and Text Mining to Find Interesting Reading Materials for Slow EFL Learners (YCL, ClH, MHL, HFY, CFH), pp. 77–85.
- HCI-UA-2011-MaehigashiMTKMH #automation
- Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
- HCI-UA-2011-Nesset #evaluation #visual notation
- Following the Signs: Children’s Use of Visual Cues to Facilitate Website Evaluation (VN), pp. 599–606.
- HCI-UA-2011-OhkuraKKTESIW
- Restoration Support System for a Historic Textile Market Using Virtual Environment (MO, MK, YK, ST, HE, AS, TI, YW), pp. 413–422.
- HCI-UA-2011-Wang11a #interactive #learning #network #student #tool support
- Interactions between Human and Computer Networks: EFL College Students Using Computer Learning Tools in Remedial English Classes (ALW), pp. 107–112.
- HIMI-v1-2011-KinoshitaTN #visualisation
- Kansei Stroll Map: Walking around a City Using Visualized Impressions of Streetscapes (YK, ST, TN), pp. 211–220.
- HIMI-v1-2011-KomatsuO #case study #evaluation #visual notation
- Study on Evaluation of Kawaii Colors Using Visual Analog Scale (TK, MO), pp. 103–108.
- HIMI-v1-2011-KotaniHKA #information management
- Characteristics of Information Transmission Rates Using Noncontact Tactile Display (KK, MH, NK, TA), pp. 450–453.
- HIMI-v1-2011-LeeKW #authentication #multi #smarttech
- Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
- HIMI-v1-2011-MitaWKM #case study #communication
- A Study of Attention Control by Using Eye Communication with an Anthropomorphic Agent (TM, RW, NK, KM), pp. 603–611.
- HIMI-v1-2011-NakanishiY
- Applicability of Touch Sense Controllers Using Warm and Cold Sensations (MN, SY), pp. 470–477.
- HIMI-v1-2011-TanakaYSN #comparison
- Characteristics of Comfortable Sheet Switches on Control Panels of Electrical Appliances: Comparison Using Older and Younger Users (YT, YY, MS, MN), pp. 498–507.
- HIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #visualisation
- Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
- HIMI-v2-2011-BagciMKKT #adaptation #recognition
- Object and Scene Recognition Using Color Descriptors and Adaptive Color KLT (VHB, MGM, RK, RK, VT), pp. 355–363.
- HIMI-v2-2011-FagerstromG #empirical #facebook #network #social
- Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
- HIMI-v2-2011-FukadaKKH #evaluation #information management #user interface
- Evaluation of Disaster Information Management System Using Tabletop User Interfaces (HF, KK, AK, NH), pp. 373–380.
- HIMI-v2-2011-SagaTKTM #analysis #comparison
- Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
- HIMI-v2-2011-TanumaSNN #artificial reality #design
- Comfortable Design of Task-Related Information Displayed Using Optical See-Through Head-Mounted Display (KT, TS, MN, MN), pp. 419–429.
- IDGD-2011-BrandND #embedded #interactive #network #social
- Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
- IDGD-2011-SalgadoSL #design
- Using Metaphors to Explore Cultural Perspectives in Cross-Cultural Design (LCdCS, CSdS, CFL), pp. 94–103.
- OCSC-2011-Alducin-QuinteroCMGJ #design #modelling #process
- Productivity Improvement by Using Social-Annotations about Design Intent in CAD Modelling Process (GAQ, MC, JMG, DAGZ, MDJ), pp. 153–161.
- OCSC-2011-BaekSH #research
- Meet Researcher in the Real World Using the ConAR: Context-Aware Researcher (SWB, JS, TDH), pp. 12–19.
- OCSC-2011-YoshinoM #communication
- GAZO GAZO KUN: Photo-Sharing System Using an Anthropomorphic Photo Frame for Communication Support (TY, TM), pp. 297–305.
- CAiSE-2011-BiderJS #architecture #case study #communication #experience #process
- Experiences of Using Different Communication Styles in Business Process Support Systems with the Shared Spaces Architecture (IB, PJ, RS), pp. 299–313.
- CAiSE-2011-GuabtniNB #correlation #graph #interactive
- Using Graph Aggregation for Service Interaction Message Correlation (AG, HRMN, BB), pp. 642–656.
- CAiSE-2011-LemaitreH #database #evaluation #fault #framework #quality #taxonomy
- Quality Evaluation and Improvement Framework for Database Schemas — Using Defect Taxonomies (JL, JLH), pp. 536–550.
- CAiSE-2011-NobauerSMZ #elicitation #enterprise #named #requirements
- S3C: Using Service Discovery to Support Requirements Elicitation in the ERP Domain (MN, NS, NAMM, KZ), pp. 18–32.
- CAiSE-2011-RoySSWB #design #enterprise
- Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions (MR, BS, DS, IW, BB), pp. 566–581.
- CAiSE-2011-SchmidtJ #analysis #design #requirements #security
- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
- CAiSE-2011-SpindlerLNGN
- Using Synchronised Tag Clouds for Browsing Data Collections (AdS, SL, MN, MG, MCN), pp. 214–228.
- EDOC-2011-AdriansyahDA #consistency #cost analysis
- Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
- EDOC-2011-CurleyK #case study #framework #maturity
- Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
- EDOC-2011-HildebrandtMS #design #graph
- Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs (TTH, RRM, TS), pp. 161–170.
- EDOC-2011-Hull #flexibility #towards
- Towards Flexible Service Interoperation Using Business Artifacts (RH), pp. 20–21.
- ICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system
- A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
- ICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
- On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
- ICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management
- Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
- ICEIS-v1-2011-Kim #communication #network
- CRL Distribution using an Alternative Communication Media for Vehicular Networks (HK), pp. 217–222.
- ICEIS-v1-2011-RamirezC #fault #process
- Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
- ICEIS-v1-2011-VaneaP #metadata #multi #ontology #semantics
- Semantically Enhancing Multimedia Data Warehouses — Using Ontologies as Part of the Metadata (AV, RP), pp. 163–168.
- ICEIS-v2-2011-KisilevichKBTR #open source #tool support
- Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (SK, DAK, RB, MT, LR), pp. 147–156.
- ICEIS-v2-2011-LiOAK #fault #identification #modelling #network
- Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
- ICEIS-v2-2011-TarsauliyaTS #network #search-based
- Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
- ICEIS-v2-2011-TianZX #analysis #case study #network #social
- Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
- ICEIS-v2-2011-ZhuXM #assessment #network #risk management
- Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
- ICEIS-v3-2011-BhuiyanRH #case study #modelling #multi
- Supporting Business Modeling using Multiple Notations — A Case Study (MB, SR, KH), pp. 301–306.
- ICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
- On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
- ICEIS-v3-2011-PapatheocharousTYA #agile #cost analysis #development #diagrams #estimation #modelling
- Cost Modeling and Estimation in Agile Software Development Environments using Influence Diagrams (EP, DT, PSY, ASA), pp. 117–127.
- ICEIS-v3-2011-WangWWL #modelling #workflow
- Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
- ICEIS-v4-2011-Ganesan #enterprise #framework #modelling #process
- Composite Enterprise Process Modeling (CEProM) Framework — Setting up a Process Modeling Center of Excellence using CEProM Framework (EG), pp. 378–383.
- ICEIS-v4-2011-LuCGD #algorithm #multi #network #optimisation #quality
- Quality of Service Optimization of Wireless Sensor Networks using a Multi-objective Immune Co-evolutionary Algorithm (XL, ZRC, LG, YD), pp. 160–164.
- ICEIS-v4-2011-Naderipour #ad hoc #industrial #mining #process
- Mining of Ad-hoc Business Processes using Microsoft Sharepoint, Nitro & Prom 6.0 — An Industrial Practice (FN), pp. 413–418.
- ICEIS-v4-2011-OuazzaneAKL #design #framework #web
- An e-Business Framework Design using Enhanced Web 2.0 Technology (KO, MSA, HBK, JL), pp. 97–102.
- CIKM-2011-Ando #encoding #relational
- Latent feature encoding using dyadic and relational data (SA), pp. 2201–2204.
- CIKM-2011-BanerjeeC #distributed #feature model #privacy
- Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
- CIKM-2011-BicerTN #keyword #modelling #ranking
- Ranking support for keyword search on structured data using relevance models (VB, TT, RN), pp. 1669–1678.
- CIKM-2011-BingLW #query #social #topic
- Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
- CIKM-2011-BykauMRV #evolution #query
- Supporting queries spanning across phases of evolving artifacts using Steiner forests (SB, JM, FR, YV), pp. 1649–1658.
- CIKM-2011-DangXC #aspect-oriented #clustering #query
- Inferring query aspects from reformulations using clustering (VD, XX, WBC), pp. 2117–2120.
- CIKM-2011-GangulyLMJ #feedback #pseudo #query #reduction
- Patent query reduction using pseudo relevance feedback (DG, JL, WM, GJFJ), pp. 1953–1956.
- CIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment
- A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
- CIKM-2011-Garcia-Alvarado0O #named #ontology #performance
- ONTOCUBE: efficient ontology extraction using OLAP cubes (CGA, ZC, CO), pp. 2429–2432.
- CIKM-2011-HeerschopGHFKJ #analysis
- Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
- CIKM-2011-HeRSOQ #case study #generative
- Generating links to background knowledge: a case study using narrative radiology reports (JH, MdR, MS, RCvO, YQ), pp. 1867–1876.
- CIKM-2011-HuiHLW #statistics
- Relevance weighting using within-document term statistics (KH, BH, TL, BW), pp. 99–104.
- CIKM-2011-HuTL #microblog #semantics
- Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
- CIKM-2011-JacobDG #classification #corpus #multi #social
- Classification and annotation in social corpora using multiple relations (YJ, LD, PG), pp. 1215–1220.
- CIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic
- Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
- CIKM-2011-KongDH #matrix #robust
- Robust nonnegative matrix factorization using L21-norm (DK, CHQD, HH), pp. 673–682.
- CIKM-2011-KustarevULGSS #metric
- Smoothing NDCG metrics using tied scores (AK, YU, YL, EG, IS, PS), pp. 2053–2056.
- CIKM-2011-LeeRK #algorithm #recognition
- Named entity recognition using a modified Pegasos algorithm (CL, PMR, HK), pp. 2337–2340.
- CIKM-2011-LinTC #classification #independence #sentiment #word
- Language-independent sentiment classification using three common words (ZL, ST, XC), pp. 1041–1046.
- CIKM-2011-LiuWZ #clustering #feature model
- Feature selection using hierarchical feature clustering (HL, XW, SZ), pp. 979–984.
- CIKM-2011-MagdyJ #performance
- An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
- CIKM-2011-MaLL
- Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
- CIKM-2011-NiuLX #graph #named #ranking
- DIGRank: using global degree to facilitate ranking in an incomplete graph (XN, LL, KX), pp. 2297–2300.
- CIKM-2011-OzertemVL #set
- Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
- CIKM-2011-Pasca #query #web #what
- Asking what no one has asked before: using phrase similarities to generate synthetic web search queries (MP), pp. 1347–1352.
- CIKM-2011-PeelWZ #string
- Collection-based compression using discovered long matching strings (AP, AW, JZ), pp. 2361–2364.
- CIKM-2011-PilzP #distance
- From names to entities using thematic context distance (AP, GP), pp. 857–866.
- CIKM-2011-QuattroneCMFU #effectiveness #folksonomy #retrieval #similarity
- Effective retrieval of resources in folksonomies using a new tag similarity measure (GQ, LC, PDM, EF, DU), pp. 545–550.
- CIKM-2011-SoodL #detection #probability
- Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
- CIKM-2011-VinzamuriK #classification #convergence #design
- Designing an ensemble classifier over subspace classifiers using iterative convergence routine (BV, KK), pp. 693–698.
- CIKM-2011-VirgilioM #calculus #data analysis
- RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
- CIKM-2011-WangZLBW #classification #multi #random
- Using random walks for multi-label classification (CW, WZ, ZL, YB, JW), pp. 2197–2200.
- CIKM-2011-WeichselbraunGS #game studies #sentiment
- Using games with a purpose and bootstrapping to create domain-specific sentiment lexicons (AW, SG, AS), pp. 1053–1060.
- CIKM-2011-WesselOVBK #3d #modelling #performance #retrieval
- Efficient retrieval of 3D building models using embeddings of attributed subgraphs (RW, SO, RV, IB, RK), pp. 2097–2100.
- CIKM-2011-WuQD #owl #pipes and filters
- Finding all justifications of OWL entailments using TMS and MapReduce (GW, GQ, JD), pp. 1425–1434.
- ECIR-2011-AktolgaAS #ranking
- Passage Reranking for Question Answering Using Syntactic Structures and Answer Types (EA, JA, DAS), pp. 617–628.
- ECIR-2011-AlbakourKNKSFR #evaluation #named #query
- AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
- ECIR-2011-AlonsoB #crowdsourcing #design #implementation
- Design and Implementation of Relevance Assessments Using Crowdsourcing (OA, RABY), pp. 153–164.
- ECIR-2011-BadrinathVM #query #summary
- Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
- ECIR-2011-BuccioMS #framework #predict #towards
- Towards Predicting Relevance Using a Quantum-Like Framework (EDB, MM, DS), pp. 755–758.
- ECIR-2011-GeraniKCC #retrieval
- Personal Blog Retrieval Using Opinion Features (SG, MK, MJC, FC), pp. 747–750.
- ECIR-2011-KinsellaPB #classification #metadata #social #social media #topic
- Topic Classification in Social Media Using Metadata from Hyperlinked Objects (SK, AP, JGB), pp. 201–206.
- ECIR-2011-OhCM #classification #modelling #scalability #taxonomy
- Text Classification for a Large-Scale Taxonomy Using Dynamically Mixed Local and Global Models for a Node (HSO, YC, SHM), pp. 7–18.
- ECIR-2011-PhelanMBS #recommendation #twitter
- Terms of a Feather: Content-Based News Recommendation and Discovery Using Twitter (OP, KM, MB, BS), pp. 448–459.
- ECIR-2011-ZhaoJWHLYL #modelling #topic #twitter
- Comparing Twitter and Traditional Media Using Topic Models (WXZ, JJ, JW, JH, EPL, HY, XL), pp. 338–349.
- ICML-2011-CrammerG #adaptation #classification #feedback #multi
- Multiclass Classification with Bandit Feedback using Adaptive Regularization (KC, CG), pp. 273–280.
- ICML-2011-HockingVBJ #algorithm #clustering #named
- Clusterpath: an Algorithm for Clustering using Convex Fusion Penalties (TH, JPV, FRB, AJ), pp. 745–752.
- ICML-2011-HuWC #coordination #kernel #learning #named #parametricity #scalability
- BCDNPKL: Scalable Non-Parametric Kernel Learning Using Block Coordinate Descent (EH, BW, SC), pp. 209–216.
- ICML-2011-JawanpuriaNR #kernel #learning #performance
- Efficient Rule Ensemble Learning using Hierarchical Kernels (PJ, JSN, GR), pp. 161–168.
- ICML-2011-JegelkaB11a #approximate #bound
- Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
- ICML-2011-JetchevT #feedback #retrieval
- Task Space Retrieval Using Inverse Feedback Control (NJ, MT), pp. 449–456.
- ICML-2011-KamisettyXL #approximate #correlation
- Approximating Correlated Equilibria using Relaxations on the Marginal Polytope (HK, EPX, CJL), pp. 1153–1160.
- ICML-2011-LiuI #bound #difference
- Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
- ICML-2011-Potetz #linear #problem
- Estimating the Bayes Point Using Linear Knapsack Problems (BP), pp. 257–264.
- ICML-2011-SuSM #classification #multi #naive bayes #scalability
- Large Scale Text Classification using Semisupervised Multinomial Naive Bayes (JS, JSS, SM), pp. 97–104.
- ICML-2011-YangR #learning #on the #visual notation
- On the Use of Variational Inference for Learning Discrete Graphical Model (EY, PDR), pp. 1009–1016.
- KDD-2011-ApplegateDKU #clustering #distance #multi
- Unsupervised clustering of multidimensional distributions using earth mover distance (DA, TD, SK, SU), pp. 636–644.
- KDD-2011-DalviKMR #nearest neighbour
- Sampling hidden objects using nearest-neighbor oracles (NND, RK, AM, VR), pp. 1325–1333.
- KDD-2011-Dhurandhar #predict
- Improving predictions using aggregate information (AD), pp. 1118–1126.
- KDD-2011-EneIM #clustering #performance #pipes and filters
- Fast clustering using MapReduce (AE, SI, BM), pp. 681–689.
- KDD-2011-HendersonGLAETF #graph #mining #recursion
- It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
- KDD-2011-Inchiosa #data mining #mining #scalability
- Accelerating large-scale data mining using in-database analytics (MEI), p. 778.
- KDD-2011-LeeOYK #privacy #semantics
- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
- KDD-2011-McCloskeyKIKB #behaviour #data mining #mining
- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
- KDD-2011-MenonCGAK #collaboration #predict
- Response prediction using collaborative filtering with hierarchies and side-information (AKM, KPC, SG, DA, NK), pp. 141–149.
- KDD-2011-MesterharmP #algorithm #learning #online
- Active learning using on-line algorithms (CM, MJP), pp. 850–858.
- KDD-2011-PereiraB #classification #functional
- Classification of functional magnetic resonance imaging data using informative pattern features (FP, MB), pp. 940–946.
- KDD-2011-SatpalBSRS #information management #logic #markov #network #web
- Web information extraction using markov logic networks (SS, SB, SS, RR, PS), pp. 1406–1414.
- KDD-2011-SimonLJV #comprehension #image
- Understanding atrophy trajectories in alzheimer’s disease using association rules on MRI images (GJS, PWL, CRJJ, PV), pp. 369–376.
- KDIR-2011-ArmanoGV #concept #semantics
- Semantic Enrichment of Contextual Advertising by using Concepts (GA, AG, EV), pp. 232–237.
- KDIR-2011-BallesterosFDHG #analysis #dependence
- Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
- KDIR-2011-BressoBSMKSND #mining #reduction
- Use of Domain Knowledge for Dimension Reduction — Application to Mining of Drug Side Effects (EB, SB, MST, GM, ASK, MS, AN, MDD), pp. 271–276.
- KDIR-2011-GuoK #ontology #research
- Discovering Relationship Associations from the Literature Related to Research Projects in Sustainability Science using Ontology and Inference (WG, SBK), pp. 390–393.
- KDIR-2011-LachetarB #algorithm #categorisation #metadata
- Application of an Ant Colony Algorithm — For Song Categorising using Metadata (NL, HB), pp. 379–384.
- KDIR-2011-LiVM #graph #learning #relational #visual notation
- Unsupervised Handwritten Graphical Symbol Learning — Using Minimum Description Length Principle on Relational Graph (JL, CVG, HM), pp. 172–178.
- KDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation
- Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
- KDIR-2011-MauleKR #approach #automation
- Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
- KDIR-2011-OmerBG #algorithm #mining #motivation
- A New Frequent Similar Tree Algorithm Motivated by Dom Mining — Using RTDM and its New Variant — SiSTeR (OB, RB, SG), pp. 238–243.
- KDIR-2011-PrachuabsupakijS #classification #multi #set
- Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
- KDIR-2011-RavulaCL #dynamic analysis
- Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
- KDIR-2011-ReuterC #identification #learning #similarity
- Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
- KDIR-2011-RomeiT #process #programming #xquery
- Programming the KDD Process using XQuery (AR, FT), pp. 131–139.
- KEOD-2011-GerberGM #ambiguity #consistency #development #ontology #standard
- Using Formal Ontologies for the Development of Consistent and Unambiguous Financial Accounting Standards (MCG, AG, AvdM), pp. 419–424.
- KEOD-2011-KohnMSL #complexity #ontology
- Use of Existing Ontologies as Input for Structural Complexity Management — Reducing the Effort for Analysing and Improving Engineering Systems (AK, MM, HXS, UL), pp. 195–201.
- KEOD-2011-MendesFS
- Comparing Services using DEMO (CM, JF, MMdS), pp. 528–537.
- KEOD-2011-OkumuraH #concept
- A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
- KEOD-2011-Rios-AlvaradoLS #taxonomy #web
- Structuring Taxonomies by using Linguistic Patterns and WordNet on Web Search (ABRA, ILA, VSS), pp. 273–278.
- KEOD-2011-SuzukiF #classification #documentation #multi
- Multi-labeled Patent Document Classification using Technical Term Thesaurus (YS, FF), pp. 425–428.
- KMIS-2011-AlaviJY #performance
- An Investigation of the Use of KMS on Clinical Performance (MA, SLJ, YY), pp. 236–240.
- KMIS-2011-Chebel-MorelloHZ #adaptation #modelling #reasoning
- Adaptation based on Knowledge Models for Diagnostic Systems using Case-base Reasoning (BCM, MKH, NZ), pp. 223–229.
- KMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism
- A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
- KMIS-2011-FortierS #modelling #process #requirements
- Defining Information Requirements — Using Business Process Modeling for Incident Response for Chemical Facilities (SCF, GLS), pp. 411–417.
- KMIS-2011-Grim-YefsahRT11a #network #process #robust
- Using Information of an Informal Network to Evaluate Business Process Robustness (MGY, CRS, VTG), pp. 430–435.
- KMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard
- Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
- KMIS-2011-Nishioka #process
- Quotation Process Management of One-of-a-kind Production using PSLX Information Model (YN), pp. 167–172.
- KMIS-2011-SchmidlK #information management
- Using Task Histories to Support Person-to-person Knowledge Exchange — Extracting and using Contextual Overlap and Levels of Expertise to Connect Knowledge Workers (JS, HK), pp. 77–86.
- MLDM-2011-AlshukriCZ #bound #detection #incremental #random
- Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
- MLDM-2011-CataltepeSBE #classification
- Collective Classification Using Heterogeneous Classifiers (ZÇ, AS, KB, AE), pp. 155–169.
- MLDM-2011-ChenER #mining #parametricity
- Mining Spatial Trajectories Using Non-parametric Density Functions (CSC, CFE, NJR), pp. 496–510.
- MLDM-2011-Garcia-ConstantinoCNRST #classification #generative #summary
- An Investigation Concerning the Generation of Text Summarisation Classifiers Using Secondary Data (MGC, FC, PJN, AR, CS, AT), pp. 387–398.
- MLDM-2011-GunesCO #algorithm #classification #named #novel #relational #search-based
- GA-TVRC: A Novel Relational Time Varying Classifier to Extract Temporal Information Using Genetic Algorithms (IG, ZÇ, SGÖ), pp. 568–583.
- MLDM-2011-Kessl #mining #parallel
- Static Load Balancing of Parallel Mining of Frequent Itemsets Using Reservoir Sampling (RK), pp. 553–567.
- MLDM-2011-PerezR #array #detection
- Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
- MLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics
- A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
- RecSys-2011-DalyG #effectiveness #recommendation #social
- Effective event discovery: using location and social information for scoping event recommendations (EMD, WG), pp. 277–280.
- RecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment
- Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
- RecSys-2011-KatzOSRS #collaboration #wiki
- Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
- RecSys-2011-SekoYMM #behaviour #recommendation #representation
- Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
- SEKE-2011-AlmeidaMA #analysis #execution #process
- Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
- SEKE-2011-AndradeDBW #approach #communication #documentation #retrieval
- An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
- SEKE-2011-AntunesCCG #development #information management
- Using Contextual Information to Improve Awareness in Software Development(S) (BA, JC, PC, PG), pp. 349–352.
- SEKE-2011-BhattacharyaCSK #enterprise
- Dynamic Service Choreography using Context Aware Enterprise Service Bus (SB, JC, SS, AK), pp. 319–324.
- SEKE-2011-BragaD #detection #information management #tool support
- Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
- SEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability
- Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
- SEKE-2011-FronzaSSV #predict
- Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
- SEKE-2011-GregoriadesLP11a #calculus #risk management
- Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
- SEKE-2011-Kaiser #concurrent #debugging #higher-order
- Constructing Subtle Concurrency Bugs Using Synchronization-Centric Second-Order Mutation Operators (LWGK), pp. 244–249.
- SEKE-2011-MachadoAF #evolution #requirements #semantics
- Using Semantic Annotations for Supporting Requirements Evolution (BNM, LdOA, RdAF), pp. 185–190.
- SEKE-2011-SanfordWX #analysis #modelling #security
- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
- SEKE-2011-ScatalonGC #approach #delivery #ontology
- Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
- SEKE-2011-SouzaSMCSZ #concurrent #quality #reachability #testing
- Using Coverage and Reachability Testing to Improve Concurrent Program Testing Quality (SdRSdS, PSLdS, MCCM, MSC, AdSS, EZ), pp. 207–212.
- SEKE-2011-SunHGZWY #detection #novel #petri net
- A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
- SEKE-2011-SunWH #architecture #design #modelling #ontology
- Design Software Architecture Models using Ontology (JS, HHW, TH), pp. 191–196.
- SEKE-2011-VilkomirKT #algorithm #case study #interface #testing
- Interface Testing Using a Subgraph Splitting Algorithm: A Case Study (SV, AAK, NT), pp. 219–224.
- SEKE-2011-WagnerFF #process #security
- Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
- SEKE-2011-WangKN #empirical #metric
- An Empirical Study of Software Metrics Selection Using Support Vector Machine (HW, TMK, AN), pp. 83–88.
- SIGIR-2011-AgeevGLA #game studies #interactive #modelling #web
- Find it if you can: a game for modeling different types of web search success using interaction data (MA, QG, DL, EA), pp. 345–354.
- SIGIR-2011-BennettRWY #metadata #personalisation #web
- Inferring and using location metadata to personalize web search (PNB, FR, RWW, EY), pp. 135–144.
- SIGIR-2011-BlancoHHMPTT #crowdsourcing #evaluation #reliability
- Repeatable and reliable search system evaluation using crowdsourcing (RB, HH, DMH, PM, JP, HST, DTT), pp. 923–932.
- SIGIR-2011-BouadjenekHBD #personalisation #query #social
- Personalized social query expansion using social bookmarking systems (MRB, HH, MB, JD), pp. 1113–1114.
- SIGIR-2011-Campos #analysis #query #web
- Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
- SIGIR-2011-CumminsJO #performance #predict #query #standard
- Improved query performance prediction using standard deviation (RC, JMJ, CO), pp. 1089–1090.
- SIGIR-2011-DingS #documentation #performance #retrieval
- Faster top-k document retrieval using block-max indexes (SD, TS), pp. 993–1002.
- SIGIR-2011-InagakiBCM #mobile #web
- Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
- SIGIR-2011-JethavaCBBD #identification #multi #scalability
- Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
- SIGIR-2011-LappasPS #mining #network #social
- Mining tags using social endorsement networks (TL, KP, TS), pp. 195–204.
- SIGIR-2011-LeeHWHS #dataset #graph #image #learning #multi #pipes and filters #scalability
- Multi-layer graph-based semi-supervised learning for large-scale image datasets using mapreduce (WYL, LCH, GLW, WHH, YFS), pp. 1121–1122.
- SIGIR-2011-Li11a #information retrieval
- Domain-specific information retrieval using rcommenders (WL), pp. 1327–1328.
- SIGIR-2011-LiDS #concept #recommendation #semantics
- Semantic tag recommendation using concept model (CL, AD, AS), pp. 1159–1160.
- SIGIR-2011-LiHZW #information retrieval #query #segmentation
- Unsupervised query segmentation using clickthrough for information retrieval (YL, BJPH, CZ, KW), pp. 285–294.
- SIGIR-2011-LimsopathamSMO
- Disambiguating biomedical acronyms using EMIM (NL, RLTS, CM, IO), pp. 1213–1214.
- SIGIR-2011-LiZMWCGX #comparative #comparison
- Product comparison using comparative relations (SL, ZJZ, ZM, MW, TSC, JG, WX), pp. 1151–1152.
- SIGIR-2011-MoshfeghiPJ #collaboration #semantics
- Handling data sparsity in collaborative filtering using emotion and semantic based features (YM, BP, JMJ), pp. 625–634.
- SIGIR-2011-OchiOO #predict #rating #word
- Rating prediction using feature words extracted from customer reviews (MO, MO, RO), pp. 1205–1206.
- SIGIR-2011-PaikPP #algorithm #novel #statistics
- A novel corpus-based stemming algorithm using co-occurrence statistics (JHP, DP, SKP), pp. 863–872.
- SIGIR-2011-SakaiS
- Evaluating diversified search results using per-intent graded relevance (TS, RS), pp. 1043–1052.
- SIGIR-2011-Wang #comprehension #information management #recommendation
- Understanding and using contextual information in recommender systems (LW), pp. 1329–1330.
- SIGIR-2011-WangHND #classification #information management #matrix #web
- Cross-language web page classification via dual knowledge transfer using nonnegative matrix tri-factorization (HW, HH, FN, CHQD), pp. 933–942.
- SIGIR-2011-WuYLLYX #learning #rank
- Learning to rank using query-level regression (JW, ZY, YL, HL, ZY, KX), pp. 1091–1092.
- SIGIR-2011-YangLSZZ #collaboration #learning #recommendation
- Collaborative competitive filtering: learning recommender using context of user choice (SHY, BL, AJS, HZ, ZZ), pp. 295–304.
- SIGIR-2011-ZhaoHH #information retrieval #named #probability
- CRTER: using cross terms to enhance probabilistic information retrieval (JZ, JXH, BH), pp. 155–164.
- SIGIR-2011-ZhouHH #ad hoc #estimation #probability
- Enhancing ad-hoc relevance weighting using probability density estimation (XZ, JXH, BH), pp. 175–184.
- BX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification
- Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
- BX-2011-Cleve #co-evolution #source code
- Co-evolving schemas and programs using coupled transformations (AC), p. 54.
- ECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements
- Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
- MoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml
- An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
- MoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml
- Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
- MoDELS-2011-IzukuraYOSKX #approach #development #modelling
- Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
- MoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited
- CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
- MoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #verification
- Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
- MoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling
- Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
- PLEASE-2011-Kulkarni #challenge #delivery
- Use of SPLE to deliver custom solutions at product cost: challenges and a way forward (VK), pp. 1–5.
- PLEASE-2011-SunCGW #approach #feature model
- Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
- SPLC-2011-GhezziS #approach #model checking #non-functional #parametricity #performance #product line #towards #verification
- Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
- SPLC-2011-VolterV #domain-specific language #product line
- Product Line Engineering Using Domain-Specific Languages (MV, EV), pp. 70–79.
- ECOOP-2011-Duala-EkokoR #api #recommendation
- Using Structure-Based Recommendations to Facilitate Discoverability in APIs (EDE, MPR), pp. 79–104.
- ECOOP-2011-RichardsHBV #javascript #scalability
- The Eval That Men Do — A Large-Scale Study of the Use of Eval in JavaScript Applications (GR, CH, BB, JV), pp. 52–78.
- OOPSLA-2011-Golan-GuetaBARSY #automation
- Automatic fine-grain locking using shape properties (GGG, NGB, AA, GR, MS, EY), pp. 225–242.
- OOPSLA-2011-KeLZBJD #dependence #parallel #programming
- Safe parallel programming using dynamic dependence hints (CK, LL, CZ, TB, BJ, CD), pp. 243–258.
- OOPSLA-2011-WeeratungeZJ
- Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
- PLATEAU-2011-BarisicAGB #case study #domain-specific language #quality
- Quality in use of domain-specific languages: a case study (AB, VA, MG, BB), pp. 65–72.
- PLATEAU-2011-ShonleGL #design
- Using metaphors from natural discussion to improve the design of arcum (MS, WGG, SL), pp. 39–44.
- PLATEAU-2011-StefikSSS #comparison #empirical #perl #programming language
- An empirical comparison of the accuracy rates of novices using the quorum, perl, and randomo programming languages (AS, SS, MS, KS), pp. 3–8.
- AdaEurope-2011-ChilAOP #ada #interface
- Using Robotics as a Motivational Tool: An Ada Interface to a Pioneer Robot (RC, DA, FJO, JAP), pp. 147–159.
- AdaEurope-2011-OLeary #reliability #web #web service
- Assuring Software Reliability While Using Web Services and Commercial Products (JO), pp. 1–16.
- AdaEurope-2011-SaezTC #ada #framework #multi #platform #realtime
- A Real-Time Framework for Multiprocessor Platforms Using Ada 2012 (SS, ST, AC), pp. 46–60.
- LOPSTR-2011-FioravantiPPS
- Using Real Relaxations during Program Specialization (FF, AP, MP, VS), pp. 106–122.
- LOPSTR-2011-Gallagher #analysis #logic programming #source code
- Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
- LOPSTR-2011-PilozziS #analysis #self #termination
- Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
- PADL-2011-ChristakisS #detection #fault #message passing #static analysis
- Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
- PADL-2011-RedlEK #declarative #set
- Declarative Belief Set Merging Using Merging Plans (CR, TE, TK), pp. 99–114.
- PADL-2011-SalgueiroDBA #constraints #detection
- Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
- PEPM-2011-AlbertBGHPR
- Verified resource guarantees using COSTA and KeY (EA, RB, SG, RH, GP, GRD), pp. 73–76.
- PLDI-2011-BohmKKFT #compilation #parallel
- Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator (IB, TJKEvK, SCK, BF, NPT), pp. 74–85.
- PLDI-2011-JoseM #fault #locality #satisfiability
- Cause clue clauses: error localization using maximum satisfiability (MJ, RM), pp. 437–446.
- PLDI-2011-LuciaWC #comprehension #concurrent #execution #fault
- Isolating and understanding concurrency errors using reconstructed execution fragments (BL, BPW, LC), pp. 378–388.
- PLDI-2011-RamanKOLA #distributed #parallel
- Parallelism orchestration using DoPE: the degree of parallelism executive (AR, HK, TO, JWL, DIA), pp. 26–37.
- PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security
- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
- PLDI-2011-ZengWL #concurrent #data type #monitoring #named
- Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures (QZ, DW, PL), pp. 367–377.
- POPL-2011-DilligDA #precise #reasoning #source code
- Precise reasoning for programs using containers (ID, TD, AA), pp. 187–200.
- POPL-2011-Gulwani #automation #spreadsheet #string
- Automating string processing in spreadsheets using input-output examples (SG), pp. 317–330.
- POPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread
- A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
- POPL-2011-RamseyD #composition #dependent type #independence #low level #type system
- Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
- PPDP-2011-BourdierC #analysis #network #policy #security #term rewriting
- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
- PPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification
- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
- PPDP-2011-InabaHHKN #higher-order #logic #monad #verification
- Graph-transformation verification using monadic second-order logic (KI, SH, ZH, HK, KN), pp. 17–28.
- SAS-2011-DonaldsonHKR #verification
- Software Verification Using k-Induction (AFD, LH, DK, PR), pp. 351–368.
- SAS-2011-MadhusudanQ #performance
- Efficient Decision Procedures for Heaps Using STRAND (PM, XQ), pp. 43–59.
- SAS-2011-MonniauxG #bound #fixpoint #model checking
- Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
- SIGAda-2011-BeltHRCHD #contract #execution #symbolic computation
- Enhancing spark’s contract checking facilities using symbolic execution (JB, JH, R, PC, DH, XD), pp. 47–60.
- RE-2011-FranchMTC #framework #modelling #on the
- On the joint use of i* with other modelling frameworks: A vision paper (XF, AM, JT, CC), pp. 133–142.
- REFSQ-2011-DhunganaSG #elicitation #modelling #product line #requirements #research #variability
- Research Preview: Supporting End-User Requirements Elicitation Using Product Line Variability Models (DD, NS, FG), pp. 66–71.
- ASE-2011-AlshahwanH #automation #re-engineering #testing #web
- Automated web application testing using search based software engineering (NA, MH), pp. 3–12.
- ASE-2011-AlvesGJd #impact analysis #slicing
- Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
- ASE-2011-ApelSWRB #detection #feature model #interactive #verification
- Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
- ASE-2011-Bandyopadhyay #fault #locality #testing
- Improving spectrum-based fault localization using proximity-based weighting of test cases (AB), pp. 660–664.
- ASE-2011-GarciaPMMC #architecture
- Enhancing architectural recovery using concerns (JG, DP, CM, NM, YC), pp. 552–555.
- ASE-2011-KhalekYZMK #alloy #java #named #source code #specification #testing
- TestEra: A tool for testing Java programs using alloy specifications (SAK, GY, LZ, DM, SK), pp. 608–611.
- ASE-2011-LutzJP #assurance #modelling
- Using model-based assurance to strengthen diagnostic procedures (RRL, JJ, APH), pp. 516–519.
- ASE-2011-RathfelderKE #automation #capacity #performance #predict
- Capacity planning for event-based systems using automated performance predictions (CR, SK, DE), pp. 352–361.
- ASE-2011-SagdeoAKV #clustering #invariant #named
- PRECIS: Inferring invariants using program path guided clustering (PS, VA, SK, SV), pp. 532–535.
- ASE-2011-StehleLSRM #geometry
- Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
- ASE-2011-SunL #concept analysis
- Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
- ASE-2011-VakiliD #declarative #model checking #modelling
- Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
- ESEC-FSE-2011-BarzilayHY #developer #social #social media
- Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
- ESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability
- Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
- ESEC-FSE-2011-LiCK #analysis #performance #points-to
- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
- ESEC-FSE-2011-PalmaST #interactive #requirements #smt
- Using an SMT solver for interactive requirements prioritization (FP, AS, PT), pp. 48–58.
- ESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability
- Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
- ESEC-FSE-2011-ZhengZL #api #recommendation #web
- Cross-library API recommendation using web search engines (WZ, QZ, MRL), pp. 480–483.
- ICSE-2011-ArcuriB #algorithm #random #re-engineering #statistics #testing
- A practical guide for using statistical tests to assess randomized algorithms in software engineering (AA, LCB), pp. 1–10.
- ICSE-2011-Bhattacharya #development #evolution #maintenance
- Using software evolution history to facilitate development and maintenance (PB), pp. 1122–1123.
- ICSE-2011-CordeiroF #bound #concurrent #model checking #multi #smt #thread #verification
- Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
- ICSE-2011-DietlDEMS
- Building and using pluggable type-checkers (WD, SD, MDE, KM, TWS), pp. 681–690.
- ICSE-2011-FeinRSMGGBCLSMMSD #automation #deployment #tool support
- Using MATCON to generate CASE tools that guide deployment of pre-packaged applications (EF, NR, SS, PM, SG, RG, MB, SKC, JL, VSS, SM, DM, BS, PD), pp. 1016–1018.
- ICSE-2011-Goeritzer #impact analysis #industrial
- Using impact analysis in industry (RG), pp. 1155–1157.
- ICSE-2011-KamalrudinHG #case study #interactive #quality #requirements
- Improving requirements quality using essential use case interaction patterns (MK, JGH, JCG), pp. 531–540.
- ICSE-2011-LimDF #identification #network #requirements #social
- StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
- ICSE-2011-Malik #analysis #graph
- Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
- ICSE-2011-MurtazaMGL #fault
- Diagnosing new faults using mutants and prior faults (SSM, NHM, MG, ZL), pp. 960–963.
- ICSE-2011-Smith #functional #requirements #security #testing
- Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
- ICSE-2011-Thomas #mining #modelling #repository #topic
- Mining software repositories using topic models (SWT), pp. 1138–1139.
- ICSE-2011-TofanGA #architecture #grid
- Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
- SAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict
- Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
- SAC-2011-BelcaidBHP #clustering #performance
- Efficient clustering of populations using a minimal SNP panel (MB, KB, DH, GP), pp. 83–88.
- SAC-2011-ChangH #approach #model transformation #multi #verification
- A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
- SAC-2011-FabreKT #lessons learnt #robust
- Robustness of automotive applications using reflective computing: lessons learnt (JCF, MOK, FT), pp. 230–235.
- SAC-2011-HeinenE #incremental #modelling
- Incremental feature-based mapping from sonar data using Gaussian mixture models (MRH, PME), pp. 1370–1375.
- SAC-2011-HuLCHXL #image #segmentation
- Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
- SAC-2011-Jamil #graph #query #unification
- Computing subgraph isomorphic queries using structural unification and minimum graph structures (HMJ), pp. 1053–1058.
- SAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech
- iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
- SAC-2011-KostakisKMM #comparison #graph
- Improved call graph comparison using simulated annealing (OK, JK, HM, KM), pp. 1516–1523.
- SAC-2011-LeungJ #data type #mining #nondeterminism
- Frequent itemset mining of uncertain data streams using the damped window model (CKSL, FJ), pp. 950–955.
- SAC-2011-LinXYYZGQCG #anti #hardware #named
- SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
- SAC-2011-Liu #agile #configuration management
- Rapid application configuration in Amazon cloud using configurable virtual appliances (HL), pp. 147–154.
- SAC-2011-MakanjuZM #retrieval
- Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
- SAC-2011-MeerBHFK #automation #framework #web
- A framework for automatic annotation of web pages using the Google rich snippets vocabulary (JvdM, FB, FH, FF, UK), pp. 765–772.
- SAC-2011-NakajimaLYZGXYDQCG #hybrid #optimisation #virtual machine
- Optimizing virtual machines using hybrid virtualization (JN, QL, SY, MZ, SG, MX, PY, YD, ZQ, KC, HG), pp. 573–578.
- SAC-2011-SebastianC #approach #design #re-engineering #towards
- Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
- SAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code
- Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
- SAC-2011-TranCTV #automation #modelling #process #reuse
- Automatic reuse of process patterns in process modeling (HNT, BC, TDT, MHV), pp. 1431–1438.
- SAC-2011-TrindadeR #3d #multi #navigation
- Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
- SAC-2011-VenkateshGBC #fixpoint #implementation #markov #modelling #recognition #speech
- Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov models (NV, RG, RB, MGC), pp. 368–373.
- SAC-2011-YuLGZZ #fault #modelling #multi
- Locating faults using multiple spectra-specific models (KY, ML, QG, HZ, XZ), pp. 1404–1410.
- SAC-2011-YuMGTBGGTL
- System-level co-simulation of integrated avionics using polychrony (HY, YM, YG, JPT, LB, TG, PLG, AT, OL), pp. 354–359.
- SAC-2011-ZhangWAWLL #performance
- Fast lists intersection with Bloom filter using graphics processing units (FZ, DW, NA, GW, XL, JL), pp. 825–826.
- SAC-2011-ZouaqGH #concept #graph
- Ontologizing concept maps using graph theory (AZ, DG, MH), pp. 1687–1692.
- LDTA-2011-SoderbergH #editing #jastadd #semantics #tool support
- Building semantic editors using JastAdd: tool demonstration (ES, GH), p. 11.
- SLE-2011-JoncheereS #composition #workflow
- Uniform Modularization of Workflow Concerns Using Unify (NJ, RVDS), pp. 77–96.
- SLE-2011-StappersWRAN #case study #domain-specific language #formal method #industrial
- Formalizing a Domain Specific Language Using SOS: An Industrial Case Study (FPMS, SW, MAR, SA, IN), pp. 223–242.
- ASPLOS-2011-KamruzzamanST #manycore #migration #thread
- Inter-core prefetching for multicore processors using migrating helper threads (MK, SS, DMT), pp. 393–404.
- CASE-2011-BoemPFP #clustering #distance #multi
- Multi-feature trajectory clustering using Earth Mover’s Distance (FB, FAP, GF, TP), pp. 310–315.
- CASE-2011-CabasinoGSSZ #fault #petri net
- Fault diagnosis of an ABS system using Petri nets (MPC, AG, CS, AS, KZ), pp. 594–599.
- CASE-2011-FantiSU #constraints #problem #scheduling #symmetry
- Solving scheduling problems in distribution centers using symmetry breaking constraints (MPF, GS, WU), pp. 58–65.
- CASE-2011-FeiMA #automaton #finite #modelling #resource management
- Modeling sequential resource allocation systems using Extended Finite Automata (ZF, SM, KÅ), pp. 444–449.
- CASE-2011-GhomriA #hybrid #petri net
- Continuous flow systems and control methodology using Hybrid Petri nets (LG, HA), pp. 419–424.
- CASE-2011-HajiD #case study #simulation
- A simulation case study: Reducing outpatient waiting time of otolaryngology care services using VBA (MH, HD), pp. 525–530.
- CASE-2011-HaoD #incremental #optimisation
- Optimization of tool trajectory for Incremental Sheet Forming using closed loop control (WH, SD), pp. 779–784.
- CASE-2011-HeoOP #locality #mobile
- A localization system of mobile robots using artificial landmarks (DHH, ARO, THP), pp. 139–144.
- CASE-2011-JamesBHACC #mining #mobile
- Tele-operation of a mobile mining robot using a panoramic display: an exploration of operators sense of presence (CAJ, TPB, KH, LA, CC, AC), pp. 279–284.
- CASE-2011-JulvezMV #analysis #simulation
- Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
- CASE-2011-KurzKP #maintenance #network
- Dynamic Maintenance in semiconductor manufacturing using Bayesian networks (DK, JK, JP), pp. 238–243.
- CASE-2011-MohanSBKE #3d #image
- 3D scanning of object surfaces using structured light and a single camera image (SM, KBS, IB, VK, RDE), pp. 151–156.
- CASE-2011-RatnakarZ #detection
- An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
- CASE-2011-StyliosG #fuzzy #modelling
- Modeling complex logistics systems using soft computing methodology of Fuzzy Cognitive Maps (CDS, GKG), pp. 72–77.
- CASE-2011-UrliM #industrial #realtime
- Use of Ethernet communications for real-time control systems in the metals industry (LU, SM), pp. 6–11.
- CASE-2011-XieZSL #fuzzy
- Position servo control of the slider in double toggle mechanical press using Bezier curve model and fuzzy control (JX, SZ, ZS, JL), pp. 773–778.
- CC-2011-GreweO #approach #clustering
- A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
- CC-2011-JenistaED #parallel #reachability
- Using Disjoint Reachability for Parallelization (JCJ, YHE, BD), pp. 198–224.
- CC-2011-NaeemL #alias #analysis #performance #set #summary
- Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
- CGO-2011-LiuM #analysis #locality #problem
- Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
- CGO-2011-SanchezASPS #compilation
- Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
- DAC-2011-GeQ #machine learning #multi
- Dynamic thermal management for multimedia applications using machine learning (YG, QQ), pp. 95–100.
- DAC-2011-GhaniN #branch #grid #power management #verification
- Power grid verification using node and branch dominance (NHAG, FNN), pp. 682–687.
- DAC-2011-HaddadN #analysis #grid #power management
- Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
- DAC-2011-KesturIPANC #architecture #co-evolution #design #framework #re-engineering
- An algorithm-architecture co-design framework for gridding reconstruction using FPGAs (SK, KMI, SP, AAM, VN, CC), pp. 585–590.
- DAC-2011-KuoSR #analysis #performance #reachability #source code
- Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
- DAC-2011-LinH #satisfiability
- Using SAT-based Craig interpolation to enlarge clock gating functions (THL, CY(H), pp. 621–626.
- DAC-2011-MirandaRBW #design #modelling #standard #statistics
- Statistical characterization of standard cells using design of experiments with response surface modeling (MM, PR, LB, GIW), pp. 77–82.
- DAC-2011-NowrozWR #modelling
- Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
- DAC-2011-SorgenfreiS #detection
- Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
- DAC-2011-TsaiZCH #bidirectional #fault tolerance
- A fault-tolerant NoC scheme using bidirectional channel (WCT, DYZ, SJC, YHH), pp. 918–923.
- DAC-2011-WangXAP #classification #learning #policy #power management
- Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
- DAC-2011-WeiP #security
- Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
- DAC-2011-YangBC #detection #embedded #energy #fault
- Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
- DATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive
- Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
- DATE-2011-AlordaTBS #embedded #optimisation
- Stability optimization of embedded 8T SRAMs using Word-Line Voltage modulation (BA, GT, SAB, JS), pp. 986–991.
- DATE-2011-AmoryOMML #energy
- Evaluating energy consumption of homogeneous MPSoCs using spare tiles (AMA, LO, CAMM, FGM, ML), pp. 1164–1167.
- DATE-2011-AsadiniaMTS
- Supporting non-contiguous processor allocation in mesh-based CMPs using virtual point-to-point links (MA, MM, AT, HSA), pp. 413–418.
- DATE-2011-ButtrickK #3d #network #on the #testing
- On testing prebond dies with incomplete clock networks in a 3D IC using DLLs (MB, SK), pp. 1418–1423.
- DATE-2011-DammHJPS #architecture #component #contract #design #integration #specification #testing
- Using contract-based component specifications for virtual integration testing and architecture design (WD, HH, BJ, TP, IS), pp. 1023–1028.
- DATE-2011-EggersglusD #fault #generative #optimisation #pseudo #testing
- As-Robust-As-Possible test generation in the presence of small delay defects using pseudo-Boolean optimization (SE, RD), pp. 1291–1296.
- DATE-2011-GoyalN #grid #performance #power management #verification
- Efficient RC power grid verification using node elimination (AG, FNN), pp. 257–260.
- DATE-2011-GrammatikakisPSP #estimation
- System-level power estimation methodology using cycle- and bit-accurate TLM (MDG, SP, JPS, CP), pp. 1125–1126.
- DATE-2011-KaraklajicFSV #detection #fault #low cost
- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
- DATE-2011-KimCSY #modelling #parallel #performance #simulation
- Temporal parallel simulation: A fast gate-level HDL simulation using higher level models (DK, MJC, KS, SY), pp. 1584–1589.
- DATE-2011-LiuHRG #optimisation #process
- Global optimization of integrated transformers for high frequency microwave circuits using a Gaussian process based surrogate model (BL, YH, PR, GGEG), pp. 1101–1106.
- DATE-2011-LiuSTV #design #generative #towards #validation
- Towards coverage closure: Using GoldMine assertions for generating design validation stimulus (LL, DS, WT, SV), pp. 173–178.
- DATE-2011-MeyerGCLS #cost analysis #execution #safety
- Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
- DATE-2011-MeyerNHBSGSB #configuration management #performance
- Fast Start-up for Spartan-6 FPGAs using Dynamic Partial Reconfiguration (JM, JN, MH, LB, OS, RMG, RS, JB), pp. 1542–1547.
- DATE-2011-NarayananZT #correctness #pattern matching #process
- Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
- DATE-2011-SinghSG #generative #performance #testing
- Testing of high-speed DACs using PRBS generation with “Alternate-Bit-Tapping” (MS, MS, SG), pp. 377–382.
- DATE-2011-VissersNN #interface #realtime #synthesis #tool support
- Building real-time HDTV applications in FPGAs using processors, AXI interfaces and high level synthesis tools (KAV, SN, JN), pp. 848–850.
- DATE-2011-WangKAWMA #energy #simulation
- Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
- DATE-2011-WangNKWRLMB #configuration management
- High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches (XW, SN, ARK, FGW, SR, THL, MM, SB), pp. 1065–1070.
- DATE-2011-YeHL #fault #multi #on the
- On diagnosis of multiple faults using compacted responses (JY, YH, XL), pp. 679–684.
- HPCA-2011-CarreteroVARMG #hardware #process
- Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
- HPCA-2011-GhasemiDK #architecture
- Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors (HRG, SCD, NSK), pp. 38–49.
- HPCA-2011-MehraraHSM #javascript #parallel
- Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism (MM, PCH, MS, SAM), pp. 87–98.
- HPCA-2011-PellauerAKPE #manycore #named #simulation
- HAsim: FPGA-based high-detail multicore simulation using time-division multiplexing (MP, MA, MAK, AP, JSE), pp. 406–417.
- HPDC-2011-BalkirFR #architecture #distributed #mining #pipes and filters
- A distributed look-up architecture for text mining applications using mapreduce (ASB, ITF, AR), pp. 279–280.
- HPDC-2011-HudsonNRWJP #case study #data-driven #experience #simulation
- Experiences using smaash to manage data-intensive simulations (RH, JN, LBR, KW, GCJI, MEP), pp. 205–216.
- HPDC-2011-WolinskyF #case study #distributed #experience #grid #self
- Experiences with self-organizing, decentralized grids using the grid appliance (DIW, RJOF), pp. 183–194.
- HPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code
- Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
- LCTES-2011-NavabpourBF #debugging #testing
- Software debugging and testing using the abstract diagnosis theory (SN, BB, SF), pp. 111–120.
- PDP-2011-CorneaB #benchmark #distributed #metric #performance #predict
- Performance Prediction of Distributed Applications Using Block Benchmarking Methods (BFC, JB), pp. 183–190.
- PDP-2011-MotokubotaIH #parametricity
- Accelerating Parameter Sweep Applications Using CUDA (MM, FI, KH), pp. 111–118.
- PDP-2011-ReyesS #optimisation #prototype
- Optimize or Wait? Using llc Fast-Prototyping Tool to Evaluate CUDA Optimizations (RR, FdS), pp. 257–261.
- PDP-2011-WathWL #estimation #grid #parallel
- Parallel Hematopoietic Stem Cell Division Rate Estimation Using an Agent-Based Model on the Grid (RCvdW, EvdW, PL), pp. 311–317.
- SOSP-2011-VeeraraghavanCFN #detection
- Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
- ESOP-2011-GuhaSK #analysis #type system
- Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
- FASE-2011-EhrigET #graph #version control
- A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
- FASE-2011-KelsenMG #complexity #modelling
- Models within Models: Taming Model Complexity Using the Sub-model Lattice (PK, QM, CG), pp. 171–185.
- FASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #visual notation
- On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
- STOC-2011-Goyal #constant #protocol
- Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
- TACAS-2011-GarbervetskyGN #invariant
- Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
- TACAS-2011-GopinathMK #program repair #satisfiability
- Specification-Based Program Repair Using SAT (DG, MZM, SK), pp. 173–188.
- TACAS-2011-TalupurH #model checking
- Biased Model Checking Using Flows (MT, HH), pp. 239–253.
- CADE-2011-SchneiderS #automation #first-order #ontology #owl #proving #reasoning #theorem proving
- Reasoning in the OWL 2 Full Ontology Language Using First-Order Automated Theorem Proving (MS, GS), pp. 461–475.
- CAV-2011-DudkaPV #data type #logic #named
- Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic (KD, PP, TV), pp. 372–378.
- CAV-2011-Jhala #verification
- Using Types for Software Verification (RJ), p. 20.
- CAV-2011-JhalaMR #functional #named #source code #verification
- HMC: Verifying Functional Programs Using Abstract Interpreters (RJ, RM, AR), pp. 470–485.
- CAV-2011-RamanK #behaviour #specification
- Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
- CAV-2011-SharmaDDA #generative #invariant
- Simplifying Loop Invariant Generation Using Splitter Predicates (RS, ID, TD, AA), pp. 703–719.
- CAV-2011-SinghalA #simulation #verification
- Using Coverage to Deploy Formal Verification in a Simulation World (VS, PA), pp. 44–49.
- ICLP-2011-ChishamPSW #logic programming #named #repository #web #web service
- CDAOStore: A Phylogenetic Repository Using Logic Programming and Web Services (BC, EP, TCS, BW), pp. 209–219.
- ICLP-2011-NicholsonSS #generative #logic #music #probability
- Improving the Outcome of a Probabilistic Logic Music System Generator by Using Perlin Noise (CJN, DDS, JS), pp. 231–239.
- ICLP-2011-OstrowskiFSA #evolution #ontology
- Evolution of Ontologies using ASP (MO, GF, TS, GA), pp. 16–27.
- ICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination
- SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
- ICLP-J-2011-CorapiRVPS #design #induction #learning
- Normative design using inductive learning (DC, AR, MDV, JAP, KS), pp. 783–799.
- ICLP-J-2011-DurzinskyMOSW #automation #network #re-engineering
- Automatic network reconstruction using ASP (MD, WM, MO, TS, AW), pp. 749–766.
- ICST-2011-ChenCZXF #clustering #testing
- Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
- ICST-2011-KhalekK #constraints #database #relational #testing #theorem proving
- Systematic Testing of Database Engines Using a Relational Constraint Solver (SAK, SK), pp. 50–59.
- ICST-2011-MalikSK #constraints #data type #debugging
- Constraint-Based Program Debugging Using Data Structure Repair (MZM, JHS, SK), pp. 190–199.
- ICST-2011-Nica #on the #testing
- On the Improvement of the Mutation Score Using Distinguishing Test Cases (SN), pp. 423–426.
- ICST-2011-SmithW #detection #heuristic #sql #web
- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
- ICST-2011-YuSSR #embedded #testing
- Using Property-Based Oracles when Testing Embedded System Applications (TY, AS, WSa, GR), pp. 100–109.
- ICTSS-2011-MammarCJMO #c #detection #source code #testing
- Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
- ICTSS-2011-MeinkeN #term rewriting #testing
- Learning-Based Testing for Reactive Systems Using Term Rewriting Technology (KM, FN), pp. 97–114.
- ICTSS-2011-SchwarzlAW #composition #random testing #testing
- Compositional Random Testing Using Extended Symbolic Transition Systems (CS, BKA, FW), pp. 179–194.
- ISSTA-2011-GuoE #automation #data analysis #persistent
- Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
- ISSTA-2011-NaminK #testing
- The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
- ISSTA-2011-SegallTF #combinator #design #diagrams
- Using binary decision diagrams for combinatorial test design (IS, RTB, EF), pp. 254–264.
- SAT-2011-BennettS #principle
- Model Counting Using the Inclusion-Exclusion Principle (HB, SS), pp. 362–363.
- SAT-2011-GableskeH #named #random #satisfiability
- EagleUP: Solving Random 3-SAT Using SLS with Unit Propagation (OG, MH), pp. 367–368.
- TAP-2011-HeamM #approach #automaton #random testing #testing
- A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
- VMCAI-2011-ChengRKB #embedded #fault tolerance #game studies #synthesis #theory and practice
- Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice (CHC, HR, AK, CB), pp. 118–133.
- CBSE-2010-AllierSSV #component #consistency #execution #object-oriented
- Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces (SA, HAS, SS, SV), pp. 216–231.
- CBSE-2010-EichbergKMM #component #composition #feature model #modelling
- Component Composition Using Feature Models (ME, KK, RM, MM), pp. 200–215.
- ECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality
- Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
- ECSA-2010-ElorantaK #architecture #evaluation
- Using Domain Knowledge to Boost Software Architecture Evaluation (VPE, KK), pp. 319–326.
- ECSA-2010-PerezDGA #agile #architecture #flexibility
- Flexible Working Architectures: Agile Architecting Using PPCs (JP, JD, JG, PPA), pp. 102–117.
- QoSA-2010-ChauvelSCHM #adaptation #architecture #self
- Using QoS-Contracts to Drive Architecture-Centric Self-adaptation (FC, HS, XC, GH, HM), pp. 102–118.
- DocEng-2010-BeaudouxBJ #authoring #modelling
- Using model driven engineering technologies for building authoring applications (OB, AB, JMJ), pp. 279–282.
- DocEng-2010-KarolHHA #documentation #feature model #modelling #product line
- Using feature models for creating families of documents (SK, MH, FH, UA), pp. 259–262.
- DocEng-2010-NamaneSM #feature model #matrix #recognition
- Degraded dot matrix character recognition using CSM-based feature extraction (AN, EHS, PM), pp. 207–210.
- DocEng-2010-OllisBB #documentation
- Optimized reprocessing of documents using stored processor state (JAO, DFB, SRB), pp. 135–138.
- DocEng-2010-SojkaH #documentation #library #optimisation
- Document engineering for a digital library: PDF recompression using JBIG2 and other optimizations of PDF documents (PS, RH), pp. 3–12.
- DocEng-2010-ThaoM #data type #detection #version control #xml
- Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
- DRR-2010-BallKSN #analysis #documentation
- Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
- DRR-2010-BianneKL #clustering #modelling #recognition #word
- Context-dependent HMM modeling using tree-based clustering for the recognition of handwritten words (ALB, CK, LLS), pp. 1–10.
- DRR-2010-ChazalonC #definite clause grammar #documentation
- Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
- DRR-2010-ChenMT #automation #performance #validation #word
- Efficient automatic OCR word validation using word partial format derivation and language model (SC, DM, GRT), pp. 1–10.
- DRR-2010-PeredaT #precise #semiparsing
- Date of birth extraction using precise shallow parsing (RP, KT), pp. 1–10.
- DRR-2010-YouADRGT #image #multimodal #retrieval
- Biomedical article retrieval using multimodal features and image annotations in region-based CBIR (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
- ECDL-2010-BiaMG #library
- Estimating Digitization Costs in Digital Libraries Using DiCoMo (AB, RM, JG), pp. 136–147.
- ECDL-2010-BiaMG10a #documentation #mindmap
- Using Mind Maps to Model Semistructured Documents (AB, RM, JG), pp. 421–424.
- ECDL-2010-BillerbeckDFIK #query #ranking #web
- Ranking Entities Using Web Search Query Logs (BB, GD, CSF, TI, RK), pp. 273–281.
- ECDL-2010-Black #data type #framework #metadata #pattern matching
- Using Pattern Language as a Framework for Future Metadata Structure (EAB), pp. 393–396.
- ECDL-2010-CamargoCG #image #matrix #multimodal #visualisation
- Multimodal Image Collection Visualization Using Non-negative Matrix Factorization (JEC, JCC, FAG), pp. 429–432.
- HT-2010-ChoudhuryFAGLY #automation #social
- Automatic construction of travel itineraries using social breadcrumbs (MDC, MF, SAY, NG, RL, CY), pp. 35–44.
- HT-2010-FossC #adaptation #authoring #generative #hypermedia #tool support
- The next generation authoring adaptive hypermedia: using and evaluating the MOT3.0 and PEAL tools (JGKF, AIC), pp. 83–92.
- HT-2010-GasslerZTS #named #recommendation
- SnoopyDB: narrowing the gap between structured and unstructured information using recommendations (WG, EZ, MT, GS), pp. 271–272.
- JCDL-2010-AngroshCS #identification #library #random #towards
- Context identification of sentences in related work sections using a conditional random field: towards intelligent digital libraries (MAA, SC, NS), pp. 293–302.
- JCDL-2010-BammanBC #multi
- Transferring structural markup across translations using multilingual alignment and projection (DB, AB, GRC), pp. 11–20.
- JCDL-2010-MonroyFC #library #multi #ontology #taxonomy
- Using an ontology and a multilingual glossary for enhancing the nautical archaeology digital library (CM, RF, FC), pp. 259–262.
- JCDL-2010-TahmasebiNTR #documentation #word
- Using word sense discrimination on historic document collections (NT, KN, TT, TR), pp. 89–98.
- PODS-2010-ReS #comprehension #estimation
- Understanding cardinality estimation using entropy maximization (CR, DS), pp. 53–64.
- SIGMOD-2010-BaoDKR #workflow
- An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
- SIGMOD-2010-GatterbauerS #trust
- Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
- SIGMOD-2010-JinYW #classification #graph #named
- GAIA: graph classification using evolutionary computation (NJ, CY, WW), pp. 879–890.
- SIGMOD-2010-ShindeGGD #locality #similarity
- Similarity search and locality sensitive hashing using ternary content addressable memories (RS, AG, PG, DD), pp. 375–386.
- SIGMOD-2010-VernicaCL #parallel #performance #pipes and filters
- Efficient parallel set-similarity joins using MapReduce (RV, MJC, CL), pp. 495–506.
- SIGMOD-2010-YangWLW #keyword #optimisation #web
- Optimizing content freshness of relations extracted from the web using keyword search (MY, HW, LL, MW), pp. 819–830.
- VLDB-2010-DyresonBM #xml
- Using XMorph to Transform XML Data (CED, SSB, KM), pp. 1541–1544.
- VLDB-2010-GolabKKS #quality #semantics
- Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux (LG, HJK, FK, DS), pp. 1641–1644.
- VLDB-2010-KazemitabarDAAS #query #sql
- Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight (SJK, UD, MHA, AA, CS), pp. 1537–1540.
- VLDB-2010-LimayeSC #web
- Annotating and Searching Web Tables Using Entities, Types and Relationships (GL, SS, SC), pp. 1338–1347.
- VLDB-2010-MiddelfartP
- Using Sentinel Technology in the TARGIT BI Suite (MM, TBP), pp. 1629–1632.
- VLDB-2010-TermehchyW #keyword #named #xml
- EXTRUCT: Using Deep Structural Information in XML Keyword Search (AT, MW), pp. 1593–1596.
- VLDB-2011-LeeH10 #clustering #named #performance
- QSkycube: Efficient Skycube Computation using Point-Based Space Partitioning (JL, SwH), pp. 185–196.
- CSEET-2010-LewHS #re-engineering
- Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course (MWL, TBH, MS), pp. 121–128.
- EDM-2010-BousbiaLBR #behaviour #learning #web
- Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments (NB, JML, AB, IR), pp. 279–280.
- EDM-2010-CadeO #modelling #topic
- Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
- EDM-2010-FalakmasirH #data mining #education #mining
- Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning (MHF, JH), pp. 241–248.
- EDM-2010-FinchamABF #modelling
- Using Neural Imaging and Cognitive Modeling to Infer Mental States while Using an Intelligent Tutoring System (JMF, JRA, SB, JLF), pp. 51–60.
- EDM-2010-GongBH #multi #parametricity
- Using multiple Dirichlet distributions to improve parameter plausibility (YG, JEB, NTH), pp. 61–70.
- EDM-2010-HowardJN #mining #process
- Examining Learner Control in a Structured Inquiry Cycle Using Process Mining (LH, JJ, CN), pp. 71–80.
- EDM-2010-JeongBJH #analysis #behaviour #effectiveness #learning #markov #modelling
- Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
- EDM-2010-KhodeirWDH #abduction #difference #network #probability #student
- Inferring the Differential Student Model in a Probabilistic Domain Using Abduction inference in Bayesian networks (NK, NMW, NMD, NH), pp. 299–300.
- EDM-2010-MacfadyenS #design #interactive #monitoring #online
- Using LiMS (the Learner Interaction Monitoring System) to Track Online Learner Engagement and Evaluate Course Design (LM, PS), pp. 301–302.
- EDM-2010-MontalvoBPNG #identification #machine learning #student
- Identifying Students’ Inquiry Planning Using Machine Learning (OM, RSJdB, MASP, AN, JDG), pp. 141–150.
- EDM-2010-PedroBMNG #behaviour #detection
- Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
- EDM-2010-ShanabrookCWA #behaviour #identification #student
- Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
- EDM-2010-StamperBC #knowledge base #problem
- Using a Bayesian Knowledge Base for Hint Selection on Domain Specific Problems (JCS, TB, MJC), pp. 327–328.
- EDM-2010-YudelsonBMM #adaptation #education #integration #optimisation #semantics
- Using Numeric Optimization To Refine Semantic User Model Integration Of Adaptive Educational Systems (MY, PB, AM, MM), pp. 221–230.
- ITiCSE-2010-AlaoutinenS #programming #self #student #taxonomy
- Student self-assessment in a programming course using bloom’s revised taxonomy (SA, KS), pp. 155–159.
- ITiCSE-2010-AydinolG #web
- Advantage of using web 2.0 applications in class (ABA, ÖG), p. 308.
- ITiCSE-2010-BasawapatnaKR #design #education #game studies #scalability
- Using scalable game design to teach computer science from middle school to graduate school (ARB, KHK, AR), pp. 224–228.
- ITiCSE-2010-BasawapatnaR #feedback #how #physics #student
- Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
- ITiCSE-2010-Crescenzi
- Using AVs to explain NP-completeness (PC), p. 299.
- ITiCSE-2010-FinkelsteinPHDCB #game studies #named #network #social #student
- SNAG: using social networking games to increase student retention in computer science (SLF, EP, AH, KD, SRC, TB), pp. 142–146.
- ITiCSE-2010-GarlickC #empirical
- Using alice in CS1: a quantitative experiment (RG, ECC), pp. 165–168.
- ITiCSE-2010-GunawardenaTK #collaboration
- Encouraging reading and collaboration using classroom salon (AG, AT, DK), pp. 254–258.
- ITiCSE-2010-HowardJN #behaviour #design #learning #online
- Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
- ITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition
- Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
- ITiCSE-2010-KyrilovCT #assessment #case study #education #evaluation #online
- Improving CS education at Wits using an online assessment and evaluation system: a case study (AK, JC, MT), p. 314.
- ITiCSE-2010-Larraza-MendiluzeG #game studies #learning #process #topic
- Changing the learning process of the input/output topic using a game in a portable console (ELM, NGV), p. 316.
- ITiCSE-2010-MarkhamK #case study #experience
- Using personal robots in CS1: experiences, outcomes, and attitudinal influences (SM, KNK), pp. 204–208.
- ITiCSE-2010-MartinezLDC #case study #experience #re-engineering
- Experiences in software engineering courses using psychometrics with RAMSET (LGM, GL, ARD, JRC), pp. 244–248.
- SIGITE-2010-KulgachevJ #evaluation #network #performance
- 802.11 networks performance evaluation using OPNET (VK, HJ), pp. 149–152.
- SIGITE-2010-WangHY #education #network #security
- Using VMware VCenter lab manager in undergraduate education for system administration and network security (XW, GCH, RY), pp. 43–52.
- CSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #word
- Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
- CSMR-2010-NadiHM #predict #set
- Does the Past Say It All? Using History to Predict Change Sets in a CMDB (SN, RCH, SM), pp. 97–106.
- CSMR-2010-OzkayaPGC #architecture #evolution #requirements
- Using Architecturally Significant Requirements for Guiding System Evolution (IO, JADP, AG, SC), pp. 127–136.
- CSMR-2010-Shrinivasan #migration
- Data Migration from a Product to a Data Warehouse Using ETL Tool (CS), pp. 63–65.
- ICPC-2010-ChenR #case study #dependence #feature model #graph
- Case Study of Feature Location Using Dependence Graph, after 10 Years (KC, VR), pp. 1–3.
- ICPC-2010-RevelleDP #data fusion #feature model #mining #web
- Using Data Fusion and Web Mining to Support Feature Location in Software (MR, BD, DP), pp. 14–23.
- ICPC-2010-ScannielloDDD #algorithm #clustering
- Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering (GS, AD, CD, TD), pp. 180–189.
- ICSM-2010-AbdallahMG #robust #slicing
- Certifying software robustness using program slicing (MA, MM, KG), pp. 1–2.
- ICSM-2010-CanforaCCP #detection #empirical #logic #multi
- Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
- ICSM-2010-DajsurenGM #legacy
- Modernizing legacy software using a System Grokking technology (YD, MG, DM), pp. 1–7.
- ICSM-2010-GethersP #modelling #object-oriented #relational #topic
- Using Relational Topic Models to capture coupling among classes in object-oriented software systems (MG, DP), pp. 1–10.
- ICSM-2010-HindleGH #process
- Software process recovery using Recovered Unified Process Views (AH, MWG, RCH), pp. 1–10.
- ICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification
- Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
- ICSM-2010-KameiMMMAH #debugging #modelling #predict
- Revisiting common bug prediction findings using effort-aware models (YK, SM, AM, KiM, BA, AEH), pp. 1–10.
- ICSM-2010-SaleckerG #graph #testing
- Pairwise test set calculation using k-partite graphs (ES, SG), pp. 1–5.
- ICSM-2010-SavageDGP #named #source code #topic
- TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
- ICSM-2010-Wilson #concept #ontology
- Using ontology fragments in concept location (LAW), pp. 1–2.
- MSR-2010-JuzgadoV #difference #re-engineering
- Using differences among replications of software engineering experiments to gain knowledge (NJJ, SV).
- MSR-2010-PentaGA #approach #identification
- Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
- SCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming
- Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
- SCAM-2010-ThomasAHB #evolution #modelling #topic #validation
- Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
- WCRE-2010-BittencourtSGM #automation #information retrieval #modelling
- Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
- WCRE-2010-GratiSP #diagrams #execution #interactive #sequence chart #visualisation
- Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization (HG, HAS, PP), pp. 87–96.
- WCRE-2010-HaiducAMM #automation #on the #source code #summary
- On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
- WCRE-2010-SelimFZ #clone detection #detection #representation
- Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
- WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based
- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
- CIAA-2010-Johnson #natural language
- Uniformizing Rational Relations for Natural Language Applications Using Weighted Determinization (JHJ), pp. 173–180.
- CIAA-2010-Jonoska #automaton #self
- Using Automata to Describe Self-Assembled Nanostructures (NJ), pp. 1–3.
- CIAA-2010-YuBI #automaton #multi #relational #string #verification
- Relational String Verification Using Multi-track Automata (FY, TB, OHI), pp. 290–299.
- DLT-2010-Head #algebra #parallel
- Using Light to Implement Parallel Boolean Algebra (TH), pp. 231–242.
- ICALP-v1-2010-BojanczykP #automaton #evaluation #nondeterminism #performance
- Efficient Evaluation of Nondeterministic Automata Using Factorization Forests (MB, PP), pp. 515–526.
- ICALP-v2-2010-FontaineLV #algebra #approach #automaton
- Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
- LATA-2010-KasprzikK #learning #string
- String Extension Learning Using Lattices (AK, TK), pp. 380–391.
- LATA-2010-LetichevskySS #automaton #equivalence #finite #multi #problem #proving
- The Equivalence Problem of Deterministic Multitape Finite Automata: A New Proof of Solvability Using a Multidimensional Tape (AAL, ASS, SKS), pp. 392–402.
- LATA-2010-Penaloza #reasoning #standard
- Using Sums-of-Products for Non-standard Reasoning (RP), pp. 488–499.
- IFM-2010-LanoR #model transformation #specification #uml #verification
- Specification and Verification of Model Transformations Using UML-RSDS (KL, SKR), pp. 199–214.
- SEFM-2010-GothelG #automation #invariant #network #realtime #towards #verification
- Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants (TG, SG), pp. 310–314.
- SEFM-2010-LindsayWY #assessment #behaviour #model checking #safety
- Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
- SEFM-2010-ScannielloRT #architecture #empirical #evaluation #semantics
- Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation (GS, MR, GT), pp. 103–112.
- SEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing
- A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
- FLOPS-2010-MorihataM #automation #parallel #quantifier #recursion
- Automatic Parallelization of Recursive Functions Using Quantifier Elimination (AM, KM), pp. 321–336.
- FLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis
- Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
- Haskell-2010-Morris #case study #design #experience
- Experience report: using hackage to inform language design (JGM), pp. 61–66.
- ICFP-2010-BradyH #domain-specific language #implementation #partial evaluation
- Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation (EB, KH), pp. 297–308.
- ICFP-2010-Pop #case study #experience #haskell #python
- Experience report: Haskell as a reagent: results and observations on the use of Haskell in a python project (IP), pp. 369–374.
- ICFP-2010-ScottSGM #functional #industrial #programming
- Using functional programming within an industrial product group: perspectives and perceptions (DJS, RS, TG, AM), pp. 87–92.
- IFL-2010-BjornsonTG #f# #user interface
- Composing Reactive GUIs in F# Using WebSharper (JB, AT, AG), pp. 203–216.
- ILC-2010-YuasaY #low level #validation
- Validating low-level instructions for fixnums using BDDs (SY, MY), pp. 11–20.
- AIIDE-2010-GoldO #game studies
- Using Machine Translation to Convert Between Difficulties in Rhythm Games (KG, AO).
- AIIDE-2010-HeckelY #behaviour #coordination #multi
- Multi-Agent Coordination Using Dynamic Behavior-Based Subsumption (FWPH, GMY).
- AIIDE-2010-SharifiZS #behaviour #game studies #learning
- Learning Companion Behaviors Using Reinforcement Learning in Games (AS, RZ, DS).
- AIIDE-2010-YoungbloodHHC #agile #behaviour #development #game studies
- Rapid Development of Characters in FPS/3PS Games Using Visually-Specified Behavior-based Control (GMY, FWPH, DHH, AC).
- CIG-2010-BeaudryBCK #challenge #game studies #markov
- Using Markov decision theory to provide a fair challenge in a roll-and-move board game (EB, FB, SC, FK), pp. 1–8.
- CIG-2010-BenbassatS #evolution #programming #search-based
- Evolving Lose-Checkers players using genetic programming (AB, MS), pp. 30–37.
- CIG-2010-CardamoneLLB #algorithm #search-based
- Searching for the optimal racing line using genetic algorithms (LC, DL, PLL, APB), pp. 388–394.
- CIG-2010-LevillainORB #experience #fuzzy
- Characterizing player's experience from physiological signals using fuzzy decision trees (FL, JOO, MR, BBM), pp. 75–82.
- CIG-2010-MawhorterM #generative
- Procedural level generation using occupancy-regulated extension (PAM, MM), pp. 351–358.
- CIG-2010-OnievaCLL #fuzzy #logic
- Overtaking opponents with blocking strategies using fuzzy logic (EO, LC, DL, PLL), pp. 123–130.
- CIG-2010-RawalRM #behaviour
- Constructing competitive and cooperative agent behavior using coevolution (AR, PR, RM), pp. 107–114.
- CIG-2010-SmithAHL #education
- Using co-evolved RTS opponents to teach spatial tactics (GS, PA, RH, SJL), pp. 146–153.
- FDG-2010-BoyceB #game studies #learning #motivation
- BeadLoom Game: using game elements to increase motivation and learning (AKB, TB), pp. 25–31.
- FDG-2010-SheldonPKOCTR #approach #game studies #learning #mobile #named #student
- Weatherlings: a new approach to student learning using web-based mobile games (JS, JP, EK, JO, VHHC, PWT, LR), pp. 203–208.
- FDG-2010-TreanorMW #design #exclamation #game studies #logic #visual notation
- Kaboom! is a many-splendored thing: an interpretation and design methodology for message-driven games using graphical logics (MT, MM, NWF), pp. 224–231.
- VS-Games-2010-YusoffCG #game studies #validation
- Validation of Serious Games Attributes Using the Technology Acceptance Model (AY, RC, LG), pp. 45–51.
- ICGT-2010-Qayum #automation #graph transformation #refactoring #search-based
- Automated Assistance for Search-Based Refactoring Using Unfolding of Graph Transformation Systems (FQ), pp. 407–409.
- ICGT-2010-SpicherMG #declarative
- Declarative Mesh Subdivision Using Topological Rewriting in MGS (AS, OM, JLG), pp. 298–313.
- ICGT-2010-Zambon #abstraction #graph transformation #verification
- Using Graph Transformations and Graph Abstractions for Software Verification (EZ), pp. 416–418.
- CHI-2010-BillingsW #comprehension #online
- Understanding dispute resolution online: using text to reflect personal and substantive issues in conflict (MB, LAW), pp. 1447–1456.
- CHI-2010-ChangYM #testing #user interface
- GUI testing using computer vision (THC, TY, RCM), pp. 1535–1544.
- CHI-2010-ChevalierDBF #documentation #navigation
- Using text animated transitions to support navigation in document histories (FC, PD, AB, JDF), pp. 683–692.
- CHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering
- Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
- CHI-2010-DixonPH #feedback #named #recognition #sketching
- iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces (DD, MP, TH), pp. 897–906.
- CHI-2010-DruinFHGH #interface #keyword
- Children’s roles using keyword search interfaces at home (AD, EF, HH, EG, LH), pp. 413–422.
- CHI-2010-HeerB #crowdsourcing #design #visual notation #visualisation
- Crowdsourcing graphical perception: using mechanical turk to assess visualization design (JH, MB), pp. 203–212.
- CHI-2010-HogganB #interface #multimodal #named #testing
- Crosstrainer: testing the use of multimodal interfaces in situ (EEH, SAB), pp. 333–342.
- CHI-2010-HuhNS #comprehension #reuse
- Finding the lost treasure: understanding reuse of used computing devices (JH, KN, NS), pp. 1875–1878.
- CHI-2010-LankST #documentation #fault #injection
- Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
- CHI-2010-McGookinRB #graph #interactive
- Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
- CHI-2010-SongGGF #interactive #mobile #named
- MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector (HS, FG, TG, GWF), pp. 2451–2460.
- CHI-2010-VertanenM #performance #speech
- Speech dasher: fast writing using speech and gaze (KV, DJCM), pp. 595–598.
- CHI-2010-Villamarin-SalomonB #behaviour
- Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
- CHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order
- An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
- CHI-2010-WuDM #detection #enterprise #network #social
- Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
- CHI-2010-YukselDTS #human-computer #interface #multi #novel
- A novel brain-computer interface using a multi-touch surface (BFY, MD, JT, AS), pp. 855–858.
- CSCW-2010-BurkeKW #communication #social
- Social use of computer-mediated communication by adults on the autism spectrum (MB, RK, DW), pp. 425–434.
- SOFTVIS-2010-AnslowMNTB #evaluation #scalability #visualisation
- User evaluation of polymetric views using a large visualization wall (CA, SM, JN, EDT, RB), pp. 25–34.
- SOFTVIS-2010-LinTOB #comprehension #profiling #towards
- Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
- SOFTVIS-2010-TrumperBD #comprehension #parallel #thread #visualisation
- Understanding complex multithreaded software systems by using trace visualization (JT, JB, JD), pp. 133–142.
- SOFTVIS-2010-Zeckzer #layout #matrix #visualisation
- Visualizing software entities using a matrix layout (DZ), pp. 207–208.
- CAiSE-2010-CastanoFM #semantics #variability #web
- Dealing with Matching Variability of Semantic Web Data Using Contexts (SC, AF, SM), pp. 194–208.
- CAiSE-2010-Paraszczak
- The Influence of IT Systems on the Use of the Earth’s Resources (JRP), pp. 7–8.
- EDOC-2010-AmarLCN #aspect-oriented #imperative #programming
- Using Aspect-Oriented Programming to Trace Imperative Transformations (BA, HL, BC, CN), pp. 143–152.
- EDOC-2010-EshuisN #framework #outsourcing #process
- A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
- EDOC-2010-QuartelSL #architecture #enterprise #modelling #requirements
- IT Portfolio Valuation — Using Enterprise Architecture and Business Requirements Modeling (DACQ, MWAS, MML), pp. 3–13.
- EDOC-2010-ZdravkovicI #approach #design #framework #modelling #ontology
- A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
- ICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance
- Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
- ICEIS-AIDSS-2010-FariaGSMM #automation #natural language #ontology
- Using Natural Language Processing for Automatic Extraction of Ontology Instances (CGdF, RG, IS, MM, DM), pp. 278–283.
- ICEIS-AIDSS-2010-GerberKM #formal method #metamodelling #ontology #towards
- Towards the Formalisation of the TOGAF Content Metamodel using Ontologies (AG, PK, AvdM), pp. 54–64.
- ICEIS-AIDSS-2010-GilS #implementation #performance #process
- Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
- ICEIS-AIDSS-2010-HaasMSD #information management #named
- ConTask — Using Context-sensitive Assistance to Improve Task-oriented Knowledge Work (JH, HM, SS, AD), pp. 30–39.
- ICEIS-AIDSS-2010-MoriyasuYN #learning #self
- Supervised Learning for Agent Positioning by using Self-organizing Map (KM, TY, HN), pp. 368–372.
- ICEIS-AIDSS-2010-SahaPMB #classification #clustering #difference #image
- Improvement of Differential Crisp Clustering using ANN Classifier for Unsupervised Pixel Classification of Satellite Image (IS, DP, UM, SB), pp. 21–29.
- ICEIS-AIDSS-2010-SalasPRR #identification
- Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
- ICEIS-AIDSS-2010-TomeAC #architecture #enterprise #experience #named
- TREEAD — A Tool that Enables the Re-use of Experience in Enterprise Architecture Description (PT, LA, EC), pp. 332–343.
- ICEIS-AIDSS-2010-VialeBGP #approach #modelling #process #scalability #sequence
- Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
- ICEIS-DISI-2010-BarczynskiFBS #adaptation #concept #information management #modelling #named
- AdaptIE — Using Domain Language Concept to Enable Domain Experts in Modeling of Information Extraction Plans (WMB, FF, FB, DS), pp. 249–256.
- ICEIS-DISI-2010-FerrucciGOS #development
- Estimating Software Development Effort using Tabu Search (FF, CG, RO, FS), pp. 236–241.
- ICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability
- Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
- ICEIS-DISI-2010-LemosCV #query #relational #sql #xml
- Using SQL/XML for Efficiently Translating Queries over XML View of Relational Data (FCL, CC, VMPV), pp. 269–274.
- ICEIS-DISI-2010-PanZH #library #open source #query #retrieval
- An Open Source Software based Library Catalogue System using Soundexing Retrieval and Query Caching (ZP, YZ, JH), pp. 182–189.
- ICEIS-DISI-2010-PopovicCJ #process #quality
- Absorption of Information Provided by Business Intelligence Systems — The Effect of Information Quality on the Use of Information in Business Processes (AP, PSC, JJ), pp. 176–181.
- ICEIS-DISI-2010-SchusterJS #web
- Finding and Classifying Product Relationships using Information from the Public Web (DS, TMJ, AS), pp. 300–309.
- ICEIS-DISI-2010-SunyaevKDK #framework #health
- Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
- ICEIS-HCI-2010-AstolfiMSA #difference #enterprise #people #problem
- Using Cultural Differences to Join People with Common Interests or Problems in Enterprise Environment (GA, VMAdM, MARS, JCA), pp. 192–197.
- ICEIS-HCI-2010-TranKVW #declarative #generative #modelling #user interface
- Using Task and Data Models for user Interface Declarative Generation (VT, MK, JV, YW), pp. 155–160.
- ICEIS-ISAS-2010-GradlMWK #enterprise #modelling #network #process
- Modeling ERP Business Processes using Layered Queueing Networks (SG, MM, HW, HK), pp. 255–260.
- ICEIS-J-2010-BottcherHM10a #xml
- Using XML Schema Subtraction to Compress Electronic Payment Messages (SB, RH, CM), pp. 451–463.
- ICEIS-J-2010-Cruz-LaraOGBBC #chat #communication #interface #standard
- A Chat Interface Using Standards for Communication and e-Learning in Virtual Worlds (SCL, TO, JG, NB, LB, JPC), pp. 541–554.
- ICEIS-J-2010-HernandesSF10a #collaboration #concept #ontology #taxonomy #visualisation
- Using Visualization and a Collaborative Glossary to Support Ontology Conceptualization (EMH, DS, SF), pp. 90–103.
- ICEIS-J-2010-LopesVSS
- Using Cases, Evidences and Context to Support Decision Making (ECL, VV, ACS, US), pp. 340–356.
- ICEIS-J-2010-UrbanoRO10a #metric
- Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
- ICEIS-SAIC-2010-GoyalK #approach #automation #fuzzy #multi #set
- Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
- ICEIS-SAIC-2010-Kristensen #abstraction #collaboration #message passing
- Abstraction from Collaboration between Agents using Asynchronous Message-passing (BBK), pp. 86–92.
- CIKM-2010-AjiWAG #analysis #modelling
- Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
- CIKM-2010-BatalH #classification #predict
- Constructing classification features using minimal predictive patterns (IB, MH), pp. 869–878.
- CIKM-2010-BenderskyCS #feedback #pseudo #query
- Structural annotation of search queries using pseudo-relevance feedback (MB, WBC, DAS), pp. 1537–1540.
- CIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards
- Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
- CIKM-2010-CartrightALM #approximate #modelling #performance #query
- Fast query expansion using approximations of relevance models (MAC, JA, VL, AM), pp. 1573–1576.
- CIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query
- Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
- CIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image
- Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
- CIKM-2010-FengZXY #crawling #rank
- Focused crawling using navigational rank (SF, LZ, YX, CY), pp. 1513–1516.
- CIKM-2010-Grefenstette #semantics
- Use of semantics in real life applications (GG), pp. 5–6.
- CIKM-2010-GuptaGNM #query
- Efficiently querying archived data using Hadoop (RG, HG, UN, MKM), pp. 1301–1304.
- CIKM-2010-HarveyRC #modelling #ranking #social #topic
- Ranking social bookmarks using topic models (MH, IR, MJC), pp. 1401–1404.
- CIKM-2010-HuangSN #graph #query #refinement #word
- Query model refinement using word graphs (YH, LS, JYN), pp. 1453–1456.
- CIKM-2010-JindalLL #overview
- Finding unusual review patterns using unexpected rules (NJ, BL, EPL), pp. 1549–1552.
- CIKM-2010-KapteinSVK #ranking #wiki
- Entity ranking using Wikipedia as a pivot (RK, PS, APdV, JK), pp. 69–78.
- CIKM-2010-KohnckeB #category theory #documentation #wiki
- Using Wikipedia categories for compact representations of chemical documents (BK, WTB), pp. 1809–1812.
- CIKM-2010-KurashimaIIF #recommendation
- Travel route recommendation using geotags in photo sharing sites (TK, TI, GI, KF), pp. 579–588.
- CIKM-2010-LangMWL #concept #markov #random
- Improved latent concept expansion using hierarchical markov random fields (HL, DM, BW, JTL), pp. 249–258.
- CIKM-2010-LiLY #named #query #semantics
- EntityEngine: answering entity-relationship queries using shallow semantics (XL, CL, CY), pp. 1925–1926.
- CIKM-2010-LimNJLL #behaviour #detection #overview #rating
- Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
- CIKM-2010-LiQKG #automation #constraints #model merging
- Automatic schema merging using mapping constraints among incomplete sources (XL, CQ, DK, SG), pp. 299–308.
- CIKM-2010-MoonLCLZC #feedback #learning #online #ranking #realtime
- Online learning for recency search ranking using real-time user feedback (TM, LL, WC, CL, ZZ, YC), pp. 1501–1504.
- CIKM-2010-NguyenYLF #case study #experience #learning #multi #ranking
- Experiences with using SVM-based learning for multi-objective ranking (LTN, WGY, RL, OF), pp. 1917–1920.
- CIKM-2010-PobleteBMB #graph #image #query #retrieval #semantic gap #web
- Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval (BP, BB, MM, JMB), pp. 1553–1556.
- CIKM-2010-ShavittWW #peer-to-peer #recommendation
- Building recommendation systems using peer-to-peer shared content (YS, EW, UW), pp. 1457–1460.
- CIKM-2010-ShiN #dependence
- Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
- CIKM-2010-SotoudehA #detection #framework #induction
- Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
- CIKM-2010-VijayalakshmiMMDRM #algorithm #search-based
- Intelligent sales forecasting engine using genetic algorithms (MV, BM, RM, AD, RR, KM), pp. 1669–1672.
- CIKM-2010-WangL #clustering #documentation #incremental #summary
- Document update summarization using incremental hierarchical clustering (DW, TL), pp. 279–288.
- CIKM-2010-WhiteBD #predict
- Predicting short-term interests using activity-based search context (RWW, PNB, STD), pp. 1009–1018.
- CIKM-2010-WoodLH #concept #image
- Searching consumer image collections using web-based concept expansion (MDW, ACL, SH), pp. 679–688.
- CIKM-2010-XueCS #analysis #modelling
- Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
- CIKM-2010-XueHC #query #set
- Improving verbose queries using subset distribution (XX, SH, WBC), pp. 1059–1068.
- ECIR-2010-AltingovdeAU #retrieval #xml
- XML Retrieval Using Pruned Element-Index Files (ISA, DA, ÖU), pp. 306–318.
- ECIR-2010-AlyDHS #concept #modelling #retrieval
- Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts (RA, ARD, DH, AFS), pp. 241–252.
- ECIR-2010-CoxZFH #approximate #correctness #query
- Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (IJC, JZ, RF, LKH), pp. 265–280.
- ECIR-2010-GoharianFYM #peer-to-peer #query
- Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
- ECIR-2010-KabadjovSSPP #evaluation #summary #taxonomy
- Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy (MAK, JS, RS, MP, BP), pp. 662–666.
- ECIR-2010-KimCLL #detection #effectiveness #image #named #sequence
- BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
- ECIR-2010-RamanUBB #documentation #feedback #on the #pseudo
- On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents (KR, RU, PB, AB), pp. 573–576.
- ECIR-2010-UdupaK #analysis #canonical #correlation #equivalence
- Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
- ECIR-2010-YangJX #enterprise
- Using Weighted Tagging to Facilitate Enterprise Search (SY, JJ, YX), pp. 590–593.
- ECIR-2010-YinHL #information retrieval #ranking #wiki
- Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia (XY, XH, ZL), pp. 495–507.
- ECIR-2010-ZucconA #documentation #probability #quantum #rank #ranking
- Using the Quantum Probability Ranking Principle to Rank Interdependent Documents (GZ, LA), pp. 357–369.
- ICML-2010-BshoutyL #clustering #linear
- Finding Planted Partitions in Nearly Linear Time using Arrested Spectral Clustering (NHB, PML), pp. 135–142.
- ICML-2010-Busa-FeketeK #performance
- Fast boosting using adversarial bandits (RBF, BK), pp. 143–150.
- ICML-2010-CumminsN #named #recognition #visual notation
- FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model (MJC, PMN), pp. 3–10.
- ICML-2010-DruckM #generative #learning #modelling
- High-Performance Semi-Supervised Learning using Discriminatively Constrained Generative Models (GD, AM), pp. 319–326.
- ICML-2010-KokD #learning #logic #markov #network
- Learning Markov Logic Networks Using Structural Motifs (SK, PMD), pp. 551–558.
- ICML-2010-LayB #classification #predict
- Supervised Aggregation of Classifiers using Artificial Prediction Markets (NL, AB), pp. 591–598.
- ICML-2010-PetrikTPZ #approximate #feature model #linear #markov #process #source code
- Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes (MP, GT, RP, SZ), pp. 871–878.
- ICML-2010-Salakhutdinov #adaptation #learning
- Learning Deep Boltzmann Machines using Adaptive MCMC (RS), pp. 943–950.
- ICML-2010-YuZ #coordination
- Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
- ICPR-2010-AdluruTWD #re-engineering
- Improving Undersampled MRI Reconstruction Using Non-local Means (GA, TT, RTW, EVRDB), pp. 4000–4003.
- ICPR-2010-Allili #retrieval
- Wavelet-Based Texture Retrieval Using a Mixture of Generalized Gaussian Distributions (MSA), pp. 3143–3146.
- ICPR-2010-AlySTT #multi #recognition #robust #self #similarity
- Robust Face Recognition Using Multiple Self-Organized Gabor Features and Local Similarity Matching (SKHA, AS, NT, RiT), pp. 2909–2912.
- ICPR-2010-AmanoK #predict
- Appearance Control Using Projection with Model Predictive Control (TA, HK), pp. 2832–2835.
- ICPR-2010-AnYB #documentation #segmentation
- Document Segmentation Using Pixel-Accurate Ground Truth (CA, DY, HSB), pp. 245–248.
- ICPR-2010-AriA #estimation #modelling #optimisation
- Maximum Likelihood Estimation of Gaussian Mixture Models Using Particle Swarm Optimization (CA, SA), pp. 746–749.
- ICPR-2010-ArvanitopoulosBT #fault #linear #subclass
- Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
- ICPR-2010-AshrafSF #constraints #invariant #rank #recognition
- View-Invariant Action Recognition Using Rank Constraint (NA, YS, HF), pp. 3611–3614.
- ICPR-2010-AslanAFRAX #3d #graph #segmentation
- 3D Vertebral Body Segmentation Using Shape Based Graph Cuts (MSA, AMA, AAF, HMR, BA, PX), pp. 3951–3954.
- ICPR-2010-AtmosukartoSH #3d #learning #programming #search-based
- The Use of Genetic Programming for Learning 3D Craniofacial Shape Quantifications (IA, LGS, CH), pp. 2444–2447.
- ICPR-2010-AzarM #automation #image #network #sequence
- Automated Tracking of the Carotid Artery in Ultrasound Image Sequences Using a Self Organizing Neural Network (JCA, HHM), pp. 2544–2547.
- ICPR-2010-BanimahdE #distance #image #segmentation #set
- Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
- ICPR-2010-BassiouK #clustering #distance #word
- Word Clustering Using PLSA Enhanced with Long Distance Bigrams (NB, CK), pp. 4226–4229.
- ICPR-2010-BayramogluA #image #recognition
- Shape Index SIFT: Range Image Recognition Using Local Features (NB, AAA), pp. 352–355.
- ICPR-2010-BaysalKD
- Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
- ICPR-2010-BenabbasLID #modelling #recognition
- Action Recognition Using Direction Models of Motion (YB, AL, NI, CD), pp. 4295–4298.
- ICPR-2010-BicegoMMAF #2d #kernel #recognition
- 2D Shape Recognition Using Information Theoretic Kernels (MB, AFTM, VM, PMQA, MATF), pp. 25–28.
- ICPR-2010-BimboLMP #detection #geometry
- Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
- ICPR-2010-BouchrikaCNMT #detection #people
- Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
- ICPR-2010-BozkurtEEE #recognition #speech
- Use of Line Spectral Frequencies for Emotion Recognition from Speech (EB, EE, ÇEE, ATE), pp. 3708–3711.
- ICPR-2010-BuloP #clustering #difference #probability
- Probabilistic Clustering Using the Baum-Eagon Inequality (SRB, MP), pp. 1429–1432.
- ICPR-2010-CadavidA #automation #detection #modelling #visual notation
- Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
- ICPR-2010-CakirC #2d #feature model #image
- Image Feature Extraction Using 2D Mel-Cepstrum (SÇ, AEÇ), pp. 674–677.
- ICPR-2010-CalderaraPC #people #similarity #statistics
- Alignment-Based Similarity of People Trajectories Using Semi-directional Statistics (SC, AP, RC), pp. 4275–4278.
- ICPR-2010-CandamoGKG #detection
- Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
- ICPR-2010-CaoZL #markov #random
- Human Body Parts Tracking Using Sequential Markov Random Fields (XQC, JZ, ZQL), pp. 1759–1762.
- ICPR-2010-Carneiro #automation #case study #comparative #design #image
- A Comparative Study on the Use of an Ensemble of Feature Extractors for the Automatic Design of Local Image Descriptors (GC), pp. 3356–3359.
- ICPR-2010-CeolinH #difference #gender #metric
- Characterising Facial Gender Difference Using Fisher-Rao Metric (SC, ERH), pp. 4308–4311.
- ICPR-2010-ChenNW #estimation #multi
- Actual Midline Estimation from Brain CT Scan Using Multiple Regions Shape Matching (WC, KN, KW), pp. 2552–2555.
- ICPR-2010-ChoiMLSBPF #3d #multi #re-engineering
- 3D Face Reconstruction Using a Single or Multiple Views (JC, GGM, YL, LS, ORPB, MP, TCF), pp. 3959–3962.
- ICPR-2010-ChoPPKKALL #hybrid #segmentation
- Level-Set Segmentation of Brain Tumors Using a New Hybrid Speed Function (WC, JP, SYP, SHK, SWK, GA, MEL, GL), pp. 1545–1548.
- ICPR-2010-ChoudhuryM #standard
- Color Constancy Using Standard Deviation of Color Channels (AC, GGM), pp. 1722–1726.
- ICPR-2010-ChowdhuryCGR #graph #video
- Cell Tracking in Video Microscopy Using Bipartite Graph Matching (ASC, RC, MG, NR), pp. 2456–2459.
- ICPR-2010-CiompiPR #approach #random
- A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
- ICPR-2010-ColemanSG #architecture #feature model
- Coarse Scale Feature Extraction Using the Spiral Architecture Structure (SAC, BWS, BG), pp. 2370–2373.
- ICPR-2010-CoutinhoFF #identification #parsing
- One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
- ICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition
- A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
- ICPR-2010-DaubneyX #3d #image #refinement
- Estimating 3D Human Pose from Single Images Using Iterative Refinement of the Prior (BD, XX), pp. 3440–3443.
- ICPR-2010-DehzangiMCL #classification #fuzzy
- Framewise Phone Classification Using Weighted Fuzzy Classification Rules (OD, BM, EC, HL), pp. 4186–4189.
- ICPR-2010-DickinsonHA #multi #video
- Segmenting Video Foreground Using a Multi-Class MRF (PD, AH, KA), pp. 1848–1851.
- ICPR-2010-DornaikaC #classification #detection #performance
- Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
- ICPR-2010-DuboisPM #adaptation #analysis #component #composition
- Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
- ICPR-2010-EkbalSG #feature model #multi #optimisation #recognition
- Feature Selection Using Multiobjective Optimization for Named Entity Recognition (AE, SS, CSG), pp. 1937–1940.
- ICPR-2010-EklundAOYK #communication #interface #realtime
- A Brain Computer Interface for Communication Using Real-Time fMRI (AE, MTA, HO, AY, HK), pp. 3665–3669.
- ICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation
- A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
- ICPR-2010-ErdoganG
- Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors (HE, EMG), pp. 4573–4576.
- ICPR-2010-ErgulA #classification #topic
- Scene Classification Using Spatial Pyramid of Latent Topics (EE, NA), pp. 3603–3606.
- ICPR-2010-FischerKFB #documentation #modelling #word
- HMM-based Word Spotting in Handwritten Documents Using Subword Models (AF, AK, VF, HB), pp. 3416–3419.
- ICPR-2010-FleckD #image #invariant
- Using Local Affine Invariants to Improve Image Matching (DF, ZD), pp. 1844–1847.
- ICPR-2010-FornesELV #classification
- Symbol Classification Using Dynamic Aligned Shape Descriptor (AF, SE, JL, EV), pp. 1957–1960.
- ICPR-2010-FouheySB #detection #image #multi
- Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
- ICPR-2010-FraundorferWP #locality #mobile #visual notation #word
- Combining Monocular and Stereo Cues for Mobile Robot Localization Using Visual Words (FF, CW, MP), pp. 3927–3930.
- ICPR-2010-FujitaHSTS #detection #image
- An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
- ICPR-2010-GajsekSM #canonical #correlation #multi #recognition
- Multi-modal Emotion Recognition Using Canonical Correlations and Acoustic Features (RG, VS, FM), pp. 4133–4136.
- ICPR-2010-GhaeminiaSS #adaptation
- Adaptive Motion Model for Human Tracking Using Particle Filter (MHG, AHS, SBS), pp. 2073–2076.
- ICPR-2010-Gonzalez-RubioC #multi #on the #string
- On the Use of Median String for Multi-source Translation (JGR, FC), pp. 4328–4331.
- ICPR-2010-GrazziniDS #image #multi
- Multichannel Image Regularisation Using Anisotropic Geodesic Filtering (JG, SED, PS), pp. 2664–2667.
- ICPR-2010-GriptonL #kernel #semistructured data
- Kernel Domain Description with Incomplete Data: Using Instance-Specific Margins to Avoid Imputation (AG, WL), pp. 2921–2924.
- ICPR-2010-GuoBC #approach #learning
- Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
- ICPR-2010-GuoH
- Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks (JMG, CSH), pp. 1373–1376.
- ICPR-2010-GuoM #detection
- Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
- ICPR-2010-GuoMR #database #performance #recognition #scalability
- Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
- ICPR-2010-HaberdarS #detection #framework #mobile #platform #refinement #video
- Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
- ICPR-2010-HafnerGLUVW #classification #image
- Endoscopic Image Classification Using Edge-Based Features (MH, AG, ML, AU, AV, FW), pp. 2724–2727.
- ICPR-2010-HarirchiRMDG #algorithm #detection
- Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
- ICPR-2010-HassanAMHW #authentication #image #self
- Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
- ICPR-2010-HassanCG #documentation #image #kernel #retrieval
- Document Image Retrieval Using Feature Combination in Kernel Space (EH, SC, MG), pp. 2009–2012.
- ICPR-2010-HoriKY #generative #image #multi #sequence
- Arbitrary Stereoscopic View Generation Using Multiple Omnidirectional Image Sequences (MH, MK, NY), pp. 286–289.
- ICPR-2010-Hotta #classification #visual notation #word
- Scene Classification Using Local Co-occurrence Feature in Subspace Obtained by KPCA of Local Blob Visual Words (KH), pp. 4230–4233.
- ICPR-2010-HsinLLC #image
- Image Inpainting Using Structure-Guided Priority Belief Propagation and Label Transformations (HFH, JJL, CSL, HYC), pp. 4492–4495.
- ICPR-2010-HuC #distance #retrieval #sketching #video
- Motion-sketch Based Video Retrieval Using a Trellis Levenshtein Distance (RH, JPC), pp. 121–124.
- ICPR-2010-HuQHJT #recognition
- Action Recognition Using Spatial-Temporal Context (QH, LQ, QH, SJ, QT), pp. 1521–1524.
- ICPR-2010-HuYLS #3d #locality #multi #novel
- A Novel Facial Localization for Three-dimensional Face Using Multi-level Partition of Unity Implicits (YH, JY, WL, PS), pp. 682–685.
- ICPR-2010-IbrahimKKG #analysis #online #verification
- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
- ICPR-2010-InoueSSF #feature model #modelling
- High-Level Feature Extraction Using SIFT GMMs and Audio Models (NI, TS, KS, SF), pp. 3220–3223.
- ICPR-2010-IzadiS #automation #detection #image #segmentation
- Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
- ICPR-2010-JabidKC #classification #gender
- Gender Classification Using Local Directional Pattern (LDP) (TJ, MHK, OC), pp. 2162–2165.
- ICPR-2010-JagerPCC #3d #analysis
- Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
- ICPR-2010-JakkojuKJ #classification #performance
- Fast and Spatially-Smooth Terrain Classification Using Monocular Camera (CJ, KMK, CVJ), pp. 4060–4063.
- ICPR-2010-JammalamadakaJKM #matrix
- Discriminative Basis Selection Using Non-negative Matrix Factorization (AJ, SJ, SK, BSM), pp. 1533–1536.
- ICPR-2010-JiaM #design
- Classifying Textile Designs Using Bags of Shapes (WJ, SJM), pp. 294–297.
- ICPR-2010-Jiang #3d #re-engineering
- 3D Human Pose Reconstruction Using Millions of Exemplars (HJ), pp. 1674–1677.
- ICPR-2010-JiI #recognition
- Using Moments on Spatiotemporal Plane for Facial Expression Recognition (YJ, KI), pp. 3806–3809.
- ICPR-2010-JoshiWL #semantics
- Suggesting Songs for Media Creation Using Semantics (DJ, MDW, JL), pp. 3208–3211.
- ICPR-2010-KalafatlarY #3d #segmentation
- 3D Articulated Shape Segmentation Using Motion Information (EK, YY), pp. 3595–3598.
- ICPR-2010-KanetoNB #estimation #realtime
- Real-Time User Position Estimation in Indoor Environments Using Digital Watermarking for Audio Signals (RK, YN, NB), pp. 97–100.
- ICPR-2010-KayaCC #design
- Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
- ICPR-2010-KeustermansMVS #automation #identification #modelling
- Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
- ICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self
- EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
- ICPR-2010-KhwajaAG #invariant #recognition #representation
- Illumination and Expression Invariant Recognition Using SSIM Based Sparse Representation (AAK, AA, RG), pp. 4028–4031.
- ICPR-2010-KimL #markov #monte carlo #optimisation #random
- Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
- ICPR-2010-KimYOC #optimisation #video
- Recovery Video Stabilization Using MRF-MAP Optimization (SWK, KMY, SO, JYC), pp. 2804–2807.
- ICPR-2010-KitaW #clustering #image
- Binarization of Color Characters in Scene Images Using k-means Clustering and Support Vector Machines (KK, TW), pp. 3183–3186.
- ICPR-2010-KohGC #locality #robust
- A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
- ICPR-2010-KootstraBK #segmentation #symmetry
- Using Symmetry to Select Fixation Points for Segmentation (GK, NB, DK), pp. 3894–3897.
- ICPR-2010-KrauszB #recognition
- Action Recognition in Videos Using Nonnegative Tensor Factorization (BK, CB), pp. 1763–1766.
- ICPR-2010-KrishnanS #detection
- Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
- ICPR-2010-KryszczukHS #orthogonal #predict
- Direct Printability Prediction in VLSI Using Features from Orthogonal Transforms (KK, PH, RS), pp. 2764–2767.
- ICPR-2010-KumarCCAPH #classification #complexity
- Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
- ICPR-2010-KumeTSY #estimation #image #parametricity #video
- Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy (HK, TT, TS, NY), pp. 3923–3926.
- ICPR-2010-KusakunniranWZL #multi #recognition
- Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron (WK, QW, JZ, HL), pp. 2186–2189.
- ICPR-2010-LawalAM #abduction #classification #network #recognition
- Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
- ICPR-2010-LeeCL #algorithm #data-driven #graph #markov #monte carlo
- A Graph Matching Algorithm Using Data-Driven Markov Chain Monte Carlo Sampling (JL, MC, KML), pp. 2816–2819.
- ICPR-2010-LeeHH #automation #gender #recognition
- Automatic Gender Recognition Using Fusion of Facial Strips (PHL, JYH, YPH), pp. 1140–1143.
- ICPR-2010-LeeP #information retrieval
- Tracking Hand Rotation and Grasping from an IR Camera Using Cylindrical Manifold Embedding (CSL, SWP), pp. 2612–2615.
- ICPR-2010-Lei #distance #verification
- Combining the Likelihood and the Kullback-Leibler Distance in Estimating the Universal Background Model for Speaker Verification Using SVM (ZL), pp. 4553–4556.
- ICPR-2010-Liao
- Region Description Using Extended Local Ternary Patterns (WHL), pp. 1003–1006.
- ICPR-2010-LiGW #adaptation #image #reduction
- Adaptive Enhancement with Speckle Reduction for SAR Images Using Mirror-Extended Curvelet and PSO (YL, HG, QW), pp. 4520–4523.
- ICPR-2010-LiIK #recognition #robust #word
- Robust Face Recognition Using Block-Based Bag of Words (ZL, JiI, MK), pp. 1285–1288.
- ICPR-2010-LiLD #learning
- Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
- ICPR-2010-LinW #detection #framework #platform
- Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
- ICPR-2010-LiuA #learning #semantics
- Learning Scene Semantics Using Fiedler Embedding (JL, SA), pp. 3627–3630.
- ICPR-2010-LiuCLL #automation #locality #parametricity
- A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
- ICPR-2010-LiuLH #learning #multi #representation
- Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
- ICPR-2010-LiuR
- Estimating Nonrigid Shape Deformation Using Moments (WL, ER), pp. 185–188.
- ICPR-2010-LiuS #similarity #visual notation
- Visual Tracking Using Sparsity Induced Similarity (HL, FS), pp. 1702–1705.
- ICPR-2010-LiuWWY #adaptation #linear
- Pan-Sharpening Using an Adaptive Linear Model (LL, YW, YW, HY), pp. 4512–4515.
- ICPR-2010-LiZ
- One-Shot Scanning Using a Color Stripe Pattern (RL, HZ), pp. 1666–1669.
- ICPR-2010-LiZZ #detection #invariant
- Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
- ICPR-2010-LlobetCPA #finite #transducer
- OCR Post-processing Using Weighted Finite-State Transducers (RL, JRCN, JCPC, JA), pp. 2021–2024.
- ICPR-2010-LutfYL #identification
- Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
- ICPR-2010-LvBYD #verification #visual notation
- Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
- ICPR-2010-Machucho-CadenaB #3d #algebra #geometry #re-engineering
- 3D Reconstruction of Tumors for Applications in Laparoscopy Using Conformal Geometric Algebra (RMC, EBC), pp. 2532–2535.
- ICPR-2010-MalgireddyCSGM #framework #gesture #modelling #recognition
- A Framework for Hand Gesture Recognition and Spotting Using Sub-gesture Modeling (MRM, JJC, SS, VG, DM), pp. 3780–3783.
- ICPR-2010-MansouriAT #video
- MPEG-2 Video Watermarking Using Pattern Consideration (AM, AMA, FTA), pp. 2428–2431.
- ICPR-2010-MatsukawaK #recognition
- Action Recognition Using Three-Way Cross-Correlations Feature of Local Moton Attributes (TM, TK), pp. 1731–1734.
- ICPR-2010-MaTW #analysis #random
- Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
- ICPR-2010-MehmoodN #detection #kernel
- Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
- ICPR-2010-MonzoAAM #case study #comparative #locality #recognition
- A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
- ICPR-2010-MoriMY #recognition
- Gait Recognition Using Period-Based Phase Synchronization for Low Frame-Rate Videos (AM, YM, YY), pp. 2194–2197.
- ICPR-2010-MoroTU #detection
- Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
- ICPR-2010-MozaffariBA #classification #gender #geometry #image
- Gender Classification Using Single Frontal Image Per Person: Combination of Appearance and Geometric Based Features (SM, HB, RA), pp. 1192–1195.
- ICPR-2010-NacereddineTZH #image #retrieval
- Shape-Based Image Retrieval Using a New Descriptor Based on the Radon and Wavelet Transforms (NN, ST, DZ, LH), pp. 1997–2000.
- ICPR-2010-NasonovK #performance
- Fast Super-Resolution Using Weighted Median Filtering (AVN, ASK), pp. 2230–2233.
- ICPR-2010-NishidaKOH #algorithm #visual notation
- Visual Tracking Algorithm Using Pixel-Pair Feature (KN, TK, YO, MH), pp. 1808–1811.
- ICPR-2010-NordbergZ #2d #geometry #image #multi #segmentation
- Multibody Motion Segmentation Using the Geometry of 6 Points in 2D Images (KN, VZ), pp. 1783–1787.
- ICPR-2010-NymanHA #constraints #framework #multi #platform
- Multi-camera Platform Calibration Using Multi-linear Constraints (PN, AH, KÅ), pp. 53–56.
- ICPR-2010-OhH #learning #process #video
- Unsupervised Learning of Activities in Video Using Scene Context (SO, AH), pp. 3579–3582.
- ICPR-2010-OliverTLM #automation #segmentation #set
- Automatic Diagnosis of Masses by Using Level set Segmentation and Shape Description (AO, AT, XL, JM), pp. 2528–2531.
- ICPR-2010-OzdemirA #classification #image #representation
- Image Classification Using Subgraph Histogram Representation (BÖ, SA), pp. 1112–1115.
- ICPR-2010-PaivaJT #analysis #image
- Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
- ICPR-2010-PaivaT #detection #image
- Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
- ICPR-2010-PanMSHN #adaptation #estimation #video
- A Dual Pass Video Stabilization System Using Iterative Motion Estimation and Adaptive Motion Smoothing (PP, AM, JS, YH, SN), pp. 2298–2301.
- ICPR-2010-PapalazarouRW #detection #estimation #image #multi
- Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
- ICPR-2010-PapariCP #detection #novel
- Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
- ICPR-2010-ParkKS #detection #markov #modelling #recognition #visual notation
- Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
- ICPR-2010-PatrauceanGC #identification #invariant
- Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
- ICPR-2010-PaulaOBS #recognition
- Forest Species Recognition Using Color-Based Features (PLdP, LSO, AdSBJ, RS), pp. 4178–4181.
- ICPR-2010-PengSGS #classification #documentation
- Text Separation from Mixed Documents Using a Tree-Structured Classifier (XP, SS, VG, RS), pp. 241–244.
- ICPR-2010-PengYZC #classification #segmentation
- Retinal Blood Vessels Segmentation Using the Radial Projection and Supervised Classification (QP, XY, LZ, YmC), pp. 1489–1492.
- ICPR-2010-PhamTN #bound #segmentation #similarity
- Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
- ICPR-2010-PiroonratanaWUALC #identification #morphism #nondeterminism #ranking #symmetry
- Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
- ICPR-2010-PlumptonKLJ #classification #linear #online
- On-Line fMRI Data Classification Using Linear and Ensemble Classifiers (COP, LIK, DEJL, SJJ), pp. 4312–4315.
- ICPR-2010-PrumVO #online #recognition #word
- On-Line Handwriting Word Recognition Using a Bi-character Model (SP, MV, JMO), pp. 2700–2703.
- ICPR-2010-QiaoC #3d #analysis #component #modelling #statistics
- Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
- ICPR-2010-QuelhasMC #3d #quantifier
- 3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter (PQ, AMM, ACC), pp. 2508–2511.
- ICPR-2010-QuWL #difference #image #recognition
- Action Recognition Using Space-Time Shape Difference Images (HQ, LW, CL), pp. 3661–3664.
- ICPR-2010-RahtuSH #random
- Compressing Sparse Feature Vectors Using Random Ortho-Projections (ER, MS, JH), pp. 1397–1400.
- ICPR-2010-RantosonSFM #3d #metric
- Non Contact 3D Measurement Scheme for Transparent Objects Using UV Structured light (RR, CS, DF, FM), pp. 1646–1649.
- ICPR-2010-RaraAESF #re-engineering #recognition
- Face Recognition at-a-Distance Using Texture, Dense- and Sparse-Stereo Reconstruction (HMR, AMA, SYE, TLS, AAF), pp. 1221–1224.
- ICPR-2010-ReckyL #detection
- Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
- ICPR-2010-RoyM #video
- Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (AR, SM), pp. 4504–4507.
- ICPR-2010-RoySB #game studies #image #segmentation
- Segmentation of Unideal Iris Images Using Game Theory (KR, CYS, PB), pp. 2844–2847.
- ICPR-2010-SadekAMS #automation #realtime #recognition
- Real-Time Automatic Traffic Accident Recognition Using HFG (SS, AAH, BM, US), pp. 3348–3351.
- ICPR-2010-SagheerHNS #recognition #word
- Holistic Urdu Handwritten Word Recognition Using Support Vector Machine (MWS, CLH, NN, CYS), pp. 1900–1903.
- ICPR-2010-SanromaAS #approach #graph
- A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
- ICPR-2010-SantoshWL #visual notation
- Using Spatial Relations for Graphical Symbol Description (KCS, LW, BL), pp. 2041–2044.
- ICPR-2010-SarginGMR
- Object Tracking with Ratio Cycles Using Shape and Appearance Cues (MES, PG, BSM, KR), pp. 3649–3652.
- ICPR-2010-SatakeM #multi
- Stereo-Based Multi-person Tracking Using Overlapping Silhouette Templates (JS, JM), pp. 4304–4307.
- ICPR-2010-ScharfenbergerCF #artificial reality #predict
- Driver Body-Height Prediction for an Ergonomically Optimized Ingress Using a Single Omnidirectional Camera (CS, SC, GF), pp. 298–301.
- ICPR-2010-SenechalBP #automation #detection
- Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
- ICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition
- Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
- ICPR-2010-SeppkeDH #detection #energy #image #symmetry
- Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
- ICPR-2010-SeppkeDHW #equation #multi #parametricity #performance
- Fast Derivation of Soil Surface Roughness Parameters Using Multi-band SAR Imagery and the Integral Equation Model (BS, LSDF, JAH, FW), pp. 3931–3934.
- ICPR-2010-SfikasHN #analysis #clustering #multi
- Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
- ICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile
- Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
- ICPR-2010-ShiSG #documentation #image
- Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile (ZS, SS, VG), pp. 1916–1919.
- ICPR-2010-ShobeirinejadG #classification #gender
- Gender Classification Using Interlaced Derivative Patterns (AS, YG), pp. 1509–1512.
- ICPR-2010-SilveiraM #image
- Boosting Alzheimer Disease Diagnosis Using PET Images (MS, JSM), pp. 2556–2559.
- ICPR-2010-Simsekli #automation #classification #music
- Automatic Music Genre Classification Using Bass Lines (US), pp. 4137–4140.
- ICPR-2010-SirmacekU #detection #network
- Road Network Extraction Using Edge Detection and Spatial Voting (BS, CÜ), pp. 3113–3116.
- ICPR-2010-SmeetsFHVS #3d #approach #composition #invariant #modelling #recognition
- Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
- ICPR-2010-SoldeaESU #approach #image #segmentation
- Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, MÇ, AE, MGU, ZF, MC), pp. 2592–2595.
- ICPR-2010-SoltanaACA #adaptation #algorithm #search-based
- Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
- ICPR-2010-SrikrishnanC #analysis #linear
- Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
- ICPR-2010-StarkWP #representation #speech
- Single Channel Speech Separation Using Source-Filter Representation (MS, MW, FP), pp. 826–829.
- ICPR-2010-SteerAM #data fusion #recognition
- Audio-Visual Data Fusion Using a Particle Filter in the Application of Face Recognition (MAS, AAH, BM), pp. 4392–4395.
- ICPR-2010-SulicPKK #distributed #random #reduction
- Dimensionality Reduction for Distributed Vision Systems Using Random Projection (VS, JP, MK, SK), pp. 380–383.
- ICPR-2010-SultaniC #detection
- Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
- ICPR-2010-SuryanarayanSM #recognition
- Dynamic Hand Pose Recognition Using Depth Data (PS, AS, DM), pp. 3105–3108.
- ICPR-2010-SuzukiIAT #algorithm #estimation #image
- A Scale Estimation Algorithm Using Phase-Based Correspondence Matching for Electron Microscope Images (AS, KI, TA, RT), pp. 2420–2423.
- ICPR-2010-SzeptyckiACZGS #2d #composition
- Partial Face Biometry Using Shape Decomposition on 2D Conformal Maps of Faces (PS, MA, LC, WZ, XDG, DS), pp. 1505–1508.
- ICPR-2010-TabiaCDV #3d #retrieval
- 3D-Shape Retrieval Using Curves and HMM (HT, OC, MD, JPV), pp. 3147–3150.
- ICPR-2010-Tagawa #eye tracking #modelling #statistics
- Depth Perception Model Based on Fixational Eye Movements Using Bayesian Statistical Inference (NT), pp. 1662–1665.
- ICPR-2010-TangHLL #retrieval
- A Person Retrieval Solution Using Finger Vein Patterns (DT, BH, RL, WL), pp. 1306–1309.
- ICPR-2010-TanveerI #approach
- A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
- ICPR-2010-TaxHVP #clustering #concept #detection #learning #multi
- The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
- ICPR-2010-TekeT #image #multi #strict
- Multi-spectral Satellite Image Registration Using Scale-Restricted SURF (MT, AT), pp. 2310–2313.
- ICPR-2010-ThiCZWS #modelling #recognition
- Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
- ICPR-2010-TorrentPLFSMP #approach #detection
- Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
- ICPR-2010-TrummerMD #online #optimisation
- Online Next-Best-View Planning for Accuracy Optimization Using an Extended E-Criterion (MT, CM, JD), pp. 1642–1645.
- ICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability
- Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
- ICPR-2010-TumaIP #classification #kernel #set
- Hydroacoustic Signal Classification Using Kernel Functions for Variable Feature Sets (MT, CI, MP), pp. 1011–1014.
- ICPR-2010-TurkerKG #classification #image #network
- Classification of Polarimetric SAR Images Using Evolutionary RBF Networks (TI, SK, MG), pp. 4324–4327.
- ICPR-2010-UbukataTMU #multi #segmentation
- Multi-object Segmentation in a Projection Plane Using Subtraction Stereo (TU, KT, AM, KU), pp. 3296–3299.
- ICPR-2010-Velasco-ForeroA #modelling #statistics
- Statistical Shape Modeling Using Morphological Representations (SVF, JA), pp. 3537–3540.
- ICPR-2010-VenkateshaT #process #recognition
- Human Activity Recognition Using Local Shape Descriptors (SV, MT), pp. 3704–3707.
- ICPR-2010-VenkateshJ
- Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
- ICPR-2010-VenkateshKM #3d #approach #recognition
- Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
- ICPR-2010-Wang #detection #documentation #recognition
- Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
- ICPR-2010-WangAYL #bottom-up #estimation #learning #top-down
- Combined Top-Down/Bottom-Up Human Articulated Pose Estimation Using AdaBoost Learning (SW, HA, TY, SL), pp. 3670–3673.
- ICPR-2010-WangC10a #3d #estimation
- Articulated Human Body: 3D Pose Estimation Using a Single Camera (ZW, RC), pp. 3768–3771.
- ICPR-2010-WangH #multi #random #recognition
- Cancelable Face Recognition Using Random Multiplicative Transform (YW, DH), pp. 1261–1264.
- ICPR-2010-WangH10a #case study #classification #design #multi #prototype
- A Study of Designing Compact Recognizers of Handwritten Chinese Characters Using Multiple-Prototype Based Classifiers (YW, QH), pp. 1872–1875.
- ICPR-2010-WangJMS #process
- Decoding Finger Flexion from Electrocorticographic Signals Using a Sparse Gaussian Process (ZW, QJ, KJM, GS), pp. 3756–3759.
- ICPR-2010-WangLL #3d #linear #programming
- Monocular 3D Tracking of Deformable Surfaces Using Linear Programming (CW, XL, YL), pp. 1710–1713.
- ICPR-2010-WangLS #documentation #identification
- Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
- ICPR-2010-WangM #learning #order #process
- Gaussian Process Learning from Order Relationships Using Expectation Propagation (RW, SJM), pp. 605–608.
- ICPR-2010-WangSLYB #classification
- Shape Classification Using Tree -Unions (BW, WS, WL, XY, XB), pp. 983–986.
- ICPR-2010-WartakB #estimation
- Optical Flow Estimation Using Diffusion Distances (SW, AGB), pp. 189–192.
- ICPR-2010-WatanabeNKI #estimation
- Estimation of Non-rigid Surface Deformation Using Developable Surface Model (YW, TN, TK, MI), pp. 197–200.
- ICPR-2010-WijnhovenW #detection #performance #probability
- Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
- ICPR-2010-WuHCCT #detection #interactive #visual notation
- Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
- ICPR-2010-WuLW #image #learning #retrieval
- Enhancing SVM Active Learning for Image Retrieval Using Semi-supervised Bias-Ensemble (JW, ML, CLW), pp. 3175–3178.
- ICPR-2010-XiaLH #mining #modelling
- Mining Exemplars for Object Modelling Using Affinity Propagation (SX, JL, ERH), pp. 918–921.
- ICPR-2010-Xie #segmentation #set
- Level Set Based Segmentation Using Local Feature Distribution (XX), pp. 2780–2783.
- ICPR-2010-XuHW #similarity
- Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding (WX, ERH, RCW), pp. 3324–3327.
- ICPR-2010-YaegashiY #kernel #learning #multi #recognition
- Geotagged Photo Recognition Using Corresponding Aerial Photos with Multiple Kernel Learning (KY, KY), pp. 3272–3275.
- ICPR-2010-YamanakaSS #adaptation #image
- Adaptive Image Projection onto Non-planar Screen Using Projector-Camera Systems (TY, FS, JS), pp. 307–310.
- ICPR-2010-YamauchiBS #3d #modelling
- 3D Human Body Modeling Using Range Data (KY, BB, HS), pp. 3476–3479.
- ICPR-2010-YangSZ #analysis #multi #recognition
- Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
- ICPR-2010-YoonK #recognition
- Human Action Recognition Using Segmented Skeletal Features (SMY, AK), pp. 3740–3743.
- ICPR-2010-ZareG #multi #pattern matching #pattern recognition #recognition
- Pattern Recognition Using Functions of Multiple Instances (AZ, PDG), pp. 1092–1095.
- ICPR-2010-ZhangGC #detection #invariant
- Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
- ICPR-2010-ZhangHTW #3d #evaluation #framework #modelling
- 3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
- ICPR-2010-ZhangK10a #detection #graph
- Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
- ICPR-2010-ZhangSSQ #keyword
- Improved Mandarin Keyword Spotting Using Confusion Garbage Model (SZ, ZS, QS, YQ), pp. 3700–3703.
- ICPR-2010-ZhangWB #classification
- Age Classification Base on Gait Using HMM (DZ, YW, BB), pp. 3834–3837.
- ICPR-2010-ZhangZ #analysis #canonical #correlation #image
- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
- ICPR-2010-ZhangZZZ #classification #kernel #metric
- Time Series Classification Using Support Vector Machine with Gaussian Elastic Metric Kernel (DZ, WZ, DZ, HZ), pp. 29–32.
- ICPR-2010-ZhouK #identification #image #locality
- Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
- ICPR-2010-ZhouWH #2d #3d #realtime
- Real-Time 3D Face and Facial Action Tracking Using Extended 2D+3D AAMs (MZ, YW, XH), pp. 3963–3966.
- ICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition
- Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
- ICPR-2010-ZouH #3d #performance
- Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
- ICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence
- Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
- KDD-2010-AbeMPRJTBACKDG #learning #optimisation
- Optimizing debt collections using constrained reinforcement learning (NA, PM, CP, CKR, DLJ, VPT, JJB, GFA, BRC, MK, MD, TG), pp. 75–84.
- KDD-2010-ChuaL #generative #modelling #network #online #rating #trust
- Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
- KDD-2010-LiuMTLL #learning #metric #optimisation
- Semi-supervised sparse metric learning using alternating linearization optimization (WL, SM, DT, JL, PL), pp. 1139–1148.
- KDD-2010-MaxwellBR #graph #memory management #mining
- Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
- KDD-2010-PrestonBKSF #clustering #constraints
- Redefining class definitions using constraint-based clustering: an application to remote sensing of the earth’s surface (DP, CEB, RK, DSM, MAF), pp. 823–832.
- KDD-2010-RothBDFHLLMM #graph #social
- Suggesting friends using the implicit social graph (MR, ABD, DD, GF, IH, AL, NL, YM, RM), pp. 233–242.
- KDD-2010-SatoN #modelling #process #topic
- Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
- KDD-2010-YangO #feature model #predict #probability
- Feature selection for support vector regression using probabilistic prediction (JBY, CJO), pp. 343–352.
- KDD-2010-YeLCJ #automation #categorisation #clustering
- Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
- KDD-2010-ZhengSTLLCH #data mining #mining #network
- Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
- KDIR-2010-BallesterosBG #dependence #parsing
- Text Simplification using Dependency Parsing for Spanish (MB, SB, PG), pp. 330–335.
- KDIR-2010-BallesterosHFG #dependence #parsing
- Giving Shape to an N-version Dependency Parser — Improving Dependency Parsing Accuracy for Spanish using Maltparser (MB, JH, VF, PG), pp. 336–341.
- KDIR-2010-Bernard #formal method #modelling #reuse
- Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
- KDIR-2010-CamposMO #random #recognition
- Recognition of Gene/Protein Names using Conditional Random Fields (DC, SM, JLO), pp. 275–280.
- KDIR-2010-Ghosh #locality #mining #modelling #multi #predict #scalability
- Actionable Mining of Large, Multi-relational Data using Localized Predictive Models (JG), pp. 9–10.
- KDIR-2010-HelouA #metric #multi #semantics
- Semantic Measures based on Wordnet using Multiple Information Sources (MAH, AA), pp. 500–503.
- KDIR-2010-JedrzejczakW #generative #query
- Integrated Candidate Generation in Processing Batches of Frequent Itemset Queries using Apriori (PJ, MW), pp. 487–490.
- KDIR-2010-KrainesGHMT #generative
- Generating Literature-based Knowledge Discoveries in Life Sciences using Relationship Associations (SBK, WG, DH, HM, TT), pp. 35–44.
- KDIR-2010-MollerEDS #automation #ontology #recognition
- Automatic Spatial Plausibility Checks for Medical Object Recognition Results using a Spatio-anatomical Ontology (MM, PE, AD, DS), pp. 5–13.
- KDIR-2010-Studer #lightweight #modelling #process #semantics #web
- Process-oriented Semantic Web Search — Using Lightweight Semantic Models for Supporting the Search Process (RS), p. 7.
- KDIR-2010-TsengPF #classification #markov
- The Typhoon Track Classification using Tri-plots and Markov Chain (JCHT, HKKP, CF), pp. 364–369.
- KDIR-2010-ZhangUC #information management
- A Comprehensive Solution to Procedural Knowledge Acquisition using Information Extraction (ZZ, VSU, FC), pp. 432–437.
- KEOD-2010-CasasCC #fibonacci #modelling #representation #specification #towards
- Towards a Representation of Enviromental Models using Specification and Description Language — From the Fibonacci Model to a Wildfire Model (PFiC, MC, JC), pp. 343–346.
- KEOD-2010-ChatterjeeB #documentation #network #random #summary
- Single Document Text Summarization using Random Indexing and Neural Networks (NC, AB), pp. 171–176.
- KEOD-2010-ChatterjeeKRD #automation #classification #email #ontology
- Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
- KEOD-2010-EynardMM #analysis #on the #ontology
- On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
- KEOD-2010-KamelR #ontology #parallel
- Ontology Building using Parallel Enumerative Structures (MK, BR), pp. 276–281.
- KEOD-2010-NairM #multi #network
- Informledge System — A Modified Knowledge Network with Autonomous Nodes using Multi-lateral Links (TRGN, MM), pp. 351–354.
- KEOD-2010-TiwariAMK #mobile #web #web service
- Dynamic Discovery of Web Services using Mobile Agents (GT, RA, SM, DSK), pp. 497–500.
- KEOD-2010-ValienteRV #modelling #owl #semantics
- Defining the Semantics of It Service Management Models using OWL and SWRL (MCV, DR, CVC), pp. 378–381.
- KEOD-2010-YunSNYKK #framework #platform #semantics #web #workflow
- Improving the Workflow of Semantic Web Portals using M/R in Cloud Platform (SY, MS, HN, SKY, HK, HGK), pp. 485–488.
- KEOD-2010-ZakraouiZ #interactive #programming #set #web
- Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
- KMIS-2010-BornerL #enterprise
- Using Role-plays to Acquire Process-oriented Knowledge in Enterprises (RB, ML), pp. 149–156.
- KMIS-2010-BrockV #analysis #data flow #semantics
- A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
- KMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation
- Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
- KMIS-2010-KrainesG #ontology #reuse #semantics
- Supporting Reuse of Knowledge of Failures through Ontology-based Semantic Search (SBK, WG), pp. 164–169.
- KMIS-2010-SrivastavaS #composition #game studies #validation
- The Validation of a Dynamic Service Composition Model using a Simple Game (AS, PGS), pp. 260–266.
- RecSys-2010-HannonBS #collaboration #recommendation #twitter
- Recommending twitter users to follow using content and collaborative filtering approaches (JH, MB, BS), pp. 199–206.
- RecSys-2010-LeeB #collaboration #process #recommendation #self
- Using self-defined group activities for improvingrecommendations in collaborative tagging systems (DHL, PB), pp. 221–224.
- RecSys-2010-VasukiNLD #network #recommendation
- Affiliation recommendation using auxiliary networks (VV, NN, ZL, ISD), pp. 103–110.
- SEKE-2010-ArrudaCD #detection #framework
- A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
- SEKE-2010-FagundesS #estimation #fault
- Software Defect Estimation using Support Vector Regression (RAdAF, RMCRdS), pp. 265–268.
- SEKE-2010-JuniorLAMW #impact analysis #learning #multi
- Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
- SEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering
- Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
- SEKE-2010-KhounSiavashB #metric #ontology #semantics
- Using the whole structure of ontology for semantic relatedness measurement (EK, ABD), pp. 79–83.
- SEKE-2010-MarcaciniR #clustering #incremental #topic
- Incremental Construction of Topic Hierarchies using Hierarchical Term Clustering (RMM, SOR), p. 553.
- SEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification
- Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
- SEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning
- A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
- SEKE-2010-Radlinski #development #predict #quality
- Software Development Effort and Quality Prediction Using Bayesian Nets and small Local Qualitative Data (LR), pp. 113–116.
- SEKE-2010-RodriguesVZ #automation #modelling #product line #testing
- PLeTs-Test Automation using Software Product Lines and Model Based Testing (EdMR, LDV, AFZ), pp. 483–488.
- SEKE-2010-ShewchukG #experience #functional #maintenance #testing #user interface
- Experience with Maintenance of a Functional GUI Test Suite using IBM Rational Functional Tester (YS, VG), pp. 489–494.
- SEKE-2010-VilaMF #adaptation #analysis #qvt #strict
- Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
- SEKE-2010-Wang #black box #parametricity #testing
- Reducing Black-box Test Suite Using Input Parameter Relationships (LW), pp. 180–185.
- SEKE-2010-XuanJRYL #automation #classification #debugging
- Automatic Bug Triage using Semi-Supervised Text Classification (JX, HJ, ZR, JY, ZL), pp. 209–214.
- SIGIR-2010-ChandarC
- Diversification of search results using webgraphs (PC, BC), pp. 869–870.
- SIGIR-2010-ClementsSVR #behaviour #predict
- Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
- SIGIR-2010-DuZYCC #query #recognition
- Using search session context for named entity recognition in query (JD, ZZ, JY, YC, ZC), pp. 765–766.
- SIGIR-2010-GaoCWZ #learning #rank
- Learning to rank only using training data from related domain (WG, PC, KFW, AZ), pp. 162–169.
- SIGIR-2010-GoharianM #classification #query
- Context aware query classification using dynamic query window and relationship net (NG, SSRM), pp. 723–724.
- SIGIR-2010-KimC #documentation #multi #ranking
- Ranking using multiple document types in desktop search (JK, WBC), pp. 50–57.
- SIGIR-2010-LeeLSR #precise #retrieval #sentiment
- High precision opinion retrieval using sentiment-relevance flows (SWL, JTL, YIS, HCR), pp. 817–818.
- SIGIR-2010-LopesR #health #information retrieval #precise
- Using local precision to compare search engines in consumer health information retrieval (CTL, CR), pp. 835–836.
- SIGIR-2010-MeijR #modelling #query #wiki
- Supervised query modeling using wikipedia (EM, MdR), pp. 875–876.
- SIGIR-2010-MerhavMBYF #recognition #relational
- Incorporating global information into named entity recognition systems using relational context (YM, FdSM, DB, WGY, OF), pp. 883–884.
- SIGIR-2010-MojdehC #consistency #learning
- Semi-supervised spam filtering using aggressive consistency learning (MM, GVC), pp. 751–752.
- SIGIR-2010-RothK #modelling #retrieval
- Cross-language retrieval using link-based language models (BR, DK), pp. 773–774.
- SIGIR-2010-ShtokKC #modelling #predict #statistics
- Using statistical decision theory and relevance models for query-performance prediction (AS, OK, DC), pp. 259–266.
- SIGIR-2010-WhiteC
- Exploring the use of labels to shortcut search trails (RWW, RC), pp. 811–812.
- SIGIR-2010-WooLLSR #ranking #retrieval
- Achieving high accuracy retrieval using intra-document term ranking (HWW, JTL, SWL, YIS, HCR), pp. 885–886.
- SIGIR-2010-YiLWR #video
- Contextual video advertising system using scene information inferred from video scripts (BJY, JTL, HWW, HCR), pp. 771–772.
- SIGIR-2010-YinHZL #approach #modelling #wiki
- A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
- SIGIR-2010-ZhangWL #interactive #multi #named #summary #visualisation
- VisualSum: an interactive multi-document summarization system using visualization (YZ, DW, TL), pp. 857–858.
- ECMFA-2010-JohannesF #abstraction #composition #framework #modelling #network #reuse
- Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework (JJ, MAF), pp. 132–143.
- ECMFA-2010-KessentiniBSB #diagrams #heuristic #petri net #sequence chart
- Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search (MK, AB, HAS, MB), pp. 156–172.
- MoDELS-v1-2010-KolovosRAPPB #emf #model transformation
- Taming EMF and GMF Using Model Transformation (DSK, LMR, SbA, RFP, FACP, GB), pp. 211–225.
- MoDELS-v1-2010-NoyritGTS #consistency #modelling #multi #uml
- Consistent Modeling Using Multiple UML Profiles (FN, SG, FT, BS), pp. 392–406.
- MoDELS-v2-2010-GerthKLE #detection #precise #process
- Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
- MoDELS-v2-2010-LanoR #model transformation #modelling #slicing #uml
- Slicing of UML Models Using Model Transformations (KL, SKR), pp. 228–242.
- MoDELS-v2-2010-LoniewskiIA #development #modelling #overview #requirements
- A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
- SPLC-2010-Elizondo #composition #development
- Using Composition Connectors to Support Software Asset Development (PVE), pp. 496–497.
- SPLC-2010-GadelhaCGCFL #approach #component #product line
- An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
- SPLC-2010-GhanamM #execution #feature model #modelling #testing
- Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
- SPLC-2010-HartmannKMRTY #component #integration
- Using MDA for Integration of Heterogeneous Components in Software Supply Chains (HH, MK, AAJM, JR, TT, TYH), pp. 361–376.
- ECOOP-2010-DhooliaMSS #debugging
- Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
- ECOOP-2010-GilL #java #source code
- The Use of Overloading in Java Programs (JYG, KL), pp. 529–551.
- ECOOP-2010-ZaeemK #alloy #contract #data type
- Contract-Based Data Structure Repair Using Alloy (RNZ, SK), pp. 577–598.
- OOPSLA-2010-Kell #adaptation #assembly #component #interface
- Component adaptation and assembly using interface relations (SK), pp. 322–340.
- OOPSLA-2010-LernerVG #aspect-oriented #javascript
- Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
- AdaEurope-2010-AnderssonP #ada #algorithm #implementation #manycore #realtime #scheduling
- Implementing Multicore Real-Time Scheduling Algorithms Based on Task Splitting Using Ada 2012 (BA, LMP), pp. 54–67.
- AdaEurope-2010-PastorASA #approach #modelling #realtime #sequence #towards
- Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, BÁ), pp. 167–180.
- AdaEurope-2010-White #ada #hardware #scheduling
- Using Hardware Support for Scheduling with Ada (RW), pp. 125–138.
- LOPSTR-2010-VoetsS #analysis #logic programming #source code
- Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
- PADL-2010-DieterleHL #composition
- Skeleton Composition Using Remote Data (MD, TH, RL), pp. 73–87.
- PEPM-2010-Henglein #algebra #equivalence #lazy evaluation #optimisation #relational
- Optimizing relational algebra operations using generic equivalence discriminators and lazy products (FH), pp. 73–82.
- PEPM-2010-HofmannK #detection #morphism #problem #towards
- I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
- PLDI-2010-BaekC #approximate #energy #framework #named #programming
- Green: a framework for supporting energy-conscious programming using controlled approximation (WB, TMC), pp. 198–209.
- PLDI-2010-WestbrookRIYAT #java #multi #named #programming
- Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
- POPL-2010-DiasR #automation #declarative #generative
- Automatically generating instruction selectors using declarative machine descriptions (JD, NR), pp. 403–416.
- PPDP-2010-BrabrandT #ambiguity #pattern matching #regular expression #string
- Typed and unambiguous pattern matching on strings using regular expressions (CB, JGT), pp. 243–254.
- QAPL-2010-AltisenLM #automaton #calculus #component #evaluation #interface #performance #realtime
- Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata (KA, YL, MM), pp. 16–33.
- SAS-2010-BrauerK #abstraction #automation
- Automatic Abstraction for Intervals Using Boolean Formulae (JB, AK), pp. 167–183.
- SAS-2010-Lesens #question #static analysis #why
- Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
- SIGAda-2010-BradleyPZ #ada #development #realtime
- Real-time system development in ada using LEGO® mindstorms® NXT (PJB, JAdlP, JZ), pp. 37–40.
- SIGAda-2010-JemliR #compilation #problem #static analysis
- A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
- SIGAda-2010-Pettit #ada #concurrent #design #embedded #realtime #uml
- Designing real-time, concurrent, and embedded software systems using UML and Ada (RGPI), pp. 7–8.
- SIGAda-2010-Rosen #object-oriented #reliability
- Use of object oriented technologies in high reliability system (JPR), pp. 3–4.
- RE-2010-BittnerRGW #multi #requirements
- Manufacturer-Supplier Requirements Synchronization Using Exchange Containers and Multi-Level Systems (MB, MOR, HG, MW), pp. 325–330.
- RE-2010-ClementsB #architecture
- Using Business Goals to Inform a Software Architecture (PCC, LB), pp. 69–78.
- RE-2010-LockerbieBMBE #analysis #concept #modelling #simulation
- Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
- RE-2010-SalinesiMDD #constraints #integer #requirements #reuse #theorem proving
- Using Integer Constraint Solving in Reuse Based Requirements Engineering (CS, RM, DD, OD), pp. 243–251.
- RE-2010-SawahMR #elicitation #modelling #overview #perspective #requirements
- Using Cognitive Mapping to Elicit Modelling Requirements: An Overview (SES, AM, MR), pp. 357–363.
- RE-2010-SeyffGG #information management
- Using Contextual Information to Guide on-site Analysts (NS, FG, PG), pp. 397–398.
- RE-2010-SeyffGM #mobile #tool support
- Using Mobile RE Tools to Give End-Users Their Own Voice (NS, FG, NAMM), pp. 37–46.
- RE-2010-Stanbridge #analysis #test coverage #testing #user interface
- Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
- RE-2010-WnukCR #reduction #requirements #towards
- Guiding Requirements Scoping Using ROI: Towards Agility, Openness and Waste Reduction (KW, DC, BR), pp. 409–410.
- REFSQ-2010-ProynovaPWW #perspective #requirements #research
- Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
- ASE-2010-KimYS #debugging #memory management #model checking #named
- JRF-E: using model checking to give advice on eliminating memory model-related bugs (KK, TYK, BAS), pp. 215–224.
- ASE-2010-NgocO #fault
- Checking roundoff errors using counterexample-guided narrowing (DTBN, MO), pp. 301–304.
- ASE-2010-RatanotayanonCS #feature model #transitive
- Using transitive changesets to support feature location (SR, HJC, SES), pp. 341–344.
- ASE-2010-ShangAH #case study #experience #mining #pipes and filters #repository #scalability #tool support
- An experience report on scaling tools for mining software repositories using MapReduce (WS, BA, AEH), pp. 275–284.
- ASE-2010-TrezentosLO #dependence #named #optimisation #problem #pseudo
- Apt-pbo: solving the software dependency problem using pseudo-boolean optimization (PT, IL, ALO), pp. 427–436.
- FSE-2010-ErnstA #type system
- Building and using pluggable type systems (MDE, MA), pp. 375–376.
- FSE-2010-HalleB #analysis #interactive #message passing
- Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
- FSE-2010-KanadeARR #dependence #representation #testing
- Representation dependence testing using program inversion (AK, RA, SKR, GR), pp. 277–286.
- FSE-2010-MyersS #dynamic analysis #ide #user interface
- Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
- FSE-2010-Shokry #behaviour #synthesis #towards
- Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
- ICSE-2010-AdamsJH #identification
- Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
- ICSE-2010-FritzM #developer
- Using information fragments to answer the questions developers ask (TF, GCM), pp. 175–184.
- ICSE-2010-GorschekTA #concept #empirical #object-oriented #scalability
- A large-scale empirical study of practitioners’ use of object-oriented concepts (TG, EDT, LA), pp. 115–124.
- ICSE-2010-JilaniMLGM #invariant
- Using invariant functions and invariant relations to compute loop functions (LLJ, OM, AL, WG, AM), pp. 317–318.
- ICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference
- Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
- ICSE-2010-LewisW #fault #monitoring #runtime
- Runtime repair of software faults using event-driven monitoring (CL, JW), pp. 275–280.
- ICSE-2010-LimQF #named #network #scalability #social
- StakeNet: using social networks to analyse the stakeholders of large-scale software projects (SLL, DQ, AF), pp. 295–304.
- ICSE-2010-Marinho #consistency #modelling #ocl #product line
- A proposal for consistency checking in dynamic software product line models using OCL (FGM), pp. 333–334.
- ICSE-2010-NitaN #adaptation #api #source code
- Using twinning to adapt programs to alternative APIs (MN, DN), pp. 205–214.
- ICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation
- Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
- ICSE-2010-SallehMGB #empirical #programming
- An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (NS, EM, JCG, GSJB), pp. 577–586.
- ICSE-2010-SharpdD #re-engineering #research
- Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
- ICSE-2010-TreudeS #developer
- Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds (CT, MADS), pp. 365–374.
- SAC-2010-AlmeidaYA10a #principle
- Filtering spams using the minimum description length principle (TAA, AY, JA), pp. 1854–1858.
- SAC-2010-BechikhSG #mobile #multi #optimisation
- Searching for knee regions in multi-objective optimization using mobile reference points (SB, LBS, KG), pp. 1118–1125.
- SAC-2010-BettiniDS #implementation #product line
- Implementing software product lines using traits (LB, FD, IS), pp. 2096–2102.
- SAC-2010-BicegoLOP #array #classification #modelling #topic
- Expression microarray classification using topic models (MB, PL, BO, AP), pp. 1516–1520.
- SAC-2010-BrogleBB #multi #quality
- Quality of service for multicasting using NICE (MB, SB, TB), pp. 670–677.
- SAC-2010-BucchiaroneGFT #experience #natural language #requirements #scalability #set
- An experience in using a tool for evaluating a large set of natural language requirements (AB, SG, AF, GT), pp. 281–286.
- SAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited
- Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
- SAC-2010-DrumondG #concept #logic #markov #ontology
- Extracting ontology concept hierarchies from text using Markov logic (LD, RG), pp. 1354–1358.
- SAC-2010-FunfzigTA #constraints #parametricity
- Haptic manipulation of rational parametric planar cubics using shape constraints (CF, PT, GA), pp. 1253–1257.
- SAC-2010-FuPTW
- Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
- SAC-2010-GabrielSN #clustering #matrix #similarity
- Eigenvector-based clustering using aggregated similarity matrices (HHG, MS, AN), pp. 1083–1087.
- SAC-2010-GiuntaPT #aspect-oriented #design pattern
- Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
- SAC-2010-GoncalvesCCGS #modelling #towards
- Towards the modeling reactive and proactive agents by using MAS-ML (EJTG, MIC, GALdC, GFG, VTdS), pp. 936–937.
- SAC-2010-GongWWLZY
- Recognizing affect from non-stylized body motion using shape of Gaussian descriptors (LG, TW, CW, FL, FZ, XY), pp. 1203–1206.
- SAC-2010-GuermaziHH #analysis #classification #image #web
- Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
- SAC-2010-GuoQL #configuration management #energy #network #optimisation
- A general energy optimization model for wireless networks using configurable antennas (SG, ZQ, SL), pp. 246–250.
- SAC-2010-HassanB #distributed #file system
- Semi-join computation on distributed file systems using map-reduce-merge model (MAHH, MB), pp. 406–413.
- SAC-2010-HautakorpiM #algorithm #network
- Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA) (JH, JM), pp. 655–662.
- SAC-2010-HeinzlS #validation #xml
- Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
- SAC-2010-HoqueRA #named #protocol #scalability
- S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
- SAC-2010-JiKYC #3d #how #interactive
- How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
- SAC-2010-KimKMY #multi #network #predict #probability
- Probabilistic context prediction using time-inferred multiple pattern networks (YHK, WK, KM, YY), pp. 1015–1019.
- SAC-2010-Kuzume
- Input device for disabled persons using expiration and tooth-touch sound signals (KK), pp. 1159–1164.
- SAC-2010-LanLSH #algorithm #classification #image
- An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
- SAC-2010-LeeJL #detection #graph
- Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
- SAC-2010-LeeKWAHP #3d #finite #random
- Tracking random finite objects using 3D-LIDAR in marine environments (KWL, BK, WSW, MA, FSH, NMP), pp. 1282–1287.
- SAC-2010-MacielNJIS #interactive
- Reality cues-based interaction using whole-body awareness (AM, LPN, VAMJ, JMTI, LFMSS), pp. 1224–1228.
- SAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability
- Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
- SAC-2010-MaranzatoPLN #detection
- Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
- SAC-2010-McDonaldTKG #component #reduction
- Using logic-based reduction for adversarial component recovery (JTM, EDT, YCK, MRG), pp. 1993–2000.
- SAC-2010-MenorBBGP #classification #markov #taxonomy
- Virus DNA-fragment classification using taxonomic hidden Markov model profiles (MM, KB, MB, YG, GP), pp. 1567–1571.
- SAC-2010-MiaoOWS #distributed #network
- Coverage-hole trap model in target tracking using distributed relay-robot network (HM, CCO, XW, CS), pp. 1299–1304.
- SAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity
- Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
- SAC-2010-MillerRPW #identification
- Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
- SAC-2010-MissenBC #detection
- Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
- SAC-2010-MustaphaZAG #composition #ontology #semantics
- Enhancing semantic search using case-based modular ontology (NBM, HBZ, MAA, HHBG), pp. 1438–1439.
- SAC-2010-NinagawaE #modelling #network #predict #probability
- Link prediction using probabilistic group models of network structure (AN, KE), pp. 1115–1116.
- SAC-2010-ParizekY #component #interactive #traversal
- Extraction of component-environment interaction model using state space traversal (PP, NY), pp. 2203–2210.
- SAC-2010-Perez-CastilloGP #on the #process
- On the use of patterns to recover business processes (RPC, IGRdG, MP), pp. 165–166.
- SAC-2010-PirkolaT #approach #crawling #problem
- Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
- SAC-2010-PortugalR #algorithm #clustering #graph #multi
- MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning (DP, RPR), pp. 1271–1276.
- SAC-2010-RiponGHT #approach #layout #multi #problem
- Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
- SAC-2010-Roder #interactive #requirements #usability
- Using interaction requirements to operationalize usability (HR), pp. 318–319.
- SAC-2010-RoyPL #component #detection #documentation #image
- Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
- SAC-2010-RyuCC #image #layout #named
- PHOTOLAND: a new image layout system using spatio-temporal information in digital photos (DSR, WKC, HGC), pp. 1884–1891.
- SAC-2010-ShahinLK #architecture #design #visualisation
- Rationale visualization of software architectural design decision using compendium (MS, PL, MRK), pp. 2367–2368.
- SAC-2010-ShinKNNTO #named #ontology #recommendation
- ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping--- (IS, TK, HN, KN, YT, AO), pp. 1442–1443.
- SAC-2010-SmithH #documentation #image #retrieval
- Document retrieval using image features (DS, RH), pp. 47–51.
- SAC-2010-StoffelSKK #analysis #documentation #visual notation
- Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
- SAC-2010-VermolenHL #consistency #modelling #proving
- Proving consistency of VDM models using HOL (SV, JH, PGL), pp. 2503–2510.
- SAC-2010-WeeL
- Client-side load balancer using cloud (SW, HL), pp. 399–405.
- SAC-2010-Youssef #metric #parallel #performance
- Using surface effect measures to model parallel performance (BBY), pp. 2400–2401.
- LDTA-J-2007-AkessonEH #attribute grammar #compilation #implementation #jastadd
- Implementation of a Modelica compiler using JastAdd attribute grammars (JÅ, TE, GH), pp. 21–38.
- LDTA-J-2007-CamachoMBV #automation #generative #tool support #verification
- Automated generation of program translation and verification tools using annotated grammars (DOC, KM, MvdB, JJV), pp. 3–20.
- LDTA-2010-Freudenthal #domain-specific language #enterprise
- Using DSLs for developing enterprise systems (MF), p. 11.
- SLE-2010-HostO #canonical #identification #implementation #java #semantics
- Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
- SLE-2010-JohnstoneS10a #generative
- Translator Generation Using ART (AJ, ES), pp. 306–315.
- ASPLOS-2010-KirmanM #power management
- A power-efficient all-optical on-chip interconnect using wavelength-based oblivious routing (NK, JFM), pp. 15–28.
- ASPLOS-2010-RamanKMJA #concurrent #parallel #thread #transaction
- Speculative parallelization using software multi-threaded transactions (AR, HK, TRM, TBJ, DIA), pp. 65–76.
- ASPLOS-2010-WooL #gpu #named #programmable
- COMPASS: a programmable data prefetcher using idle GPU shaders (DHW, HHSL), pp. 297–310.
- CASE-2010-AnandFLM #distributed #implementation #network
- A practical implementation of distributed system control over an asynchronous Ethernet network using time stamped data (DMA, JGF, YSLB, JRM), pp. 515–520.
- CASE-2010-AngererPA #configuration management #mobile #named
- MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots (SA, RP, RA), pp. 822–827.
- CASE-2010-CabasinoGS #fault #petri net
- Diagnosis using labeled Petri nets: Faults may either be silent or undistinguishable events (MPC, AG, CS), pp. 485–490.
- CASE-2010-DhupatiKRR #analysis #detection #novel #speech #validation
- A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
- CASE-2010-FrohlichS #automation #constraints #matrix #modelling #problem #scheduling
- Relation matrices for automated MILP modeling of scheduling problems using temporal constraints (RF, SCS), pp. 69–74.
- CASE-2010-GujarathiM #generative #integration
- Generative CAD and CAE integration using common data model (GPG, YM), pp. 586–591.
- CASE-2010-HuSF #analysis #biology
- Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
- CASE-2010-IshiiONTOTM #analysis #image
- Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
- CASE-2010-JohnsonM #optimisation
- Local planning using switching time optimization (ERJ, TDM), pp. 828–834.
- CASE-2010-Kanamori #design
- Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
- CASE-2010-KwokHFRW #approach #image
- Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
- CASE-2010-LeBSK #modelling #realtime #towards
- Towards virtual instruments for cardiovascular healthcare: Real-time modeling of cardiovascular dynamics using ECG signals (TQL, STSB, AS, RK), pp. 903–910.
- CASE-2010-MaruyamaKHTA
- Nanomanipulation of single virus using Dielectrophoretic concentration on a microfluidic chip (HM, KK, AH, TT, FA), pp. 710–715.
- CASE-2010-MikosFBF #design #development #distributed #ontology #reuse
- Development of a system for distributed sharing and reuse of design and manufacturing knowledge in the PFMEA domain using a description logics-based ontology (WLM, JCEF, PEAB, LSF), pp. 598–603.
- CASE-2010-PaullGLM #adaptation
- An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
- CASE-2010-RososhanskyXL #automation
- Coverage based tool path planning for automated polishing using contact stress theory (MR, FX, YL), pp. 592–597.
- CASE-2010-SunCL #algorithm #scheduling
- Scheduling of steel-making and continuous casting system using the surrogate subgradient algorithm for lagrangian relaxation (LS, TC, PBL), pp. 885–890.
- CC-2010-CraikK #object-oriented #parallel #source code
- Using Ownership to Reason about Inherent Parallelism in Object-Oriented Programs (AC, WK), pp. 145–164.
- CGO-2010-GottschlichVS #memory management #performance #transaction
- An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
- DAC-2010-Ababei #design #modelling #network #optimisation
- Network on chip design and optimization using specialized influence models (CA), pp. 625–626.
- DAC-2010-CallegariDWA #classification #learning
- Classification rule learning using subgroup discovery of cross-domain attributes responsible for design-silicon mismatch (NC, DGD, LCW, MSA), pp. 374–379.
- DAC-2010-ChoRXP #network
- History-based VLSI legalization using network flow (MC, HR, HX, RP), pp. 286–291.
- DAC-2010-ConstantinidesA #debugging #testing
- Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
- DAC-2010-DadgourHSB #analysis #design #energy #logic
- Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
- DAC-2010-DhimanMR #modelling #online #predict
- A system for online power prediction in virtualized environments using Gaussian mixture models (GD, KM, TR), pp. 807–812.
- DAC-2010-LiangM #reuse
- Instruction cache locking using temporal reuse profile (YL, TM), pp. 344–349.
- DAC-2010-ParkBWM #debugging #graph #locality #named
- BLoG: post-silicon bug localization in processors using bug localization graphs (SBP, AB, HW, SM), pp. 368–373.
- DAC-2010-PigorschS #preprocessor #satisfiability
- An AIG-Based QBF-solver using SAT for preprocessing (FP, CS), pp. 170–175.
- DAC-2010-Potkonjak #synthesis #tool support
- Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
- DAC-2010-WangM #approximate #named #realtime #scalability
- PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme (WW, PM), pp. 705–710.
- DATE-2010-AndalamRG #multi #predict #thread
- Deterministic, predictable and light-weight multithreading using PRET-C (SA, PSR, AG), pp. 1653–1656.
- DATE-2010-ArtiagaC #metadata
- Using filesystem virtualization to avoid metadata bottlenecks (EA, TC), pp. 562–567.
- DATE-2010-Aue #internet #mobile #power management
- Low power mobile internet devices using LTE technology (VA), p. 794.
- DATE-2010-BarrioMMHM #functional #synthesis
- Using Speculative Functional Units in high level synthesis (AADB, MCM, JMM, RH, SOM), pp. 1779–1784.
- DATE-2010-BolteSBNB
- Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
- DATE-2010-ChenABF #monitoring
- Non-invasive blood oxygen saturation monitoring for neonates using reflectance pulse oximeter (WC, IA, SBO, LMGF), pp. 1530–1535.
- DATE-2010-ChengDMMRWRA #parametricity
- Capturing intrinsic parameter fluctuations using the PSP compact model (BC, DD, NM, CM, GR, XW, SR, AA), pp. 650–653.
- DATE-2010-ChenLJC #distributed #manycore #memory management
- Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller (XC, ZL, AJ, SC), pp. 39–44.
- DATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters
- Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
- DATE-2010-DammMHG #modelling #network #simulation #transaction
- Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
- DATE-2010-DietrichEH #analysis #statistics
- Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
- DATE-2010-El-MoselhyD #order #reduction #statistics
- Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
- DATE-2010-GaoH #geometry #optimisation #programming
- A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
- DATE-2010-GiraldoMJM #hardware
- A HMMER hardware accelerator using divergences (JFEG, NM, RPJ, ACMAdM), pp. 405–410.
- DATE-2010-HatamiP #analysis #component #library #performance #representation #robust
- Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
- DATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics
- Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
- DATE-2010-KarnerASW #network #runtime #simulation
- Holistic simulation of FlexRay networks by using run-time model switching (MK, EA, CS, RW), pp. 544–549.
- DATE-2010-KlemmF #c++ #embedded #metaprogramming
- Bitstream processing for embedded systems using C++ metaprogramming (RK, GF), pp. 909–913.
- DATE-2010-LarsenLNP #analysis #realtime #synthesis
- Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
- DATE-2010-MishraJ #optimisation #power management #synthesis
- Low-power FinFET circuit synthesis using surface orientation optimization (PM, NKJ), pp. 311–314.
- DATE-2010-PomeranzR #requirements #sequence #testing
- Reducing the storage requirements of a test sequence by using a background vector (IP, SMR), pp. 1237–1242.
- DATE-2010-ShafiqueMH #adaptation #complexity #reduction #video
- An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusion (MS, BM, JH), pp. 1713–1718.
- DATE-2010-SoekenWKGD #modelling #ocl #satisfiability #uml #verification
- Verifying UML/OCL models using Boolean satisfiability (MS, RW, MK, MG, RD), pp. 1341–1344.
- DATE-2010-TajalliL #design #framework #power management
- Ultra-low power mixed-signal design platform using subthreshold source-coupled circuits (AT, YL), pp. 711–716.
- DATE-2010-VadlamaniZBT #adaptation #composition #fault #manycore
- Multicore soft error rate stabilization using adaptive dual modular redundancy (RV, JZ, WPB, RT), pp. 27–32.
- DATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis
- GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
- DATE-2010-ZengC #metric
- Interconnect delay and slew metrics using the beta distribution (JKZ, CPC), pp. 1329–1332.
- DATE-2010-ZhangLL #approach #markov #modelling #simulation #verification
- An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
- HPCA-2010-BiswasRMACJPPS #metric
- Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
- HPCA-2010-KaseridisSCJ #resource management #scalability
- A bandwidth-aware memory-subsystem resource management using non-invasive resource profilers for large CMP systems (DK, JS, JC, LKJ), pp. 1–11.
- HPCA-2010-TangBHC #architecture #cpu #performance
- DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance (DT, YB, WH, MC), pp. 1–12.
- HPDC-2010-BatiniGM #architecture #enterprise
- Optimal enterprise data architecture using publish and subscribe (CB, SG, AM), pp. 541–547.
- HPDC-2010-BhagawatyJPABK #design #implementation #simulation
- Design, implementation and use of a simulation data archive for coastal science (HB, LJ, SP, GA, NB, TK), pp. 651–657.
- HPDC-2010-BuiYT #abstraction #distributed #named #python #workflow
- Weaver: integrating distributed computing abstractions into scientific workflows using Python (PB, LY, DT), pp. 636–643.
- HPDC-2010-ChenCHCH #adaptation
- Improving host swapping using adaptive prefetching and paging notifier (WZC, HC, WH, XC, DH), pp. 300–303.
- HPDC-2010-CoutinhoOOBLDM #parallel #workflow
- Data parallelism in bioinformatics workflows using Hydra (FC, ESO, DdO, VPB, AABL, AMRD, MM), pp. 507–515.
- HPDC-2010-DonassoloCLV #performance #scalability #simulation #volunteer
- Fast and scalable simulation of volunteer computing systems using SimGrid (BD, HC, AL, PV), pp. 605–612.
- HPDC-2010-HenschelMS #distributed #workflow
- A distributed workflow for an astrophysical OpenMP application: using the data capacitor over WAN to enhance productivity (RH, SM, SCS), pp. 644–650.
- HPDC-2010-JabriM
- Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
- HPDC-2010-KimHMAJ #distributed #energy #scalability
- Exploring the RNA folding energy landscape using scalable distributed cyberinfrastructure (JK, WH, SM, FAE, SJ), pp. 477–488.
- HPDC-2010-LiewAHH #data type #distributed #graph #optimisation #parallel #streaming #towards
- Towards optimising distributed data streaming graphs using parallel streams (CSL, MPA, JIvH, LH), pp. 725–736.
- HPDC-2010-LimPF #named #performance
- SoftPower: fine-grain power estimations using performance counters (MYL, AP, RJF), pp. 308–311.
- HPDC-2010-StoutFMG #clustering #network #scalability
- Scaling virtual organization clusters over a wide area network using the Kestrel workload management system (LS, MF, MAM, SG), pp. 692–698.
- HPDC-2010-StuartCMO #multi #pipes and filters
- Multi-GPU volume rendering using MapReduce (JAS, CKC, KLM, JDO), pp. 841–848.
- ISMM-2010-TianFG #parallel #predict
- Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
- OSDI-2010-AnanthanarayananKGSLSH #clustering
- Reining in the Outliers in Map-Reduce Clusters using Mantri (GA, SK, AGG, IS, YL, BS, EH), pp. 265–278.
- OSDI-2010-FeldmanZFF #collaboration #named
- SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
- OSDI-2010-KimWZK
- Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
- OSDI-2010-PengD #distributed #incremental #scalability #transaction
- Large-scale Incremental Processing Using Distributed Transactions and Notifications (DP, FD), pp. 251–264.
- PDP-2010-BittencourtSM #algorithm #graph #lookahead #scheduling
- DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm (LFB, RS, ERMM), pp. 27–34.
- PDP-2010-EbrahimiDLPT #architecture #interface #network
- A High-Performance Network Interface Architecture for NoCs Using Reorder Buffer Sharing (ME, MD, PL, JP, HT), pp. 546–550.
- PDP-2010-FloresAA #energy #hardware
- Energy-Efficient Hardware Prefetching for CMPs Using Heterogeneous Interconnects (AF, JLA, MEA), pp. 147–154.
- PDP-2010-LeoAGZ #analysis #clustering #data transformation #throughput
- Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
- PDP-2010-MarosiKFL
- Sandboxing for Desktop Grids Using Virtualization (CAM, PK, GF, OL), pp. 559–566.
- PDP-2010-MartinezCPRP #modelling #performance
- Performance Modeling of MPI Applications Using Model Selection Techniques (DRM, JCC, TFP, FFR, VBP), pp. 95–102.
- PDP-2010-MinhW #parallel #predict
- Using Historical Data to Predict Application Runtimes on Backfilling Parallel Systems (TNM, LW), pp. 246–252.
- PPoPP-2010-CastaldoW #parallel #scalability
- Scaling LAPACK panel operations using parallel cache assignment (AMC, RCW), pp. 223–232.
- PPoPP-2010-LupeiSPMBKA #game studies #memory management #parallel #scalability #towards #transaction
- Towards scalable and transparent parallelization of multiplayer games using transactional memory support (DL, BS, DP, MM, MB, WK, CA), pp. 325–326.
- PPoPP-2010-SandesM #comparison #gpu #named #sequence
- CUDAlign: using GPU to accelerate the comparison of megabase genomic sequences (EFdOS, ACMAdM), pp. 137–146.
- PPoPP-2010-UpadhyayaMP #data type #generative #performance
- Using data structure knowledge for efficient lock generation and strong atomicity (GU, SPM, VSP), pp. 281–292.
- PPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability
- PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
- FASE-2010-DarvasM #consistency #proving
- Proving Consistency and Completeness of Model Classes Using Theory Interpretation (ÁD, PM), pp. 218–232.
- TACAS-2010-ParizekK #component #detection #fault #java #performance #random
- Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
- CAV-2010-TorreMP #concurrent #interface #linear #model checking #source code
- Model-Checking Parameterized Concurrent Programs Using Linear Interfaces (SLT, PM, GP), pp. 629–644.
- ICLP-2010-ShakarianSS10 #network #optimisation #problem #social #source code
- Using Generalized Annotated Programs to Solve Social Network Optimization Problems (PS, VSS, MLS), pp. 182–191.
- ICST-2010-DebroyW #automation #source code
- Using Mutation to Automatically Suggest Fixes for Faulty Programs (VD, WEW), pp. 65–74.
- ICST-2010-HuangCM #algorithm #search-based #testing #user interface
- Repairing GUI Test Suites Using a Genetic Algorithm (SH, MBC, AMM), pp. 245–254.
- ICST-2010-Laurent #concept #formal method #process #testing #validation #verification
- Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
- ICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol
- Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
- ICTSS-2010-ArcuriIB #black box #embedded #random #realtime #search-based #testing
- Black-Box System Testing of Real-Time Embedded Systems Using Random and Search-Based Testing (AA, MZZI, LCB), pp. 95–110.
- ICTSS-2010-LamanchaU #generative #product line #testing
- Testing Product Generation in Software Product Lines Using Pairwise for Features Coverage (BPL, MPU), pp. 111–125.
- ISSTA-2010-DanielGM #execution #on the #symbolic computation
- On test repair using symbolic execution (BD, TG, DM), pp. 207–218.
- ISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing
- Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
- SAT-2010-Ehlers #automaton #satisfiability
- Minimising Deterministic Büchi Automata Precisely Using SAT Solving (RE), pp. 326–332.
- SAT-2010-FuhsS #linear #satisfiability #source code
- Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT (CF, PSK), pp. 71–84.
- TAP-2010-BueDKB #abstraction #behaviour
- Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
- TAP-2010-ClaessenSH #named #specification #testing
- QuickSpec: Guessing Formal Specifications Using Testing (KC, NS, JH), pp. 6–21.
- TAP-2010-GladischTBY #generative #testing #verification
- Generating Regression Unit Tests Using a Combination of Verification and Capture & Replay (CG, SST, BB, AY), pp. 61–76.
- VMCAI-2010-BuZL #automaton #hybrid #programming #reachability #verification
- Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming (LB, JZ, XL), pp. 78–94.
- CBSE-2009-Bickford #component #specification
- Component Specification Using Event Classes (MB), pp. 140–155.
- QoSA-2009-KrogmannSBKMM #architecture #feedback #performance #predict #visualisation
- Improved Feedback for Architectural Performance Prediction Using Software Cartography Visualizations (KK, CMS, SB, MK, AM, FM), pp. 52–69.
- WICSA-ECSA-2009-AboudAFHTUV #architecture #automation #classification #component #concept
- Automated architectural component classification using concept lattices (NAA, GA, JRF, MH, CT, CU, SV), pp. 21–30.
- WICSA-ECSA-2009-Babar #agile #architecture #case study #challenge #development
- An exploratory study of architectural practices and challenges in using agile software development approaches (MAB), pp. 81–90.
- WICSA-ECSA-2009-BucchiaronePVR #modelling #self #verification
- Self-Repairing systems modeling and verification using AGG (AB, PP, CV, OR), pp. 181–190.
- WICSA-ECSA-2009-EmeryH #architecture #framework
- Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 (DEE, RH), pp. 31–40.
- WICSA-ECSA-2009-HenttonenM #architecture #open source #reuse #tool support
- Open source based tools for sharing and reuse of software architectural knowledge (KH, MM), pp. 41–50.
- WICSA-ECSA-2009-LiuLXSZ #architecture #enterprise #integration
- Using architecture integration patterns to compose enterprise mashups (YL, XL, LX, MS, LZ), pp. 111–120.
- WICSA-ECSA-2009-NordCEH #architecture #documentation #set
- Reviewing architecture documents using question sets (RLN, PCC, DEE, RH), pp. 325–328.
- WICSA-ECSA-2009-RooSA #adaptation #architecture #embedded #multi #optimisation
- An architectural style for optimizing system qualities in adaptive embedded systems using Multi-Objective Optimization (AdR, HS, MA), pp. 349–352.
- DocEng-2009-DiazAK #product line
- Using DITA for documenting software product lines (OD, FIA, JK), pp. 231–240.
- DocEng-2009-Hassan09a #documentation #graph #interactive #named
- GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
- DocEng-2009-JoshiL #analysis #documentation #image #natural language #web
- Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
- DRR-2009-HalimaA #concept #recognition #segmentation
- Simultaneous segmentation and recognition of Arabic printed text using linguistic concepts of vocabulary (MBH, AMA), pp. 1–10.
- DRR-2009-LiD #difference #independence #verification
- Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
- DRR-2009-NakaiKI #documentation #image
- Camera-based document image mosaicing using LLAH (TN, KK, MI), pp. 1–10.
- DRR-2009-NonnemakerB #classification
- Using synthetic data safely in classification (JN, HSB), pp. 1–10.
- DRR-2009-TaghvaC #analysis #bound #documentation
- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
- DRR-2009-TanVK #clustering #identification #online
- Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
- ECDL-2009-DammKFC #concept #library #multimodal #music #query
- A Concept for Using Combined Multimodal Queries in Digital Music Libraries (DD, FK, CF, MC), pp. 261–272.
- ECDL-2009-MachadoPFMM #component #user interface
- User Interface for a Geo-Temporal Search Service Using DIGMAP Components (JM, GP, NF, BM, HM), pp. 483–486.
- ECDL-2009-OlsenS #distributed #library
- Gaining Access to Decentralised Library Resources Using Location-Aware Services (BSO, ITS), pp. 388–391.
- ECDL-2009-TonniesB #evaluation #library #quality #roadmap #semantics
- Using Semantic Technologies in Digital Libraries — A Roadmap to Quality Evaluation (ST, WTB), pp. 168–179.
- HT-2009-AmitayCHOSYG #approach #social
- Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
- HT-2009-HargoodMW
- Using a thematic model to enrich photo montages (CH, DEM, MJW), pp. 135–140.
- HT-2009-Martinez-RomoA #approach #information management #web
- Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
- ICDAR-2009-Abd-AlmageedKD #documentation #linear
- Page Rule-Line Removal Using Linear Subspaces in Monochromatic Handwritten Arabic Documents (WAA, JK, DSD), pp. 768–772.
- ICDAR-2009-AbdulkaderC #fault #learning #low cost #multi
- Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment (AA, MRC), pp. 576–580.
- ICDAR-2009-AhmadVK #markov #recognition #word
- Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model (ARA, CVG, MK), pp. 161–165.
- ICDAR-2009-BarratT #image #modelling #network
- Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
- ICDAR-2009-BledaBGZLMPV #online #recognition
- Improving a DTW-Based Recognition Engine for On-line Handwritten Characters by Using MLPs (MJCB, SEB, JGM, FZM, DLP, AMV, FPV, JMVT), pp. 1260–1264.
- ICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming
- Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
- ICDAR-2009-BoussellaaBZAA #algorithm #documentation #image
- Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm (WB, AB, AZ, HEA, AMA), pp. 743–747.
- ICDAR-2009-BukhariSB09a #independence #segmentation
- Script-Independent Handwritten Textlines Segmentation Using Active Contours (SSB, FS, TMB), pp. 446–450.
- ICDAR-2009-CaoPSN #adaptation #clustering
- Unsupervised HMM Adaptation Using Page Style Clustering (HC, RP, SS, PN), pp. 1091–1095.
- ICDAR-2009-DiemS #recognition
- Recognition of Degraded Handwritten Characters Using Local Features (MD, RS), pp. 221–225.
- ICDAR-2009-ElbaatiBKEAA #recognition
- Arabic Handwriting Recognition Using Restored Stroke Chronology (AE, HB, MK, AE, HEA, AMA), pp. 411–415.
- ICDAR-2009-FornesLSB #identification #music #on the
- On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
- ICDAR-2009-GalballyFMO #evaluation #verification
- Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
- ICDAR-2009-GarainP #identification #multi
- Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
- ICDAR-2009-HamdaniAKA #multi #online #recognition
- Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition (MH, HEA, MK, AMA), pp. 201–205.
- ICDAR-2009-HanifP #algorithm #detection #image #locality
- Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
- ICDAR-2009-Hassan #documentation #graph
- User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
- ICDAR-2009-HeH09a #classification #estimation #online
- Affine Distortion Compensation for an Isolated Online Handwritten Chinese Character Using Combined Orientation Estimation and HMM-Based Minimax Classification (TH, QH), pp. 1226–1230.
- ICDAR-2009-HoangTP #diagrams #image
- Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram (TVH, ST, NYP), pp. 921–925.
- ICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition
- Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
- ICDAR-2009-IbrahimKKAG #analysis #dependence #online #verification
- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
- ICDAR-2009-ImpedovoFM #recognition #word
- HMM Based Handwritten Word Recognition System by Using Singularities (SI, AF, RM), pp. 783–787.
- ICDAR-2009-KimLK #mobile
- Scene Text Extraction Using Focus of Mobile Camera (EK, SL, JHK), pp. 166–170.
- ICDAR-2009-LandreMR #classification #difference #image
- Ornamental Letters Image Classification Using Local Dissimilarity Maps (JL, FMN, SR), pp. 186–190.
- ICDAR-2009-LeloreB #documentation #image #markov
- Document Image Binarisation Using Markov Field Model (TL, FB), pp. 551–555.
- ICDAR-2009-LuqmanBR #classification #graph #network #recognition
- Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
- ICDAR-2009-MansjurWJ #automation #categorisation #classification #kernel #learning #topic
- Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization (DSM, TSW, BHJ), pp. 1086–1090.
- ICDAR-2009-MarinaiMS #clustering #order
- Mathematical Symbol Indexing Using Topologically Ordered Clusters of Shape Contexts (SM, BM, GS), pp. 1041–1045.
- ICDAR-2009-MiyaoM #adaptation #online #recognition
- Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples (HM, MM), pp. 1156–1160.
- ICDAR-2009-MoghaddamRC #approach #classification #independence #multi #segmentation #set
- Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
- ICDAR-2009-MontreuilGHN #2d #documentation #layout #random
- Unconstrained Handwritten Document Layout Extraction Using 2D Conditional Random Fields (FM, EG, LH, SN), pp. 853–857.
- ICDAR-2009-MuramatsuYM #authentication #online
- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
- ICDAR-2009-NakaiKI #documentation #image #realtime #retrieval #web
- Real-Time Retrieval for Images of Documents in Various Languages Using a Web Camera (TN, KK, MI), pp. 146–150.
- ICDAR-2009-PalWK #case study #classification #comparative #recognition
- Comparative Study of Devnagari Handwritten Character Recognition Using Different Feature and Classifiers (UP, TW, FK), pp. 1111–1115.
- ICDAR-2009-PanBS #recognition
- Isolated Handwritten Farsi Numerals Recognition Using Sparse and Over-Complete Representations (WP, TDB, CYS), pp. 586–590.
- ICDAR-2009-PavelecOJNB #identification #modelling
- Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
- ICDAR-2009-RomeroTV #feedback #image
- Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images (VR, AHT, EV), pp. 96–100.
- ICDAR-2009-RoyPLD #multi #programming #segmentation
- Multi-Oriented and Multi-Sized Touching Character Segmentation Using Dynamic Programming (PPR, UP, JL, MD), pp. 11–15.
- ICDAR-2009-SaldarriagaMV #documentation #online #recognition
- Using top n Recognition Candidates to Categorize On-line Handwritten Documents (SPS, EM, CVG), pp. 881–885.
- ICDAR-2009-SundaramR #online #recognition
- An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
- ICDAR-2009-WakaharaU #2d #composition
- Hierarchical Decomposition of Handwriting Deformation Vector Field Using 2D Warping and Global/Local Affine Transformation (TW, SU), pp. 1141–1145.
- ICDAR-2009-WangBA #automation #documentation
- Document Content Extraction Using Automatically Discovered Features (SYW, HSB, CA), pp. 1076–1080.
- ICDAR-2009-WangH #classification #design #fault #modelling #parametricity #precise
- Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification Error Training and Parameter Compression (YW, QH), pp. 36–40.
- ICDAR-2009-YiPX #integration #multi #recognition #video
- Using Multiple Frame Integration for the Text Recognition of Video (JY, YP, JX), pp. 71–75.
- ICDAR-2009-ZhouLN #online #random #recognition #string
- Online Handwritten Japanese Character String Recognition Using Conditional Random Fields (XDZ, CLL, MN), pp. 521–525.
- JCDL-2009-Barker #education #library #online
- Science teachers’ use of online resources and the digital library for Earth system education (LJB), pp. 1–10.
- JCDL-2009-GaleasKF #analysis #assessment #documentation #fourier
- Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
- JCDL-2009-HaqN #encryption
- Using timed-release cryptography to mitigate the preservation risk of embargo periods (RH, MLN), pp. 183–192.
- JCDL-2009-MurataTMK #ranking
- Query-page intention matching using clicked titles and snippets to boost search rankings (MM, HT, YM, RK), pp. 105–114.
- JCDL-2009-PereiraRZLGF #ambiguity #web
- Using web information for author name disambiguation (DAP, BARN, NZ, AHFL, MAG, AAF), pp. 49–58.
- JCDL-2009-TreeratpitukG #random
- Disambiguating authors in academic publications using random forests (PT, CLG), pp. 39–48.
- SIGMOD-2009-ChaudhuriNS #profiling #static analysis
- Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
- SIGMOD-2009-ChenOG #performance
- Fast and dynamic OLAP exploration using UDFs (ZC, CO, CGA), pp. 1087–1090.
- SIGMOD-2009-Chi #social #web
- Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason (EHC), pp. 973–984.
- SIGMOD-2009-IsardY #distributed #programming language
- Distributed data-parallel computing using a high-level programming language (MI, YY), pp. 987–994.
- SIGMOD-2009-PaparizosNSA #data flow #query #web
- Answering web queries using structured data sources (SP, AN, JCS, RA), pp. 1127–1130.
- SIGMOD-2009-Plattner #approach #database #in memory
- A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
- SIGMOD-2009-ZhangMC #clustering #scalability
- Scalable skyline computation using object-based space partitioning (SZ, NM, DWC), pp. 483–494.
- VLDB-2009-CanimBMLR
- An Object Placement Advisor for DB2 Using Solid State Storage (MC, BB, GAM, CAL, KAR), pp. 1318–1329.
- VLDB-2009-CautisDOV #performance #query #set #specification #xpath
- Efficient Rewriting of XPath Queries Using Query Set Specifications (BC, AD, NO, VV), pp. 301–312.
- VLDB-2009-JohnsonPA #inheritance #scalability
- Improving OLTP Scalability using Speculative Lock Inheritance (RJ, IP, AA), pp. 479–489.
- VLDB-2009-LeglerLSK #distributed #mining #robust
- Robust Distributed Top-N Frequent Pattern Mining Using the SAP BW Accelerator (TL, WL, JS, JK), pp. 1438–1449.
- VLDB-2009-LiuJ
- Using Trees to Depict a Forest (BL, HVJ), pp. 133–144.
- VLDB-2009-NandiB #named #taxonomy
- HAMSTER: Using Search Clicklogs for Schema and Taxonomy Matching (AN, PAB), pp. 181–192.
- VLDB-2009-PereiraRSTWH #question #web
- Answering Web Questions Using Structured Data — Dream or Reality? (FP, AR, SS, WTP, GW, AYH), p. 1646.
- VLDB-2009-Rajaraman #named #topic #web
- Kosmix: High-Performance Topic Exploration using the Deep Web (AR), pp. 1524–1529.
- VLDB-2009-WangSCMKZPY #data transformation #named #semantics #web
- SMDM: Enhancing Enterprise-Wide Master Data Management Using Semantic Web Technologies (XW, XS, FC, LM, NK, KZ, YP, YY), pp. 1594–1597.
- VLDB-2009-WillhalmPBPZS #in memory #named #performance
- SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units (TW, NP, YB, HP, AZ, JS), pp. 385–394.
- CSEET-2009-Al-Yahya #re-engineering #wiki
- Using Wikis to Support Teamwork Skills in Software Engineering Courses (MMAY), pp. 142–149.
- CSEET-2009-GB #education #ontology #re-engineering
- Using Ontologies to Aid the Teaching of Software Engineering (SPG, AB), pp. 224–231.
- CSEET-2009-KoolmanojwongB #case study #education #experience #research
- Using Software Project Courses to Integrate Education and Research: An Experience Report (SK, BWB), pp. 26–33.
- CSEET-2009-McMeekinKCC #taxonomy
- Evaluating Software Inspection Cognition Levels Using Bloom’s Taxonomy (DAM, BRvK, EC, DJAC), pp. 232–239.
- CSEET-2009-Padua #quality
- Using Quality Audits to Assess Software Course Projects (WP), pp. 162–165.
- CSEET-2009-TaranMSS #authoring #case study #framework #industrial #multi #platform #scalability
- Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry (GT, RM, RS, AS), pp. 61–68.
- CSEET-2009-WuWSK #development #education #evaluation #framework #game studies
- An Evaluation of Using a Game Development Framework in Higher Education (BW, AIW, JES, TBK), pp. 41–44.
- EDM-2009-AbbasS #learning
- an Argument Learning Environment Using Agent-Based ITS (ALES) (SA, HS), pp. 200–209.
- EDM-2009-AgapitoO #detection #performance
- Detecting Symptoms of Low Performance Using Production Rules (JBA, AO), pp. 31–40.
- EDM-2009-FengBH #composition #education #learning
- Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions on Learning (MF, JB, NTH), pp. 51–60.
- EDM-2009-PavlikCK #analysis #automation #domain model #learning #modelling
- Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
- EDM-2009-RaiGB #parametricity
- Using Dirichlet priors to improve model parameter plausibility (DR, YG, JB), pp. 141–150.
- EDM-2009-SacinASO #data mining #education #mining #recommendation
- Recommendation in Higher Education Using Data Mining Techniques (CVS, JBA, LS, AO), pp. 191–199.
- ITiCSE-2009-AhoniemiK
- Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
- ITiCSE-2009-Al-BowAEFFLLM #education #game studies #programming #student
- Using game creation for teaching computer programming to high school students and teachers (MAB, DA, JE, RF, JF, CL, STL, SM), pp. 104–108.
- ITiCSE-2009-AltinBEKOSSSMPR09a #experience #learning #student #tool support #user interface
- Use of intuitive tools to enhance student learning and user experience (RA, MB, NE, CK, ÖCÖ, MS, HS, DS, CCM, CP, CRR), p. 365.
- ITiCSE-2009-BlasGMB #analysis #automation #composition
- Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
- ITiCSE-2009-BrabrandD #taxonomy
- Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
- ITiCSE-2009-Dooley
- Peer assessments using the moodle workshop tool (JFD), p. 344.
- ITiCSE-2009-Draganova #learning #mobile
- Use of mobile phone technologies in learning (CD), p. 399.
- ITiCSE-2009-EnglishR #assessment #automation #case study #source code #student
- Evaluating students’ programs using automated assessment: a case study (JE, TR), p. 371.
- ITiCSE-2009-Garcia-MateosA #algorithm #data type #online
- A course on algorithms and data structures using on-line judging (GGM, JLFA), pp. 45–49.
- ITiCSE-2009-Gomez-MartinJA #design pattern #education #game studies #product line
- Teaching design patterns using a family of games (MAGM, GJD, JA), pp. 268–272.
- ITiCSE-2009-Kultur
- Keeping the pace in CS-1 through the use of CMS (CK), p. 398.
- ITiCSE-2009-MaFRRW #modelling #visualisation
- Improving the mental models held by novice programmers using cognitive conflict and jeliot visualisations (LM, JDF, MR, IR, MW), pp. 166–170.
- ITiCSE-2009-MoffatT #algorithm #education
- The use of MUVE technology in teaching AI algorithms (DCM, KT), p. 396.
- ITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming
- Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
- ITiCSE-2009-Rubio-SanchezV #recursion
- Tail recursion by using function generalization (MRS, JÁVI), p. 394.
- ITiCSE-2009-SoriaP #architecture #aspect-oriented #development #education #open source
- Teaching software architectures and aspect-oriented software development using open-source projects (CCS, JP), p. 385.
- ITiCSE-2009-Steenkiste
- The use of a controlled wireless testbed in courses (PS), pp. 80–84.
- ITiCSE-2009-Townsend #student
- Using a groupware system in CS1 to engage introverted students (GCT), pp. 16–20.
- ITiCSE-2009-VillalobosCJ #interactive #learning #programming
- Developing programming skills by using interactive learning objects (JV, NAC, CJ), pp. 151–155.
- SIGITE-2009-Connolly #design #education #guidelines #web
- No longer partying like it’s 1999: designing a modern web stream using the it2008 curriculum guidelines (RWC), pp. 74–79.
- SIGITE-2009-Cross #protocol
- Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
- SIGITE-2009-HansenBGRM #novel #open source
- A novel IP telephony course using open-source software (RAH, VMB, RG, DR, LM), pp. 43–49.
- SIGITE-2009-OhMP #education #encryption #internet #protocol #simulation
- Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
- SIGITE-2009-PakC #assessment #markov #modelling #risk management
- Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
- SIGITE-2009-Stanley #architecture #education #hardware #logic #network #operating system #simulation
- Using digital logic simulation as a teaching aid in discrete mathematics, hardware and operating systems, networking, computer organization and computer architecture: a workshop outline (TDS), pp. 1–2.
- ICPC-J-2008-HindleGH09 #complexity #rank
- Reading beside the lines: Using indentation to rank revisions by complexity (AH, MWG, RCH), pp. 414–429.
- CSMR-2009-BurenR #analysis #architecture #maintenance
- Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
- CSMR-2009-Chikofsky #architecture #process
- Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
- CSMR-2009-FrankeJLUHEK #assessment #metric #network
- A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
- CSMR-2009-Gimnich #design
- Using Existing Software Assets in SOA Design (RG), pp. 309–310.
- CSMR-2009-KpodjedoRGA #algorithm #evolution #question
- Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla? (SK, FR, PG, GA), pp. 179–188.
- CSMR-2009-PatelHR #clustering #dependence #dynamic analysis
- Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
- CSMR-2009-Rombach #design #maintenance #product line
- Design for Maintenance — Use of Engineering Principles and Product Line Technology (HDR), pp. 1–2.
- CSMR-2009-SoriaPC #architecture #fault #locality #modelling #tool support
- Tool Support for Fault Localization Using Architectural Models (AS, JADP, MRC), pp. 59–68.
- CSMR-2009-SoriaPC09a #architecture #aspect-oriented #configuration management
- Handling the Dynamic Reconfiguration of Software Architectures Using Aspects (CCS, JP, JÁC), pp. 263–266.
- ICPC-2009-GueheneucKM #comprehension
- Working session: Using eye-tracking to understand program comprehension (YGG, HHK, JIM), pp. 278–279.
- ICPC-2009-MurphyVS #behaviour #process #programming
- Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
- ICPC-2009-StefikG #debugging #empirical
- Using spoken text to aid debugging: An empirical study (AS, EG), pp. 110–119.
- ICSM-2009-AlamAH #dependence
- Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
- ICSM-2009-BettenburgSH #empirical #off the shelf #risk management
- An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
- ICSM-2009-DaraLLST #execution #testing
- Using dynamic execution data to generate test cases (RD, SL, WL, ASG, LT), pp. 433–436.
- ICSM-2009-DongG #comprehension #hybrid
- Understanding source package organization using the hybrid model (XD, MWG), pp. 575–578.
- ICSM-2009-DraganCM
- Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
- ICSM-2009-FerzundAW #classification #metric
- Software change classification using hunk metrics (JF, SNA, FW), pp. 471–474.
- ICSM-2009-FokaefsTCS #clustering #object-oriented
- Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
- ICSM-2009-GayHMM #concept #feedback #on the
- On the use of relevance feedback in IR-based concept location (GG, SH, AM, TM), pp. 351–360.
- ICSM-2009-HolmesCWD #case study #source code
- The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
- ICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance
- Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
- ICSM-2009-Li #analysis #dependence #identification
- Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
- ICSM-2009-Poshyvanyk #information retrieval #maintenance
- Using information retrieval to support software maintenance tasks (DP), pp. 453–456.
- ICSM-2009-ShihabJH #developer #open source
- Studying the use of developer IRC meetings in open source projects (ES, ZMJ, AEH), pp. 147–156.
- ICSM-2009-ShternT #clustering #evaluation
- Refining clustering evaluation using structure indicators (MS, VT), pp. 297–305.
- ICSM-2009-VasaLBN #analysis #comparative #evolution
- Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
- ICSM-2009-WitZD #clone tracking
- Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
- ICSM-2009-YokomoriSNI #component #framework #impact analysis #ranking
- Assessing the impact of framework changes using component ranking (RY, HPS, MN, KI), pp. 189–198.
- ICSM-2009-Yoo #impact analysis #metric #performance
- Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
- ICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability
- Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
- MSR-2009-EkanayakeTGB #concept #fault #predict #quality
- Tracking concept drift of software projects using defect prediction quality (JE, JT, HCG, AB), pp. 51–60.
- MSR-2009-Kuhn #automation #component #evolution #source code #word
- Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
- MSR-2009-LubsenZP #co-evolution
- Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
- MSR-2009-MatterKN #debugging #developer
- Assigning bug reports using a vocabulary-based expertise model of developers (DM, AK, ON), pp. 131–140.
- MSR-2009-ShihabJH #chat #developer #gnome #internet #on the
- On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project (ES, ZMJ, AEH), pp. 107–110.
- MSR-2009-TianRP #automation #categorisation
- Using Latent Dirichlet Allocation for automatic categorization of software (KT, MR, DP), pp. 163–166.
- WCRE-1999-CapobiancoLOPP99a #analysis #traceability
- Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
- WCRE-1999-GatrellCH99a #c# #design pattern #replication
- Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
- WCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code
- On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
- WCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics
- Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
- CIAA-2009-AhnH #heuristic #implementation
- Implementation of State Elimination Using Heuristics (JHA, YSH), pp. 178–187.
- CIAA-2009-Sastre-Martinez #network #parsing #performance #recursion
- Efficient Parsing Using Filtered-Popping Recursive Transition Networks (JMSM), pp. 241–244.
- ICALP-v1-2009-Jansen #constant #scheduling
- An EPTAS for Scheduling Jobs on Uniform Processors: Using an MILP Relaxation with a Constant Number of Integral Variables (KJ), pp. 562–573.
- ICALP-v1-2009-Nederlof #algorithm #performance #problem
- Fast Polynomial-Space Algorithms Using Möbius Inversion: Improving on Steiner Tree and Related Problems (JN), pp. 713–725.
- ICALP-v2-2009-CooperIKK #graph #random
- Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
- LATA-2009-Blanchet-SadriMRW #algorithm #word
- An Answer to a Conjecture on Overlaps in Partial Words Using Periodicity Algorithms (FBS, RM, AR, EW), pp. 188–199.
- LATA-2009-Onodera #locality
- New Morphic Characterizations of Languages in Chomsky Hierarchy Using Insertion and Locality (KO), pp. 648–659.
- FM-2009-HjortRLPS #modelling #testing #user interface
- Model-Based GUI Testing Using Uppaal at Novo Nordisk (UHH, JIR, KGL, MAP, AS), pp. 814–818.
- FM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement
- A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
- FM-2009-JostLHSH #analysis #bound
- “Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
- FM-2009-LangM #composition #confluence #detection #partial order #reduction
- Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
- FM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight
- An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
- IFM-2009-SalaunB #algebra #encoding #process
- Realizability of Choreographies Using Process Algebra Encodings (GS, TB), pp. 167–182.
- SEFM-2009-BertoliniM #model checking #probability #testing #user interface
- Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
- SEFM-2009-HieronsJUY #adaptation #sequence
- Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences (RMH, GVJ, HU, HY), pp. 157–166.
- SEFM-2009-HummelT #behaviour #specification
- Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
- SEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing
- Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
- SEFM-2009-TruongTN #analysis #coordination #multi
- Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
- SFM-2009-ClarkGT #analysis #web #web service
- Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
- TLCA-2009-Atkey #for free #parametricity #representation #syntax
- Syntax for Free: Representing Syntax with Binding Using Parametricity (RA), pp. 35–49.
- CEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code
- Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
- ICFP-2009-GazagnaireH #database #functional #named #performance #programming #transaction
- OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons (TG, VH), pp. 203–214.
- ICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support
- Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
- ICFP-2009-Pierce #education #programming language #proving
- λ, the ultimate TA: using a proof assistant to teach programming language foundations (BCP), pp. 121–122.
- AIIDE-2009-TutenelSBK #design #game studies #semantics
- Using Semantics to Improve the Design of Game Worlds (TT, RMS, RB, KJdK).
- AIIDE-2009-ZhaoS #behaviour #game studies #learning #modelling
- Learning Character Behaviors Using Agent Modeling in Games (RZ, DS).
- CIG-2009-AveryLA #coordination #evolution
- Evolving coordinated spatial tactics for autonomous entities using influence maps (PA, SJL, BA), pp. 341–348.
- CIG-2009-CardamoneLL #learning
- Learning drivers for TORCS through imitation using supervised methods (LC, DL, PLL), pp. 148–155.
- CIG-2009-CowleyCBH #behaviour #modelling #predict
- Analyzing player behavior in Pacman using feature-driven decision theoretic predictive modeling (BC, DC, MMB, RJH), pp. 170–177.
- CIG-2009-DrachenCY #modelling #self
- Player modeling using self-organization in Tomb Raider: Underworld (AD, AC, GNY), pp. 1–8.
- CIG-2009-EbnerT #evolution #programming #search-based
- Evolving driving controllers using Genetic Programming (ME, TT), pp. 279–286.
- CIG-2009-GalwayCB #difference #game studies #learning
- Improving Temporal Difference game agent control using a dynamic exploration during control learning (LG, DC, MMB), pp. 38–45.
- CIG-2009-JangYC #algorithm #game studies #realtime
- Optimal strategy selection of non-player character on real time strategy game using a speciated evolutionary algorithm (SHJ, JY, SBC), pp. 75–79.
- CIG-2009-MalikD #behaviour #coordination #metaprogramming #multi #testing
- Improving testing of multi-unit computer players for unwanted behavior using coordination macros (AM, JD), pp. 355–362.
- CIG-2009-ThompsonL #automation #execution #realtime
- Realtime execution of automated plans using evolutionary robotics (TT, JL), pp. 333–340.
- DiGRA-2009-AndersonBCDLM #game studies #problem #video
- Using microgenetic methods to investigate problem solving in video games (AA, CB, KMC, JD, AL, WM).
- DiGRA-2009-DahlskogKA #classification #functional #game studies
- Mapping the game landscape: Locating genres using functional classification (SD, AK, EA).
- DiGRA-2009-EylesE #game studies
- Using an RFID game to phenomenologically test a theoretical systemic model for describing ambient games (ME, RE).
- DiGRA-2009-RibbensP #case study #experience #research
- Researching player experiences through the use of different qualitative methods (WR, YP).
- DiGRA-2009-RyanS #comprehension #game studies #interactive #learning #video
- Evaluating Interactive Entertainment using Breakdown: Understanding Embodied Learning in Video Games (WR, MAS).
- DiGRA-2009-Salazar #framework #multi #simulation
- Simulating a Quasi-Simulation: A framework for using Multi Agent Simulation Techniques for studying MMORPGs (JS).
- FDG-2009-ChertoffBLL #3d #game studies
- An exploration of menu techniques using a 3D game input device (DBC, RWB, JJLJ), pp. 256–262.
- VS-Games-2009-CharlesCM #game studies #representation #student
- Using Player and World Representation Techniques from Computer Games to Improve Student Engagement (DC, TC, MM), pp. 36–42.
- VS-Games-2009-Halloran #communication #game studies
- It's Talk, But Not as We Know It: Using VoIP to Communicate in War Games (JH0), pp. 133–140.
- VS-Games-2009-ValerioPMMSC
- Second Life Information Desk System Using Instant Messaging and Short Messaging Service Technologies (SV, JP, LM, PM, CS, FdC), pp. 125–132.
- VS-Games-2009-VidaniC #design #game studies #modelling
- Using a Task Modeling Formalism in the Design of Serious Games for Emergency Medical Procedures (ACV, LC), pp. 95–102.
- GT-VMT-2009-MazanekM09a #diagrams #parsing
- Contraction of Unconnected Diagrams using Least Cost Parsing (SM, MM), pp. 189–201.
- CHI-2009-AokiHMMPSW #community #research
- A vehicle for research: using street sweepers to explore the landscape of environmental community action (PMA, RJH, AMM, CM, EP, SS, AW), pp. 375–384.
- CHI-2009-AppertZ #tool support
- Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
- CHI-2009-BaoG #what
- What’s “this” you say?: the use of local references on distant displays (PB, DG), pp. 1029–1032.
- CHI-2009-BergmanTBCW
- It’s not that important: demoting personal information of low subjective importance using GrayArea (OB, ST, RBM, EC, SW), pp. 269–278.
- CHI-2009-BuscherCM #eye tracking #predict #web #what
- What do you see when you’re surfing?: using eye tracking to predict salient regions of web pages (GB, EC, MRM), pp. 21–30.
- CHI-2009-FeketeEG #named
- Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
- CHI-2009-FindlaterMMD #adaptation #performance
- Ephemeral adaptation: the use of gradual onset to improve menu selection performance (LF, KM, JM, JQD), pp. 1655–1664.
- CHI-2009-Gerber #effectiveness
- Using improvisation to enhance the effectiveness of brainstorming (EG), pp. 97–104.
- CHI-2009-HongC
- Annotate once, appear anywhere: collective foraging for snippets of interest using paragraph fingerprinting (LH, EHC), pp. 1791–1794.
- CHI-2009-HornSCJ #education #programming language #visual notation
- Comparing the use of tangible and graphical programming languages for informal science education (MSH, ETS, RJC, RJKJ), pp. 975–984.
- CHI-2009-JakobsenH #source code #visualisation
- Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
- CHI-2009-KitturCS #topic #what #wiki
- What’s in Wikipedia?: mapping topics and conflict using socially annotated category structure (AK, EHC, BS), pp. 1509–1512.
- CHI-2009-LawA #game studies #named
- Input-agreement: a new mechanism for collecting data using human computation games (EL, LvA), pp. 1197–1206.
- CHI-2009-MarshallFHRHRYD #interactive #physics
- Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
- CHI-2009-WonJH #visual notation #web
- Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
- CHI-2009-YamashitaIKI #multi
- Difficulties in establishing common ground in multiparty groups using machine translation (NY, RI, HK, TI), pp. 679–688.
- DHM-2009-Butler #3d
- Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
- DHM-2009-EllegastHS #assessment
- Workload Assessment in Field Using the Ambulatory CUELA System (RPE, IH, CS), pp. 221–226.
- DHM-2009-FaustC #3d
- 3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
- DHM-2009-JeonJKH #classification #gender
- Facial Gender Classification Using LUT-Based Sub-images and DIE (JBJ, SHJ, DJK, KSH), pp. 36–45.
- DHM-2009-McInnesSP #reliability
- Within and Between-Subject Reliability Using Classic Jack for Ergonomic Assessments (BM, AS, JP), pp. 653–660.
- DHM-2009-PandithLD #evaluation
- The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
- DHM-2009-SummerskillMCGSD #case study #evaluation #validation
- Validation of the HADRIAN System Using an ATM Evaluation Case Study (SJS, RM, KC, DEG, RES, PD), pp. 727–736.
- HCD-2009-CantoniBFB #human-computer #requirements
- Playful Holistic Support to HCI Requirements Using LEGO Bricks (LC, LB, MF, DB), pp. 844–853.
- HCD-2009-ChuangO #correlation #design #mobile
- A Photo Correlation Map Using Mobile AP II for Scenario-Based Design (YLC, MO), pp. 177–183.
- HCD-2009-HasanMP #e-commerce #usability
- Using Google Analytics to Evaluate the Usability of E-Commerce Sites (LH, AM, SGP), pp. 697–706.
- HCD-2009-HashizumeKY #communication #difference
- Regional Difference in the Use of Cell Phone and Other Communication Media among Senior Users (AH, MK, TY), pp. 426–435.
- HCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #web
- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
- HCD-2009-JonesND #information retrieval #set
- Use of Nursing Management Minimum Data Set (NMMDS) for a Focused Information Retrieval (JFJ, ETN, CD), pp. 972–978.
- HCD-2009-MisawaF #case study #experience #generative #idea #user interface
- A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
- HCD-2009-Rocker
- Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments (CR), pp. 1052–1061.
- HCD-2009-Seland #design #game studies #mobile
- Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
- HCD-2009-ShibukawaFIN #effectiveness
- Fundamental Studies on Effective e-Learning Using Physiology Indices (MS, MFF, YI, SPN), pp. 795–804.
- HCD-2009-YuL #generative #idea
- Facilitating Idea Generation Using Personas (DJY, WCL), pp. 381–388.
- HCI-AUII-2009-FanS #3d #navigation #user interface
- Pull and Push: Proximity-Aware User Interface for Navigating in 3D Space Using a Handheld Camera (MF, YS), pp. 133–140.
- HCI-AUII-2009-IizukaAM #behaviour
- The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
- HCI-AUII-2009-JeongSGKJ
- Object Scanning Using a Sensor Frame (SJ, TS, GG, KHK, JWJ), pp. 433–439.
- HCI-AUII-2009-JiK #named
- CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
- HCI-AUII-2009-KimPS #3d #design
- Menu Design in Cell Phones: Use of 3D Menus (KK, RWP, GS), pp. 48–57.
- HCI-AUII-2009-KubickiLLSKC #human-computer #interactive
- New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
- HCI-AUII-2009-LeeJLJCY #monitoring #smarttech
- Wearable ECG Monitoring System Using Conductive Fabrics and Active Electrodes (SHL, SMJ, CKL, KSJ, GC, SKY), pp. 778–783.
- HCI-AUII-2009-MatsuiIK #image #recognition
- Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing (TM, TI, YK), pp. 151–158.
- HCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi
- Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
- HCI-AUII-2009-SungJC #metric
- Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor (MS, KJ, GC), pp. 784–792.
- HCI-AUII-2009-TakadaOKT #navigation #smarttech
- A Context-Aware AR Navigation System Using Wearable Sensors (DT, TO, KK, HT), pp. 793–801.
- HCI-AUII-2009-TokiwaYNSI
- Motion Capture System Using an Optical Resolver (TT, MY, HN, MS, MI), pp. 536–543.
- HCI-NIMT-2009-BeinhauerH #evaluation #mobile #multimodal
- Using Acoustic Landscapes for the Evaluation of Multimodal Mobile Applications (WB, CH), pp. 3–11.
- HCI-NIMT-2009-ChoumaneS #interactive #modelling #multimodal
- Modeling and Using Salience in Multimodal Interaction Systems (AC, JS), pp. 12–18.
- HCI-NIMT-2009-Jain #human-computer #multimodal
- Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
- HCI-NIMT-2009-KotaniYAH #representation
- Representation of Velocity Information by Using Tactile Apparent Motion (KK, TY, TA, KH), pp. 470–478.
- HCI-NIMT-2009-KoudaKS #design #interface
- Motion Stroke-A Tablet-Based Interface for Motion Design Tool Using Drawing (HK, IK, KS), pp. 821–829.
- HCI-NIMT-2009-MikhailAGSSE #communication #named
- BEXPLORER: Computer and Communication Control Using EEG (MM, MAS, MG, NS, BS, KEA), pp. 579–587.
- HCI-NIMT-2009-MiwaIWIN
- Shadow Awareness: Bodily Expression Supporting System with Use of Artificial Shadow (YM, SI, TW, KI, HN), pp. 226–235.
- HCI-NIMT-2009-OkitaNS #communication
- Non-verbal Communication System Using Pictograms (MO, YN, HS), pp. 720–724.
- HCI-NIMT-2009-SadP09a #gesture #representation
- Using Pictographic Representation, Syntactic Information and Gestures in Text Entry (HHS, FP), pp. 735–744.
- HCI-NIMT-2009-SanchezFFP #development #interface
- Development of Symbiotic Brain-Machine Interfaces Using a Neurophysiology Cyberworkstation (JCS, RJOF, JABF, JCP), pp. 606–615.
- HCI-NIMT-2009-SchreiberWB #concept #interactive
- New Interaction Concepts by Using the Wii Remote (MS, MvWM, RB), pp. 261–270.
- HCI-NIMT-2009-SuzukiMT #interactive #interface
- Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
- HCI-NT-2009-AbeOO #automation #image
- Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
- HCI-NT-2009-BeeldersBMD #interface #performance #prototype #word
- Measuring User Performance for Different Interfaces Using a Word Processor Prototype (TRB, PJB, TM, ED), pp. 395–404.
- HCI-NT-2009-HaesenMLC #design #multi
- Supporting Multidisciplinary Teams and Early Design Stages Using Storyboards (MH, JM, KL, KC), pp. 616–623.
- HCI-NT-2009-HermannJSS #internet
- Acceptance of Future Technologies Using Personal Data: A Focus Group with Young Internet Users (FH, DJ, DS, AS), pp. 431–437.
- HCI-NT-2009-KimWW #adaptation #parametricity #process #recognition #research
- The Research on Adaptive Process for Emotion Recognition by Using Time-Dependent Parameters of Autonomic Nervous Response (JK, MCW, JW), pp. 77–84.
- HCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #virtual machine
- Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
- HCI-NT-2009-OkuboF #development #estimation
- Development of Estimation System for Concentrate Situation Using Acceleration Sensor (MO, AF), pp. 131–140.
- HCI-NT-2009-SuzukiMSANYF #estimation #on the #performance
- On the Possibility about Performance Estimation Just before Beginning a Voluntary Motion Using Movement Related Cortical Potential (SS, TM, YS, KA, NN, TY, SF), pp. 184–191.
- HCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability
- Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
- HCI-VAD-2009-CasasOP #education #tablet
- Using Tablet PCs and Pen-Based Technologies to Support Engineering Education (IC, SFO, JP), pp. 31–38.
- HCI-VAD-2009-MampadiCG #adaptation #hypermedia #information management #learning
- The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems (FM, SYC, GG), pp. 156–165.
- HCI-VAD-2009-OHearB #enterprise #process #user interface
- Using Activity Descriptions to Generate User Interfaces for ERP Software (TO, YB), pp. 577–586.
- HCI-VAD-2009-Sano #framework
- A Proposal for a Framework for an e-Alumni Program Using SNS (HS), pp. 209–216.
- HIMI-DIE-2009-KumeS #analysis #web
- Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
- HIMI-DIE-2009-LaquaiAPR #3d #interactive #multimodal #user interface
- Using 3D Touch Interaction for a Multimodal Zoomable User Interface (FL, MA, TP, GR), pp. 543–552.
- HIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics
- Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
- HIMI-DIE-2009-MistrzykR #industrial #modelling
- Practical Use of Task Models for Building and Modeling Operations Chart in the Industrial Production (TM, AR), pp. 140–148.
- HIMI-DIE-2009-NakagawaNM
- Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
- HIMI-DIE-2009-Soderston #experience #tool support #user interface
- A Retrospective and Prospective View of Information Technology Professionals’ Use of Tools: Maturing the User Experience (CS), pp. 306–315.
- HIMI-DIE-2009-SrinivasSPK #classification #feature model #performance
- Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
- HIMI-II-2009-HadaS #development #mobile #process
- Development of an Annotation-Based Classroom Activities Support Environment Using Digital Appliance, Mobile Device and PC (YH, MS), pp. 642–649.
- HIMI-II-2009-HasegawaOWMM #estimation #mobile
- Legible Character Size on Mobile Terminal Screens: Estimation Using Pinch-in/Out on the iPod Touch Panel (SH, MO, TW, SM, MM), pp. 395–402.
- HIMI-II-2009-KimMC #clustering #network #protocol
- A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
- HIMI-II-2009-KimMPH #performance #visualisation
- Efficient Annotation Visualization Using Distinctive Features (SKK, SHM, JP, SYH), pp. 295–303.
- HIMI-II-2009-LigdaJLJ #automation #distributed #tool support
- Pilot Confidence with ATC Automation Using Cockpit Situation Display Tools in a Distributed Traffic Management Environment (SVL, NHJ, JL, WWJ), pp. 816–825.
- HIMI-II-2009-MilanovaKRTK #adaptation #image #representation #retrieval
- Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation (MGM, RK, SHR, VT, RK), pp. 304–314.
- HIMI-II-2009-SawaragiIHN #approach #identification
- Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
- HIMI-II-2009-SchwarzlerRWR #modelling #visual notation
- Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System (SS, GR, FW, GR), pp. 201–209.
- HIMI-II-2009-WatanabeOHMM #mobile
- Usefulness of Mobile Information Provision Systems Using Graphic Text -Visibility of Graphic Text on Mobile Phones (TW, MO, SH, SM, MM), pp. 476–485.
- HIMI-II-2009-YajimaSM
- Remote Consultation System Using Hierarchically Structured Agents (HY, JS, KM), pp. 609–618.
- IDGD-2009-BoseS #hypermedia
- The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
- IDGD-2009-EngleF #metric #multi #scalability
- Rescaling Non-metric Data to Metric Data Using Multi-Dimensional Scaling (KME, GAF), pp. 245–253.
- IDGD-2009-PhukanR #eye tracking #usability
- Considerations for Using Eye Trackers during Usability Studies (AP, MR), pp. 301–307.
- IDGD-2009-SwansonSG #framework
- Exploring Cultural Context Using the Contextual Scenario Framework (ES, KS, JG), pp. 117–126.
- OCSC-2009-AndersenFLN #development #game studies
- The Coming Revolution in Competence Development: Using Serious Games to Improve Cross-Cultural Skills (BA, MF, PL, VPN), pp. 413–422.
- OCSC-2009-ChaLHK #evaluation
- User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence (JWC, HwL, YSH, LK), pp. 305–311.
- OCSC-2009-JohnsonB #community #wiki
- Creating Community through the Use of a Class Wiki (KAJ, JB), pp. 471–478.
- OCSC-2009-KadenbachK #challenge #collaboration #development #education #social
- Benefits and Challenges of Using Collaborative Development Environments with Social Software in Higher Computer Science Education (DK, CK), pp. 479–487.
- OCSC-2009-SongNKE #recommendation #word
- A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
- OCSC-2009-TsuchihashiO #case study #interface
- A Study on the Interface for Viewing the Information Menu of a Town from Intersections Using a Digital Compass (MT, KO), pp. 126–133.
- CAiSE-2009-GaillyP #modelling #ontology #standard
- Using the REA Ontology to Create Interoperability between E-Collaboration Modeling Standards (FG, GP), pp. 395–409.
- CAiSE-2009-GiachettiMP #automation #domain-specific language #generative #modelling #uml
- Using UML as a Domain-Specific Modeling Language: A Proposal for Automatic Generation of UML Profiles (GG, BM, OP), pp. 110–124.
- CAiSE-2009-KaiyaTSSK #analysis #quality #requirements
- Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
- CAiSE-2009-LiuLYWH #analysis #constraints #verification #workflow
- ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
- CAiSE-2009-MaoBPF #automation #generative
- Defining and Using Schematic Correspondences for Automatically Generating Schema Mappings (LM, KB, NWP, AAAF), pp. 79–93.
- CAiSE-2009-SalayM #diagrams #quality #test coverage
- Improving Model Quality Using Diagram Coverage Criteria (RS, JM), pp. 186–200.
- CAiSE-2009-SalayME #megamodelling #modelling
- Using Macromodels to Manage Collections of Related Models (RS, JM, SME), pp. 141–155.
- EDOC-2009-BoukhebouzeABM #modelling #process #rule-based #verification
- Rule-Based Modeling and Verification of Business Processes Using ECAPE Net (MB, YA, ANB, ZM), p. 74–?.
- EDOC-2009-BucklEMRS #architecture #enterprise
- Using Enterprise Architecture Management Patterns to Complement TOGAF (SB, AME, FM, RR, CMS), pp. 34–41.
- ICEIS-AIDSS-2009-CastroAP #approach #concept #implementation #metadata #named
- K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
- ICEIS-AIDSS-2009-CastroO #multi #quality
- Using Quality Costs in a Multi-agent System for an Airline Operations Control (AJMC, EO), pp. 19–24.
- ICEIS-AIDSS-2009-ChongC
- An Investigation into Dynamic Customer Requirement using Computational Intelligence (YTC, CHC), pp. 113–117.
- ICEIS-AIDSS-2009-KhashmanD #image #network
- Optimum DCT Compression of Medical Images using Neural Networks (AK, KD), pp. 90–95.
- ICEIS-AIDSS-2009-KuoWHH #clustering #network #optimisation #order
- An Order Clustering System using ART2 Neural Network and Particle Swarm Optimization Methodn (RJK, MJW, TWH, TLH), pp. 54–59.
- ICEIS-AIDSS-2009-MarinicaOG #algorithm #mining
- User-driven Association Rule Mining using a Local Algorithm (CM, AO, FG), pp. 200–205.
- ICEIS-AIDSS-2009-OReilly #algorithm #multi #optimisation
- Frequency Assignment Optimization using the Swarm Intelligence Multi-agent based Algorithm (SIMBA) (GBO), pp. 25–32.
- ICEIS-AIDSS-2009-RaimbaultGL #diagrams #information management #uml
- Using UML Class Diagram as a Knowledge Engineering Tool (TR, DG, SL), pp. 60–65.
- ICEIS-AIDSS-2009-RodriguesNCM
- Estimating Greenhouse Gas Emissions using Computational Intelligence (JAPR, LBN, PHGC, JCCBSdM), pp. 248–250.
- ICEIS-AIDSS-2009-SunLTT #2d #invariant #recognition
- Using GRA for 2D Invariant Object Recognition (THS, JCL, CHT, FCT), pp. 108–112.
- ICEIS-AIDSS-2009-TsengCH #approach #assembly #multi #sequence
- A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
- ICEIS-DISI-2009-GroppeGK #optimisation
- Optimization of SPARQL by using coreSPARQL (JG, SG, JK), pp. 107–112.
- ICEIS-DISI-2009-GuerraBOSS #keyword #named
- Keymantic: A Keyword-based Search Engine using Structural Knowledge (FG, SB, MO, AS, CS), pp. 241–246.
- ICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics
- Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
- ICEIS-DISI-2009-MoserMBM #approach #integration #modelling #performance #requirements #semantics
- Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
- ICEIS-DISI-2009-RomeuAC #integration #metric
- Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
- ICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #web
- Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
- ICEIS-HCI-2009-NakanishiTO #artificial reality #complexity #design #effectiveness #guidelines #verification
- Study for Establishing Design Guidelines for Manuals using Augmented Reality Technology — Verification and Expansion of the Basic Model Describing “Effective Complexity” (MN, SiT, YO), pp. 21–26.
- ICEIS-HCI-2009-NetoD #case study #gesture #scalability
- A Study on the use of Gestures for Large Displays (AN, CD), pp. 55–60.
- ICEIS-ISAS-2009-CiaramellaCLM #agile #process #prototype
- Using BPMN and Tracing for Rapid Business Process Prototyping Environments (AC, MGCAC, BL, FM), pp. 206–212.
- ICEIS-ISAS-2009-FerreiraCAB #modelling #requirements
- Keeping the Rationale of IS Requirements using Organizational Business Models (JJF, VMC, RMdA, FAB), pp. 292–297.
- ICEIS-ISAS-2009-KinderenGA #modelling #multi #reasoning
- Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models (SdK, JG, HA), pp. 131–136.
- ICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #xml
- A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
- ICEIS-ISAS-2009-NascimentoITR #legacy #process
- A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
- ICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process
- Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
- ICEIS-J-2009-CallegariB #fuzzy #logic #multi
- A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
- ICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #safety
- Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
- ICEIS-J-2009-GadK #clustering #performance #semantics #similarity
- Enhancing Text Clustering Performance Using Semantic Similarity (WKG, MSK), pp. 325–335.
- ICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network
- An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
- ICEIS-J-2009-NachevHS #fuzzy #network #predict
- Insolvency Prediction of Irish Companies Using Backpropagation and Fuzzy ARTMAP Neural Networks (AN, SH, BS), pp. 287–298.
- ICEIS-J-2009-NollR #concept #traceability
- Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
- ICEIS-J-2009-Sun #network
- Stereo Matching Using Synchronous Hopfield Neural Network (THS), pp. 336–347.
- ICEIS-SAIC-2009-CernuzziZ #design #named #tool support
- Gaia4E: A Tool Supporting the Design of MAS using Gaia (LC, FZ), pp. 82–88.
- ICEIS-SAIC-2009-CiuffoI #case study #collaboration #information management #recommendation
- Using Grids to Support Information Filtering Systems — A Case Study of Running Collaborative Filtering Recommendations on gLite (LNC, EI), pp. 12–18.
- ICEIS-SAIC-2009-GandhiT #categorisation #email #ontology
- Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
- ICEIS-SAIC-2009-LeeLK #classification
- Blog Classification using K-means (KJL, ML, WK), pp. 61–67.
- CIKM-2009-AchananuparpYC
- Using negative voting to diversify answers in non-factoid question answering (PA, CCY, XC), pp. 1681–1684.
- CIKM-2009-AlgarniLXL #effectiveness #feedback #information management
- An effective model of using negative relevance feedback for information filtering (AA, YL, YX, RYKL), pp. 1605–1608.
- CIKM-2009-AlonsoGB #clustering #timeline
- Clustering and exploring search results using timeline constructions (OA, MG, RABY), pp. 97–106.
- CIKM-2009-AnastasakosHKR #approach #collaboration #graph #recommendation
- A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
- CIKM-2009-BalasubramanianC #automation #generative #modelling #topic
- Automatic generation of topic pages using query-based aspect models (NB, SC), pp. 2049–2052.
- CIKM-2009-BatalH #classification
- Boosting KNN text classification accuracy by using supervised term weighting schemes (IB, MH), pp. 2041–2044.
- CIKM-2009-BohmNPW #clustering
- Density-based clustering using graphics processors (CB, RN, CP, BW), pp. 661–670.
- CIKM-2009-CaoCCJZ #categorisation #modelling #retrieval
- The use of categorization information in language models for question retrieval (XC, GC, BC, CSJ, CZ), pp. 265–274.
- CIKM-2009-DasdanDKD #automation #interface #query #retrieval
- Automatic retrieval of similar content using search engine query interface (AD, PD, SK, CD), pp. 701–710.
- CIKM-2009-DengKL #retrieval
- Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
- CIKM-2009-FernandezL #retrieval
- Using opinion-based features to boost sentence retrieval (RTF, DEL), pp. 1617–1620.
- CIKM-2009-GurajadaK #clustering #maintenance #online
- On-line index maintenance using horizontal partitioning (SG, PSK), pp. 435–444.
- CIKM-2009-GwaderaC #mining #ranking
- Mining and ranking streams of news stories using cross-stream sequential patterns (RG, FC), pp. 1709–1712.
- CIKM-2009-HuSZC #clustering #semantics
- Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
- CIKM-2009-IslamI #set #web
- Real-word spelling correction using Google web 1Tn-gram data set (AI, DI), pp. 1689–1692.
- CIKM-2009-KatoOOT #query #relational #web
- Query by analogical example: relational search using web search engine indices (MPK, HO, SO, KT), pp. 27–36.
- CIKM-2009-KhareA #empirical #interface #markov #segmentation
- An empirical study on using hidden markov model for search interface segmentation (RK, YA), pp. 17–26.
- CIKM-2009-KimC #pseudo #retrieval
- Retrieval experiments using pseudo-desktop collections (JK, WBC), pp. 1297–1306.
- CIKM-2009-KobayakawaKTOKT #analysis #classification #kernel
- Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
- CIKM-2009-KuttyNL #approach #clustering #documentation #named #xml
- XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
- CIKM-2009-LeeNL #approach #feedback #retrieval
- An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
- CIKM-2009-LeeVRKMI #adaptation #performance #topic
- Measuring system performance and topic discernment using generalized adaptive-weight mean (CTL, VV, EMR, GK, NMF, AI), pp. 2033–2036.
- CIKM-2009-LiuZ #classification #sentiment
- Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
- CIKM-2009-LuHM #algorithm #approximate #performance
- Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
- CIKM-2009-MabroukehE #mining #ontology #predict #semantics #web
- Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
- CIKM-2009-MaCQG #game studies
- Improving search engines using human computation games (HM, RC, CQ, AG), pp. 275–284.
- CIKM-2009-MartineauFJP #classification #difference #problem #word
- Improving binary classification on text problems using differential word features (JM, TF, AJ, SP), pp. 2019–2024.
- CIKM-2009-MouzaLRS #algebra #n-gram #named #string
- AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
- CIKM-2009-PanCASD #feature model #ranking
- Feature selection for ranking using boosted trees (FP, TC, DA, FS, GD), pp. 2025–2028.
- CIKM-2009-ParkG #automation #metric #realtime #towards
- Towards real-time measurement of customer satisfaction using automatically generated call transcripts (YP, SCG), pp. 1387–1396.
- CIKM-2009-ParkR #analysis #information retrieval #kernel #semantics
- Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
- CIKM-2009-PuH #clustering #feedback #pseudo #semantics
- Pseudo relevance feedback using semantic clustering in relevance language model (QP, DH), pp. 1931–1934.
- CIKM-2009-RachakondaS #topic
- Finding the topical anchors of a context using lexical cooccurrence data (ARR, SS), pp. 1741–1744.
- CIKM-2009-RafieiL #query #web
- Data extraction from the web using wild card queries (DR, HL), pp. 1939–1942.
- CIKM-2009-SeoCS #community #concurrent #online #thread
- Online community search using thread structure (JS, WBC, DAS), pp. 1907–1910.
- CIKM-2009-VienVCYKC #kernel #locality #named #visualisation
- VRIFA: a nonlinear SVM visualization tool using nomogram and localized radial basis function (LRBF) kernels (NAV, NHV, TC, HY, SK, BHC), pp. 2081–2082.
- CIKM-2009-ViyanonM #database #detection #relational #similarity #xml
- A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
- CIKM-2009-VriesKCC #array #robust
- Robust record linkage blocking using suffix arrays (TdV, HK, SC, PC), pp. 305–314.
- CIKM-2009-WangML #learning #programming #question #rank #search-based
- Learning to rank using evolutionary computation: immune programming or genetic programming? (SW, JM, JL), pp. 1879–1882.
- CIKM-2009-WimalasuriyaD #information management #multi #ontology
- Using multiple ontologies in information extraction (DCW, DD), pp. 235–244.
- CIKM-2009-WuCZZ #approach #definite clause grammar #learning #novel #rank
- Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
- CIKM-2009-WuTW #query #revisited #xml
- Answering XML queries using materialized views revisited (XW, DT, WHW), pp. 475–484.
- CIKM-2009-XiaYZ #automation #web
- Automatic web data extraction using tree alignment (YX, HY, SZ), pp. 1645–1648.
- CIKM-2009-XuFZH #feature model #orthogonal
- To obtain orthogonal feature extraction using training data selection (YX, SF, JZ, OH), pp. 1819–1822.
- CIKM-2009-YangXBHSY #case study #cumulative #generative #information retrieval #social
- A study of information retrieval on accumulative social descriptions using the generation features (LY, SX, SB, DH, ZS, YY), pp. 721–730.
- ECIR-2009-Ailon #algorithm #linear #query #ranking
- A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
- ECIR-2009-BolelliEG #detection #topic
- Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
- ECIR-2009-Efron #aspect-oriented #multi #query
- Using Multiple Query Aspects to Build Test Collections without Human Relevance Judgments (ME), pp. 276–287.
- ECIR-2009-HalveyPHVHGJ #case study #difference #low level #metric #retrieval #video
- Diversity, Assortment, Dissimilarity, Variety: A Study of Diversity Measures Using Low Level Features for Video Retrieval (MH, PP, DH, RV, FH, AG, JMJ), pp. 126–137.
- ECIR-2009-KarimzadehganWR
- Enhancing Expert Finding Using Organizational Hierarchies (MK, RWW, MR), pp. 177–188.
- ECIR-2009-LlorenteR #automation #higher-order #image #statistics
- Using Second Order Statistics to Enhance Automated Image Annotation (AL, SMR), pp. 570–577.
- ECIR-2009-MissenB #detection #semantics
- Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
- ECIR-2009-WeerkampBR #email #information management
- Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
- ECIR-2009-YinSC #query
- Query Expansion Using External Evidence (ZY, MS, NC), pp. 362–374.
- ICML-2009-CamposZJ #constraints #learning #network
- Structure learning of Bayesian networks using constraints (CPdC, ZZ, QJ), pp. 113–120.
- ICML-2009-LiKZ #learning
- Semi-supervised learning using label mean (YFL, JTK, ZHZ), pp. 633–640.
- ICML-2009-PlathTN #classification #image #multi #random #segmentation
- Multi-class image segmentation using conditional random fields and global classification (NP, MT, SN), pp. 817–824.
- ICML-2009-RainaMN #learning #scalability
- Large-scale deep unsupervised learning using graphics processors (RR, AM, AYN), pp. 873–880.
- ICML-2009-Schmidt #process
- Function factorization using warped Gaussian processes (MNS), pp. 921–928.
- ICML-2009-TielemanH #performance #persistent
- Using fast weights to improve persistent contrastive divergence (TT, GEH), pp. 1033–1040.
- ICML-2009-Toussaint #approximate #optimisation
- Robot trajectory optimization using approximate inference (MT), pp. 1049–1056.
- ICML-2009-YiWSS #probability
- Stochastic search using the natural gradient (YS, DW, TS, JS), pp. 1161–1168.
- ICML-2009-YuLZG #collaboration #parametricity #predict #random #scalability
- Large-scale collaborative prediction using a nonparametric random effects model (KY, JDL, SZ, YG), pp. 1185–1192.
- ICML-2009-ZhanLLZ #learning #metric
- Learning instance specific distances using metric propagation (DCZ, ML, YFL, ZHZ), pp. 1225–1232.
- KDD-2009-DundarHBRR #case study #dataset #detection #learning
- Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
- KDD-2009-FuxmanKGATS #automation #classification
- Improving classification accuracy using automatically extracted training data (AF, AK, ABG, RA, PT, JCS), pp. 1145–1154.
- KDD-2009-JiYLZKY #interactive
- Drosophila gene expression pattern annotation using sparse features and term-term interactions (SJ, LY, YXL, ZHZ, SK, JY), pp. 407–416.
- KDD-2009-Macskassy #empirical #graph #learning #metric
- Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
- KDD-2009-MakanjuZM #clustering
- Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
- KDD-2009-MaunzHK #graph #mining #refinement #scalability
- Large-scale graph mining using backbone refinement classes (AM, CH, SK), pp. 617–626.
- KDD-2009-PatnaikMSR #data mining #mining
- Sustainable operation and management of data center chillers using temporal data mining (DP, MM, RKS, NR), pp. 1305–1314.
- KDD-2009-SatuluriP #clustering #community #graph #probability #scalability
- Scalable graph clustering using stochastic flows: applications to community discovery (VS, SP), pp. 737–746.
- KDD-2009-VatturiW #detection
- Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
- KDD-2009-XuYL #mining
- Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
- KDIR-2009-DuarteDRF #clustering #consistency
- Cluster Ensemble Selection — Using Average Cluster Consistency (FJFD, JMMD, FR, ALNF), pp. 85–95.
- KDIR-2009-FatemiPRS #concept #mining #retrieval #semantics #video
- Using Association Rule Mining to Enrich Semantic Concepts for Video Retrieval (NF, FP, LER, AFS), pp. 119–126.
- KDIR-2009-GoyalBM #query
- Entailment of Causal Queries in Narratives using Action Language (PG, LB, TMM), pp. 112–118.
- KDIR-2009-GuoK #ontology
- Discovering Relationship Associations in Life Sciences using Ontology and Inference (WG, SBK), pp. 10–17.
- KDIR-2009-KimRM #retrieval #semantics
- A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
- KDIR-2009-KulkarniC #concept #semantics #word
- Computation of the Semantic Relatedness between Words using Concept Clouds (SK, DC), pp. 183–188.
- KDIR-2009-LamB #categorisation #invariant #multi
- Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
- KDIR-2009-WangVH #documentation #probability #retrieval
- Document Retrieval using a Probabilistic Knowledge Model (SW, SV, MH), pp. 26–33.
- KEOD-2009-CeaGMS #development #ontology
- Using Linguistic Patterns to Enhance Ontology Development (GAdC, AGP, EMP, MdCSF), pp. 206–213.
- KEOD-2009-DumitrescuK #performance #reuse #self #towards
- Towards Social-software for the Efficient Reuse of Solution Patterns for Self-optimizing Systems (RD, BK), pp. 342–347.
- KEOD-2009-Hufflen #component #framework #non-functional
- A Framework for Managing Components using Non-functional Properties (JMH), pp. 460–463.
- KEOD-2009-YiR #algorithm #clustering #ontology
- Using a Clustering Algorithm for Domain Related Ontology Construction (HY, VJRS), pp. 336–341.
- KEOD-2009-ZghalKYN #composition #named #ontology
- OACAS — Ontologies Alignment using Composition and Aggregation of Similarities (SZ, MK, SBY, EMN), pp. 233–238.
- KMIS-2009-AlvesM #correlation
- Best use of Knowledge in a Space Program — Managing the Correlated Technologies (MBA, AMM), pp. 301–304.
- KMIS-2009-Kume #analysis #visual notation #web
- Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
- MLDM-2009-CelepcikayEO #dataset
- Regional Pattern Discovery in Geo-referenced Datasets Using PCA (OUC, CFE, CO), pp. 719–733.
- MLDM-2009-GadK #clustering #semantics #similarity
- New Semantic Similarity Based Model for Text Clustering Using Extended Gloss Overlaps (WKG, MSK), pp. 663–677.
- MLDM-2009-GoncalvesQ #classification #kernel #semantics
- Using Graph-Kernels to Represent Semantic Information in Text Classification (TG, PQ), pp. 632–646.
- MLDM-2009-KobayashiS #classification #distributed #linear #representation
- A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
- MLDM-2009-NunesSP #detection #image
- Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
- MLDM-2009-QureshiZ #quality
- Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
- MLDM-2009-RiesenB #difference #graph #prototype #reduction
- Dissimilarity Based Vector Space Embedding of Graphs Using Prototype Reduction Schemes (KR, HB), pp. 617–631.
- MLDM-2009-SilvaSNPJN #classification #geometry #image #metric
- Lung Nodules Classification in CT Images Using Simpson’s Index, Geometrical Measures and One-Class SVM (CAdS, ACS, SMBN, ACdP, GBJ, RAN), pp. 810–822.
- RecSys-2009-Golbeck #recommendation #social #trust #tutorial
- Tutorial on using social trust for recommender systems (JG), pp. 425–426.
- RecSys-2009-JamaliE #network #recommendation #trust
- Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
- RecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust
- FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
- RecSys-2009-PhelanMS #realtime #recommendation #topic #twitter
- Using twitter to recommend real-time topical news (OP, KM, BS), pp. 385–388.
- RecSys-2009-QuerciaC #mobile #named #recommendation
- FriendSensing: recommending friends using mobile phones (DQ, LC), pp. 273–276.
- RecSys-2009-UmyarovT #estimation #modelling #rating #recommendation
- Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models (AU, AT), pp. 37–44.
- SEKE-2009-AhsanFW #debugging #estimation #machine learning
- Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
- SEKE-2009-AndresMN #mining #realtime #testing
- Using a Mining Frequency Patterns Model to Automate Passive Testing of Real-time Systems (CA, MGM, MN), pp. 426–431.
- SEKE-2009-FarZYA #concept #documentation #learning #semantics
- Realization of Semantic Search Using Concept Learning and Document Annotation Agents (BHF, CZ, Z(Y, MA), pp. 164–169.
- SEKE-2009-GarlanCSBC #analysis #architecture
- Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
- SEKE-2009-HuangCPHP #automation #information management
- Automated Nursing Knowledge Management Using Indexing (SH, SC, ASP, SH, MP), pp. 93–96.
- SEKE-2009-LemkeR #framework #platform
- Using Knowledge Objects to Exchange Knowledge in a MAS Platform (APL, MBR), pp. 206–211.
- SEKE-2009-PengLPF #algorithm #requirements
- Requirements Discovery Based on RGPS Using Evolutionary Algorithm (TP, BL, WP, ZF), pp. 286–290.
- SEKE-2009-PortoMF #comprehension #visualisation
- The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
- SEKE-2009-RusNSC #algorithm #clustering #fault #graph
- Clustering of Defect Reports Using Graph Partitioning Algorithms (VR, XN, SGS, YC), pp. 442–445.
- SEKE-2009-WilliamsR #risk management #statistics
- Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
- SIGIR-2009-ArampatzisKR #optimisation
- Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
- SIGIR-2009-BolourianMR #named #quantifier #topic
- SugarCube: quantification of topic propagation in the blogosphere using percolation theory (AAB, YM, CJvR), pp. 786–787.
- SIGIR-2009-Bossard #automation #documentation #summary
- Using document structure for automatic summarization (AB), p. 849.
- SIGIR-2009-BrunoM #approach #clustering #modelling #multi
- Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
- SIGIR-2009-CarmelRZ #clustering #wiki
- Enhancing cluster labeling using wikipedia (DC, HR, NZ), pp. 139–146.
- SIGIR-2009-Collins-ThompsonB #performance #predict #query
- Estimating query performance using class predictions (KCT, PNB), pp. 672–673.
- SIGIR-2009-DouSNW #web
- Using anchor texts with their hyperlink structure for web search (ZD, RS, JYN, JRW), pp. 227–234.
- SIGIR-2009-GuanBMCW #graph #multi #personalisation #ranking #recommendation
- Personalized tag recommendation using graph-based ranking on multi-type interrelated objects (ZG, JB, QM, CC, CW), pp. 540–547.
- SIGIR-2009-ItakuraC #detection #markov #wiki
- Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
- SIGIR-2009-KapteinKK #ad hoc #category theory #wiki
- Using wikipedia categories for ad hoc search (RK, MK, JK), pp. 824–825.
- SIGIR-2009-KeikhaCC #random
- Blog distillation using random walks (MK, MJC, FC), pp. 638–639.
- SIGIR-2009-KumaranC #predict #quality #query
- Reducing long queries using query quality predictors (GK, VRC), pp. 564–571.
- SIGIR-2009-LeeLP #reduction #similarity
- Tag-based object similarity computation using term space dimension reduction (YKL, SJL, JP), pp. 790–791.
- SIGIR-2009-Liu #community #ranking
- Using computational community interest as an indicator for ranking (XL), p. 851.
- SIGIR-2009-Liu09a #information retrieval #personalisation #topic
- Personalizing information retrieval using task features, topic knowledge, and task product (JL), p. 855.
- SIGIR-2009-MaCQG #game studies
- Page hunt: improving search engines using human computation games (HM, RC, CQ, AG), pp. 746–747.
- SIGIR-2009-McDougallM
- Expertise search in academia using facets (DM, CM), p. 834.
- SIGIR-2009-MetzlerNCR #documentation
- Building enriched document representations using aggregated anchor text (DM, JN, HC, SR), pp. 219–226.
- SIGIR-2009-NohPYLP #automation #folksonomy #multi #network
- An automatic translation of tags for multimedia contents using folksonomy networks (TGN, SBP, HGY, SJL, SYP), pp. 492–499.
- SIGIR-2009-PunithaJG #automation #feature model #multi #query #retrieval #topic #video
- Topic prerogative feature selection using multiple query examples for automatic video retrieval (PP, JMJ, AG), pp. 804–805.
- SIGIR-2009-RavanaPM
- System scoring using partial prior information (SDR, LAFP, AM), pp. 788–789.
- SIGIR-2009-SeoJ #graph #precise #retrieval
- High precision retrieval using relevance-flow graph (JS, JJ), pp. 694–695.
- SIGIR-2009-SiersdorferPS #automation #video
- Automatic video tagging using content redundancy (SS, JSP, MS), pp. 395–402.
- SIGIR-2009-SubramaniamSDV #fuzzy #similarity #string
- Experiments in CLIR using fuzzy string search based on surface similarity (SS, AKS, PD, VV), pp. 682–683.
- SIGIR-2009-TomasikTT #classification #image
- Tagging products using image classification (BT, PT, DT), pp. 792–793.
- SIGIR-2009-WangLF #automation #fuzzy #predict
- Automatic URL completion and prediction using fuzzy type-ahead search (JW, GL, JF), pp. 634–635.
- SIGIR-2009-XuM #web
- Evaluating web search using task completion time (YX, DM), pp. 676–677.
- SIGIR-2009-YehK #documentation #image
- Searching documentation using text, OCR, and image (TY, BK), pp. 776–777.
- ECMDA-FA-2009-EvansFM #case study #eclipse #experience #modelling #network
- Experiences of Developing a Network Modeling Tool Using the Eclipse Environment (AE, MAF, PM), pp. 301–312.
- ECMDA-FA-2009-KublerG #approach #mining #qvt
- A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
- ECMDA-FA-2009-TisiJFCB #higher-order #model transformation #on the
- On the Use of Higher-Order Model Transformations (MT, FJ, PF, SC, JB), pp. 18–33.
- ICMT-2009-AmstelLB #asf+sdf #metric #model transformation #quality
- Using Metrics for Assessing the Quality of ASF+SDF Model Transformations (MvA, CFJL, MvdB), pp. 239–248.
- ICMT-2009-FabroABJ #model transformation
- Achieving Rule Interoperability Using Chains of Model Transformations (MDDF, PA, JB, FJ), pp. 249–259.
- MoDELS-2009-DrusinskyS #logic #uml
- Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
- MoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
- MoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
- Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
- MoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
- Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-MaozMK #modelling #testing
- Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
- MoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
- SPLC-2009-SchmidL #optimisation #product line
- Introducing and optimizing software product lines using the FEF (KS, FvdL), p. 311.
- SPLC-2009-Voelter #domain-specific language #product line
- Using domain specific languages for product line engineering (MV), p. 329.
- MoDELS-2009-DrusinskyS #logic #uml
- Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
- MoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
- MoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
- Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
- MoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
- Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-MaozMK #modelling #testing
- Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
- MoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
- ECOOP-2009-CutsemBDM
- Adding State and Visibility Control to Traits Using Lexical Nesting (TVC, AB, SD, WDM), pp. 220–243.
- ECOOP-2009-XuRS #alias #analysis #points-to #scalability
- Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
- OOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime
- Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
- TOOLS-EUROPE-2009-BruniV #generative #named #prototype #virtual machine
- PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy (CB, TV), pp. 328–347.
- TOOLS-EUROPE-2009-SadilekW #grammarware #semantics
- Using Grammarware Languages to Define Operational Semantics of Modelled Languages (DAS, GW), pp. 348–356.
- TOOLS-EUROPE-2009-StrickerHS #constraints #design #diagrams #uml
- Designing Design Constraints in the UML Using Join Point Designation Diagrams (VS, SH, DS), pp. 57–76.
- AdaEurope-2009-Montoya-DatoAG #ada #experience #online #programming
- An Experience on Ada Programming Using On-Line Judging (FJMD, JLFA, GGM), pp. 75–89.
- LOPSTR-2009-AstefanoaeiBR #testing
- Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
- LOPSTR-2009-CzenkoE #flexibility
- LP with Flexible Grouping and Aggregates Using Modes (MC, SE), pp. 67–81.
- LOPSTR-2009-ScandoloKH #parallel #pipes and filters
- Program Parallelization Using Synchronized Pipelining (LS, CK, MVH), pp. 173–187.
- PADL-2009-MaldeO #analysis #haskell #scalability #sequence
- Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
- PEPM-2009-CifuentesKLS #debugging #detection #program analysis
- Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
- PEPM-2009-SalamaMTGO #consistency #dependent type
- Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions (CS, GM, WT, JG, JO), pp. 121–130.
- PLDI-2009-AftandilianG #garbage collection
- GC assertions: using the garbage collector to check heap properties (EA, SZG), pp. 235–244.
- PLDI-2009-KunduTL #equivalence #optimisation #proving
- Proving optimizations correct using parameterized program equivalence (SK, ZT, SL), pp. 327–337.
- PLDI-2009-MehraraHHM #hardware #low cost #memory management #transaction
- Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory (MM, JH, PCH, SAM), pp. 166–176.
- PLDI-2009-RavitchJAL #automation #generative #library #static analysis
- Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
- PLDI-2009-SrivastavaG #abstraction #verification
- Program verification using templates over predicate abstraction (SS, SG), pp. 223–234.
- PLDI-2009-TorreMP #calculus #fixpoint #recursion #source code
- Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
- POPL-2009-BrunelDHLM #logic #model checking
- A foundation for flow-based program matching: using temporal logic and model checking (JB, DD, RRH, JLL, GM), pp. 114–126.
- SAS-2009-DohKS #parsing #static analysis #string
- Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
- SAS-2009-Qadeer #algorithm #smt #verification
- Algorithmic Verification of Systems Software Using SMT Solvers (SQ), p. 2.
- SAS-2009-Simon #analysis #optimisation #pointer #similarity
- Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
- SIGAda-2009-Barkstrom #ada #algorithm #concurrent #multi #on the #problem
- On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms (BRB), pp. 61–72.
- SIGAda-2009-DelangePPKSK #simulation #validation
- Validate, simulate, and implement ARINC653 systems using the AADL (JD, LP, AP, MK, FS, FK), pp. 31–44.
- SIGAda-2009-LosebyCB #embedded
- Use of SPARK in a resource constrained embedded system (CL, PC, CB), pp. 87–90.
- SIGAda-2009-Sward09a #ada
- Georegistration of imagery from unmanned aircraft systems using Ada (RES), pp. 121–126.
- RE-2009-AdamDEG #requirements
- Using Task-oriented Requirements Engineering in Different Domains (SA, JD, ME, AG), pp. 267–272.
- RE-2009-CarvalloF #component #on the #process #requirements
- On the Use of Requirements for Driving Call-for-Tender Processes for Procuring Coarse-grained OTS Components (JPC, XF), pp. 287–292.
- RE-2009-KonradD #industrial #lessons learnt #modelling
- Lessons Learned from the Use of Artifact Models in Industrial Projects (SK, HD), pp. 349–354.
- RE-2009-TunJLNY #problem
- Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
- ASE-2009-CassellAGN #automation #clustering #towards
- Towards Automating Class-Splitting Using Betweenness Clustering (KC, PA, LG, JN), pp. 595–599.
- ASE-2009-GuldaliFJSE #automation #clustering #requirements #testing
- Semi-automated Test Planning for e-ID Systems by Using Requirements Clustering (BG, HF, MJ, SS, GE), pp. 29–39.
- ASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise
- Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
- ASE-2009-LedruPB #string #testing
- Using String Distances for Test Case Prioritisation (YL, AP, SB), pp. 510–514.
- ASE-2009-LiXTHS #automation #generative #named #regular expression #source code #testing
- Reggae: Automated Test Generation for Programs Using Complex Regular Expressions (NL, TX, NT, JdH, WS), pp. 515–519.
- ASE-2009-MalikGEK #automation #data type #debugging
- A Case for Automated Debugging Using Data Structure Repair (MZM, KG, BE, SK), pp. 620–624.
- ASE-2009-RayMACSM #validation #verification
- Validating Automotive Control Software Using Instrumentation-Based Verification (AR, IM, CA, RC, CPS, CM), pp. 15–25.
- ASE-2009-WeiglhoferFW #fault #locality #testing
- Using Spectrum-Based Fault Localization for Test Case Grouping (MW, GF, FW), pp. 630–634.
- ASE-2009-YuAB #analysis #generative #source code #string
- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
- ESEC-FSE-2009-MaiaKUM #modelling #probability #refinement #towards
- Towards accurate probabilistic models using state refinement (PHMM, JK, SU, NCM), pp. 281–284.
- ESEC-FSE-2009-VangalaCT #clustering #comparison #execution #testing
- Test case comparison and clustering using program profiles and static execution (VV, JC, PT), pp. 293–294.
- ICSE-2009-CalinescuK #analysis
- Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
- ICSE-2009-CasoBGU #abstraction #contract #finite #validation
- Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
- ICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering
- A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
- ICSE-2009-Hassan #complexity #fault #predict
- Predicting faults using the complexity of code changes (AEH), pp. 78–88.
- ICSE-2009-MenziesWBH #how #probability #process
- How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
- ICSE-2009-MorinBNJ #adaptation #aspect-oriented #modelling
- Taming Dynamically Adaptive Systems using models and aspects (BM, OB, GN, JMJ), pp. 122–132.
- ICSE-2009-SantelicesJYH #lightweight #multi
- Lightweight fault-localization using multiple coverage types (RAS, JAJ, YY, MJH), pp. 56–66.
- ICSE-2009-WeimerNGF #automation #programming #search-based
- Automatically finding patches using genetic programming (WW, TN, CLG, SF), pp. 364–374.
- ICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social
- Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
- SAC-2009-Abbadeni #database #information retrieval #multi #query #visual notation
- Information retrieval from visual databases using multiple representations and multiple queries (NA), pp. 1523–1527.
- SAC-2009-BaechlerBH #image #modelling #verification
- Labeled images verification using Gaussian mixture models (MB, JLB, JH), pp. 1331–1335.
- SAC-2009-BreauxLOA #identification #requirements
- Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
- SAC-2009-BuresHM #component #product line
- Using a product line for creating component systems (TB, PH, MM), pp. 501–508.
- SAC-2009-CaldersGPR #mining #process
- Using minimum description length for process mining (TC, CWG, MP, AR), pp. 1451–1455.
- SAC-2009-CasadeiV #design #model checking #probability #self #simulation
- Using probabilistic model checking and simulation for designing self-organizing systems (MC, MV), pp. 2103–2104.
- SAC-2009-ChunLSC #multi #predict #video
- An enhanced multi-view video compression using the constrained inter-view prediction (SC, SL, KS, KC), pp. 1811–1815.
- SAC-2009-DaiMSZ #concept analysis #towards
- Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
- SAC-2009-DaoudTBC #ontology #personalisation
- A session based personalized search using an ontological user profile (MD, LTL, MB, BC), pp. 1732–1736.
- SAC-2009-DelicatoSPOBP #adaptation #aspect-oriented #composition #mobile
- Using aspects and dynamic composition to provide context-aware adaptation for mobile applications (FCD, ILAS, PFP, ALSO, TVB, LP), pp. 456–460.
- SAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing
- TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
- SAC-2009-EsfahaniMSU #mining #process
- Using process mining to business process distribution (FSE, MAAM, MNS, NIU), pp. 2140–2145.
- SAC-2009-FilhoNLA #framework #memory management #mobile #visualisation
- A framework for text visualization using memory traffic management for mobile devices (JBFF, JdSRN, CRFL, RMCA), pp. 1847–1848.
- SAC-2009-FloraTB #forensics #identification #image
- Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
- SAC-2009-GonzalesLL #community #online #requirements
- Requirements engineering using appreciative inquiry for an online community of caregivers of children with autism (CHG, GL, GDL), pp. 142–146.
- SAC-2009-HalleV #monitoring #runtime #streaming #web #web service #xml
- Runtime monitoring of web service choreographies using streaming XML (SH, RV), pp. 2118–2125.
- SAC-2009-HarshN #multi
- Using geo-spatial session tagging for smart multicast session discovery (PH, REN), pp. 22–27.
- SAC-2009-HijikataHON #algorithm #analysis
- HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
- SAC-2009-HoqueRA #authentication #privacy #protocol #robust #security
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- SAC-2009-HuangSMZH #approach
- A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
- SAC-2009-JeschkePV #development #web
- Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
- SAC-2009-LemosBOML #code search #reuse #testing
- Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
- SAC-2009-LimaH #approach
- Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
- SAC-2009-LindvallFKCJ #network #semantics
- Searching for relevant software change artifacts using semantic networks (ML, RLF, GK, ZC, VPJ), pp. 496–500.
- SAC-2009-LiuDSYH #algorithm #classification #image #invariant
- A new K-View algorithm for texture image classification using rotation-invariant feature (HL, SD, ES, CY, CCH), pp. 914–921.
- SAC-2009-LiuTS #classification #complexity #learning
- Assessing complexity of service-oriented computing using learning classifier systems (LL, ST, HS), pp. 2170–2171.
- SAC-2009-LuYLELW #correlation #data type #detection #incremental
- Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
- SAC-2009-MacielH #architecture #rest #transaction
- An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
- SAC-2009-MagaudNS #coq #formal method #theorem
- Formalizing Desargues’ theorem in Coq using ranks (NM, JN, PS), pp. 1110–1115.
- SAC-2009-MarquesF #documentation
- Reconstructing strip-shredded documents using color as feature matching (MAOM, COAF), pp. 893–894.
- SAC-2009-MartinsHM #image #multi #re-engineering
- Super-resolution image reconstruction using the generalized isotropic multi-level logistic model (ALDM, MRPH, NDAM), pp. 934–938.
- SAC-2009-MattheT #query
- Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degrees (TM, GDT), pp. 1699–1703.
- SAC-2009-MoallemL #distributed #grid #scheduling
- Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
- SAC-2009-NetoFP #named #people
- MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasks (FGdON, JMF, RRGP), pp. 158–159.
- SAC-2009-OlowoyeyeTF #segmentation
- Medical volume segmentation using bank of Gabor filters (AO, MT, SF), pp. 826–829.
- SAC-2009-PaganoPL #multi #realtime
- Real-time multi-view vision systems using WSNs (PP, FP, YL), pp. 2191–2196.
- SAC-2009-ParkH #embedded #fine-grained #operating system #programming
- Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environment (JP, SH), pp. 1952–1956.
- SAC-2009-ParkKLKK #network #realtime
- A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networks (HP, MK, SL, SK, YK), pp. 196–200.
- SAC-2009-ParkPR #algorithm #automation
- Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithms (KP, TP, KRR), pp. 1098–1105.
- SAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation
- A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
- SAC-2009-PassitoMM #analysis #network #protocol
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
- SAC-2009-PostarnakevichS #modelling #representation #visualisation
- Global-to-local representation and visualization of molecular surfaces using deformable models (NP, RS), pp. 782–787.
- SAC-2009-RamanathanRG #delivery #framework #people #process #trade-off
- The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvement (JR, RR, RG), pp. 259–264.
- SAC-2009-RodriguesSC #composition #embedded #functional #set #verification
- Improving functional verification of embedded systems using hierarchical composition and set theory (CLR, KRGdS, HdNC), pp. 1632–1636.
- SAC-2009-RyuKC #algorithm #detection #documentation #evolution
- A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
- SAC-2009-SchmidtSS #approach #personalisation #social #web
- Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
- SAC-2009-ShaLW #classification #visual notation
- Foreground classification using active template in the scene context for visual surveillance (XS, XL, JW), pp. 943–944.
- SAC-2009-SherminO #network
- Using dynamic bayesian networks to infer gene regulatory networks from expression profiles (AS, MAO), pp. 799–803.
- SAC-2009-TanakaKTN #navigation #predict
- A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
- SAC-2009-TarratacaSC #gesture #recognition #smarttech
- The current feasibility of gesture recognition for a smartphone using J2ME (LT, ACS, JMPC), pp. 1642–1649.
- SAC-2009-TokoroTT #smarttech
- A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
- SAC-2009-YounM #email #ontology #personalisation
- Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
- LDTA-2008-FokkerS09 #abstract interpretation #attribute grammar #functional #source code
- Abstract Interpretation of Functional Programs using an Attribute Grammar System (JF, SDS), pp. 117–133.
- GPCE-2009-Nikhil #design #hardware
- Using GPCE principles for hardware systems and accelerators: (bridging the gap to HW design) (RSN), pp. 1–2.
- ASPLOS-2009-CaulfieldGS #clustering #data-driven #memory management #named #performance #power management
- Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications (AMC, LMG, SS), pp. 217–228.
- ASPLOS-2009-SidiroglouLPVNK #automation #named #self
- ASSURE: automatic software self-healing using rescue points (SS, OL, CP, NV, JN, ADK), pp. 37–48.
- CASE-2009-AlenljungL #graph #verification
- Formal verification of PLC controlled systems using Sensor Graphs (TA, BL), pp. 164–170.
- CASE-2009-BalajiGK #case study
- Selection of a machine tool for FMS using ELECTRE III — a case study (CMB, AG, RK), pp. 171–176.
- CASE-2009-BeraN
- A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
- CASE-2009-BukkapatnamMKSK #monitoring #realtime
- Real-time monitoring of container stability loss using wireless vibration sensor tags (STSB, SM, JK, VS, RK), pp. 221–226.
- CASE-2009-ChakiC #approach #automation #fuzzy #multi
- An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
- CASE-2009-GargM #agile #algorithm #clustering #named
- RACK: RApid clustering using K-means algorithm (VKG, MNM), pp. 621–626.
- CASE-2009-HariharanB #markov #process
- Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
- CASE-2009-JohnsonM #animation #automation #optimisation #synthesis
- Automated trajectory synthesis from animation data using trajectory optimization (ERJ, TDM), pp. 274–279.
- CASE-2009-KumarWKSS #analysis #fuzzy #predict #variability
- A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
- CASE-2009-Makkapati #segmentation
- Improved wavelet-based microscope autofocusing for blood smears by using segmentation (VM), pp. 208–211.
- CASE-2009-NaveenRR #algorithm #difference #evolution #network #search-based
- Rule extraction from differential evolution trained radial basis function network using genetic algorithms (NN, VR, CRR), pp. 152–157.
- CASE-2009-SenguptaDBMD #detection #fault #modelling
- Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
- CASE-2009-VoronovA #model checking #process #verification
- Verification of process operations using model checking (AV, KÅ), pp. 415–420.
- CASE-2009-YuanZ
- Micro-mixing of highly viscous bio-samples using orbital shaking (LY, YFZ), pp. 579–584.
- CC-2009-AbadiBHHI #implementation #memory management #transaction
- Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
- DAC-2009-AbercrombiePC #design #equation #simulation
- Use of lithography simulation for the calibration of equation-based design rule checks (DA, FP, CC), pp. 67–70.
- DAC-2009-BaiocchiC #in memory #memory management
- Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
- DAC-2009-ChoudhuryM #logic #lookahead #optimisation
- Timing-driven optimization using lookahead logic circuits (MRC, KM), pp. 390–395.
- DAC-2009-EllithorpeTK #architecture #named #network
- Internet-in-a-Box: emulating datacenter network architectures using FPGAs (JDE, ZT, RHK), pp. 880–883.
- DAC-2009-FeySD #bound #fault tolerance
- Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
- DAC-2009-GhaniN #approximate #grid #performance #power management #verification
- Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
- DAC-2009-HelinskiAP #physics
- A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
- DAC-2009-JainC #graph #performance #satisfiability
- Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts (HJ, EMC), pp. 563–568.
- DAC-2009-LeeK #manycore #optimisation #throughput
- Optimizing throughput of power- and thermal-constrained multicore processors using DVFS and per-core power-gating (JL, NSK), pp. 47–50.
- DAC-2009-MehrotraS #performance #robust
- A robust and efficient harmonic balance (HB) using direct solution of HB Jacobian (AM, AS), pp. 370–375.
- DAC-2009-PatilLZWM #logic
- Digital VLSI logic technology using Carbon Nanotube FETs: frequently asked questions (NP, AL, JZ, HSPW, SM), pp. 304–309.
- DAC-2009-PotkonjakNNM #detection #hardware
- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
- DAC-2009-SarbisheiAF #clustering #heuristic #optimisation #polynomial
- Polynomial datapath optimization using partitioning and compensation heuristics (OS, BA, MF), pp. 931–936.
- DAC-2009-ShinPS #synthesis
- Register allocation for high-level synthesis using dual supply voltages (IS, SP, YS), pp. 937–942.
- DAC-2009-StrojwasJRP
- Creating an affordable 22nm node using design-lithography co-optimization (AJS, TJ, VR, LTP), pp. 95–96.
- DAC-2009-WangCSC #graph #power management #synthesis
- Low power gated bus synthesis using shortest-path Steiner graph for system-on-chip communications (RW, NCC, BS, CKC), pp. 166–171.
- DAC-2009-WuDL #3d #integer #named #programming #scalability
- GRIP: scalable 3D global routing using integer programming (THW, AD, JTL), pp. 320–325.
- DAC-2009-ZengZNGGS #optimisation #scheduling
- Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
- DAC-2009-ZhangS #estimation
- Accurate temperature estimation using noisy thermal sensors (YZ, AS), pp. 472–477.
- DATE-2009-AlvesNDB #detection #fault #multi
- Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
- DATE-2009-BaertBWA
- Exploring parallelizations of applications for MPSoC platforms using MPA (RB, EB, SW, TJA), pp. 1148–1153.
- DATE-2009-BildBD #performance
- Minimization of NBTI performance degradation using internal node control (DRB, GEB, RPD), pp. 148–153.
- DATE-2009-ChangBM #design
- Customizing IP cores for system-on-chip designs using extensive external don’t-cares (KHC, VB, ILM), pp. 582–585.
- DATE-2009-DarbariAFB #design #simulation
- Selective state retention design using symbolic simulation (AD, BMAH, DF, JB), pp. 1644–1649.
- DATE-2009-DensmoreSDPS #design #evaluation #framework
- UMTS MPSoC design evaluation using a system level design framework (DD, AS, AD, RP, ALSV), pp. 478–483.
- DATE-2009-GuoS #bound #design #distributed #optimisation
- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
- DATE-2009-KinsmanN #finite #modulo theories #precise
- Finite Precision bit-width allocation using SAT-Modulo Theory (ABK, NN), pp. 1106–1111.
- DATE-2009-KirchnerBG #simulation
- Analogue mixed signal simulation using spice and SystemC (TK, NB, CG), pp. 284–287.
- DATE-2009-KochteZIKRWCP #modelling #transaction #validation
- Test exploration and validation using transaction level models (MAK, CGZ, MEI, RSK, MR, HJW, SDC, PP), pp. 1250–1253.
- DATE-2009-KravetsM #logic #synthesis
- Sequential logic synthesis using symbolic bi-decomposition (VNK, AM), pp. 1458–1463.
- DATE-2009-LinW
- Rewiring using IRredundancy Removal and Addition (CCL, CYW), pp. 324–327.
- DATE-2009-MitraZPW #logic
- Imperfection-immune VLSI logic circuits using Carbon Nanotube Field Effect Transistors (SM, JZ, NP, HW), pp. 436–441.
- DATE-2009-MollCRB #modelling #performance #protocol
- Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
- DATE-2009-OzturkK #compilation #execution #memory management
- Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
- DATE-2009-PurandareWK #abstraction #refinement
- Strengthening properties using abstraction refinement (MP, TW, DK), pp. 1692–1697.
- DATE-2009-RealVD #correlation
- Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
- DATE-2009-RobertsKM #energy #memory management
- Using non-volatile memory to save energy in servers (DR, TK, TNM), pp. 743–748.
- DATE-2009-SafizadehTATB #nondeterminism
- Using randomization to cope with circuit uncertainty (HS, MT, EKA, GT, KB), pp. 815–820.
- DATE-2009-SinhaRBS #design #multi #protocol
- Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
- DATE-2009-TannirK #analysis
- Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
- DATE-2009-WangCTHR #modelling #optimisation #performance #polynomial
- An efficient decoupling capacitance optimization using piecewise polynomial models (XW, YC, SXDT, XH, JR), pp. 1190–1195.
- DATE-2009-WangM
- An accurate interconnect thermal model using equivalent transmission line circuit (BW, PM), pp. 280–283.
- HPCA-2009-PowellBEMSY #named #parametricity #runtime
- CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
- HPCA-2009-ReddiGHWSB #predict
- Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
- HPDC-2009-AssuncaoCB #capacity #clustering #in the cloud
- Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters (MDdA, AdC, RB), pp. 141–150.
- HPDC-2009-HironakaST #concurrent #performance
- High performance wide-area overlay using deadlock-free routing (KH, HS, KT), pp. 81–90.
- HPDC-2009-Reeuwijk #data flow #framework #learning #named #peer-to-peer #self
- Maestro: a self-organizing peer-to-peer dataflow framework using reinforcement learning (CvR), pp. 187–196.
- ISMM-2009-GuanSJ #performance #policy
- Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
- ISMM-2009-NaeemL #alias #analysis #performance #set
- Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
- ISMM-2009-SerranoZ #garbage collection #optimisation
- Placement optimization using data context collected during garbage collection (MJS, XZ), pp. 69–78.
- PDP-2009-AchourNS #adaptation #algorithm #clustering #modelling #on the #performance
- On the Use of Performance Models for Adaptive Algorithm Selection on Heterogeneous Clusters (SA, WN, LAS), pp. 85–89.
- PDP-2009-CasconOHDR #concurrent #interface #multi #network #thread
- A Multi-Threaded Network Interface Using Network Processors (PC, JO, WMH, AFD, IR), pp. 196–200.
- PDP-2009-EngelmannVNS #fault tolerance #migration
- Proactive Fault Tolerance Using Preemptive Migration (CE, GV, TN, SLS), pp. 252–257.
- PDP-2009-FrancoBFA #2d #implementation #parallel
- A Parallel Implementation of the 2D Wavelet Transform Using CUDA (JF, GB, JF, MEA), pp. 111–118.
- PDP-2009-KunisR #algorithm #constraints #optimisation #parallel #precedence #scheduling
- Optimization of Layer-based Scheduling Algorithms for Mixed Parallel Applications with Precedence Constraints Using Move-blocks (RK, GR), pp. 70–77.
- PDP-2009-SantosAPDRS #monitoring #performance #scheduling #web #web service
- Using Web Services for Performance Monitoring and Scheduling (AS, FA, VBP, DD, JR, ES), pp. 361–368.
- PPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction
- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
- PPoPP-2009-LiBH #distributed #multi #performance #scalability #scheduling
- Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin (TL, DPB, SH), pp. 65–74.
- PPoPP-2009-ZyulkyarovGUCAHV #game studies #interactive #memory management #multi #transaction
- Atomic quake: using transactional memory in an interactive multiplayer game server (FZ, VG, OSÜ, AC, EA, TH, MV), pp. 25–34.
- SOSP-2009-DunaganZS #combinator #graph #named #optimisation
- Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
- ESOP-2009-Campbell #analysis #data type #memory management
- Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
- ESOP-2009-Reynolds #category theory #design #programming language
- Using Category Theory to Design Programming Languages (JCR), pp. 62–63.
- FASE-2009-AguirreFMMW #alloy #behaviour #specification
- Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
- FASE-2009-ChatterjeeJS #java #named #query
- SNIFF: A Search Engine for Java Using Free-Form Queries (SC, SJ, KS), pp. 385–400.
- FASE-2009-KovacsV #array #invariant #proving #source code #theorem proving
- Finding Loop Invariants for Programs over Arrays Using a Theorem Prover (LK, AV), pp. 470–485.
- STOC-2009-AndersenP #evolution #set
- Finding sparse cuts locally using evolving sets (RA, YP), pp. 235–244.
- STOC-2009-Gentry #encryption
- Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
- STOC-2009-Liu #algorithm #quantum
- Quantum algorithms using the curvelet transform (YKL), pp. 391–400.
- CAV-2009-BeerBCOT
- Explaining Counterexamples Using Causality (IB, SBD, HC, AO, RJT), pp. 94–108.
- CAV-2009-DangS #image #polynomial
- Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion (TD, DS), pp. 219–232.
- CAV-2009-GuernicG #analysis #hybrid #reachability
- Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
- CAV-2009-LahiriQR #concurrent #detection #fault #precise #smt
- Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
- CAV-2009-MajumdarX #testing
- Reducing Test Inputs Using Information Partitions (RM, RGX), pp. 555–569.
- CAV-2009-Monniaux #float #linear #on the
- On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure (DM), pp. 570–583.
- CAV-2009-VerdoolaegeJB #equivalence #source code
- Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences (SV, GJ, MB), pp. 599–613.
- CSL-2009-GaboardiP #bound #semantics
- Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
- ICLP-2009-BroechelerSS #logic programming #probability #query #source code
- Using Histograms to Better Answer Queries to Probabilistic Logic Programs (MB, GIS, VSS), pp. 40–54.
- ICLP-2009-Mungall #case study #experience #logic programming
- Experiences Using Logic Programming in Bioinformatics (CM), pp. 1–21.
- ICLP-2009-PaluDPR #constraints #lazy evaluation #programming #set
- Answer Set Programming with Constraints Using Lazy Grounding (ADP, AD, EP, GR), pp. 115–129.
- ICLP-2009-Raiser #constraints #graph transformation
- Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (FR), pp. 540–541.
- ICLP-2009-Todorova #natural language #prolog
- Answering Questions from Natural Language Using A-Prolog (YT), pp. 544–546.
- ICLP-2009-Wielemaker #prolog #web
- Enabling Serendipitous Search on the Web of Data Using Prolog (JW), p. 36.
- ICST-2009-BandyopadhyayG #generative #modelling #sequence #state machine #uml
- Test Input Generation Using UML Sequence and State Machines Models (AB, SG), pp. 121–130.
- ICST-2009-KaminskiA #detection #fault #logic #testing
- Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
- ICST-2009-KaminskiA09a #fault #logic #mutation testing #performance #testing
- Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing (GKK, PA), pp. 386–395.
- ICST-2009-MurphyKVC #approach #assurance #quality #testing
- Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
- ICST-2009-MurphySK #ml #runtime #testing
- Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles (CM, KS, GEK), pp. 436–445.
- ICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving
- Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
- ISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage
- Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
- ISSTA-2009-ChengLZWY #debugging #graph #identification #mining
- Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
- ISSTA-2009-ClauseO #automation #identification #named
- Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
- ISSTA-2009-ZhangHGXM #integer #linear #programming #testing
- Time-aware test-case prioritization using integer linear programming (LZ, SSH, CG, TX, HM), pp. 213–224.
- MBT-2009-DadeauLH #automaton #generative #on the #random #testing
- On the Use of Uniform Random Generation of Automata for Testing (FD, JL, PCH), pp. 37–51.
- MBT-2009-SchumannSH #graph #nondeterminism #testing
- Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs (AS, MS, JH), pp. 87–99.
- SAT-2009-BonetJ #metric #satisfiability
- Efficiently Calculating Evolutionary Tree Measures Using SAT (MLB, KSJ), pp. 4–17.
- SAT-2009-HaimW #machine learning
- Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
- SAT-2009-KojevnikovKY #performance
- Finding Efficient Circuits Using SAT-Solvers (AK, ASK, GY), pp. 32–44.
- TestCom-FATES-2009-AdjirSR #realtime #testing
- Testing Real-Time Systems Using TINA (NA, PdSS, KMR), pp. 1–15.
- TestCom-FATES-2009-ErnitsRJV #modelling #testing #web
- Model-Based Testing of Web Applications Using NModel (JPE, RR, JJ, MV), pp. 211–216.
- TestCom-FATES-2009-SubramaniamXGP #approach #proving #testing #theorem proving
- An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
- VMCAI-2009-KiddRDV #debugging #random
- Finding Concurrency-Related Bugs Using Random Isolation (NK, TWR, JD, MV), pp. 198–213.
- VMCAI-2009-TalyGT #constraints #logic #theorem proving
- Synthesizing Switching Logic Using Constraint Solving (AT, SG, AT), pp. 305–319.
- VMCAI-2009-WimmerBB #bound #generative #markov #model checking
- Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
- CBSE-2008-KuperbergKR #behaviour #black box #component #modelling #parametricity #performance #predict
- Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
- ECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology
- Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
- ECSA-2008-FilhoCNOLAM #design #overview #perspective
- Evaluating Domain Design Approaches Using Systematic Review (EDdSF, RdOC, DFSN, THBdO, LBL, ESdA, SRdLM), pp. 50–65.
- ECSA-2008-KamalA #behaviour #design pattern #modelling
- Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
- ECSA-2008-NavarroC #approach #architecture #automation #design
- Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
- ECSA-2008-Perry #architecture #design #evolution #maintenance
- Issues in Architecture Evolution: Using Design Intent in Maintenance and Controlling Dynamic Evolution (DEP), p. 1.
- ECSA-2008-SanzQCMO #architecture #modelling #representation
- Representing Service-Oriented Architectural Models Using pi-ADL (MLS, ZQ, CEC, EM, FO), pp. 273–280.
- QoSA-2008-ArdagnaGM #architecture #modelling
- Rethinking the Use of Models in Software Architecture (DA, CG, RM), pp. 1–27.
- WICSA-2008-Aldrich #architecture
- Using Types to Enforce Architectural Structure (JA), pp. 211–220.
- WICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability
- Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
- DocEng-2008-AlkhateebL #composition #documentation #generative #towards
- Towards extending and using SPARQL for modular document generation (FA, SL), pp. 164–172.
- DocEng-2008-KumarS #automation #documentation #n-gram
- Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
- DocEng-2008-Nguyen #algorithm #documentation #image
- A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
- DocEng-2008-RonnauPB #documentation #reliability #xml
- Merging changes in XML documents using reliable context fingerprints (SR, CP, UMB), pp. 52–61.
- DocEng-2008-ValleCP #documentation #identification #performance #visual notation
- Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
- DRR-2008-AntaniDLST #image
- Exploring use of images in clinical articles for decision support in evidence-based medicine (SA, DDF, JL, BVS, GRT), p. 68150.
- DRR-2008-BaiNS #composition
- Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
- DRR-2008-ChanVT #identification #online #prototype
- Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
- DRR-2008-El-HajjML #modelling #recognition #word
- Recognition of Arabic handwritten words using contextual character models (REH, CM, LLS), p. 681503.
- DRR-2008-ShafaitKB #adaptation #image #implementation #performance
- Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
- DRR-2008-XiangTLW #recognition #reliability
- Achieving high recognition reliability using decision trees and AdaBoost (JX, XT, YL, PSPW), p. 68150.
- DRR-2008-XiuB #adaptation #recognition
- Whole-book recognition using mutual-entropy-driven model adaptation (PX, HSB), p. 681506.
- DRR-2008-ZouLT #html #online
- Extracting a sparsely located named entity from online HTML medical articles using support vector machine (JZ, DXL, GRT), p. 68150.
- ECDL-2008-BindingT #web #web service
- Using Terminology Web Services for the Archaeological Domain (CB, DT), pp. 392–393.
- ECDL-2008-FernandezMFVA #agile #development #library
- Agile DL: Building a DELOS-ConformedDigital Library Using Agile Software Development (JDF, MAMP, PdlF, JV, JA), pp. 398–399.
- ECDL-2008-IkedaZG
- Matching Hierarchies Using Shared Objects (RI, KZ, HGM), pp. 209–220.
- ECDL-2008-UematsuIFKO #proximity
- Proximity Scoring Using Sentence-Based Inverted Index for Practical Full-Text Search (YU, TI, KF, RK, HO), pp. 308–319.
- ECDL-2008-YangPJLH #ambiguity #correlation #topic #web
- Author Name Disambiguation for Citations Using Topic and Web Correlation (KHY, HTP, JYJ, HML, JMH), pp. 185–196.
- HT-2008-ChiM #comprehension #performance #social
- Understanding the efficiency of social tagging systems using information theory (EHC, TM), pp. 81–88.
- HT-2008-ChoudhurySJS #communication #predict #social
- Dynamic prediction of communication flow using social context (MDC, HS, AJ, DDS), pp. 49–54.
- HT-2008-Diniz #education #hypermedia
- Efl and hypertext: using webquests to maximize english teaching (MGD), pp. 223–224.
- HT-2008-LeeBG #community #ranking #similarity
- Extracting and ranking viral communities using seeds and content similarity (HCL, AB, LG), pp. 139–148.
- HT-2008-TomsaB #social #visualisation
- Hyperlinks visualization using social bookmarking (MT, MB), pp. 245–246.
- JCDL-2008-CarmelYR #analysis #library
- Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
- JCDL-2008-HariharanHM #summary #web
- Discovering gis sources on the web using summaries (RH, BH, SM), pp. 94–103.
- JCDL-2008-Hetzner #markov #metadata #modelling
- A simple method for citation metadata extraction using hidden markov models (EH), pp. 280–284.
- JCDL-2008-KhooPWRPD #library #metric #web
- Using web metrics to analyze digital libraries (MK, JP, ALW, MR, BP, RAD), pp. 375–384.
- JCDL-2008-PereiraRZL #web
- Using web information for creating publication venue authority files (DAP, BARN, NZ, AHFL), pp. 295–304.
- JCDL-2008-TibenderanaO #library
- Acceptance and use of electronic library services in ugandan universities (PKGT, PJO), pp. 323–332.
- SIGMOD-2008-BohmFP #clustering #component #independence
- Outlier-robust clustering using independent components (CB, CF, CP), pp. 185–198.
- SIGMOD-2008-LeeC #performance #query
- Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
- VLDB-2008-Cohen #constraints #generative #xml
- Generating XML structure using examples and constraints (SC), pp. 490–501.
- VLDB-2008-CohenK #estimation #sketching
- Tighter estimation using bottom k sketches (EC, HK), pp. 213–224.
- VLDB-2008-CormodeSYZ #graph
- Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
- VLDB-2008-FontouraJKOTV #taxonomy
- Relaxation in text search using taxonomies (MF, VJ, RK, CO, AT, SV), pp. 672–683.
- VLDB-2008-KwonBG #distributed #fault tolerance #file system
- Fault-tolerant stream processing using a distributed, replicated file system (YK, MB, AGG), pp. 574–585.
- VLDB-2008-LeeHLG #classification #clustering #named
- TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering (JGL, JH, XL, HG), pp. 1081–1094.
- VLDB-2008-MetwallyEAA #correlation #detection #named
- SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
- CSEET-2008-GotterbarnM #re-engineering
- Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
- CSEET-2008-JohnsgardM #overview #programming
- Using Alice in Overview Courses to Improve Success Rates in Programming I (KJ, JM), pp. 129–136.
- CSEET-2008-RasR #information management #learning
- Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning (ER, JR), pp. 77–84.
- CSEET-2008-SalamahG #education #model checking #specification
- A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
- EDM-2008-BarnesSLC #case study #logic #proving #student
- A pilot study on logic proof tutoring using hints generated from historical student data (TB, JCS, LL, MJC), pp. 197–201.
- EDM-2008-PavlikCWK #performance
- Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor (PIP, HC, LW, KRK), pp. 77–86.
- ITiCSE-2008-Albin-ClarkK #game studies #simulation
- The use of role play to simulate a tethered swarm of robots for urban search and rescue (USAR) (AAC, TRVAK), p. 335.
- ITiCSE-2008-Connolly #design #development #education #multi #platform
- Complecto mutatio: teaching software design best practices using multi-platform development (RWC), p. 345.
- ITiCSE-2008-DennyLH #student
- Student use of the PeerWise system (PD, ALR, JH), pp. 73–77.
- ITiCSE-2008-Deugo08a #eclipse
- Using eclipse in the classroom (DD), p. 322.
- ITiCSE-2008-Kurmas #automation #logic #performance #student #testing
- Improving student performance using automated testing of simulated digital logic circuits (ZK), pp. 265–270.
- ITiCSE-2008-LinhoffS #education #game studies #programming
- Teaching game programming using XNA (JL, AS), pp. 250–254.
- ITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards
- Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
- ITiCSE-2008-SalterD #logic #multi #scalability
- Using DLSim 3: a scalable, extensible, multi-level logic simulator (RMS, JLD), p. 315.
- SIGITE-2008-Edirisinghe #education #fault #game studies #identification #programming #student
- Teaching students to identify common programming errors using a game (EMNSE), pp. 95–98.
- SIGITE-2008-MullinsC #programming #student
- Engaging students in programming fundamentals using alice 2.0 (PMM, MC), pp. 81–88.
- CSMR-2008-CosmaM #comprehension #dependence #distributed #object-oriented
- Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies (DCC, RM), pp. 103–112.
- CSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability
- Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
- CSMR-2008-LagerstromJ #architecture #enterprise #maintenance #modelling #predict
- Using Architectural Models to Predict the Maintainability of Enterprise Systems (RL, PJ), pp. 248–252.
- CSMR-2008-MendeBKM #clone detection #detection #evolution #product line
- Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
- CSMR-2008-SpekKL #architecture #concept #semantics #towards
- Towards Recovering Architectural Concepts Using Latent Semantic Indexing (PvdS, SK, PvdL), pp. 253–257.
- CSMR-2008-Trifu #data flow #identification #object-oriented
- Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
- ICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code
- CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
- ICPC-2008-HaiducM #on the #source code
- On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
- ICPC-2008-Parr #embedded #reuse #semantics
- The Reuse of Grammars with Embedded Semantic Actions (TP), pp. 5–10.
- ICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing
- NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
- ICSM-2008-JeffreyGG #debugging #identification #memory management
- Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
- ICSM-2008-KothariBMS #algebra #development #on the #performance
- On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
- ICSM-2008-LiH #random testing #testing
- Using random test selection to gain confidence in modified software (WL, MJH), pp. 267–276.
- ICSM-2008-LuciaOV #metric #semantics
- Using structural and semantic metrics to improve class cohesion (ADL, RO, LV), pp. 27–36.
- ICSM-2008-MalikH #adaptation #co-evolution #evolution #heuristic
- Supporting software evolution using adaptive change propagation heuristics (HM, AEH), pp. 177–186.
- ICSM-2008-RiccaPT #guidelines #lessons learnt #maintenance
- Guidelines on the use of Fit tables in software maintenance tasks: Lessons learned from 8 experiments (FR, MDP, MT), pp. 317–326.
- MSR-2008-HataMK #precise
- An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
- MSR-2008-SiyCS #challenge #developer #segmentation
- Summarizing developer work history using time series segmentation: challenge report (HPS, PC, MS), pp. 137–140.
- SCAM-2008-BoogerdM #analysis #data flow #on the #profiling
- On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
- SCAM-2008-CeccatoDT #legacy #program transformation
- Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
- SCAM-2008-GiffhornH #analysis #java #precise #source code
- Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
- SCAM-2008-JiaH #fault #higher-order #mutation testing #testing
- Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
- WCRE-2008-GrantCS #analysis #automation #component #concept #independence
- Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
- WCRE-2008-LukinsKE #debugging #locality #retrieval #source code
- Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
- WCRE-2008-Muliawan #higher-order #model transformation #transformation language
- Extending a Model Transformation Language Using Higher Order Transformations (OM), pp. 315–318.
- WCRE-2008-RompaeyD #estimation
- Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
- CIAA-2008-GarciaPAR #automaton #finite #learning #nondeterminism #regular expression
- Learning Regular Languages Using Nondeterministic Finite Automata (PG, MVdP, GIA, JR), pp. 92–101.
- ICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability
- Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
- LATA-2008-Klunder #automaton #finite
- Characterization of Star-Connected Languages Using Finite Automata (BK), pp. 311–320.
- FM-2008-ChalinR #fault #ml #performance #runtime
- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity (PC, FR), pp. 246–261.
- FM-2008-ChetaliN #evaluation #formal method #industrial #security
- Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
- FM-2008-MacedoLF #development #distributed #incremental #realtime
- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM (HDM, PGL, JSF), pp. 181–197.
- RTA-2008-MoserS #polynomial #proving
- Proving Quadratic Derivational Complexities Using Context Dependent Interpretations (GM, AS), pp. 276–290.
- SEFM-2008-GuoS #finite #impact analysis #proving #state machine #theorem proving
- Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover (BG, MS), pp. 335–344.
- SEFM-2008-SalasK #modelling #policy #privacy #testing
- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
- SEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol
- Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
- SEFM-2008-XavierHM #fault tolerance #source code #verification
- Using Formal Verification to Reduce Test Space of Fault-Tolerant Programs (KSX, SH, ACVdM), pp. 181–190.
- FLOPS-2008-Julien #induction #integer
- Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base (NJ), pp. 48–63.
- FLOPS-2008-PrinceGM #proving
- Proving Properties about Lists Using Containers (RP, NG, CM), pp. 97–112.
- IFL-2008-LijnseP #automation #data type #database #programming #relational
- Between Types and Tables — Using Generic Programming for Automated Mapping between Data Types and Relational Databases (BL, RP), pp. 272–290.
- AIIDE-2008-CutumisuSBS #game studies #learning
- Agent Learning using Action-Dependent Learning Rates in Computer Role-Playing Games (MC, DS, MHB, RSS).
- CIG-2008-ChiouW #adaptation #programming #user satisfaction
- Player Adaptive Entertainment Computing (PAEC): Mechanism to model user satisfaction by using Neuro Linguistic Programming (NLP) techniques (AC, KWW), pp. 343–349.
- CIG-2008-DjordjevichXBWGV #game studies
- Preparing for the aftermath: Using emotional agents in game-based training for disaster response (DD, PGX, MLB, JW, MRG, SJV), pp. 266–275.
- CIG-2008-OlesenYH #challenge #game studies #realtime
- Real-time challenge balance in an RTS game using rtNEAT (JKO, GNY, JH), pp. 87–94.
- CIG-2008-OsakiSTK #difference #evaluation #learning #probability
- An Othello evaluation function based on Temporal Difference Learning using probability of winning (YO, KS, YT, YK), pp. 205–211.
- CIG-2008-Sahraei-ArdakaniRRL #case study #optimisation
- A study of electricity market dynamics using Invasive Weed Colonization Optimization (MSA, MR, ARK, CL), pp. 276–282.
- CIG-2008-WenderW #game studies #learning
- Using reinforcement learning for city site selection in the turn-based strategy game Civilization IV (SW, IDW), pp. 372–377.
- CIG-2008-WestraHDD #adaptation #game studies #online
- On-line adapting games using agent organizations (JW, HvH, VD, FD), pp. 243–250.
- CIG-2008-WittkampBH #adaptation
- Using NEAT for continuous adaptation and teamwork formation in Pacman (MW, LB, PH), pp. 234–242.
- GT-VMT-2006-JakobS08 #graph grammar #metamodelling #modelling
- View Creation of Meta Models by Using Modified Triple Graph Grammars (JJ, AS), pp. 181–190.
- GT-VMT-2006-Varro08 #database #graph transformation #implementation #independence #plugin #query
- Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries (GV), pp. 121–132.
- GT-VC-2007-BruniBGM08 #architecture #graph grammar #modelling
- Modelling Dynamic Software Architectures using Typed Graph Grammars (RB, AB, SG, HCM), pp. 39–53.
- GT-VMT-2008-BaresiGMM #abstraction #graph transformation #verification
- Using Graph Transformation Systems to Specify and Verify Data Abstractions (LB, CG, AM, MM).
- GT-VMT-2008-BucchiaroneG #architecture #verification
- Dynamic Software Architectures Verification using DynAlloy (AB, JPG).
- GT-VMT-2008-GrabskaSL #design #graph transformation #reasoning #visual notation
- Visual Design and Reasoning with the Use of Hypergraph Transformations (EG, GMS, TLL).
- ICGT-2008-EhrigE #correctness #graph #model transformation #semantics
- Semantical Correctness and Completeness of Model Transformations Using Graph and Rule Transformation (HE, CE), pp. 194–210.
- ICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network
- Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
- ICGT-2008-RangelLKEB #behaviour #refactoring
- Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
- ICGT-2008-Striewe #graph grammar #implementation #state machine
- Using a Triple Graph Grammar for State Machine Implementations (MS), pp. 514–516.
- CHI-2008-BuechleyECC #arduino #education
- The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science education (LB, ME, JC, AC), pp. 423–432.
- CHI-2008-ClawsonLRIS #automation #fault #type system
- Automatic whiteout++: correcting mini-QWERTY typing errors using keypress timing (JC, KL, AR, RAI, TS), pp. 573–582.
- CHI-2008-DugganP #topic #web
- Knowledge in the head and on the web: using topic expertise to aid search (GBD, SJP), pp. 39–48.
- CHI-2008-GeyerDDMBM #reuse #social
- Use and reuse of shared lists as a social content type (WG, CD, JMD, DRM, BB, MJM), pp. 1545–1554.
- CHI-2008-GrafSSWR #interactive #search-based #user interface
- In-car interaction using search-based user interfaces (SG, WS, AS, AW, GR), pp. 1685–1688.
- CHI-2008-GuoS #case study #comparative #interactive #user interface
- Exploring the use of tangible user interfaces for human-robot interaction: a comparative study (CG, ES), pp. 121–130.
- CHI-2008-HornbaekF #empirical #evaluation #usability
- Making use of business goals in usability evaluation: an experiment with novice evaluators (KH, EF), pp. 903–912.
- CHI-2008-HsiehLHK #communication
- Using tags to assist near-synchronous communication (GH, JL, SEH, RK), pp. 223–226.
- CHI-2008-Joinson #facebook #people
- Looking at, looking up or keeping up with people?: motives and use of facebook (ANJ), pp. 1027–1036.
- CHI-2008-KangWA #interactive #mobile #social #video
- Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
- CHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #web
- AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
- CHI-2008-KobayashiI #multi #scalability
- Ninja cursors: using multiple cursors to assist target acquisition on large screens (MK, TI), pp. 949–958.
- CHI-2008-LanirBF #design #visual notation
- Observing presenters’ use of visual aids to inform the design of classroom presentation software (JL, KSB, LF), pp. 695–704.
- CHI-2008-LawranceBBR #behaviour #maintenance
- Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
- CHI-2008-MorrisBM #named #type system
- SuperBreak: using interactivity to enhance ergonomic typing breaks (DM, AJBB, BM), pp. 1817–1826.
- CHI-2008-MoscovichH #multi
- Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
- CHI-2008-OganAJ #learning #predict
- Pause, predict, and ponder: use of narrative videos to improve cultural discussion and learning (AO, VA, CJ), pp. 155–162.
- CHI-2008-RatwaniMT #eye tracking #fault #predict
- Predicting postcompletion errors using eye movements (RMR, JMM, JGT), pp. 539–542.
- CHI-2008-SankarpandianLE #named
- Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
- CHI-2008-SaponasTMB #interface
- Demonstrating the feasibility of using forearm electromyography for muscle-computer interfaces (TSS, DST, DM, RB), pp. 515–524.
- CHI-2008-SzentgyorgyiTL #game studies #social
- Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system (CS, MAT, EL), pp. 1463–1472.
- CHI-2008-TianXWZLSD #3d #user interface
- Tilt menu: using the 3D orientation information of pen devices to extend the selection capability of pen-based user interfaces (FT, LX, HW, XZ, YL, VS, GD), pp. 1371–1380.
- CHI-2008-YataniPBN #gesture #named
- Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
- CSCW-2008-HancockTF #symmetry
- I know something you don’t: the use of asymmetric personal information for interpersonal advantage (JTH, CLT, KF), pp. 413–416.
- CSCW-2008-ReillyMWI
- Small details: using one device to navigate together (DFR, BM, CRW, KMI), pp. 253–256.
- SOFTVIS-2008-AnslowNMB #3d #visualisation #web
- Web software visualization using extensible 3D (X3D) graphics (CA, JN, SM, RB), pp. 213–214.
- SOFTVIS-2008-ParduhnSW #algorithm #graph #visualisation
- Algorithm visualization using concrete and abstract shape graphs (SAP, RS, RW), pp. 33–36.
- SOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #visualisation
- Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
- CAiSE-2008-DeckerKLPW #modelling
- Modeling Service Choreographies Using BPMN and BPEL4Chor (GD, OK, FL, KP, MW), pp. 79–93.
- CAiSE-2008-HerssensJF
- Capturing and Using QoS Relationships to Improve Service Selection (CH, IJ, SF), pp. 312–327.
- CAiSE-2008-MuehlenR #how #modelling #process
- How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
- CAiSE-2008-ViscusiTS #approach #case study #empirical
- Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
- EDOC-2008-KavimandanKG #automation #enterprise #model transformation #synthesis #workflow
- Automated Context-Sensitive Dialog Synthesis for Enterprise Workflows Using Templatized Model Transformations (AK, RK, ASG), pp. 159–168.
- EDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality
- Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
- EDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol
- Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
- ICEIS-AIDSS-2008-BurdescuML #concept #student
- Building a Decision Support System for Students by Using Concept Maps (DDB, MCM, BL), pp. 130–135.
- ICEIS-AIDSS-2008-MahdaviSP #approach #automation
- Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
- ICEIS-AIDSS-2008-Nachev #network
- Forecasting with ARTMAP-IC Neural Networks — An Application Using Corporate Bankruptcy Data (AN), pp. 167–172.
- ICEIS-AIDSS-2008-SchmidtV #reasoning
- Using Case-Based Reasoning to Explain Exceptional Cases (RS, OV), pp. 119–124.
- ICEIS-AIDSS-2008-TsengKH #approach #assembly
- A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
- ICEIS-DISI-2008-MoraGRPBGCR #metric #qvt
- Software Measurement by Using QVT Transformations in an MDA Context (BM, FG, FR, MP, AB, AG, JÁC, IR), pp. 117–124.
- ICEIS-HCI-2008-LeivaCGA #development #maintenance #workflow
- A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
- ICEIS-HCI-2008-MordechaiFD #interface #named #taxonomy
- TTLS: A Grouped Display of Search Results Based on Organizational Taxonomy Using the LCC&K Interface (VM, AJF, OD), pp. 47–53.
- ICEIS-ISAS1-2008-GullaBK #concept #ontology
- Using Association Rules to Learn Concept Relationships in Ontologies (JAG, TB, GSK), pp. 58–65.
- ICEIS-ISAS1-2008-LoewensternS #lifecycle
- IT Service Management of Using Heterogeneous, Dynamically Alterable Configuration Item Lifecycles (DL, LS), pp. 155–160.
- ICEIS-ISAS2-2008-BrunetSLG #modelling
- Using Variants in KAOS Goal Modelling (JB, FS, RL, CG), pp. 339–344.
- ICEIS-ISAS2-2008-PivetaMPAGP #process #ranking #refactoring
- Ranking Refactoring Patterns Using the Analytical Hierarchy Process (EKP, AMDM, MSP, JA, PG, RTP), pp. 195–200.
- ICEIS-ISAS2-2008-Prpitsch #process
- From Process to Software Systems’ Service — Using a Layered Model to Connect Technical and Process-related Views (CP), pp. 298–304.
- ICEIS-J-2008-PapatheocharousA08a #algorithm #approach #hybrid #modelling #network #predict #search-based
- Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
- ICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics
- Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
- ICEIS-SAIC-2008-BoukadiGV #aspect-oriented #collaboration #enterprise
- Enhancing Enterprise Collaboration Using Context-Aware Service Based on Aspects (KB, CG, LV), pp. 29–36.
- ICEIS-SAIC-2008-BrockeTW #e-commerce #mobile
- Making Use of Mobile Devices in E-Commerce — Overcoming Organizational Barriers through User Participation (JvB, BT, DW), pp. 168–173.
- ICEIS-SAIC-2008-DAgostiniFDG #semantics
- Contextual Semantic Search — Capturing, using the User’s Context to Direct Semantic Search (CSD, RF, MARD, FAOG), pp. 154–159.
- ICEIS-SAIC-2008-KangasharjuK #data transfer #mobile #xml
- Using Bit-Efficient XML to Optimize Data Transfer of XForms-Based Mobile Services (JK, OK), pp. 5–11.
- ICEIS-SAIC-2008-RanW #adaptation #metric #performance
- Develop Adaptive Workplace E-Learning Environments by Using Performance Measurement Systems (WR, MW), pp. 142–147.
- ICEIS-SAIC-2008-StellerKCNL #approach #pervasive #reasoning #semantics
- A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
- CIKM-2008-BaoYFXSY #social
- Boosting social annotations using propagation (SB, BY, BF, SX, ZS, YY), pp. 1507–1508.
- CIKM-2008-BarskySTU
- A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
- CIKM-2008-BroderCFGJR #feedback #web
- Search advertising using web relevance feedback (AZB, PC, MF, EG, VJ, LR), pp. 1013–1022.
- CIKM-2008-ChanLY #logic #modelling
- Coreference resolution using expressive logic models (KC, WL, XY), pp. 1373–1374.
- CIKM-2008-DaoudTB #graph #ontology #personalisation
- Using a graph-based ontological user profile for personalizing search (MD, LTL, MB), pp. 1495–1496.
- CIKM-2008-HuangS #markov #query
- A latent variable model for query expansion using the hidden markov model (QH, DS), pp. 1417–1418.
- CIKM-2008-MahouiTSC #identification #modelling #predict
- Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
- CIKM-2008-MaYLK #mining #network #process #social
- Mining social networks using heat diffusion processes for marketing candidates selection (HM, HY, MRL, IK), pp. 233–242.
- CIKM-2008-MaYLK08a #matrix #named #probability #recommendation #social
- SoRec: social recommendation using probabilistic matrix factorization (HM, HY, MRL, IK), pp. 931–940.
- CIKM-2008-MeiZC #query
- Query suggestion using hitting time (QM, DZ, KWC), pp. 469–478.
- CIKM-2008-QuMG #network #semantics
- Using tag semantic network for keyphrase extraction in blogs (LQ, CM, IG), pp. 1381–1382.
- CIKM-2008-RahurkarC
- Using the current browsing context to improve search relevance (MR, SC), pp. 1493–1494.
- CIKM-2008-RaviP #scalability
- Using structured text for large-scale attribute extraction (SR, MP), pp. 1183–1192.
- CIKM-2008-RosenfeldFU #classification #sequence #web
- Using sequence classification for filtering web pages (BR, RF, LHU), pp. 1355–1356.
- CIKM-2008-SeoC
- Blog site search using resource selection (JS, WBC), pp. 1053–1062.
- CIKM-2008-ShiNC
- Relating dependent indexes using dempster-shafer theory (LS, JYN, GC), pp. 429–438.
- CIKM-2008-VinayMC #effectiveness #rank #retrieval
- Estimating retrieval effectiveness using rank distributions (VV, NMF, IJC), pp. 1425–1426.
- CIKM-2008-WangZRM #automation #online #ranking #topic
- Automatic online news topic ranking using media focus and user attention based on aging theory (CW, MZ, LR, SM), pp. 1033–1042.
- CIKM-2008-XinLTL #comprehension #random
- Academic conference homepage understanding using constrained hierarchical conditional random fields (XX, JL, JT, QL), pp. 1301–1310.
- CIKM-2008-XuDW #query #wiki
- Entity-based query reformulation using wikipedia (YX, FD, BW), pp. 1441–1442.
- ECIR-2008-AbdullahG #approach #usability
- Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
- ECIR-2008-AyacheQ #corpus #learning #video
- Video Corpus Annotation Using Active Learning (SA, GQ), pp. 187–198.
- ECIR-2008-CloughR #design #image #visualisation
- Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
- ECIR-2008-EidoonYO #ontology
- Ontology Matching Using Vector Space (ZE, NY, FO), pp. 472–481.
- ECIR-2008-HeLR #metric #predict #query
- Using Coherence-Based Measures to Predict Query Difficulty (JH, ML, MdR), pp. 689–694.
- ECIR-2008-HuangBCQ #image #network #retrieval #web
- Improving Web Image Retrieval Using Image Annotations and Inference Network (PH, JB, CC, GQ), pp. 617–621.
- ECIR-2008-LillisTCD #data fusion #probability
- Extending Probabilistic Data Fusion Using Sliding Windows (DL, FT, RWC, JD), pp. 358–369.
- ECIR-2008-NaKL08c #probability #similarity
- Query-Based Inter-document Similarity Using Probabilistic Co-relevance Model (SHN, ISK, JHL), pp. 684–688.
- ECIR-2008-NunesRD #web
- Use of Temporal Expressions in Web Search (SN, CR, GD), pp. 580–584.
- ECIR-2008-RitchieTR #information retrieval
- Using Terms from Citations for IR: Some First Results (AR, ST, SR), pp. 211–221.
- ECIR-2008-ScholerSBT
- Using Clicks as Implicit Judgments: Expectations Versus Observations (FS, MS, BB, AT), pp. 28–39.
- ECIR-2008-SongHRB #composition #mining #modelling #multi #query
- Facilitating Query Decomposition in Query Language Modeling by Association Rule Mining Using Multiple Sliding Windows (DS, QH, SMR, PB), pp. 334–345.
- ECIR-2008-ValletHJ #evaluation #graph #recommendation
- Use of Implicit Graph for Recommending Relevant Videos: A Simulated Evaluation (DV, FH, JMJ), pp. 199–210.
- ECIR-2008-ZhaoST #effectiveness #performance #predict #query #similarity #variability
- Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence (YZ, FS, YT), pp. 52–64.
- ICML-2008-DoshiPR #learning
- Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
- ICML-2008-KirshnerP #dependence
- ICA and ISA using Schweizer-Wolff measure of dependence (SK, BP), pp. 464–471.
- ICML-2008-LarochelleB #classification #strict
- Classification using discriminative restricted Boltzmann machines (HL, YB), pp. 536–543.
- ICML-2008-SahbiARK #kernel #recognition #robust
- Robust matching and recognition using context-dependent kernels (HS, JYA, JR, RK), pp. 856–863.
- ICML-2008-SalakhutdinovM08a #markov #matrix #monte carlo #probability
- Bayesian probabilistic matrix factorization using Markov chain Monte Carlo (RS, AM), pp. 880–887.
- ICML-2008-ShiBY #learning #modelling
- Data spectroscopy: learning mixture models using eigenspaces of convolution operators (TS, MB, BY), pp. 936–943.
- ICML-2008-SyedBS #learning #linear #programming
- Apprenticeship learning using linear programming (US, MHB, RES), pp. 1032–1039.
- ICML-2008-Tieleman #approximate #strict
- Training restricted Boltzmann machines using approximations to the likelihood gradient (TT), pp. 1064–1071.
- ICML-2008-WangM #analysis
- Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
- ICML-2008-YueJ #predict #set
- Predicting diverse subsets using structural SVMs (YY, TJ), pp. 1224–1231.
- ICPR-2008-Abd-AlmageedASD #classification #hybrid
- Document-zone classification using partial least squares and hybrid classifiers (WAA, MA, WS, DSD), pp. 1–4.
- ICPR-2008-AgrisBK #adaptation #agile #approach #recognition
- Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
- ICPR-2008-AmanoK #feedback
- Appearance enhancement using a projector-camera feedback system (TA, HK), pp. 1–4.
- ICPR-2008-Baradarani #segmentation
- Moving object segmentation using the 9/7-10/8 dual-tree complex filter bank (AB), pp. 1–4.
- ICPR-2008-BarratT #effectiveness #image #network #retrieval #semantics #visual notation
- Visual features with semantic combination using Bayesian network for a more effective image retrieval (SB, ST), pp. 1–4.
- ICPR-2008-BazinKDV #image
- Improvement of feature matching in catadioptric images using gyroscope data (JCB, IK, CD, PV), pp. 1–5.
- ICPR-2008-CamposJ #constraints #learning #network #parametricity
- Improving Bayesian Network parameter learning using constraints (CPdC, QJ), pp. 1–4.
- ICPR-2008-ChakrabortyE #constraints #invariant #locality
- Object localization using affine invariant substructure constraints (IC, AME), pp. 1–5.
- ICPR-2008-ChamaretM #validation #video
- Attention-based video reframing: Validation using eye-tracking (CC, OLM), pp. 1–4.
- ICPR-2008-ChandraS
- A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
- ICPR-2008-ChangLAH #clique #clustering #constraints
- Unsupervised clustering using hyperclique pattern constraints (YC, DJL, JKA, YH), pp. 1–4.
- ICPR-2008-ChangLAH08a #collaboration #image #learning
- Using collaborative learning for image contrast enhancement (YC, DJL, JKA, YH), pp. 1–4.
- ICPR-2008-ChenCW #higher-order #named #performance
- HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods (AYCC, JJC, LW), pp. 1–4.
- ICPR-2008-ChenSXS #algorithm #identification #search-based
- Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
- ICPR-2008-ChenZP #segmentation
- Unsupervised dynamic texture segmentation using local spatiotemporal descriptors (JC, GZ, MP), pp. 1–4.
- ICPR-2008-CheongL #approach #image #matrix #multi #orthogonal #recognition
- An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
- ICPR-2008-ChoB #dependence #image
- Image inpainting using wavelet-based inter- and intra-scale dependency (DC, TDB), pp. 1–4.
- ICPR-2008-ChoiMSH #analysis
- Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
- ICPR-2008-ChuangHFH #detection #multi
- Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
- ICPR-2008-DehzangiMCL #classification #fuzzy #learning #speech
- Fuzzy rule selection using Iterative Rule Learning for speech data classification (OD, BM, CES, HL), pp. 1–4.
- ICPR-2008-DonoserB #matrix #segmentation
- Using covariance matrices for unsupervised texture segmentation (MD, HB), pp. 1–4.
- ICPR-2008-EmmsHW #graph #quantum
- Graph drawing using quantum commute time (DE, ERH, RCW), pp. 1–4.
- ICPR-2008-FabletLSMCB #learning
- Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
- ICPR-2008-FengGDJ #retrieval
- Motion capture data retrieval using an artist’s doll (TCF, PG, JD, BJ), pp. 1–4.
- ICPR-2008-FerrerVSRB #algorithm #approximate #graph
- An approximate algorithm for median graph computation using graph embedding (MF, EV, FS, KR, HB), pp. 1–4.
- ICPR-2008-GatosPP #adaptation #documentation #image #multi
- Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
- ICPR-2008-GhoshM #classification #documentation #kernel #similarity #xml
- Combining content and structure similarity for XML document classification using composite SVM kernels (SG, PM), pp. 1–4.
- ICPR-2008-GongC #graph #learning #online #optimisation #realtime #segmentation
- Real-time foreground segmentation on GPUs using local online learning and global graph cut optimization (MG, LC), pp. 1–4.
- ICPR-2008-Gonzalez-AguirreABD #geometry #graph #modelling #self #visual notation
- Model-based visual self-localization using geometry and graphs (DIGA, TA, EBC, RD), pp. 1–5.
- ICPR-2008-GuehamBC #automation #classification #correlation #forensics
- Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
- ICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #video
- An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
- ICPR-2008-GuoYZZY #embedded #markov #random
- Face super-resolution using 8-connected Markov Random Fields with embedded prior (KG, XY, RZ, GZ, SY), pp. 1–4.
- ICPR-2008-HahnKW #3d #algorithm #estimation
- Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm (MH, LK, CW), pp. 1–4.
- ICPR-2008-HainesW #random
- Combining shape-from-shading and stereo using Gaussian-Markov random fields (TSFH, RCW), pp. 1–4.
- ICPR-2008-HanYJ #evaluation #online
- Online feature evaluation for object tracking using Kalman Filter (ZH, QY, JJ), pp. 1–4.
- ICPR-2008-HidakaK #feature model #optimisation
- Non-Neighboring Rectangular Feature selection using Particle Swarm Optimization (AH, TK), pp. 1–4.
- ICPR-2008-HortaMF #algorithm #clustering #comparison #image
- A comparison of clustering fully polarimetric SAR images using SEM algorithm and G0P mixture modelwith different initializations (MMH, NDAM, ACF), pp. 1–4.
- ICPR-2008-HossainMJY #adaptation #identification #invariant
- Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
- ICPR-2008-HsiaoCC #recognition
- Human action recognition using temporal-state shape contexts (PCH, CSC, LWC), pp. 1–4.
- ICPR-2008-HuangST #detection #video
- Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
- ICPR-2008-HuAS08a #learning
- Learning motion patterns in crowded scenes using motion flow field (MH, SA, MS), pp. 1–5.
- ICPR-2008-HuSM #categorisation #clustering
- Categorization using semi-supervised clustering (JH, MS, AM), pp. 1–4.
- ICPR-2008-IbrahimG #online #verification
- On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
- ICPR-2008-Ilic #recognition
- Object labeling for recognition using vocabulary trees (SI), pp. 1–4.
- ICPR-2008-IzadiS #robust
- Robust region-based background subtraction and shadow removing using color and gradient information (MI, PS), pp. 1–5.
- ICPR-2008-JiaDQA #3d #estimation #metric
- Directionality measurement and illumination estimation of 3D surface textures by using mojette transform (PJ, JD, LQ, FA), pp. 1–4.
- ICPR-2008-KaholV #analysis #modelling #process
- Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
- ICPR-2008-KangKNN #image #multi #recognition #segmentation
- Multiband image segmentation and object recognition using texture filter banks (YK, KK, TN, YN), pp. 1–4.
- ICPR-2008-KarnickMP #approach #classification #concept #incremental #learning #multi
- Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
- ICPR-2008-KashimaHRS #clustering #distance
- K-means clustering of proportional data using L1 distance (HK, JH, BKR, MS), pp. 1–4.
- ICPR-2008-KasuyaKKO #estimation #robust
- Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
- ICPR-2008-KatayamaUS #coordination #online #recognition
- A new HMM for on-line character recognition using pen-direction and pen-coordinate features (YK, SU, HS), pp. 1–4.
- ICPR-2008-KazuiMMF #detection #matrix
- Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
- ICPR-2008-KimS #consistency #detection #sequence #video
- Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
- ICPR-2008-Kita #case study #detection #image
- A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
- ICPR-2008-KleinLM
- Preceding car tracking using belief functions and a particle filter (JK, CL, PM), pp. 1–4.
- ICPR-2008-KonKAT #adaptation #detection #interactive #realtime
- Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
- ICPR-2008-LachezeB #image #locality
- Image sampling for localization using entropy (LL, RB), pp. 1–4.
- ICPR-2008-LeeWN #detection #performance
- Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
- ICPR-2008-LiDM #feature model #learning #locality
- Localized feature selection for Gaussian mixtures using variational learning (YL, MD, YM), pp. 1–4.
- ICPR-2008-LinG #infinity
- Depth recovery using defocus blur at infinity (HYL, KDG), pp. 1–4.
- ICPR-2008-LiuS08a #detection #robust
- Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
- ICPR-2008-LiYWS #invariant
- Bi-model tracking of object of interest using invariant spatiogram descriptor (JL, WYY, JGW, WS), pp. 1–4.
- ICPR-2008-Machucho-CadenaCB
- Rendering of brain tumors using endoneurosonography (RMC, SdlCR, EBC), pp. 1–4.
- ICPR-2008-MakiHM #image
- Tracking features on a moving object using local image bases (AM, YH, TM), pp. 1–5.
- ICPR-2008-MandalW #recognition
- Face recognition using curvelet based PCA (TM, QMJW), pp. 1–4.
- ICPR-2008-MaruyamaKYT #3d #locality
- 3D object localization based on occluding contour using STL CAD model (KM, YK, TY, FT), pp. 1–4.
- ICPR-2008-MeiS #image #parametricity #statistics
- Unsupervised image embedding using nonparametric statistics (GM, CRS), pp. 1–4.
- ICPR-2008-MirzaeiR #clustering #transitive
- Combining hierarchical clusterings using min-transitive closure (AM, MR), pp. 1–4.
- ICPR-2008-MohantaSC #detection #multi
- Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
- ICPR-2008-MooreSLD #image #segmentation #top-down
- Top down image segmentation using congealing and graph-cut (DM, JS, SL, BAD), pp. 1–4.
- ICPR-2008-MunizCR #classification #independence
- Use of band ratioing for building illumination independent texture classification systems (RM, JAC, MRS), pp. 1–4.
- ICPR-2008-MuraiF #bound #detection #video
- Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
- ICPR-2008-OkaKXLW #authentication #named #similarity #sketching
- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
- ICPR-2008-OnishiTA #3d #estimation #image
- 3D human posture estimation using the HOG features from monocular image (KO, TT, YA), pp. 1–4.
- ICPR-2008-PaclikLND #analysis #estimation #multi
- Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
- ICPR-2008-PalaioB #adaptation #multi
- Multi-object tracking using an adaptive transition model particle filter with region covariance data association (HP, JB), pp. 1–4.
- ICPR-2008-PanBS #detection #image #representation
- Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
- ICPR-2008-PengXXD #recognition
- Face recognition using anisotropic dual-tree complex wavelet packets (YP, XX, WX, QD), pp. 1–4.
- ICPR-2008-PohK #authentication #bound #fault #multimodal #on the
- On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
- ICPR-2008-RebiereAD #image
- Image mosaicing using local optical flow registration (NR, MFAF, FD), pp. 1–5.
- ICPR-2008-Rokui
- Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
- ICPR-2008-RyooA #fuzzy #nondeterminism #process
- Human activities: Handling uncertainties using fuzzy time intervals (MSR, JKA), pp. 1–5.
- ICPR-2008-SahaB #clustering #multi #symmetry
- A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
- ICPR-2008-SanromaSA #clique #graph
- Improving the matching of graphs generated from shapes by the use of procrustes distances into a clique-based MAP formulation (GS, FS, RA), pp. 1–4.
- ICPR-2008-SekiH #3d #multi #realtime
- Real-time 3D tracking using multiple sample points (AS, HH), pp. 1–4.
- ICPR-2008-ShenCH #image #retrieval
- Face image retrieval by using Haar features (BCS, CSC, HHH), pp. 1–4.
- ICPR-2008-ShenCLB #random
- Stereo matching using random walks (RS, IC, XL, AB), pp. 1–4.
- ICPR-2008-ShenZL #detection #higher-order #programming
- Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
- ICPR-2008-ShinK #algorithm
- Enhanced Resolution-aware Fitting algorithm using interpolation operator (JS, DK), pp. 1–4.
- ICPR-2008-ShivakumaraHT #detection #performance #video
- Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
- ICPR-2008-SinghNGBSP #hybrid #random
- Hybrid SVM — Random Forest classication system for oral cancer screening using LIF spectra (RKS, SKN, LG, SB, CS, KMP), pp. 1–4.
- ICPR-2008-Stelldinger #re-engineering
- Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting (PS), pp. 1–4.
- ICPR-2008-SugaFTA #graph #recognition #segmentation
- Object recognition and segmentation using SIFT and Graph Cuts (AS, KF, TT, YA), pp. 1–4.
- ICPR-2008-SugimotoO #array #image #synthesis
- Virtual focusing image synthesis for user-specified image region using camera array (SS, MO), pp. 1–4.
- ICPR-2008-SukumarBPKA #locality #multi #nondeterminism
- Uncertainty minimization in multi-sensor localization systems using model selection theory (SRS, HB, DLP, AK, MAA), pp. 1–4.
- ICPR-2008-SuS #generative #modelling
- Generative models for fingerprint individuality using ridge models (CS, SNS), pp. 1–4.
- ICPR-2008-SuzukiSZ #network
- Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD) (KS, ZS, JZ), pp. 1–4.
- ICPR-2008-TaketomiSY #database #estimation #realtime
- Real-time camera position and posture estimation using a feature landmark database with priorities (TT, TS, NY), pp. 1–4.
- ICPR-2008-ThomeeHBL #retrieval
- Using an artificial imagination for texture retrieval (BT, MJH, EMB, MSL), pp. 1–4.
- ICPR-2008-Trujillo-RomeroD #pseudo
- Registration by using a pseudo color attribute (FTR, MD), pp. 1–4.
- ICPR-2008-TsolakisFD #framework #performance
- A framework for efficient correspondence using feature interrelations (AGT, MF, AD), pp. 1–4.
- ICPR-2008-TsuchiyaF #feature model
- A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
- ICPR-2008-UedaT #locality #on the #scalability
- On the scalability of robot localization using high-dimensional features (TU, KT), pp. 1–4.
- ICPR-2008-UkitaKK
- IBR-based free-viewpoint imaging of a complex scene using few cameras (NU, SK, MK), pp. 1–4.
- ICPR-2008-VajariaSK #multi #retrieval
- Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
- ICPR-2008-Vega-PonsRV #algorithm #segmentation #set
- Active contour algorithm for texture segmentation using a texture feature set (SVP, JLGR, OLV), pp. 1–4.
- ICPR-2008-WachenfeldTJ #recognition #robust
- Robust recognition of 1-D barcodes using camera phones (SW, ST, XJ), pp. 1–4.
- ICPR-2008-WangC #classification #semantics
- Film shot classification using directing semantics (HLW, LFC), pp. 1–4.
- ICPR-2008-WangM #invariant #probability #recognition #similarity
- Scale invariant face recognition using probabilistic similarity measure (ZW, ZM), pp. 1–4.
- ICPR-2008-WangTHW #bound
- Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
- ICPR-2008-WatanabeIHY #algorithm #performance #reduction #video
- A fast algorithm of video super-resolution using dimensionality reduction by DCT and example selection (KW, YI, TH, MY), pp. 1–5.
- ICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social
- Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
- ICPR-2008-WongCF #adaptation #image
- Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
- ICPR-2008-WuF #3d #classification #learning #multi
- Multiple view based 3D object classification using ensemble learning of local subspaces (JW, KF), pp. 1–4.
- ICPR-2008-XiaoL #higher-order
- Improvement on Mean Shift based tracking using second-order information (LX, PL), pp. 1–4.
- ICPR-2008-XiaoWH #graph #invariant #recognition
- Object recognition using graph spectral invariants (XB, RCW, ERH), pp. 1–4.
- ICPR-2008-YamaguchiWNN #estimation #image #sequence
- Road region estimation using a sequence of monocular images (KY, AW, TN, YN), pp. 1–4.
- ICPR-2008-YangB #algorithm #fault #sketching
- Curve fitting algorithm using iterative error minimization for sketch beautification (JY, HB), pp. 1–4.
- ICPR-2008-YangQ #analysis #component #detection #independence #network
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- ICPR-2008-YangYWY #fuzzy #recognition
- Face recognition using Complete Fuzzy LDA (WY, HY, JW, JY), pp. 1–4.
- ICPR-2008-YanZ #correlation #multimodal
- Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
- ICPR-2008-YaoADTHM
- Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT (JY, NA, AD, AMTD, OMH, JM), pp. 1–4.
- ICPR-2008-YaoCAPKA #probability
- Sensor planning for PTZ cameras using the probability of camera overload (YY, CHC, BRA, DLP, AK, MAA), pp. 1–5.
- ICPR-2008-YenCWWC #video
- A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
- ICPR-2008-YiAC #invariant #kernel
- Orientation and scale invariant mean shift using object mask-based kernel (KMY, HSA, JYC), pp. 1–4.
- ICPR-2008-YingZ #detection #performance
- Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
- ICPR-2008-ZareG #detection #process
- Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
- ICPR-2008-ZhangYDG #recognition
- Handwritten Chinese character recognition using Local Discriminant Projection with Prior Information (HZ, JY, WD, JG), pp. 1–4.
- ICPR-2008-ZhaoG #multi #recognition
- Establishing point correspondence using multidirectional binary pattern for face recognition (SZ, YG), pp. 1–4.
- ICPR-2008-ZhongYSCG #clustering
- Hierarchical background subtraction using local pixel clustering (BZ, HY, SS, XC, WG), pp. 1–4.
- ICPR-2008-ZhouWS #classification #process #recognition
- Human motion recognition using Gaussian Processes classification (HZ, LW, DS), pp. 1–4.
- ICPR-2008-ZhuangZHH #estimation #markov
- Face age estimation using patch-based hidden Markov model supervectors (XZ, XZ, MHJ, TSH), pp. 1–4.
- ICPR-2008-ZitouniSOD #algorithm #graph #image #ranking #web
- Re-ranking of web image search results using a graph algorithm (HZ, SGS, DO, PD), pp. 1–4.
- KDD-2008-CaroCS
- Using tagflake for condensing navigable tag hierarchies from tag clouds (LDC, KSC, MLS), pp. 1069–1072.
- KDD-2008-ChowGS #detection #privacy
- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
- KDD-2008-Christen #automation #classification #nearest neighbour
- Automatic record linkage using seeded nearest neighbour and support vector machine classification (PC), pp. 151–159.
- KDD-2008-GallagherTEF #classification #network
- Using ghost edges for classification in sparsely labeled networks (BG, HT, TER, CF), pp. 256–264.
- KDD-2008-GrossmanG #data mining #mining #performance
- Data mining using high performance data clouds: experimental studies using sector and sphere (RLG, YG), pp. 920–927.
- KDD-2008-HallSM #dependence
- Unsupervised deduplication using cross-field dependencies (RH, CAS, AM), pp. 310–317.
- KDD-2008-HoT #automation #multi
- Automated cyclone discovery and tracking using knowledge sharing in multiple heterogeneous satellite data (SSH, AT), pp. 928–936.
- KDD-2008-KoenigsteinST #analysis #query #string
- Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
- KDD-2008-LaxmanTW #generative #modelling #predict #sequence
- Stream prediction using a generative model based on frequent episodes in event sequences (SL, VT, RWW), pp. 453–461.
- KDD-2008-MelvilleRL #modelling #web
- Customer targeting models using actively-selected web content (PM, SR, RDL), pp. 946–953.
- KDD-2008-SarmaGI #query
- Bypass rates: reducing query abandonment using negative inferences (ADS, SG, SI), pp. 177–185.
- KDD-2008-SatoYN #graph #information management #parametricity #semantics #word
- Knowledge discovery of semantic relationships between words using nonparametric bayesian graph model (IS, MY, HN), pp. 587–595.
- KDD-2008-ShengPI #data mining #mining #multi #quality
- Get another label? improving data quality and data mining using multiple, noisy labelers (VSS, FJP, PGI), pp. 614–622.
- KDD-2008-WangD #classification #kernel #semantics #wiki
- Building semantic kernels for text classification using wikipedia (PW, CD), pp. 713–721.
- KDD-2008-YuJ #kernel
- Training structural svms with kernels using sampled cuts (CNJY, TJ), pp. 794–802.
- KDD-2008-ZengMLBM #analysis #predict
- Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
- KR-2008-DohertyS #reasoning
- Reasoning with Qualitative Preferences and Cardinalities using Generalized Circumscription (PD, AS), pp. 560–570.
- KR-2008-MotikGHS #graph #representation
- Representing Structured Objects using Description Graphs (BM, BCG, IH, US), pp. 296–306.
- RecSys-2008-BogersB #recommendation
- Recommending scientific articles using citeulike (TB, AvdB), pp. 287–290.
- RecSys-2008-KagieWG #difference
- Choosing attribute weights for item dissimilarity using clikstream data with an application to a product catalog map (MK, MCvW, PJFG), pp. 195–202.
- RecSys-2008-Kwon #rating #recommendation
- Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
- RecSys-2008-ShepitsenGMB #clustering #personalisation #recommendation #social
- Personalized recommendation in social tagging systems using hierarchical clustering (AS, JG, BM, RDB), pp. 259–266.
- RecSys-2008-ZanardiC #ranking #recommendation #social
- Social ranking: uncovering relevant content using tag-based recommender systems (VZ, LC), pp. 51–58.
- SEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability
- Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
- SEKE-2008-BalushiSPCL #identification #ontology #quality
- Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
- SEKE-2008-Barros #information management #predict
- Predicting Software Project Size Using Project Generated Information (MdOB), pp. 149–154.
- SEKE-2008-BrandlFW #modelling #reasoning #testing
- Coverage-based Testing Using Qualitative Reasoning Models (HB, GF, FW), pp. 393–398.
- SEKE-2008-CuiSXM #architecture #design #reuse
- A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
- SEKE-2008-DasguptaEFKSV #design #fault tolerance #grid #standard
- Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy (GD, OE, LF, SK, SMS, BV), pp. 814–819.
- SEKE-2008-DuZR #concept analysis #release planning
- Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
- SEKE-2008-FilhoV #testing #web #web service #xml
- Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
- SEKE-2008-FraserWW #automaton #testing
- Using Observer Automata to Select Test Cases for Test Purposes (GF, MW, FW), pp. 709–714.
- SEKE-2008-HittleG #fault #file system #injection #testing
- Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
- SEKE-2008-KimBBSA #behaviour #named #visualisation
- VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
- SEKE-2008-KornerG #automation #ontology
- Improving Automatic Model Creation Using Ontologies (SJK, TG), pp. 691–696.
- SEKE-2008-LucasSM #classification #personalisation #recommendation #towards
- Comparing the Use of Traditional and Associative Classifiers towards Personalized Recommendations (JPL, SS, MNMG), pp. 607–612.
- SEKE-2008-MahoneyE #monitoring
- Using Scenario Monitoring to Address State Based Crosscutting Concerns (MM, TE), pp. 581–586.
- SEKE-2008-MarquesMNF #approach #interface #ontology #semantics #web #web service
- Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
- SEKE-2008-MuhlenfeldMMS #execution #modelling #ontology #process
- Ontology-based Process Modeling and Execution Using STEP/EXPRESS (AM, WM, FM, MS), pp. 935–940.
- SEKE-2008-ParkK #automaton #bound #constraints #lts #model checking
- Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
- SEKE-2008-ReddyreddyX #xml
- Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
- SEKE-2008-TekbacakTD #approach #certification #data access #security #semantics
- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
- SEKE-2008-ZhongYAF
- Ontology-learning Supported Sematic Search Using Cooperative Agents (CZ, Z(Y, MA, BHF), pp. 123–128.
- SIGIR-2008-BalogRW #modelling #retrieval
- Bloggers as experts: feed distillation using expert retrieval models (KB, MdR, WW), pp. 753–754.
- SIGIR-2008-Banerjee #classification #corpus #modelling #topic
- Improving text classification accuracy using topic modeling over an additional corpus (SB), pp. 867–868.
- SIGIR-2008-BenderskyK #graph #ranking
- Re-ranking search results using document-passage graphs (MB, OK), pp. 853–854.
- SIGIR-2008-BuscherDE #feedback #query
- Query expansion using gaze-based feedback on the subdocument level (GB, AD, LvE), pp. 387–394.
- SIGIR-2008-DingLLP #clustering #probability
- Posterior probabilistic clustering using NMF (CHQD, TL, DL, WP), pp. 831–832.
- SIGIR-2008-DruckMM #learning
- Learning from labeled features using generalized expectation criteria (GD, GSM, AM), pp. 595–602.
- SIGIR-2008-Gan #approach #query
- Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
- SIGIR-2008-GengLQALS #nearest neighbour #query #ranking
- Query dependent ranking using K-nearest neighbor (XG, TYL, TQ, AA, HL, HYS), pp. 115–122.
- SIGIR-2008-GuanWCBW #crawling #effectiveness #estimation #online #topic
- Guide focused crawler efficiently and effectively using on-line topical importance estimation (ZG, CW, CC, JB, JW), pp. 757–758.
- SIGIR-2008-HeMO #metric #retrieval
- Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
- SIGIR-2008-HeMO08a #ranking
- Ranking opinionated blog posts using OpinionFinder (BH, CM, IO), pp. 727–728.
- SIGIR-2008-JiangN #video #visual notation
- Bag-of-visual-words expansion using visual relatedness for video indexing (YGJ, CWN), pp. 769–770.
- SIGIR-2008-JohoHJ #documentation #summary
- Emulating query-biased summaries using document titles (HJ, DH, JMJ), pp. 709–710.
- SIGIR-2008-KapteinLHK #modelling #web
- Using parsimonious language models on web data (RK, RL, DH, JK), pp. 763–764.
- SIGIR-2008-PengL #analysis #evolution #topic
- Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
- SIGIR-2008-TanWC #detection #sentiment
- Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
- SIGIR-2008-TrieschniggMRK #concept #modelling
- Measuring concept relatedness using language models (DT, EM, MdR, WK), pp. 823–824.
- SIGIR-2008-VelosoAGM #learning #rank
- Learning to rank at query-time using association rules (AV, HMdA, MAG, WMJ), pp. 267–274.
- SIGIR-2008-WangH #documentation #retrieval
- Improving biomedical document retrieval using domain knowledge (SW, MH), pp. 785–786.
- SIGIR-2008-WanY #analysis #clustering #multi #summary
- Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
- SIGIR-2008-YuZXG #categorisation #design #learning
- trNon-greedy active learning for text categorization using convex ansductive experimental design (KY, SZ, WX, YG), pp. 635–642.
- BX-2008-Hidaka1 #bidirectional #graph transformation
- Bidirectional Graph Transformation using UnCAL (SH), p. 43.
- ECMDA-FA-2008-BercoviciFW #architecture
- From Business Architecture to SOA Realization Using MDD (AB, FF, AJW), pp. 381–392.
- ECMDA-FA-2008-NogueraD #domain model #framework #modelling #validation
- Annotation Framework Validation Using Domain Models (CN, LD), pp. 48–62.
- ICMT-2008-VignagaPB #contract #interactive #model transformation
- Extracting Object Interactions Out of Software Contracts Using Model Transformations (AV, DP, MCB), pp. 245–259.
- MoDELS-2008-El-BoussaidiM #constraints #design #detection
- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
- MoDELS-2008-OberCL #behaviour #composition #modelling #slicing
- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
- MoDELS-2008-RosseboR #composition #policy #specification #uml
- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
- MoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
- Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
- SPLC-2008-GustavssonA #embedded #flexibility #product line
- Evaluating Flexibility in Embedded Automotive Product Lines Using Real Options (HG, JA), pp. 235–242.
- SPLC-2008-HartmannT #diagrams #feature model #multi #product line #variability
- Using Feature Diagrams with Context Variability to Model Multiple Product Lines for Software Supply Chains (HH, TT), pp. 12–21.
- MoDELS-2008-El-BoussaidiM #constraints #design #detection
- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
- MoDELS-2008-OberCL #behaviour #composition #modelling #slicing
- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
- MoDELS-2008-RosseboR #composition #policy #specification #uml
- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
- MoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
- Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
- TOOLS-EUROPE-2008-CohenGM #program transformation
- Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
- AdaEurope-2008-Evequoz #concurrent #performance #word
- Practical, Fast and Simple Concurrent FIFO Queues Using Single Word Synchronization Primitives (CE), pp. 59–72.
- PADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming
- Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
- PEPM-2008-GillenwaterMSZTGO #hardware #static typing
- Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
- PEPM-2008-ZhuK #library
- Specialization for applications using shared libraries (PZ, SCK), pp. 159–168.
- PLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code
- Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
- POPL-2008-LahiriQ #precise #smt #verification
- Back to the future: revisiting precise program verification using SMT solvers (SKL, SQ), pp. 171–182.
- PPDP-2008-MoralesCH #automaton #generative
- Comparing tag scheme variations using an abstract machine generator (JFM, MC, MVH), pp. 32–43.
- PPDP-2008-PlasmeijerJKA #ajax #declarative #evaluation #workflow
- Declarative Ajax and client side evaluation of workflows using iTasks (RP, JMJ, PWMK, PA), pp. 56–66.
- QAPL-2008-Smith #abstract interpretation #imperative #probability #source code
- Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions (MJAS), pp. 43–59.
- SAS-2008-AllamigeonGG #invariant
- Inferring Min and Max Invariants Using Max-Plus Polyhedra (XA, SG, EG), pp. 189–204.
- SAS-2008-LalR #data flow #multi #query
- Solving Multiple Dataflow Queries Using WPDSs (AL, TWR), pp. 93–109.
- SAS-2008-PrabhuS #analysis #array #java #pointer
- Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
- SAS-2008-RamanathanSGJ #protocol
- Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
- SIGAda-2008-Moore #ada
- A buffer container class hierarchy using Ada 2005 (BJM), pp. 57–74.
- SIGAda-2008-SwardW #architecture #enterprise #multi
- A multi-language service-oriented architecture using an enterprise service bus (RES, KJW), pp. 85–90.
- RE-2008-Castro-HerreraDCM #data mining #elicitation #mining #process #recommendation #requirements #scalability
- Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes (CCH, CD, JCH, BM), pp. 165–168.
- RE-2008-FeatherHMU #analysis #deployment #requirements
- Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
- RE-2008-MavinNWML #requirements
- Using Scenarios to Discover Requirements for Engine Control Systems (AM, MN, PW, NAMM, PL), pp. 235–240.
- RE-2008-RifautD #assessment #framework #quality #requirements
- Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
- RE-2008-Szoke #automation #scheduling
- A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
- REFSQ-2008-SchlosserJM #database #requirements
- Using a Creativity Workshop to Generate Requirements for an Event Database Application (CS, SJ, NAMM), pp. 109–122.
- ASE-2008-AdnanGDZ #analysis #clustering #component #design #interface
- Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
- ASE-2008-AndreouP #estimation #fuzzy
- Software Cost Estimation using Fuzzy Decision Trees (ASA, EP), pp. 371–374.
- ASE-2008-BrichauKM #source code
- Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
- ASE-2008-CamachoM #automation #named
- APPAREIL: A Tool for Building Automated Program Translators Using Annotated Grammars (DOC, KM), pp. 489–490.
- ASE-2008-Hall #modelling #queue #realtime #specification #validation
- Validating Real Time Specifications using Real Time Event Queue Modeling (RJH), pp. 79–88.
- ASE-2008-KhalekELK #constraints #generative #relational #testing #theorem proving
- Query-Aware Test Generation Using a Relational Constraint Solver (SAK, BE, YOL, SK), pp. 238–247.
- ASE-2008-PortOM #requirements #simulation
- Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
- ASE-2008-RakamaricH #automation #axiom #static analysis
- Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
- ASE-2008-TurnerPKC #approach #automation #code generation #process #web
- An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
- FSE-2008-DragertDR #concurrent #generative
- Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
- FSE-2008-KoesnandarERHSS #metaprogramming #web
- Using assertions to help end-user programmers create dependable web macros (AK, SGE, GR, LH, CS, KTS), pp. 124–134.
- FSE-2008-KulturTB #estimation #memory management #named #network
- ENNA: software effort estimation using ensemble of neural networks with associative memory (YK, BT, ABB), pp. 330–338.
- FSE-2008-OsterweilCEPWBH #dataset #experience #process #workflow
- Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
- FSE-2008-YuWGB #composition #encoding #performance #summary #verification #web #web service
- Modular verification of web services using efficient symbolic encoding and summarization (FY, CW, AG, TB), pp. 192–202.
- ICSE-2008-BunyakiatiFSC #standard #testing #uml
- Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
- ICSE-2008-GannodBH #education #re-engineering
- Using the inverted classroom to teach software engineering (GCG, JEB, MTH), pp. 777–786.
- ICSE-2008-SankaranarayananIG #induction #library #logic programming #mining #specification
- Mining library specifications using inductive logic programming (SS, FI, AG), pp. 131–140.
- ICSE-2008-SicardBP #architecture #component #self
- Using components for architecture-based management: the self-repair case (SS, FB, NDP), pp. 101–110.
- ICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language
- An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
- ICSE-2008-XuR #detection #java #memory management #precise #profiling
- Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
- ICSE-2008-YilmazPW #fault #locality
- Time will tell: fault localization using time spectra (CY, AMP, CW), pp. 81–90.
- ICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict
- Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
- SAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving
- Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
- SAC-2008-AbreuGZG #automation #fault #invariant #locality
- Automatic software fault localization using generic program invariants (RA, AG, PZ, AJCvG), pp. 712–717.
- SAC-2008-AgulhariSB
- Compressing electrocardiogram signals using parameterized wavelets (CMA, RMRS, ISB), pp. 1348–1352.
- SAC-2008-AhamedRH #architecture #distributed #identification #scalability
- Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
- SAC-2008-AiresSM
- Optical flow using color information: preliminary results (KRTA, AMS, AADM), pp. 1607–1611.
- SAC-2008-AndresAN #experience #formal method #information management
- Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
- SAC-2008-AntonellisMT #clustering #documentation #named #summary #xml
- XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries (PA, CM, NT), pp. 1081–1088.
- SAC-2008-AntonyBHP #approach #biology #interactive #mining #validation
- Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
- SAC-2008-AraujoPFLO #distributed #named
- FlagelLink: a decision support system for distributed flagellar data using data warehouse (FFA, ÂMAP, KMF, BFL, DMO), pp. 1268–1272.
- SAC-2008-BadishiK #adaptation
- Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
- SAC-2008-BraghettoFP #algebra #execution #process
- Using process algebra to control the execution of business processes (KRB, JEF, CP), pp. 128–129.
- SAC-2008-BroiniziFG #framework #requirements
- Using annotations in the naked objects framework to explore data requirements (MEBB, JEF, AG), pp. 630–637.
- SAC-2008-BuenoWJ #automation #generative #testing
- Automatic test data generation using particle systems (PMSB, WEW, MJ), pp. 809–814.
- SAC-2008-BussBSE #analysis #flexibility #graph #pointer
- Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
- SAC-2008-CarvalhoLGS #identification #programming #search-based
- Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
- SAC-2008-ChongKLG #energy #network
- Using association rules for energy conservation in wireless sensor networks (SKC, SK, SWL, MMG), pp. 971–975.
- SAC-2008-CorreaIZF #analysis #image #mobile
- Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
- SAC-2008-Denner-Broser #algorithm #analysis #problem
- An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
- SAC-2008-DingMH #approach #refinement #specification
- An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
- SAC-2008-FonsecaVM #data access #detection #online
- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
- SAC-2008-GarciaH #analysis #functional #metric
- Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
- SAC-2008-GarciaT #security #semantics #web #web service
- Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
- SAC-2008-HieronsJUY #adaptation #sequence
- Using adaptive distinguishing sequences in checking sequence constructions (RMH, GVJ, HU, HY), pp. 682–687.
- SAC-2008-KeyvanpourA #approach #image #interactive #retrieval #semantics
- A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
- SAC-2008-KuangZ #algorithm #detection
- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
- SAC-2008-LiG #detection #network #optimisation
- TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
- SAC-2008-LuizPBR #approach #mobile #programming #search-based
- A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
- SAC-2008-MaagG #approach #protocol #self #testing
- Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
- SAC-2008-MatosBP #recognition
- Face recognition using DCT coefficients selection (FMdSM, LVB, JvdP), pp. 1753–1757.
- SAC-2008-MengleG #algorithm #ambiguity #classification #feature model
- Using ambiguity measure feature selection algorithm for support vector machine classifier (SSRM, NG), pp. 916–920.
- SAC-2008-MengleGP #category theory #classification
- Discovering relationships among categories using misclassification information (SSRM, NG, AP), pp. 932–937.
- SAC-2008-MorimotoO #metric #video
- Eyelid measurements using digital video processing (CHM, TFdO), pp. 1369–1373.
- SAC-2008-Nassiri #3d #e-commerce #trust
- Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
- SAC-2008-NecaskyP #concept #design #semantics #web #web service
- Designing semantic web services using conceptual model (MN, JP), pp. 2243–2247.
- SAC-2008-OsadaOKKK #diagrams #metric
- Proposing metrics of difficulty of domain knowledge using usecase diagrams (AO, DO, NK, HK, KK), pp. 624–629.
- SAC-2008-PavelecJBO #identification #independence
- Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
- SAC-2008-PereiraAGS #architecture #configuration management #hybrid
- Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture (MMP, SRFdA, BCdO, ISS), pp. 1552–1553.
- SAC-2008-RadtkeSW #algorithm #classification
- Using the RRT algorithm to optimize classification systems for handwritten digits and letters (PVWR, RS, TW), pp. 1748–1752.
- SAC-2008-ReynosoCGP #diagrams #metric #ocl #statechart #uml
- Formal definition of measures for UML statechart diagrams using OCL (LR, JACL, MG, MP), pp. 846–847.
- SAC-2008-RochaR #animation #evaluation
- An evaluation of a collision handling system using sphere-trees for plausible rigid body animation (RdSR, MAFR), pp. 1241–1245.
- SAC-2008-SchobelP #case study #clustering #cpu #kernel #research #scheduling
- Kernel-mode scheduling server for CPU partitioning: a case study using the Windows research kernel (MS, AP), pp. 1700–1704.
- SAC-2008-SuKZG #classification #collaboration #machine learning
- Imputation-boosted collaborative filtering using machine learning classifiers (XS, TMK, XZ, RG), pp. 949–950.
- SAC-2008-SungCM #clustering #concept #learning #lifecycle #ontology #performance #web
- Efficient concept clustering for ontology learning using an event life cycle on the web (SS, SC, DM), pp. 2310–2314.
- SAC-2008-TanWWC #detection #problem #semantics
- Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
- SAC-2008-TierneyJ #ontology #semantics
- C-SAW---contextual semantic alignment of ontologies: using negative semantic reinforcement (BT, MJ), pp. 2346–2347.
- SAC-2008-VictorPB
- Context addressing using context-aware flooding (KV, JP, YB), pp. 1960–1961.
- SAC-2008-Willassen #calculus
- Using simplified event calculus in digital investigation (SYW), pp. 1438–1442.
- SAC-2008-XuWQ #modelling #verification
- Modeling and verifying BPEL using synchronized net (CX, HW, WQ), pp. 2358–2362.
- SAC-2008-YuiMUK #distributed #named #parallel #xquery
- XBird/D: distributed and parallel XQuery processing using remote proxy (MY, JM, SU, HK), pp. 1003–1007.
- SAC-2008-ZhangMD #feature model #fuzzy #image #retrieval #set
- Texture feature extraction and description using fuzzy set of main dominant directions of variable scales in content-based medical image retrieval (GZ, ZMM, LD), pp. 1760–1761.
- SAC-2008-ZhuDXW #documentation #image #linear
- Perspective rectification of camera-based document images using local linear structure (YZ, RD, BX, CW), pp. 451–452.
- LDTA-2007-AkessonEH08 #compilation #development #jastadd
- Development of a Modelica Compiler Using JastAdd (JÅ, TE, GH), pp. 117–131.
- LDTA-2007-HameyG08 #domain-specific language #experience #implementation #stratego
- Implementing a Domain-Specific Language Using Stratego/XT: An Experience Paper (LGCH, SG), pp. 37–51.
- GPCE-2008-ApelKB #aspect-oriented #functional #refactoring
- Program refactoring using functional aspects (SA, CK, DSB), pp. 161–170.
- GPCE-2008-Batory #modelling
- Using modern mathematics as an FOSD modeling language (DSB), pp. 35–44.
- GPCE-2008-GottschlingL #c++ #compilation #concept #library #performance #reuse #robust #semantics
- Integrating semantics and compilation: using c++ concepts to develop robust and efficient reusable libraries (PG, AL), pp. 67–76.
- SLE-2008-LiangD #evaluation #model transformation #txl
- A Practical Evaluation of Using TXL for Model Transformation (HL, JD), pp. 245–264.
- SLE-2008-Nilsson-NymanEH #semiparsing
- Practical Scope Recovery Using Bridge Parsing (ENN, TE, GH), pp. 95–113.
- ASPLOS-2008-GummarajuCTR #manycore #named #programming
- Streamware: programming general-purpose multicore processors using streams (JG, JC, YT, MR), pp. 297–307.
- CASE-2008-AddadA #algebra #architecture #evaluation #graph #modelling
- Modeling and response time evaluation of ethernet-based control architectures using timed event graphs and Max-Plus algebra (BA, SA), pp. 418–423.
- CASE-2008-Andoh #identification
- Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
- CASE-2008-ChoiJSKRKKSACC #automation #development #flexibility #framework #mobile #platform
- Development of flexible laboratory automation platform using Mobile Agents in the clinical laboratory (BC, SMJ, SHS, JK, SR, MCK, JK, WHS, KTA, WC, HRC), pp. 918–923.
- CASE-2008-DaiCL
- Robot tracking using vision and laser sensors (WD, AC, PXL), pp. 169–174.
- CASE-2008-HanX #identification #multi #network
- Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
- CASE-2008-HooverMR #3d #detection #image #matrix
- Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
- CASE-2008-HouZWCT #adaptation #approach #fuzzy #nondeterminism
- Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
- CASE-2008-LiuSXYLZF #agile #approach
- Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
- CASE-2008-MitaniH #analysis #metric #symmetry
- Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
- CASE-2008-MittalYBB #difference #equation #modelling #multi #performance #probability
- Dynamics and performance modeling of multi-stage manufacturing systems using nonlinear stochastic differential equations (UM, HY, STSB, LGB), pp. 498–503.
- CASE-2008-NagleW #named
- GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
- CASE-2008-PonnambalamPMS #network
- Modified ART1 neural networks for cell formation using production data (SGP, RSP, SSM, SS), pp. 603–608.
- CASE-2008-RohPSYC0LC #flexibility
- Flexible docking mechanism using combination of magnetic force with error-compensation capability (SgR, JHP, YKS, KY, MC, HSK, HL, HRC), pp. 697–702.
- CASE-2008-SharmaBDC #assembly #generative #optimisation #sequence
- Generation of optimized robotic assembly sequence using ant colony optimization (SS, BBB, PD, BBC), pp. 894–899.
- CASE-2008-SrivastavaVK #combinator
- Procurement of global logistics services using combinatorial auctions (NKS, NV, SK), pp. 297–302.
- CASE-2008-TamadazteDFF #automation #multi #visual notation
- Automatic micromanipulation using multiscale visual servoing (BT, SD, GF, NLFP), pp. 977–982.
- CASE-2008-UnverM #automation #composition #design pattern #throughput
- Using architectural software patterns in support of controlling modular high throughput screening automation systems (HÖÜ, JM), pp. 912–917.
- CASE-2008-XuDAG #3d #random
- Motion planning for steerable needles in 3D environments with obstacles using rapidly-exploring Random Trees and backchaining (JX, VD, RA, KG), pp. 41–46.
- CASE-2008-ZhuCS #markov #recognition
- Human intention recognition in Smart Assisted Living Systems using a Hierarchical Hidden Markov Model (CZ, QC, WS), pp. 253–258.
- CC-2008-ZhaoRARW #debugging #how #performance
- How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
- DAC-2008-BharathES #algorithm #automation #search-based
- Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM (KB, EE, MS), pp. 560–565.
- DAC-2008-BrockmanLKKM #array #design #memory management #multi #programmable
- Design of a mask-programmable memory/multiplier array using G4-FET technology (JBB, SL, PMK, AK, MMM), pp. 337–338.
- DAC-2008-CookS #design #predict
- Predictive design space exploration using genetically programmed response surfaces (HC, KS), pp. 960–965.
- DAC-2008-CoskunRG #learning #multi #online
- Temperature management in multiprocessor SoCs using online learning (AKC, TSR, KCG), pp. 890–893.
- DAC-2008-DargaSM #performance #symmetry
- Faster symmetry discovery using sparsity of symmetries (PTD, KAS, ILM), pp. 149–154.
- DAC-2008-DasikaDFMB
- DVFS in loop accelerators using BLADES (GSD, SD, KF, SAM, DMB), pp. 894–897.
- DAC-2008-GaoKKLAM #estimation #hybrid #multi #performance #simulation
- Multiprocessor performance estimation using hybrid simulation (LG, KK, SK, RL, GA, HM), pp. 325–330.
- DAC-2008-GulatiK #fault #simulation #towards
- Towards acceleration of fault simulation using graphics processing units (KG, SPK), pp. 822–827.
- DAC-2008-JinC #benchmark #case study #metric #performance #simulation #statistics
- Improve simulation efficiency using statistical benchmark subsetting: an ImplantBench case study (ZJ, ACC), pp. 970–973.
- DAC-2008-JoshiCSBA #power management #reduction
- Leakage power reduction using stress-enhanced layouts (VJ, BC, DS, DB, KA), pp. 912–917.
- DAC-2008-Ng #challenge #modelling #verification
- Challenges in using system-level models for RTL verification (KN), pp. 812–815.
- DAC-2008-OzisikyilmazMC #design #machine learning #performance
- Efficient system design space exploration using machine learning techniques (BÖ, GM, ANC), pp. 966–969.
- DAC-2008-PaulB #configuration management #memory management #performance #resource management
- Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
- DAC-2008-SauerGL #framework #functional #modelling #named #performance
- SystemClick: a domain-specific framework for early exploration using functional performance models (CS, MG, HPL), pp. 480–485.
- DAC-2008-TamPB #analysis #automation #layout #locality #precise
- Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
- DAC-2008-YuB #fault #multi
- Multiple defect diagnosis using no assumptions on failing pattern characteristics (XY, RD(B), pp. 361–366.
- DAC-2008-ZhangYZDKDKC #optimisation #power management
- Low power passive equalizer optimization using tritonic step response (LZ, WY, HZ, AD, GAK, DMD, ESK, CKC), pp. 570–573.
- DATE-2008-BadarogluDLC
- Calibration of Integrated CMOS Hall Sensors Using Coil-on-Chip in ATE Environment (MB, GD, FL, OC), pp. 873–878.
- DATE-2008-BrisolaraORLCW #code generation #uml
- Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
- DATE-2008-ChoiC #testing
- Digital bit stream jitter testing using jitter expansion (HWC, AC), pp. 1468–1473.
- DATE-2008-CopeCL #configuration management #gpu #logic #memory management
- Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
- DATE-2008-CorderoK
- Clock Distribution Scheme using Coplanar Transmission Lines (VHCC, SPK), pp. 985–990.
- DATE-2008-FarahaniFS #architecture #network #scalability
- Scalable Architecture for on-Chip Neural Network Training using Swarm Intelligence (AFF, SMF, SS), pp. 1340–1345.
- DATE-2008-FeinsteinTM #detection #equivalence #logic
- Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
- DATE-2008-GhoshNR #adaptation #fault tolerance #novel
- A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking (SG, PN, KR), pp. 366–371.
- DATE-2008-KazmierskiZA #approximate #mobile #modelling #performance
- Efficient circuit-level modelling of ballistic CNT using piecewise non-linear approximation of mobile charge density (TJK, DZ, BMAH), pp. 146–151.
- DATE-2008-LiMM #concurrent #named #self
- CASP: Concurrent Autonomous Chip Self-Test Using Stored Test Patterns (YL, SM, SM), pp. 885–890.
- DATE-2008-Marques-SilvaP #algorithm #satisfiability
- Algorithms for Maximum Satisfiability using Unsatisfiable Cores (JMS, JP), pp. 408–413.
- DATE-2008-MuraliMAGBBM #manycore #optimisation #platform
- Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization (SM, AM, DA, RG, SPB, LB, GDM), pp. 110–115.
- DATE-2008-NagpalGK #approach #design
- A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
- DATE-2008-PakbazniaP
- Coarse-Grain MTCMOS Sleep Transistor Sizing Using Delay Budgeting (EP, MP), pp. 385–390.
- DATE-2008-ParkSP #embedded #execution
- Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
- DATE-2008-PlazaMB #constraints #generative #random
- Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
- DATE-2008-PradhanV #performance #synthesis
- Fast Analog Circuit Synthesis Using Sensitivity Based Near Neighbor Searches (AP, RV), pp. 523–526.
- DATE-2008-SchirnerD #modelling #scheduling
- Introducing Preemptive Scheduling in Abstract RTOS Models using Result Oriented Modeling (GS, RD), pp. 122–127.
- DATE-2008-SteinhorstH #model checking #specification
- Model Checking of Analog Systems using an Analog Specification Language (SS, LH), pp. 324–329.
- DATE-2008-TanQ #framework #markov #power management #probability
- A Framework of Stochastic Power Management Using Hidden Markov Model (YT, QQ), pp. 92–97.
- DATE-2008-ThoguluvaRC #architecture #performance #programmable #security
- Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
- DATE-2008-VillarJGK #specification
- Heterogeneous System-level Specification Using SystemC (EV, AJ, CG, TK).
- DATE-2008-YonedaF #functional #reuse
- Wrapper and TAM Co-Optimization for Reuse of SoC Functional Interconnects (TY, HF), pp. 1366–1369.
- DATE-2008-YuanHX
- Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
- DATE-2008-ZhangHXL #fault #manycore
- Defect Tolerance in Homogeneous Manycore Processors Using Core-Level Redundancy with Unified Topology (LZ, YH, QX, XL), pp. 891–896.
- DATE-2008-ZhouPB #analysis #generative #metric #modelling
- Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
- HPCA-2008-ChenMP #constraints #graph #memory management #runtime #validation
- Runtime validation of memory ordering using constraint graph checking (KC, SM, PP), pp. 415–426.
- HPCA-2008-ChungDKK #memory management #thread #transaction
- Thread-safe dynamic binary translation using transactional memory (JC, MD, HK, CK), pp. 279–289.
- HPCA-2008-KimGWB #analysis #performance
- System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
- HPCA-2008-LeeKMP #predict
- Performance-aware speculation control using wrong path usefulness prediction (CJL, HK, OM, YNP), pp. 39–49.
- HPDC-2008-CarreraSWTA
- Managing SLAs of heterogeneous workloads using dynamic application placement (DC, MS, IW, JT, EA), pp. 217–218.
- HPDC-2008-KhannaCKSSKF #data transfer #multi #network #optimisation
- Multi-hop path splitting and multi-pathing optimizations for data transfers over shared wide-area networks using gridFTP (GK, ÜVÇ, TMK, PS, JHS, RK, ITF), pp. 225–226.
- HPDC-2008-ManosMKCKT #distributed #performance
- Distributed mpi cross-site run performance using mpig (SM, MDM, OK, PVC, NTK, BRT), pp. 229–230.
- HPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety
- Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
- HPDC-2008-SotomayorKF #execution #virtual machine
- Combining batch execution and leasing using virtual machines (BS, KK, ITF), pp. 87–96.
- LCTES-2008-EbnerBSKWK
- Generalized instruction selection using SSA-graphs (DE, FB, BS, AK, PW, AK), pp. 31–40.
- OSDI-2008-BansalA
- Binary Translation Using Peephole Superoptimizers (SB, AA), pp. 177–192.
- OSDI-2008-YuIFBEGC #distributed #named
- DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language (YY, MI, DF, MB, ÚE, PKG, JC), pp. 1–14.
- OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security
- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
- PDP-2008-BerbecaruA #performance
- An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes (DB, LA), pp. 581–589.
- PDP-2008-ColmenarMGLH #modelling #probability
- Modelling Asynchronous Systems using Probability Distribution Functions (JMC, NM, OG, JL, JIH), pp. 3–11.
- PDP-2008-GoswamiG #contract
- Resource Selection in Grids Using Contract Net (KG, AG), pp. 105–109.
- PDP-2008-KecskemetiKTKD #automation #deployment
- Automatic Service Deployment Using Virtualisation (GK, PK, GT, TK, TD), pp. 628–635.
- PDP-2008-KrenekPKFSDSWM #analysis #multi #simulation
- Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
- PDP-2008-LouatiZ #network
- Personal Overlay Networks Management Using a P2P-based Publish/Subscribe Naming System (WL, DZ), pp. 95–99.
- PDP-2008-MerzPW #coordination #distributed #framework #network #simulation
- A Simulation Framework for Distributed Super-Peer Topology Construction Using Network Coordinates (PM, MP, SW), pp. 491–498.
- PDP-2008-TaillardGD #approach #framework #performance #visual notation
- A Graphical Framework for High Performance Computing Using An MDE Approach (JT, FG, JLD), pp. 165–173.
- PPoPP-2008-AnsariKJLKW #adaptation #algorithm #case study #concurrent #experience #memory management #transaction
- Experiences using adaptive concurrency in transactional memory with Lee’s routing algorithm (MA, CK, KJ, ML, CCK, IW), pp. 261–262.
- PPoPP-2008-ChengCHT #classification #manycore #platform #scalability
- Scalable packet classification using interpreting: a cross-platform multi-core solution (HC, ZC, BH, XT), pp. 33–42.
- PPoPP-2008-LevM #hardware #memory management #transaction
- Split hardware transactions: true nesting of transactions using best-effort hardware transactional memory (YL, JWM), pp. 197–206.
- PPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling
- Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
- PPoPP-2008-RyooRBSKH #evaluation #gpu #optimisation #parallel #performance #thread
- Optimization principles and application performance evaluation of a multithreaded GPU using CUDA (SR, CIR, SSB, SSS, DBK, WmWH), pp. 73–82.
- FASE-2008-AlrajehRU #behaviour #modelling
- Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
- FASE-2008-BergJR #similarity #state machine #testing
- Regular Inference for State Machines Using Domains with Equality Tests (TB, BJ, HR), pp. 317–331.
- FASE-2008-JurjensSY #analysis #automation #security
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- FoSSaCS-2008-GruberJ #bound #communication #complexity #regular expression
- Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
- STOC-2008-Ben-AroyaT #combinator #graph
- A combinatorial construction of almost-ramanujan graphs using the zig-zag product (ABA, ATS), pp. 325–334.
- STOC-2008-DeKSS #composition #integer #multi #performance
- Fast integer multiplication using modular arithmetic (AD, PPK, CS, RS), pp. 499–506.
- TACAS-2008-ChocklerGY #automation #performance #refinement
- Efficient Automatic STE Refinement Using Responsibility (HC, OG, AY), pp. 233–248.
- TACAS-2008-McMillan #generative #invariant #proving #quantifier
- Quantified Invariant Generation Using an Interpolating Saturation Prover (KLM), pp. 413–427.
- TACAS-2008-SankaranarayananDI #hybrid #model checking
- Symbolic Model Checking of Hybrid Systems Using Template Polyhedra (SS, TD, FI), pp. 188–202.
- CAV-2008-KashyapG
- Producing Short Counterexamples Using “Crucial Events” (SK, VKG), pp. 491–503.
- CAV-2008-KingS #congruence #equation #satisfiability
- Inferring Congruence Equations Using SAT (AK, HS), pp. 281–293.
- CSL-2008-Nguyen #proving
- Proving Infinitude of Prime Numbers Using Binomial Coefficients (PN), pp. 184–198.
- ICLP-2008-AlpuenteEI #dependence #termination
- Termination of Narrowing Using Dependency Pairs (MA, SE, JI), pp. 317–331.
- ICLP-2008-AnhRD #implementation
- An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
- ICLP-2008-Baral #information management #programming #reasoning #representation #set
- Using Answer Set Programming for Knowledge Representation and Reasoning: Future Directions (CB), pp. 69–70.
- ICLP-2008-BeniniBM #constraints #multi #platform #policy #programming #resource management
- Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
- ICLP-2008-CliffeVBP #animation #declarative #named #programming #set #visualisation
- ASPVIZ: Declarative Visualisation and Animation Using Answer Set Programming (OC, MDV, MB, JAP), pp. 724–728.
- ICLP-2008-EglyGW #framework #implementation #named #programming
- ASPARTIX: Implementing Argumentation Frameworks Using Answer-Set Programming (UE, SAG, SW), pp. 734–738.
- ICLP-2008-MontaliTACGLM #declarative #logic programming #specification #verification
- Verification from Declarative Specifications Using Logic Programming (MM, PT, MA, FC, MG, EL, PM), pp. 440–454.
- ICLP-2008-MuggletonST #bias #declarative #logic programming #named
- TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
- ICLP-2008-Santos #bias #declarative #logic programming #named
- TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
- ICLP-2008-Tsitovich #detection #model checking #security
- Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
- ICST-2008-HaslingGB #case study #modelling #requirements #testing #uml
- Model Based Testing of System Requirements using UML Use Case Models (BH, HG, KB), pp. 367–376.
- ICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented
- A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
- ICST-2008-RingsNG #grid #testing #workflow
- Testing Grid Application Workflows Using TTCN-3 (TR, HN, JG), pp. 210–219.
- ICST-2008-SherriffW #composition #empirical #impact analysis
- Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
- ICST-2008-WareWS #metric #predict
- The Use of Intra-Release Product Measures in Predicting Release Readiness (MPW, FGW, MS), pp. 230–237.
- IJCAR-2008-MouraB #effectiveness #logic #set
- Deciding Effectively Propositional Logic Using DPLL and Substitution Sets (LMdM, NB), pp. 410–425.
- ISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named
- Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
- ISSTA-2008-DoR #analysis #modelling #testing
- Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
- ISSTA-2008-JeffreyGG #fault #locality
- Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
- LICS-2008-Burel #deduction #first-order #representation #type system
- A First-Order Representation of Pure Type Systems Using Superdeduction (GB), pp. 253–263.
- MBT-2008-Jurjens #case study #modelling #security #testing
- Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
- SAT-2008-EibachPV #satisfiability
- Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
- SAT-2008-KottlerKS08a #bound #np-hard #satisfiability #subclass
- A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
- TestCom-FATES-2008-DangN #generative #hybrid #testing
- Using Disparity to Enhance Test Generation for Hybrid Systems (TD, TN), pp. 54–69.
- CBSE-2007-FornasierWG #component #composition #named #programming #runtime
- Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL (PF, JW, IG), pp. 227–241.
- ECSA-2007-FuentesGPV #architecture
- Using Connectors to Model Crosscutting Influences in Software Architectures (LF, NG, MP, JAV), pp. 292–295.
- ECSA-2007-OrtizPAAS #approach #architecture #case study #component #experience #framework
- Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, BÁ, PS), pp. 335–338.
- QoSA-2007-PaceC #architecture #design #quality
- Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
- WICSA-2007-RossoM #approach #architecture #knowledge-based #scalability
- Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
- DocEng-2007-Storey #documentation #folksonomy #navigation #ontology #taxonomy
- Navigating documents using ontologies, taxonomies and folksonomies (MADS), p. 2.
- DRR-2007-KimLT #documentation #identification #online
- Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
- DRR-2007-Likforman-SulemS #network #recognition
- Recognition of degraded handwritten digits using dynamic Bayesian networks (LLS, MS).
- DRR-2007-ShettySBS #documentation #random #segmentation
- Segmentation and labeling of documents using conditional random fields (SS, HS, MJB, SNS).
- ECDL-2007-ChenWL #image
- Using Watermarks and Offline DRM to Protect Digital Images in DIAS (HYC, HAW, CLL), pp. 529–531.
- ECDL-2007-GortonFF #framework #generative #library #specification
- Specification and Generation of Digital Libraries into DSpace Using the 5S Framework (DG, WF, EAF), pp. 567–569.
- ECDL-2007-ImaiKS #library #mobile
- Retrieving Tsunami Digital Library by Use of Mobile Phones (SI, YK, NS), pp. 525–528.
- ECDL-2007-KongL #logic #multi #xml
- Using XML Logical Structure to Retrieve (Multimedia) Objects (ZK, ML), pp. 100–111.
- ECDL-2007-Martinez-PrietoFVA #logic #xml
- Electronic Work : Building Dynamic Services over Logical Structure Using Aqueducts for XML Processing (MAMP, PdlF, JV, JA), pp. 445–448.
- ECDL-2007-Shiri #interface #library #metadata #visual notation
- The Use of Metadata in Visual Interfaces to Digital Libraries (AS), pp. 489–494.
- HT-2007-ChinC #hypermedia #identification #social
- Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
- HT-2007-FigueiraL #interactive #learning #visualisation
- Interaction visualization in web-based learning using igraphs (ÁRF, JBL), pp. 45–46.
- HT-2007-LeblancA #learning
- Using forum in an organizational learning context (AL, MHA), pp. 41–42.
- HT-2007-MasonT #case study #network #social
- Tags, networks, narrative: exploring the use of social software for the study of narrative in digital contexts (BLM, ST), pp. 39–40.
- HT-2007-SinclairML #wiki
- Dynamic link service 2.0: using wikipedia as a linkbase (PASS, KM, PHL), pp. 161–162.
- ICDAR-2007-BernardAH #random #recognition
- Using Random Forests for Handwritten Digit Recognition (SB, SA, LH), pp. 1043–1047.
- ICDAR-2007-BhardwajSSS #on the #verification
- On the Use of Lexeme Features for Writer Verification (AB, AS, HS, SNS), pp. 1088–1092.
- ICDAR-2007-BrinkSB #identification #towards #verification
- Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
- ICDAR-2007-ChouGC #classification #multi #recognition
- Recognition of Fragmented Characters Using Multiple Feature-Subset Classifiers (CHC, CYG, FC), pp. 198–202.
- ICDAR-2007-CostagliolaDR #diagrams #grammarware #sketching
- Using Grammar-Based Recognizers for Symbol Completion in Diagrammatic Sketches (GC, VD, MR), pp. 1078–1082.
- ICDAR-2007-DasariB #identification
- Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
- ICDAR-2007-FinkP #modelling #on the #recognition
- On the Use of Context-Dependent Modeling Units for HMM-Based Offline Handwriting Recognition (GAF, TP), pp. 729–733.
- ICDAR-2007-FujimotoSTSN #documentation #image #parallel #programming
- Curved paper rectification for digital camera document images by shape from parallel geodesics using continuous dynamic programming (KF, JS, HT, MS, SN), pp. 267–271.
- ICDAR-2007-Furmaniak #segmentation
- Unsupervised Newspaper Segmentation Using Language Context (RF), pp. 1263–1267.
- ICDAR-2007-GaoWHD #documentation #image #integer #linear #programming
- Decompose Document Image Using Integer Linear Programming (DG, YW, HH, MD), pp. 397–401.
- ICDAR-2007-GazzahA #analysis #identification
- Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
- ICDAR-2007-HamamuraAI #algorithm #probability #recognition #word
- An Analytic Word Recognition Algorithm Using a Posteriori Probability (TH, TA, BI), pp. 669–673.
- ICDAR-2007-HirayamaNK #classification #difference
- A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace (JH, HN, NK), pp. 432–436.
- ICDAR-2007-HuangLM #string
- Cryptogram Decoding for OCR Using Numerization Strings (GBH, EGLM, AM), pp. 208–212.
- ICDAR-2007-HuangSHFN #approach #difference #recognition
- An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
- ICDAR-2007-HummIH #modelling #statistics #verification
- Spoken Handwriting Verification Using Statistical Models (AH, RI, JH), pp. 999–1003.
- ICDAR-2007-ImdadBERE #identification
- Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
- ICDAR-2007-JinZ #synthesis
- Synthesis of Chinese Character Using Affine Transformation (LJ, XZ), pp. 218–222.
- ICDAR-2007-KeshariW #hybrid #recognition
- Hybrid Mathematical Symbol Recognition Using Support Vector Machines (BK, SMW), pp. 859–863.
- ICDAR-2007-KramerKKB #finite #metadata #probability #transducer
- Bibliographic Meta-Data Extraction Using Probabilistic Finite State Transducers (MK, HK, DK, TMB), pp. 609–613.
- ICDAR-2007-KunduHHPG #recognition
- Arabic Handwriting Recognition Using Variable Duration HMM (AK, TH, BH, JP, LVG), pp. 644–648.
- ICDAR-2007-Likforman-SulemS #network #recognition
- Recognition of Broken Characters from Historical Printed Books Using Dynamic Bayesian Networks (LLS, MS), pp. 173–177.
- ICDAR-2007-LiwickiIB #detection #online #programming
- On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
- ICDAR-2007-LouloudisGH #approach #detection #documentation
- Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
- ICDAR-2007-LuthyVB #markov #modelling #segmentation
- Using Hidden Markov Models as a Tool for Handwritten Text Line Segmentation (FL, TV, HB), p. 8–?.
- ICDAR-2007-NamboodiriNJ #on the
- On Using Classical Poetry Structure for Indian Language Post-Processing (AMN, PJN, CVJ), pp. 1238–1242.
- ICDAR-2007-NguyenBML #classification #verification
- Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
- ICDAR-2007-NicolasDPH #2d #documentation #image #random #segmentation
- Document Image Segmentation Using a 2D Conditional Random Field Model (SN, JD, TP, LH), pp. 407–411.
- ICDAR-2007-PanBS #segmentation
- Text Segmentation from Complex Background Using Sparse Representations (WP, TDB, CYS), pp. 412–416.
- ICDAR-2007-PrasanthBSRM #online
- Elastic Matching of Online Handwritten Tamil and Telugu Scripts Using Local Features (LP, VB, RS, GVR, DM), pp. 1028–1032.
- ICDAR-2007-PrusaH #2d #recognition
- Mathematical Formulae Recognition Using 2D Grammars (DP, VH), pp. 849–853.
- ICDAR-2007-QuiniouA #detection #fault #network #online #recognition
- Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
- ICDAR-2007-RinglstetterRGS #fault
- Deriving Symbol Dependent Edit Weights for Text Correction_The Use of Error Dictionaries (CR, UR, AG, KUS), pp. 639–643.
- ICDAR-2007-SekiFNSM #analysis #documentation #information management
- Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
- ICDAR-2007-ShettySS #random #recognition #word
- Handwritten Word Recognition Using Conditional Random Fields (SS, HS, SNS), pp. 1098–1102.
- ICDAR-2007-TanakaG
- Autonomous Text Capturing Robot Using Improved DCT Feature and Text Tracking (MT, HG), pp. 1178–1182.
- ICDAR-2007-TonouchiK #mobile #online #recognition
- Text Input System Using Online Overlapped Handwriting Recognition for Mobile Devices (YT, AK), pp. 754–758.
- ICDAR-2007-ToujAA #segmentation
- Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
- ICDAR-2007-WendlingR #recognition
- Symbol Recognition Using a 2-class Hierarchical Model of Choquet Integrals (LW, JR), pp. 634–638.
- ICDAR-2007-WickRL #fault #modelling #topic
- Context-Sensitive Error Correction: Using Topic Models to Improve OCR (MLW, MGR, EGLM), pp. 1168–1172.
- ICDAR-2007-YangJ #kernel #recognition
- Handwritten Chinese Character Recognition Using Modified LDA and Kernel FDA (DY, LJ), pp. 914–918.
- ICDAR-2007-YangJZH #recognition
- Finger-Written Chinese Characters Recognition Using Hierarchical LDA (DY, LJ, LXZ, JCH), pp. 322–326.
- ICDAR-2007-ZhangYT #documentation #image
- Removing Shading Distortions in Camera-based Document Images Using Inpainting and Surface Fitting With Radial Basis Functions (LZ, AMY, CLT), pp. 984–988.
- ICDAR-2007-ZiaratbanFE
- Use of Legal Amount to Confirm or Correct the Courtesy Amount on Farsi Bank Checks (MZ, KF, ME), pp. 1123–1127.
- ICDAR-2007-ZiaratbanFF #feature model #recognition
- Language-Based Feature Extraction Using Template-Matching In Farsi/Arabic Handwritten Numeral Recognition (MZ, KF, FF), pp. 297–301.
- JCDL-2007-AbbasiC #analysis #categorisation #communication #visualisation
- Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
- JCDL-2007-BorgmanWMP #architecture #embedded #library #network
- Drowning in data: digital library architecture to support scientific use of embedded sensor networks (CLB, JCW, MSM, AP), pp. 269–277.
- JCDL-2007-CheeS #clustering #community #documentation
- Document clustering using small world communities (BWC, BRS), pp. 53–62.
- JCDL-2007-DruinWMB #case study #library
- Children’s interests and concerns when using the international children’s digital library: a four-country case study (AD, AW, SM, BBB), pp. 167–176.
- JCDL-2007-Ernst-GerlachF #retrieval
- Retrieval in text collections with historic spelling using linguistic and spelling variants (AEG, NF), pp. 333–341.
- JCDL-2007-LiCZL #automation #case study #classification #network
- Automatic patent classification using citation network information: an experimental study in nanotechnology (XL, HC, ZZ, JL), pp. 419–427.
- JCDL-2007-NewmanHCS #metadata #modelling #statistics #topic
- Subject metadata enrichment using statistical topic models (DN, KH, CC, PS), pp. 366–375.
- JCDL-2007-RichardsonF
- Using bilingual ETD collections to mine phrase translations (RR, EAF), pp. 352–353.
- JCDL-2007-TakedaT #clustering #named #performance #summary
- UpdateNews: a news clustering and summarization system using efficient text processing (TT, AT), pp. 438–439.
- SIGMOD-2007-BandiMAA #algorithm #data type #performance
- Fast data stream algorithms using associative memories (NB, AM, DA, AEA), pp. 247–256.
- SIGMOD-2007-ChandyG #database
- Event processing using database technology (KMC, DG), pp. 1169–1170.
- SIGMOD-2007-FaloutsosKS #graph #matrix #mining #scalability #tool support
- Mining large graphs and streams using matrix and tensor tools (CF, TGK, JS), p. 1174.
- SIGMOD-2007-FangHLYGLS #named #query
- GPUQP: query co-processing using graphics processors (RF, BH, ML, KY, NKG, QL, PVS), pp. 1061–1063.
- SIGMOD-2007-LarsonLZZ #assurance #estimation #quality
- Cardinality estimation using sample views with quality assurance (PÅL, WL, JZ, PZ), pp. 175–186.
- SIGMOD-2007-NandiJ #interface #query
- Assisted querying using instant-response interfaces (AN, HVJ), pp. 1156–1158.
- SIGMOD-2007-TufteLMPBR #estimation
- Travel time estimation using NiagaraST and latte (KT, JL, DM, VP, RLB, JR), pp. 1091–1093.
- SIGMOD-2007-ZhouGBN #query
- Query relaxation using malleable schemas (XZ, JG, WTB, WN), pp. 545–556.
- VLDB-2007-AbadiMMH #clustering #data transformation #scalability #semantics #web
- Scalable Semantic Web Data Management Using Vertical Partitioning (DJA, AM, SM, KJH), pp. 411–422.
- VLDB-2007-BhattacharyaMS #distributed #modelling #named #network #query #statistics
- MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models (AB, AM, AKS), pp. 854–865.
- VLDB-2007-Helmer #documentation #similarity
- Measuring the Structural Similarity of Semistructured Documents Using Entropy (SH), pp. 1022–1032.
- VLDB-2007-LimWW
- Unifying Data and Domain Knowledge Using Virtual Views (LL, HW, MW), pp. 255–266.
- VLDB-2007-LitwinMRS #algebra #performance #string
- Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
- VLDB-2007-LiuWC #keyword #named #semantics #xml
- XSeek: A Semantic XML Search Engine Using Keywords (ZL, JW, YC), pp. 1330–1333.
- VLDB-2007-LiWY #approximate #named #performance #query #string
- VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams (CL, BW, XY), pp. 303–314.
- VLDB-2007-PapadomanolakisDA #automation #database #design #performance #query
- Efficient Use of the Query Optimizer for Automated Database Design (SP, DD, AA), pp. 1093–1104.
- VLDB-2007-ShenDNR #datalog #declarative #embedded #information management
- Declarative Information Extraction Using Datalog with Embedded Extraction Predicates (WS, AD, JFN, RR), pp. 1033–1044.
- VLDB-2007-ZinnBG #modelling #query
- Modeling and Querying Vague Spatial Objects Using Shapelets (DZ, JB, MG), pp. 567–578.
- CSEET-2007-CarverHHHR #programming #re-engineering #student
- Increased Retention of Early Computer Science and Software Engineering Students Using Pair Programming (JCC, LH, LH, JEH, DSR), pp. 115–122.
- CSEET-2007-Chao #collaboration #student #wiki
- Student Project Collaboration Using Wikis (JC), pp. 255–261.
- CSEET-2007-McGregorBBBK #architecture #education #reasoning
- Using an Architecture Reasoning Tool to Teach Software Architecture (JDM, FB, LB, PB, MK), pp. 275–282.
- CSEET-2007-Padua #development #modelling
- Using Model-Driven Development in Time-Constrained Course Projects (WP), pp. 133–140.
- CSEET-2007-RootRT #concept #re-engineering
- Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
- CSEET-2007-Staron #analysis #learning #student
- Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
- CSEET-2007-Taran #education #game studies #re-engineering #risk management
- Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
- ITiCSE-2007-CaronnaSMIHT #predict
- Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
- ITiCSE-2007-DistasioW #education #framework #game studies
- Inclusive computer science education using a ready-made computer game framework (JD, TPW), pp. 116–120.
- ITiCSE-2007-FreireFPT #education #web
- Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
- ITiCSE-2007-GorraLC #assessment #database #student
- An account of the use of synoptic assessment for students in the area of databases at level 2 (AG, SL, JC), p. 334.
- ITiCSE-2007-Impagliazzo #approach #source code
- Using an outcome-based approach to assess computing programs (JI), p. 344.
- ITiCSE-2007-KheirW #realtime #speech #student
- Inclusion of deaf students in computer science classes using real-time speech transcription (RK, TW), pp. 261–265.
- ITiCSE-2007-Lewis #student #word
- Are pictures worth 1000 words? the use of affective imagery surveys to capture student perceptions of the computing discipline (TLL), p. 312.
- ITiCSE-2007-OliverGMA #learning
- Using disruptive technology for explorative learning (IO, KG, AM, CA), pp. 96–100.
- SIGITE-2007-Bailey #web
- A web systems laboratory using portable hard drives (MGB), pp. 107–112.
- SIGITE-2007-ChaKL #abstraction #problem
- Using puzzles: problem-solving and abstraction (SC, DK, WGL), pp. 135–140.
- SIGITE-2007-GuimaraesM #animation #database #education #security
- Using animation courseware in the teaching of database security (MAMG, MM), pp. 253–258.
- SIGITE-2007-MiertschinW #concept #learning
- Using concept maps to navigate complex learning environments (SLM, CLW), pp. 175–184.
- SIGITE-2007-ToderickL #linux #physics
- Using VPN technology to remove physical barriers in linux lab experiments (LT, PJLI), pp. 113–118.
- CSMR-2007-BrandBEJKKSV #ide #legacy #maintenance
- Using The Meta-Environment for Maintenance and Renovation (MvdB, MB, GRE, HAdJ, PK, ATK, TvdS, JJV), pp. 331–332.
- CSMR-2007-LoeschP #concept analysis #product line #variability
- Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
- CSMR-2007-Lormans #evolution #monitoring #requirements
- Monitoring Requirements Evolution using Views (ML), pp. 349–352.
- ICPC-2007-CornelissenHZMWD #comprehension #execution #sequence
- Understanding Execution Traces Using Massive Sequence and Circular Bundle Views (BC, DH, AZ, LM, JJvW, AvD), pp. 49–58.
- ICPC-2007-MirarabHT #co-evolution #network #predict
- Using Bayesian Belief Networks to Predict Change Propagation in Software Systems (SM, AH, LT), pp. 177–188.
- ICPC-2007-StefikAPB #debugging #named
- WAD: A Feasibility study using the Wicked Audio Debugger (AS, RTA, RP, JB), pp. 69–80.
- ICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code
- Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
- ICSM-2007-Anda #maintenance #metric
- Assessing Software System Maintainability using Structural Measures and Expert Assessments (BA), pp. 204–213.
- ICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing
- Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
- ICSM-2007-GustavssonLLMB #development #distributed #maintenance #modelling #uml
- Simplifying maintenance by using XSLT to unlock UML models in a distributed development environment (HG, BL, BL, AM, MB), pp. 465–468.
- ICSM-2007-LuccaFT #classification #concept analysis #web
- Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
- ICSM-2007-Salahuddin #testing
- Analysing the Impact of Change on Test Sets Using X-Machines (SS), pp. 511–512.
- ICSM-2007-Vivanco #approach #modelling #predict #quality
- Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
- ICSM-2007-WalkinshawRW #feature model
- Feature Location and Extraction using Landmarks and Barriers (NW, MR, MW), pp. 54–63.
- MSR-2007-German #open source
- Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects (DMG), p. 24.
- MSR-2007-HerraizGR07a #analysis #eclipse
- Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
- MSR-2007-LivieriHMI #analysis #evolution #kernel #linux
- Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
- MSR-2007-Masticola #development #lightweight #mining #repository
- Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
- MSR-2007-ValettoHECWW #congruence #development #repository
- Using Software Repositories to Investigate Socio-technical Congruence in Development Projects (GV, MEH, KE, SC, MNW, CW), p. 25.
- SCAM-2007-MolinaS #approximate #open source #performance #source code
- Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
- SCAM-2007-RodenVEM #agile #empirical #metric #modelling #process #quality
- An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes (PLR, SV, LHE, SLM), pp. 171–179.
- WCRE-2007-McNairGW #architecture #evolution #visualisation
- Visualizing Software Architecture Evolution Using Change-Sets (AM, DMG, JHWJ), pp. 130–139.
- WCRE-2007-RaberL #data mining #debugging #mining
- Emulated Breakpoint Debugger and Data Mining Using Detours (JR, EL), pp. 271–272.
- WCRE-2007-Staiger #analysis #reverse engineering #user interface #visual notation
- Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
- CIAA-2007-Marschner #transducer
- Efficiently Matching with Local Grammars Using Prefix Overlay Transducers (CM), pp. 314–316.
- LATA-2007-KutribM #automaton #performance #recognition
- Fast Reversible Language Recognition Using Cellular Automata (MK, AM), pp. 331–342.
- IFM-2007-HasanT #cumulative #probability #verification
- Verification of Probabilistic Properties in HOL Using the Cumulative Distribution Function (OH, ST), pp. 333–352.
- IFM-2007-PlaggeL #model checking #specification #validation
- Validating Z Specifications Using the ProBAnimator and Model Checker (DP, ML), pp. 480–500.
- IFM-2007-PodorozhnyKPZ #alloy #multi #verification
- Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
- RTA-2007-EscobarM #infinity #model checking
- Symbolic Model Checking of Infinite-State Systems Using Narrowing (SE, JM), pp. 153–168.
- RTA-2007-KorpM #bound #proving #term rewriting #termination
- Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
- SEFM-2007-CrockerC #automation #c #reasoning #source code #verification
- Verification of C Programs Using Automated Reasoning (DC, JC), pp. 7–14.
- SEFM-2007-Lano #diagrams #interactive #specification
- Formal Specification using Interaction Diagrams (KL), pp. 293–304.
- SEFM-2007-SahaRC #modelling #protocol #verification
- Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
- SEFM-2007-SampathRSR #case study #generative #how
- How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
- ICFP-2007-BeshersFS #case study #experience #functional #linux #programming
- Experience report: using functional programming to manage a linux distribution (CB, DF, JS), pp. 213–218.
- ICFP-2007-MarlowYJ #lazy evaluation #performance #pointer
- Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
- IFL-2007-Kleeblatt #dependent type
- Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
- IFL-2007-NaylorR #graph #reduction
- The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA (MN, CR), pp. 129–146.
- ILC-2007-Borden #classification
- Classification using conditional probabilities and Shannon’s definition of information (AB), p. 15.
- ILC-2007-HerzeelGCD #e-commerce #lisp
- Modularizing crosscuts in an e-commerce application in Lisp using HALO (CH, KG, PC, TD), p. 11.
- CIG-2007-CarterL #algorithm
- An Investigation into Tournament Poker Strategy using Evolutionary Algorithms (RGC, JL), pp. 117–124.
- CIG-2007-FinkDA #behaviour #game studies #machine learning
- Extracting NPC behavior from computer games using computer vision and machine learning techniques (AF, JD, JA), pp. 24–31.
- CIG-2007-LeighLM #algorithm #search-based
- Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms (REL, SJL, CM), pp. 72–79.
- CIG-2007-OommenGP #bound #finite #game studies #probability
- Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
- CIG-2007-RunarssonJ #evaluation #learning
- Effect of look-ahead search depth in learning position evaluation functions for Othello using -greedy exploration (TPR, EOJ), pp. 210–215.
- CIG-2007-SeredynskiBK #ad hoc #behaviour #evolution #game studies #modelling #network
- Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model (MS, PB, MAK), pp. 96–103.
- CIG-2007-VenessB #effectiveness #game studies #probability
- Effective Use of Transposition Tables in Stochastic Game Tree Search (JV, AB), pp. 112–116.
- DiGRA-2007-BraggeS #game studies #mining #profiling #research #tool support
- Profiling Academic Research on Digital Games Using Text Mining Tools (JB, JS).
- DiGRA-2007-DekkerC #game studies
- Please Biofeed the Zombies: Enhancing the Gameplay and Display of a Horror Game Using Biofeedback (AD, EC).
- DiGRA-2007-KamRTC #design pattern #game studies #mobile
- Mobile Gaming with Children in Rural India: Contextual Factors in the Use of Game Design Patterns (MK, VR, AT, JFC).
- DiGRA-2007-NatkinYJM #adaptation #game studies #modelling #multi #ubiquitous
- Creating Multiplayer Ubiquitous Games using an adaptive narration model based on a user's model (SN, CY, SJ, BM).
- DiGRA-2007-WyeldLCGLH #game studies
- The Ethics of Indigenous Storytelling: using the Torque Game Engine to Support Australian Aboriginal Cultural Heritage (TGW, BL, JC, CG, BL, JH).
- GDCSE-J-2007-Youngblood #education #game studies #student
- Engaging Students in Advanced Computer Science Education Using Game Segments (GMY).
- AGTIVE-2007-AschenbrennerG #graph #graph grammar
- Transforming Scene Graphs Using Triple Graph Grammars — A Practice Report (NA, LG), pp. 32–43.
- AGTIVE-2007-BiermannEET #eclipse #editing #generative #plugin
- Generating Eclipse Editor Plug-Ins Using Tiger (EB, KE, CE, GT), pp. 583–584.
- AGTIVE-2007-EngelsGSW #consistency #contract #modelling #process #visual notation #web #web service
- Assuring Consistency of Business Process Models and Web Services Using Visual Contracts (GE, BG, CS, HW), pp. 17–31.
- AGTIVE-2007-GogollaBD #graph transformation #ocl
- From Graph Transformation to OCL Using USE (MG, FB, DHD), pp. 585–586.
- AGTIVE-2007-LeenheerM #collaboration #evolution #graph transformation #ontology
- Using Graph Transformation to Support Collaborative Ontology Evolution (PDL, TM), pp. 44–58.
- GT-VMT-2007-BisztrayH #csp #process #verification
- Rule-Level Verification of Business Process Transformations using CSP (DB, RH).
- GT-VMT-2007-BonevaHKR #graph transformation #multi #simulation
- Simulating Multigraph Transformations Using Simple Graphs (IB, FH, HK, AR).
- CHI-2007-BirnholtzGMB #case study #process #scalability
- An exploratory study of input configuration and group process in a negotiation task using a large display (JPB, TG, CM, RB), pp. 91–100.
- CHI-2007-DingEKLCSWB #empirical #visual notation
- An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC (XD, TE, WAK, SL, JC, JBS, TVW, WEB), pp. 1019–1028.
- CHI-2007-KristenssonZ #gesture
- Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
- CHI-2007-KumarPW #named
- EyePoint: practical pointing and selection using gaze and keyboard (MK, AP, TW), pp. 421–430.
- CHI-2007-LankCR #predict
- Endpoint prediction using motion kinematics (EL, YCNC, JR), pp. 637–646.
- CHI-2007-LudfordPRT
- Capturing, sharing, and using local place information (PJL, RP, KR, LGT), pp. 1235–1244.
- CHI-2007-MoravejiLDOW #design #named
- Comicboarding: using comics as proxies for participatory design with children (NM, JL, JD, PO, SW), pp. 1371–1374.
- CHI-2007-NenonenLHLJH #game studies #interactive
- Using heart rate to control an interactive game (VN, AL, VH, TL, MJ, PH), pp. 853–856.
- CHI-2007-SchrammelGST #exclamation #quote
- “Look!”: using the gaze direction of embodied agents (JS, AG, RS, MT), pp. 1187–1190.
- CHI-2007-SeayK #game studies #online #problem #self
- Project massive: self-regulation and problematic use of online gaming (AFS, REK), pp. 829–838.
- CHI-2007-SellenFAHRW #case study #memory management
- Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
- CHI-2007-TangLPWD #interactive #process
- Recent shortcuts: using recent interactions to support shared activities (JCT, JL, JSP, SW, CD), pp. 1263–1272.
- CHI-2007-VogelB #interface #named
- Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
- CHI-2007-ZhaoDCBB #feedback #named
- Earpod: eyes-free menu selection using touch input and reactive audio feedback (SZ, PD, MHC, RB, PB), pp. 1395–1404.
- DHM-2007-BeurierCMTW #approach #data-driven #database #simulation
- Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
- DHM-2007-EndoKKMKM #assessment #design
- A Computer-Aided Ergonomic Assessment and Product Design System Using Digital Hands (YE, SK, TK, NM, MK, MM), pp. 833–842.
- DHM-2007-FanC #adaptation
- A Modified Particle Swarm Optimizer Using an Adaptive Dynamic Weight Scheme (SKSF, JMC), pp. 56–65.
- DHM-2007-GeorgeG #modelling
- Facilitating Pronunciation Skills for Children with Phonological Disorders Using Human Modelling (JG, PG), pp. 595–605.
- DHM-2007-KimPHL #design #evaluation
- Evaluation of Navy Shipboard Habitability for a Warship Design Using Human Model (HK, JHP, HH, CML), pp. 884–893.
- DHM-2007-LeeFCBEAP #finite #modelling
- Finite Element Modeling to Aid in Refining the Rehabilitation of Amputees Using Osseointegrated Prostheses (WL, LF, NJC, RB, JE, CA, MJP), pp. 655–658.
- DHM-2007-VolzBHK #automation #generative #linear #metric
- Automatic, Body Measurements Based Generation of Individual Avatars Using Highly Adjustable Linear Transformation (AV, RB, SH, KK), pp. 453–459.
- DHM-2007-WashburnSG #maintenance #multimodal
- Using Multimodal Technologies to Enhance Aviation Maintenance Inspection Training (CW, PS, AKG), pp. 1018–1026.
- DHM-2007-YaoMW #3d #low cost
- Low Cost 3D Shape Acquisition System Using Strip Shifting Pattern (LY, LM, DW), pp. 276–285.
- DHM-2007-ZhaoL #3d #image #locality #orthogonal
- Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
- HCI-AS-2007-KimuraTHTAOT #analysis #approach
- The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
- HCI-AS-2007-KojimaIN #documentation
- Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
- HCI-AS-2007-LeeNB #monitoring #network #reliability
- Personal Life Logger and Belonging Monitor Using Reliable ZigBee Networks (KL, KN, CB), pp. 961–970.
- HCI-IDU-2007-BaranauskasN #design #flexibility #interactive
- Using Patterns to Support the Design of Flexible User Interaction (MCCB, VPdAN), pp. 1033–1042.
- HCI-IDU-2007-Forsman #experience #human-computer #research #tool support
- After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
- HCI-IDU-2007-Gomez-CarneroI #representation
- Evaluator of User’s Actions (Eua) Using the Model of Abstract Representation Dgaui (SGC, JRI), pp. 463–471.
- HCI-IDU-2007-LingLX #complexity #validation #web
- Validating Information Complexity Questionnaires Using Travel Web Sites (CL, ML, JX), pp. 901–910.
- HCI-IDU-2007-OkamotoKGI #design
- Participatory Design Using Scenarios in Different Cultures (MO, HK, IG, KI), pp. 223–231.
- HCI-IDU-2007-StrybelVDKNCG #predict
- Predicting Perceived Situation Awareness of Low Altitude Aircraft in Terminal Airspace Using Probe Questions (TZS, KPLV, JPD, JK, TKN, VC, FPG), pp. 939–948.
- HCI-IDU-2007-TarbyERTLK #architecture #aspect-oriented #comparison #evaluation #interactive #programming #usability
- Traces Using Aspect Oriented Programming and Interactive Agent-Based Architecture for Early Usability Evaluation: Basic Principles and Comparison (JCT, HE, JR, CDT, PL, CK), pp. 632–641.
- HCI-IDU-2007-TranMC #independence #memory management
- Using Memory Aid to Build Memory Independence (QTT, EDM, GC), pp. 959–965.
- HCI-IDU-2007-VogiazouFL #design #process
- The Use of Improvisational Role-Play in User Centered Design Processes (YV, JF, JL), pp. 262–272.
- HCI-IPT-2007-ChenC
- Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator (CHC, MLC), pp. 560–568.
- HCI-IPT-2007-DzwiarekLNRS #artificial reality #assessment #visual notation
- Assessment of Perception of Visual Warning Signals Generated Using an Augmented Reality System (MD, AL, AN, CR, TS), pp. 579–586.
- HCI-IPT-2007-GalludLTP #experience #interactive #mobile
- Using Mobile Devices to Improve the Interactive Experience of Visitors in Art Museums (JAG, MDL, RT, VMRP), pp. 280–287.
- HCI-IPT-2007-JeonKB #mobile
- Interacting with a Tabletop Display Using a Camera Equipped Mobile Phone (SJ, GJK, MB), pp. 336–343.
- HCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #word
- Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
- HCI-IPT-2007-SongWT #game studies #interface
- A Tangible Game Interface Using Projector-Camera Systems (PS, SW, JT), pp. 956–965.
- HCI-IPT-2007-TsaoCC #concept #design #flexibility #research #smarttech
- The Research of Using Image-Transformation to the Conceptual Design of Wearable Product with Flexible Display (YCT, LCC, SCC), pp. 1220–1229.
- HCI-IPT-2007-YoshidaMS #interactive #mobile #visual notation
- Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
- HCI-MIE-2007-Alexandris #human-computer #quote #semantics
- “Show and Tell”: Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints (CA), pp. 13–22.
- HCI-MIE-2007-ChanCCHH #detection #multi
- A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
- HCI-MIE-2007-ChangKP #constraints #evolution #set
- Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint (JSC, EYK, SHP), pp. 583–588.
- HCI-MIE-2007-ChungK #classification
- Classification of a Person Picture and Scenery Picture Using Structured Simplicity (MBC, IJK), pp. 821–828.
- HCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #word
- Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
- HCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics
- Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
- HCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting
- Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
- HCI-MIE-2007-HirotaWI #interface
- Menu Selection Using Auditory Interface (KH, YW, YI), pp. 70–75.
- HCI-MIE-2007-JangKC #geometry #visual notation
- Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM (HJ, GYK, HIC), pp. 634–641.
- HCI-MIE-2007-JangWB #named
- MEMORIA: Personal Memento Service Using Intelligent Gadgets (HJ, JW, CB), pp. 331–339.
- HCI-MIE-2007-JungKK #estimation #image #modelling
- Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling (DJJ, KSK, HJK), pp. 649–658.
- HCI-MIE-2007-JuSK #game studies #people #quote
- “Shooting a Bird”: Game System Using Facial Feature for the Handicapped People (JJ, YS, EYK), pp. 642–648.
- HCI-MIE-2007-KangEKKASK #modelling #multi
- Human Motion Modeling Using Multivision (BDK, JSE, JHK, CK, SHA, BJS, SKK), pp. 659–668.
- HCI-MIE-2007-KimKEKASK #adaptation #detection #realtime
- Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
- HCI-MIE-2007-KimSK #network
- Emotion-Based Textile Indexing Using Neural Networks (NYK, YS, EYK), pp. 349–357.
- HCI-MIE-2007-KwonPKK #recognition
- Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift (KSK, SHP, EYK, HJK), pp. 690–699.
- HCI-MIE-2007-MehtaC #ontology
- Developing a Conversational Agent Using Ontologies (MM, AC), pp. 154–164.
- HCI-MIE-2007-OguraNS #communication #parallel #thread
- Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System (KO, KN, KS), pp. 186–195.
- HCI-MIE-2007-ReveiuDF #adaptation #multi #retrieval
- Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation (AR, MD, FF), pp. 486–492.
- HCI-MIE-2007-SetiawanHL #interactive #multi #people
- Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction (NAS, SJH, CWL), pp. 738–746.
- HCI-MIE-2007-WangYCI #interactive #interface #multimodal #realtime
- Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction (HW, JY, MHC, MI), pp. 225–231.
- HCI-MIE-2007-YoonK #case study #interactive
- A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System (JY, JK), pp. 763–768.
- HIMI-IIE-2007-AlsharaI #integration #learning
- Business Integration Using the Interdisciplinary Project Based Learning Model (IPBL) (OKA, MI), pp. 823–833.
- HIMI-IIE-2007-DoyoSA #case study #transaction
- A Study of Production / Transaction-Related Model Using Control Theory (DD, KS, KA), pp. 855–862.
- HIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social
- Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
- HIMI-IIE-2007-HarunN #user interface
- User Interface for Knowledge Sharing Using Knowledge Gardening Metaphor (AFH, NLMN), pp. 319–327.
- HIMI-IIE-2007-HashimotoN #community #memory management
- Fond Memory Management System by Using Information About Communities (KH, YN), pp. 23–29.
- HIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online
- Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
- HIMI-IIE-2007-IshiiYIN #navigation
- A Navigation System Using Ultrasonic Directional Speaker with Rotating Base (KI, YY, MI, KN), pp. 526–535.
- HIMI-IIE-2007-KaminoyamaMHSKA #navigation #people
- Walk Navigation System Using Photographs for People with Dementia (HK, TM, FH, KS, NK, SA), pp. 1039–1049.
- HIMI-IIE-2007-KanekoNATT #analysis #generative #mining
- A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
- HIMI-IIE-2007-LiuYCL #estimation #health #modelling
- Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
- HIMI-IIE-2007-MaILJ
- Use of Chinese Short Messages (DM, FI, YL, LJ), pp. 582–591.
- HIMI-IIE-2007-NagamatsuKKS #development #eye tracking
- Development of a Skill Acquisition Support System Using Expert’s Eye Movement (TN, YK, JK, HS), pp. 430–439.
- HIMI-IIE-2007-WakitaAT #metric #mobile #prototype
- Methodology for Constructing a Prototype Site for Finding Employment SPI Measures Using Mobile Phones (SW, MA, TT), pp. 983–993.
- HIMI-IIE-2007-WangCH #memory management
- Using Long Term Memory for Bookmark Management (MJW, KMC, TKH), pp. 812–820.
- HIMI-IIE-2007-YamaguchiNAHKN #artificial reality #named #navigation
- AR-Navi: An In-Vehicle Navigation System Using Video-Based Augmented Reality Technology (YY, TN, KA, MH, HK, SN), pp. 1139–1147.
- HIMI-IIE-2007-YoonKPLY #game studies #modelling
- Game Player Modeling Using D-FSMs (TBY, DMK, KHP, JHL, KHY), pp. 490–499.
- HIMI-MTT-2007-AblassmeierPRR #network
- Context-Aware Information Agents for the Automotive Domain Using Bayesian Networks (MA, TP, SR, GR), pp. 561–570.
- HIMI-MTT-2007-ChienC #comprehension
- The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch (YHC, CHC), pp. 814–823.
- HIMI-MTT-2007-ChoBKC #difference #on the #probability
- On Achieving Proportional Loss Differentiation Using Dynamic-MQDDP with Differential Drop Probability (KC, SB, JK, JWC), pp. 584–593.
- HIMI-MTT-2007-CornsML #approach #development #machine learning #optimisation
- Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
- HIMI-MTT-2007-GoncalvesaMJ #documentation
- Using Autobiographic Information to Retrieve Real and Electronic Documents (DG, TJVG, RM, JAJ), pp. 427–436.
- HIMI-MTT-2007-Jeong #comprehension
- Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
- HIMI-MTT-2007-JiGC #comparison #word
- Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
- HIMI-MTT-2007-KwonSH #design #implementation #realtime
- Design and Implementation of Enhanced Real Time News Service Using RSS and VoiceXML (HJK, JHS, KSH), pp. 677–686.
- HIMI-MTT-2007-LeeJ #case study
- A Study on a Stereoscopic Display System Using a Rotary Disk Type Beam Shutter (KHL, TJJ), pp. 868–875.
- HIMI-MTT-2007-MarucciLC #approach #classification #fuzzy
- Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
- HIMI-MTT-2007-Miki #collaboration #development #guidelines
- Use of Socio-technical Guidelines in Collaborative System Development (HM), pp. 90–97.
- HIMI-MTT-2007-NagaiEK #comprehension #process
- Measuring Brain Activities Related to Understanding Using Near-Infrared Spectroscopy (NIRS) (MN, NE, TK), pp. 884–893.
- HIMI-MTT-2007-SakuradaHON #interface #online #recognition
- A Japanese Text Input Interface Using On-Line Writing-Box-Free Handwriting Recognition and Kana-to-Kanji Conversion (TS, YH, HO, MN), pp. 940–949.
- HIMI-MTT-2007-ShiIL #query #visual notation
- Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
- HIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer
- Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
- OCSC-2007-BlevisLRS #design #interactive #research
- Using Design Critique as Research to Link Sustainability and Interactive Technologies (EB, YKL, DR, ES), pp. 22–31.
- OCSC-2007-NuschkeJ #collaboration #communication #framework #information management #tool support
- A Framework for Inter-organizational Collaboration Using Communication and Knowledge Management Tools (PN, XJ), pp. 406–415.
- VISSOFT-2007-BohnerGHM #analysis #source code #uml #visual notation #visualisation
- Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
- VISSOFT-2007-HoltenCW #sequence #visualisation
- Trace Visualization Using Hierarchical Edge Bundles and Massive Sequence Views (DH, BC, JJvW), pp. 47–54.
- VISSOFT-2007-LangelierD #analysis #visual notation
- Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
- VISSOFT-2007-LienhardKG #agile #prototype #visualisation
- Rapid Prototyping of Visualizations using Mondrian (AL, AK, OG), pp. 67–70.
- CAiSE-2007-EderW #comparison #detection #graph #ontology
- Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
- CAiSE-2007-LiuBW #behaviour #modelling
- Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
- CAiSE-2007-SilvaAMC #design #social
- Designing Social Patterns Using Advanced Separation of Concerns (CTLLS, JA, AMDM, JC), pp. 309–323.
- EDOC-2007-LiningtonL #approach #behaviour #modelling #security
- Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
- EDOC-2007-MilanovicKGGWDH #integration #process
- Business Process Integration by Using General Rule Markup Language (MM, NK, DG, AG, GW, VD, MH), pp. 353–364.
- EDOC-2007-Molina-JimenezSC #consistency #implementation #message passing #middleware
- Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware (CMJ, SKS, NC), pp. 51–62.
- EDOC-2007-RosenbergEMPD #aspect-oriented #development #process #quality #top-down
- Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL (FR, CE, AM, CP, SD), pp. 15–26.
- EDOC-2007-SunithaAK
- Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
- ICEIS-AIDSS-2007-BermejoGP #email
- Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
- ICEIS-AIDSS-2007-KirwanGM #adaptation #case study #energy #implementation #information management
- Energy Management Information Systems: An Exploratory study of Implementations Using Adaptive Structuration Theory (OK, WG, PM), pp. 303–309.
- ICEIS-AIDSS-2007-KrohaR #classification
- Using Grammars for Text Classification (PK, TR), pp. 259–264.
- ICEIS-AIDSS-2007-LiuCM #recognition
- Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
- ICEIS-AIDSS-2007-YingboJJ #learning #predict #process #workflow
- Using Decision Tree Learning to Predict Workflow Activity Time Consumption (YL, JW, JS), pp. 69–75.
- ICEIS-DISI-2007-AraqueSD #data flow #monitoring #web
- Monitoring web data sources using temporal properties as an external resources of a data warehouse (FA, AS, CD), pp. 28–35.
- ICEIS-DISI-2007-CairesC #architecture #semantics #web
- Using semantic web and service oriented technologies to build loosely coupled systems: SWOAT — a service and semantic web oriented architecture technology (BC, JC), pp. 226–232.
- ICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy
- Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
- ICEIS-DISI-2007-GroppeGL #order
- Using an index of precomputed joins in order to speed up SPARQL processing (SG, JG, VL), pp. 13–20.
- ICEIS-DISI-2007-PapatheocharousA #estimation #network
- Software cost estimation using artificial neural networks with inputs selection (EP, ASA), pp. 398–407.
- ICEIS-DISI-2007-RaminhosP #approach #declarative
- Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
- ICEIS-DISI-2007-RayG
- A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
- ICEIS-EIS-2007-AddinquyT #enterprise #requirements #specification
- Reducing Requirements to EIS Specifications GAP Using RM-ODP Enterprise Viewpoint (CA, BT), pp. 31–38.
- ICEIS-EIS-2007-KarnouskosS #enterprise #network #towards
- Towards Enterprise Applications Using Wireless Sensor Networks (SK, PS), pp. 230–236.
- ICEIS-HCI-2007-AraujoB #architecture #education #game studies
- Using Games in the Teaching of Digital Systems and of Computers Architecture (PJGdA, JVB), pp. 5–10.
- ICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech
- Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
- ICEIS-HCI-2007-FariaBVR #framework #platform
- Platform to Drive an Intelligent Wheelchair Using Facial Expressions (PMF, RAMB, EV, LPR), pp. 164–169.
- ICEIS-HCI-2007-IshikawaYY #multi #novel
- Novel View Telepresence with High-Scalability Using Multi-Casted Omni-Directional Videos (TI, KY, NY), pp. 148–156.
- ICEIS-J-2007-ArjunanWKNY #recognition
- Recognition of Human Voice Utterances from Facial Surface EMG without Using Audio Signals (SPA, HW, DKK, GRN, WCY), pp. 366–378.
- ICEIS-J-2007-Barjis07a #modelling #process #simulation
- A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
- ICEIS-J-2007-CastroO07a #distributed #multi #problem
- Solving Airline Operations Problems Using Specialized Agents in a Distributed Multi-Agent System (AJMC, ECO), pp. 173–184.
- ICEIS-J-2007-TraversonA #requirements #specification
- Linking Requirements to EIS Specifications Using Correspondence Rules (BT, CA), pp. 276–285.
- ICEIS-SAIC-2007-BoukadiGMB #petri net #specification #verification #web #web service
- Specification and Verification of Views over Composite Web Services Using High Level Petri-Nets (KB, CG, ZM, DB), pp. 107–112.
- ICEIS-SAIC-2007-CheungSB #collaboration
- Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
- ICEIS-SAIC-2007-GarcesQCHC #e-commerce #modelling #multi #transaction
- E-Commerce Transaction Modeling Using Moderately Open Multi-Agent Systems (AG, RQ, MC, JH, EC), pp. 167–172.
- ICEIS-SAIC-2007-Maximilien #approach #challenge #problem #ruby #semantics #web #web service
- A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
- ICEIS-SAIC-2007-PoloniaCO #scalability
- A MODEL to Optimize the Use of Imaging Equipment and Human Skills Scattered in Very Large Geographical Areas (DFP, CMAC, JLO), pp. 208–212.
- ICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics
- Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
- ICEIS-SAIC-2007-RuizB #documentation
- Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
- ICEIS-SAIC-2007-Silva #collaboration
- Using Narratives in Collaborative Writing — An Example (NDS), pp. 351–358.
- ICEIS-SAIC-2007-WuGRSM #automation #composition #process #semantics #web #web service
- Automatic Composition of Semantic Web Services Using Process Mediation (ZW, KG, AR, APS, JAM), pp. 453–462.
- CIKM-2007-CarteretteA #documentation #evaluation #retrieval
- Semiautomatic evaluation of retrieval systems using document similarities (BC, JA), pp. 873–876.
- CIKM-2007-GuoCXW #maintenance #online #performance
- Efficient on-line index maintenance for dynamic text collections by using dynamic balancing tree (RG, XC, HX, BW), pp. 751–760.
- CIKM-2007-JurczykA #analysis #community
- Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
- CIKM-2007-LadY #feedback
- Generalizing from relevance feedback using named entity wildcards (AL, YY), pp. 721–730.
- CIKM-2007-LiMGDBM #predict #process
- Predicting individual priorities of shared activities using support vector machines (LL, MJM, WG, CD, BB, DRM), pp. 515–524.
- CIKM-2007-Pasca07a #query #web
- Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
- CIKM-2007-PeraN #email #similarity #word
- Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
- CIKM-2007-WangFZ #feedback #query #retrieval
- Improve retrieval accuracy for difficult queries using negative feedback (XW, HF, CZ), pp. 991–994.
- CIKM-2007-XuBCY #information retrieval #social
- Using social annotations to improve language model for information retrieval (SX, SB, YC, YY), pp. 1003–1006.
- CIKM-2007-YangQZGL #analysis #graph #web
- Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
- CIKM-2007-YanH #feedback #multi #probability #query #retrieval
- Query expansion using probabilistic local feedback with application to multimedia retrieval (RY, AGH), pp. 361–370.
- CIKM-2007-YuTT #category theory #evaluation #ontology #wiki
- Ontology evaluation using wikipedia categories for browsing (JY, JAT, AMT), pp. 223–232.
- ECIR-2007-AshooriL #repository #topic #xml
- Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
- ECIR-2007-AslamP #estimation #multi #query
- Query Hardness Estimation Using Jensen-Shannon Divergence Among Multiple Scoring Functions (JAA, VP), pp. 198–209.
- ECIR-2007-BrunnertAR #enterprise #people #retrieval #visualisation
- Enterprise People and Skill Discovery Using Tolerant Retrieval and Visualization (JB, OA, DR), pp. 674–677.
- ECIR-2007-HeD #classification #naive bayes
- Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
- ECIR-2007-MacdonaldO #feedback
- Using Relevance Feedback in Expert Search (CM, IO), pp. 431–443.
- ECIR-2007-MartinetS #documentation
- Using Visual-Textual Mutual Information and Entropy for Inter-modal Document Indexing (JM, SS), pp. 549–556.
- ECIR-2007-Medina-PagolaRHP #distance #documentation #representation
- Document Representation Using Global Association Distance Model (JEMP, AYRG, AHD, JHP), pp. 565–572.
- ECIR-2007-MeenaP #analysis #sentiment
- Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
- ECIR-2007-MeloS #classification #multi #ontology
- Multilingual Text Classification Using Ontologies (GdM, SS), pp. 541–548.
- ECIR-2007-MoreauCS #automation #machine learning #query
- Automatic Morphological Query Expansion Using Analogy-Based Machine Learning (FM, VC, PS), pp. 222–233.
- ECIR-2007-PaltoglouSS #algorithm #modelling #multi
- Results Merging Algorithm Using Multiple Regression Models (GP, MS, MS), pp. 173–184.
- ECIR-2007-RoullandKCRGPO #clustering #query #refinement
- Query Reformulation and Refinement Using NLP-Based Sentence Clustering (FR, ANK, SC, CR, AG, KP, JO), pp. 210–221.
- ECIR-2007-ShahE #detection #documentation #metric #representation #topic
- Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
- ECIR-2007-YamoutOT #feedback #query
- Relevance Feedback Using Weight Propagation Compared with Information-Theoretic Query Expansion (FY, MPO, JT), pp. 258–270.
- ECIR-2007-YuSLWM #image #ranking
- Improve Ranking by Using Image Information (QY, SS, ZL, JRW, WYM), pp. 645–652.
- ECIR-2007-ZhangZC #performance #scalability
- Efficient Construction of FM-index Using Overlapping Block Processing for Large Scale Texts (DZ, YZ, JC), pp. 113–123.
- ECIR-2007-ZwolL #effectiveness #retrieval #semantics #xml
- Effective Use of Semantic Structure in XML Retrieval (RvZ, TvL), pp. 621–628.
- ICML-2007-DingL #adaptation #analysis #clustering #reduction
- Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
- ICML-2007-GerberTW #reduction #robust
- Robust non-linear dimensionality reduction using successive 1-dimensional Laplacian Eigenmaps (SG, TT, RTW), pp. 281–288.
- ICML-2007-LeskovecF #graph #modelling #multi #scalability
- Scalable modeling of real graphs using Kronecker multiplication (JL, CF), pp. 497–504.
- ICML-2007-Mahadevan #3d #adaptation #learning #multi
- Adaptive mesh compression in 3D computer graphics using multiscale manifold learning (SM), pp. 585–592.
- ICML-2007-NilssonSJ #kernel #reduction
- Regression on manifolds using kernel dimension reduction (JN, FS, MIJ), pp. 697–704.
- ICML-2007-WipfN
- Beamforming using the relevance vector machine (DPW, SSN), pp. 1023–1030.
- KDD-2007-BeckerA #concept #ranking #realtime
- Real-time ranking with concept drift using expert advice (HB, MA), pp. 86–94.
- KDD-2007-ChewBKA #information retrieval
- Cross-language information retrieval using PARAFAC2 (PAC, BWB, TGK, AA), pp. 143–152.
- KDD-2007-CulottaWHMM #adaptation #database #metric #similarity
- Canonicalization of database records using adaptive similarity measures (AC, MLW, RH, MM, AM), pp. 201–209.
- KDD-2007-DingSJL #framework #kernel #learning #recommendation
- A learning framework using Green’s function and kernel regularization with application to recommender system (CHQD, RJ, TL, HDS), pp. 260–269.
- KDD-2007-SatoN #documentation #information management #multi #parametricity #topic
- Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior (IS, HN), pp. 590–598.
- KDD-2007-Schickel-ZuberF #clustering #learning #recommendation
- Using hierarchical clustering for learning theontologies used in recommendation systems (VSZ, BF), pp. 599–608.
- KDD-2007-SrihariXS #documentation #generative
- Use of ranked cross document evidence trails for hypothesis generation (RKS, LX, TS), pp. 677–686.
- MLDM-2007-HanKK #performance #sequence
- Efficient Subsequence Matching Using the Longest Common Subsequence with a Dual Match Index (TSH, SKK, JK), pp. 585–600.
- MLDM-2007-MartinsSSPG #classification #image
- Classification of Breast Masses in Mammogram Images Using Ripley’s K Function and Support Vector Machine (LdOM, ECdS, ACS, ACdP, MG), pp. 784–794.
- MLDM-2007-PracnerTRI #attribute grammar #categorisation
- Categorizing Evolved CoreWar Warriors Using EM and Attribute Evaluation (DP, NT, MR, MI), pp. 681–693.
- MLDM-2007-SunV
- Data Selection Using SASH Trees for Support Vector Machines (CS, RV), pp. 286–295.
- MLDM-2007-ZagorisPK #algorithm #fuzzy #reduction #self
- Color Reduction Using the Combination of the Kohonen Self-Organized Feature Map and the Gustafson-Kessel Fuzzy Algorithm (KZ, NP, IK), pp. 703–715.
- RecSys-2007-LathiaHC #collaboration #distributed #metric
- Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
- RecSys-2007-NathansonBG #adaptation #clustering #recommendation
- Eigentaste 5.0: constant-time adaptability in a recommender system using item clustering (TN, EB, KYG), pp. 149–152.
- RecSys-2007-Vuorikari #education #information retrieval #question #reuse #social
- Can social information retrieval enhance the discovery and reuse of digital educational content? (RV), pp. 207–210.
- SEKE-2007-AmouiST #network #predict
- Temporal Software Change Prediction Using Neural Networks (MA, MS, LT), pp. 380–385.
- SEKE-2007-GuzmanPP #modelling #pattern matching
- Using Model-Driven Pattern Matching to derive functionalities in Models (IGRdG, MP, MP), pp. 529–534.
- SEKE-2007-HofmeisterW #architecture #design #independence #platform
- Designing a Platform-Independent Use-Case for a Composite Application using a Reference Architecture (HH, GW), pp. 227–231.
- SEKE-2007-HuangL07a #composition #reasoning
- Service Composition Using Planning and Case-Based Reasoning (KHH, AL), pp. 610–615.
- SEKE-2007-KanaskarSR #analysis #approach #detection
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- SEKE-2007-KrenickyWE #design #query
- Exploratory Design of Derivation Business Rules Using Query Rewriting (RK, DW, SME), pp. 467–472.
- SEKE-2007-MizouniSD #case study #composition #requirements
- Using Formal Composition of Use Cases in Requirements Engineering (RM, AS, RD), p. 238–?.
- SEKE-2007-MonteiroOG #implementation #source code #user interface
- A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
- SEKE-2007-MoserPS #agile #development #incremental #modelling #predict
- Incremental Effort Prediction Models in Agile Development using Radial Basis Functions (RM, WP, GS), pp. 519–522.
- SEKE-2007-PengJRZ #case study #component #database #product line #reuse
- Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
- SEKE-2007-Rhem #modelling #uml
- Knowledge Modelling using UML (AJR), p. 755–?.
- SEKE-2007-SettasS #ontology #project management
- Using Ontologies to Represent Software Project Management Antipatterns (DS, IS), pp. 604–609.
- SEKE-2007-TranCT #modelling #process
- Broadening the Use of Process Patterns for Modeling Processes (HNT, BC, DTBT), pp. 57–62.
- SEKE-2007-WongZQCD #effectiveness #fault #locality #network
- Effective Fault Localization using BP Neural Networks (WEW, LZ, YQ, KYC, JD), pp. 374–379.
- SIGIR-2007-AlonsoGB #timeline #visualisation
- Search results using timeline visualizations (OA, MG, RABY), p. 908.
- SIGIR-2007-AzzopardiRB #analysis #query #topic
- Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
- SIGIR-2007-BaiNCB #information retrieval #query
- Using query contexts in information retrieval (JB, JYN, GC, HB), pp. 15–22.
- SIGIR-2007-BanerjeeRG #clustering #wiki
- Clustering short texts using wikipedia (SB, KR, AG), pp. 787–788.
- SIGIR-2007-BroderFGJJZ #classification #query #robust #web
- Robust classification of rare queries using web knowledge (AZB, MF, EG, AJ, VJ, TZ), pp. 231–238.
- SIGIR-2007-CastilloDGMS #detection #web
- Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
- SIGIR-2007-Collins-ThompsonC #estimation #feedback #nondeterminism #pseudo
- Estimation and use of uncertainty in pseudo-relevance feedback (KCT, JC), pp. 303–310.
- SIGIR-2007-Diaz #performance #predict
- Performance prediction using spatial autocorrelation (FD), pp. 583–590.
- SIGIR-2007-FernandezL #analysis #detection
- Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
- SIGIR-2007-FranzX #multi #segmentation
- Story segmentation of broadcast news in Arabic, Chinese and English using multi-window features (MF, JMX), pp. 703–704.
- SIGIR-2007-FuKS #collaboration #query #retrieval #topic
- Using collaborative queries to improve retrieval for difficult topics (XF, DK, CS), pp. 879–880.
- SIGIR-2007-GaoNNZHWH #query
- Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
- SIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo
- An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
- SIGIR-2007-KyriakopoulouK #classification #clustering
- Using clustering to enhance text classification (AK, TK), pp. 805–806.
- SIGIR-2007-LiLHC #ad hoc #corpus #query #wiki
- Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
- SIGIR-2007-LiuHAY #named #performance #predict #sentiment
- ARSA: a sentiment-aware model for predicting sales performance using blogs (YL, XH, AA, XY), pp. 607–614.
- SIGIR-2007-Metzler #modelling #parametricity
- Using gradient descent to optimize language modeling smoothing parameters (DM), pp. 687–688.
- SIGIR-2007-MetzlerC #concept #markov #random
- Latent concept expansion using markov random fields (DM, WBC), pp. 311–318.
- SIGIR-2007-QiuLBCK #ambiguity #metadata #query
- Quantify query ambiguity using ODP metadata (GQ, KL, JB, CC, ZK), pp. 697–698.
- SIGIR-2007-SitbonB #segmentation #topic
- Topic segmentation using weighted lexical links (WLL) (LS, PB), pp. 737–738.
- SIGIR-2007-SmuckerA #similarity #web
- Using similarity links as shortcuts to relevant web pages (MDS, JA), pp. 863–864.
- SIGIR-2007-TurnbullBTL #semantics #set #towards
- Towards musical query-by-semantic-description using the CAL500 data set (DT, LB, DAT, GRGL), pp. 439–446.
- SIGIR-2007-Wan #clustering #documentation #evaluation #named
- OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
- SIGIR-2007-WhiteBC #interactive #web
- Studying the use of popular destinations to enhance web search interaction (RWW, MB, SC), pp. 159–166.
- SIGIR-2007-ZhangHRJ #learning #query
- Query rewriting using active learning for sponsored search (WVZ, XH, BR, RJ), pp. 853–854.
- SIGIR-2007-ZhengCSZ #framework #learning #ranking
- A regression framework for learning ranking functions using relative relevance judgments (ZZ, KC, GS, HZ), pp. 287–294.
- SIGIR-2007-ZhuYCG #classification #matrix
- Combining content and link for classification using matrix factorization (SZ, KY, YC, YG), pp. 487–494.
- ECMDA-FA-2007-Warmer #domain-specific language #modelling
- A Model Driven Software Factory Using Domain Specific Languages (JW), pp. 194–203.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-PilskalnsWI #debugging #runtime #uml
- Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
- SPLC-2007-BeucheBDFGHJJKMW #product line #requirements #tool support
- Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice (DB, AB, HD, AF, HG, GH, DJ, IJ, RTK, TvdM, AW), pp. 84–96.
- SPLC-2007-KastnerAB #aspectj #case study #implementation
- A Case Study Implementing Features Using AspectJ (CK, SA, DSB), pp. 223–232.
- SPLC-2007-VolterG #aspect-oriented #development #implementation #modelling #product line
- Product Line Implementation using Aspect-Oriented and Model-Driven Software Development (MV, IG), pp. 233–242.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-PilskalnsWI #debugging #runtime #uml
- Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
- ECOOP-2007-DoorenS #abstraction #inheritance
- A Higher Abstraction Level Using First-Class Inheritance Relations (MvD, ES), pp. 425–449.
- ECOOP-2007-VaziriTFD #declarative
- Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
- OOPSLA-2007-BuytaertGHAEB #compilation
- Using hpm-sampling to drive dynamic compilation (DB, AG, MH, MA, LE, KDB), pp. 553–568.
- OOPSLA-2007-Rinard #termination
- Using early phase termination to eliminate load imbalances at barrier synchronization points (MCR), pp. 369–386.
- AdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling
- Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, BÁ, FL), pp. 168–179.
- LOPSTR-2007-ZhangN #constraints #scalability #theorem proving #unification
- A Scalable Inclusion Constraint Solver Using Unification (YZ, FN), pp. 121–137.
- PADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #verification
- Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
- PADL-2007-FisselerKBKM #algebra #haskell #information management
- Algebraic Knowledge Discovery Using Haskell (JF, GKI, CB, AK, CM), pp. 80–93.
- PADL-2007-HuangHP #named #parallel #process
- HPorter: Using Arrows to Compose Parallel Processes (LH, PH, JP), pp. 275–289.
- PEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code
- Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
- PLDI-2007-CheremPR #analysis #detection #memory management
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- PLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics
- Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
- PLDI-2007-RamanathanGJ #mining #specification
- Static specification inference using predicate mining (MKR, AG, SJ), pp. 123–134.
- POPL-2007-ShenSMD #approximate #locality
- Locality approximation using time (XS, JS, BM, CD), pp. 55–61.
- PPDP-2007-Lucas #proving #termination
- Practical use of polynomials over the reals in proofs of termination (SL), pp. 39–50.
- PPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis
- Detecting defects in Erlang programs using static analysis (KFS), p. 37.
- QAPL-2007-BistarelliMRS #constraints #graph #logic programming #modelling #multi
- Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming (SB, UM, FR, FS), pp. 111–127.
- QAPL-2007-YaikhomCGH #approach #modelling #performance
- A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
- SAS-2007-SankaranarayananIG #program analysis
- Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
- SAS-2007-Tip #constraints #refactoring
- Refactoring Using Type Constraints (FT), pp. 1–17.
- SIGAda-2007-Lau #imperative #reasoning #source code
- Using SPARK for a beginner’s course on reasoning about imperative programs (KKL), pp. 75–78.
- SIGAda-2007-Maurer #ada #proving
- Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
- SIGAda-2007-PukiteL #design #logic #simulation
- Generic discrete event simulations using DEGAS: application to logic design and digital signal processing (PP, LL), pp. 27–40.
- SIGAda-2007-Sward #ada #architecture #named #web #web service
- SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
- SIGAda-2007-Sward07a #ada #architecture
- Using ada in a service-Ooriented architecture (RES), pp. 63–68.
- RE-2007-BhatG #maintenance
- Enhancing Requirement Stakeholder Satisfaction during Far-shore Maintenance of Custom Developed Software using Shift-Pattern Model (JMB, MG), pp. 322–327.
- RE-2007-ConejeroHMA #requirements
- Discovering Volatile and Aspectual Requirements Using a Crosscutting Pattern (JMC, JH, AMDM, JA), pp. 391–392.
- RE-2007-Fricker #network #social
- Explaining Stakeholder Negotiation Using Social Goal Networks (SF), pp. 387–388.
- RE-2007-KartsevaGT #design #enterprise
- Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
- RE-2007-MaidenLRJB #modelling
- Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System (NAMM, JL, DR, SJ, DB), pp. 49–52.
- RE-2007-MunirajJ #prototype #requirements
- Requirements Engineering using Prototyping Projects in Healthcare Diagnostic Software Applications (GM, VJ), pp. 307–312.
- RE-2007-SmithG #game studies #lightweight #requirements
- Using a Game to Introduce Lightweight Requirements Engineering (RS, OG), pp. 379–380.
- REFSQ-2007-FrickerGM #implementation
- Handshaking Between Software Projects and Stakeholders Using Implementation Proposals (SF, TG, PM), pp. 144–159.
- ASE-2007-CabotCR #constraints #modelling #named #ocl #programming #uml #verification
- UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming (JC, RC, DR), pp. 547–548.
- ASE-2007-ChenM #concurrent #source code #testing
- Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
- ASE-2007-ClauseDOP #effectiveness #memory management
- Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
- ASE-2007-LemosBOMMBL #named #reuse #source code
- CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
- ASE-2007-MajumdarX #generative #testing
- Directed test generation using symbolic grammars (RM, RGX), pp. 134–143.
- ASE-2007-NaslavskyR #modelling #testing #traceability
- Using traceability to support model-based regression testing (LN, DJR), pp. 567–570.
- ASE-2007-PoshyvanykM #design #incremental #information retrieval
- Using information retrieval to support design of incremental change of software (DP, AM), pp. 563–566.
- ESEC-FSE-2007-Coman #analysis #automation #developer #low level
- An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
- ESEC-FSE-2007-GrechanikMP #traceability
- Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
- ESEC-FSE-2007-HalfondO #automation #generative #interface #testing #web
- Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
- ESEC-FSE-2007-MajumdarX #generative #testing
- Directed test generation using symbolic grammars (RM, RGX), pp. 553–556.
- ESEC-FSE-2007-PatelBS #capacity #case study
- A case study in assessing and improving capacity using an anatomy of good practice (MP, AB, KS), pp. 509–512.
- ESEC-FSE-2007-SankaranarayananCJI #constraints #feedback #generative #monte carlo
- State space exploration using feedback constraint generation and Monte-Carlo sampling (SS, RMC, GJ, FI), pp. 321–330.
- ESEC-FSE-2007-SherriffHLW #identification #static analysis
- Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
- ESEC-FSE-2007-XuRTQ #java #performance
- Efficient checkpointing of java software using context-sensitive capture and replay (G(X, AR, YT, FQ), pp. 85–94.
- ESEC-FSE-2007-ZibinPAAKE #java
- Object and reference immutability using java generics (YZ, AP, MA, SA, AK, MDE), pp. 75–84.
- GTTSE-2007-SeguraBCT #automation #feature model #graph transformation #modelling
- Automated Merging of Feature Models Using Graph Transformations (SS, DB, ARC, PT), pp. 489–505.
- ICSE-2007-BernerWK #test coverage #testing
- Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
- ICSE-2007-BestJN #distributed #information management #modelling #security
- Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- ICSE-2007-LivieriHMI #analysis #distributed #open source #source code #visualisation
- Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
- ICSE-2007-RajapakseJ #analysis #trade-off #web
- Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
- ICSE-2007-RunesonAN #detection #fault #natural language
- Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
- ICSE-2007-Staron #education #evaluation #learning #process #re-engineering #student
- Using Experiments in Software Engineering as an Auxiliary Tool for Teaching — A Qualitative Evaluation from the Perspective of Students’ Learning Process (MS), pp. 673–676.
- ICSE-2007-YuanM #feedback #runtime #testing #user interface
- Using GUI Run-Time State as Feedback to Generate Test Cases (XY, AMM), pp. 396–405.
- ICSE-2007-Zualkernan #learning #programming
- Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes (IAZ), pp. 723–726.
- SAC-2007-AhamedHSK #pervasive
- Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
- SAC-2007-Avila-GarciaER #modelling #product line
- Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
- SAC-2007-BistarelliFP
- Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
- SAC-2007-BoussellaaZA #hybrid
- A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
- SAC-2007-BraghettoFP #control flow #process #specification
- Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
- SAC-2007-CambroneroPDV #modelling #web #web service
- Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
- SAC-2007-Cardoso-CachopoO #categorisation #classification
- Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
- SAC-2007-ChenL #hardware
- Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
- SAC-2007-Chiong #algorithm #search-based
- Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
- SAC-2007-CimadamoreV #approach #java
- Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
- SAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification
- Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
- SAC-2007-FabroV #automation #integration #modelling #weaving
- Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
- SAC-2007-FangWLYD #assessment #detection #multi #sequence
- The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
- SAC-2007-GooneratneTH #algorithm #graph #traversal #verification #web #web service
- Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
- SAC-2007-HuXP #approach #modelling
- Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
- SAC-2007-KawsarFN #lightweight
- A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
- SAC-2007-Kofron #behaviour #component #protocol
- Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
- SAC-2007-LebbahMR #constraints #implementation #performance #reduction
- Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
- SAC-2007-LeeHPLJK #performance #regular expression
- A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
- SAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation
- Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
- SAC-2007-NollR #ontology #traceability
- Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
- SAC-2007-NoordendeBT #mobile #security
- Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
- SAC-2007-OHareGJLOS
- Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
- SAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #verification
- Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
- SAC-2007-PaliwalAB #distributed #verification #web #web service
- Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
- SAC-2007-PaulK #precise #slicing
- Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
- SAC-2007-PereraGB #low level #visualisation
- Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
- SAC-2007-PlattGM #detection #on the #query #sequence #topic
- On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
- SAC-2007-PolatD #privacy
- Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
- SAC-2007-SarfrazR #algorithm #image #polynomial #random
- A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
- SAC-2007-TanC #classification
- Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
- SAC-2007-TetsuyaAHN #ad hoc #generative #network
- Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
- SAC-2007-VarroB #automation #induction #logic programming #model transformation
- Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
- SAC-2007-VuMTA #knowledge base #web
- Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
- SAC-2007-XingXE #approximate #automation #documentation #xml
- Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
- SAC-2007-XiongCL #classification #database #mining #multi
- Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
- SAC-2007-YiYC #mobile #multi
- Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
- SAC-2007-ZhangMMB #locality #network #performance #problem #self
- Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
- SAC-2007-ZhouHP #database #image
- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
- GPCE-2007-JarviMS #adaptation #c++ #composition #concept #library
- Library composition and adaptation using c++ concepts (JJ, MAM, JNS), pp. 73–82.
- CASE-2007-AramakiNKHT #interface #knowledge base
- Human-Robot Interface by using frame like knowledge base (SA, TN, MK, YH, TT), pp. 729–734.
- CASE-2007-BasileCT #fault #online
- Improving on-line fault diagnosis for discrete event systems using time (FB, PC, GDT), pp. 26–32.
- CASE-2007-BukkapatnamK #monitoring
- Container Integrity and Condition Monitoring using RF Vibration Sensor Tags (STSB, RK), pp. 585–590.
- CASE-2007-ChalfounBKP #fault #matrix
- Calibration Using Generalized Error Matrices of a Long Reach Articulated Carrier (JC, CB, DK, YP), pp. 777–782.
- CASE-2007-FalkmanLA #specification
- Specification of Production Systems using PPN and Sequential Operation Charts (PF, BL, KA), pp. 20–25.
- CASE-2007-FontanelliRS #algorithm #locality #metric #performance
- A Fast RANSAC-Based Registration Algorithm for Accurate Localization in Unknown Environments using LIDAR Measurements (DF, LR, SS), pp. 597–602.
- CASE-2007-Gonzalez-CastoloL #approximate #fuzzy #petri net
- Approximating State of DES Using Fuzzy Timed Petri Nets (JCGC, ELM), pp. 722–728.
- CASE-2007-JacksonCM
- A Rationale for the use of Optical Mice Chips for Economic and Accurate Vehicle Tracking (JDJ, DWC, JM), pp. 939–944.
- CASE-2007-KimCAY #mobile
- RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
- CASE-2007-KimLSSZ #approach #biology #metric #performance
- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
- CASE-2007-KimLSSZ07a #approach #biology #metric #performance
- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
- CASE-2007-LamLY #automation #framework #platform #sketching
- Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
- CASE-2007-LiuWL #algorithm #design #effectiveness #multi #platform #product line #search-based #towards
- Towards Effective Multi-platforming Design of Product Family using Genetic Algorithm (ZL, YSW, KSL), pp. 300–305.
- CASE-2007-LjungkrantzA #case study #component #industrial #library #logic #programming
- A Study of Industrial Logic Control Programming using Library Components (OL, KÅ), pp. 117–122.
- CASE-2007-LuHF #network #process #robust #smarttech
- Creating Robust Activity Maps Using Wireless Sensor Network in a Smart Home (CHL, YcH, LCF), pp. 741–746.
- CASE-2007-LuimulaSPPAL #mobile #ubiquitous
- Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
- CASE-2007-MarefatP #automation #modelling #process #retrieval #reuse #similarity
- Similarity-Based Retrieval of CAD Solid Models for Automated Reuse of Machining Process Plans (MMM, CP), pp. 312–317.
- CASE-2007-McVittieSMMLHM #automation #classification
- Automated Classification of Macrophage Membrane Integrity using a Fluorescent Live/Dead Stain (PM, CSS, TWM, SM, MEL, MH, DRM), pp. 554–559.
- CASE-2007-MitaniYH #analysis
- Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
- CASE-2007-SarkisSD #automation #modelling #parametricity
- Modeling the Variation of the Intrinsic Parameters of an Automatic Zoom Camera System using Moving Least-Squares (MS, CTS, KD), pp. 560–565.
- CASE-2007-WangLS #injection
- Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
- CASE-2007-YamamotoFI #3d #metric #multi #performance
- A High-Speed 3D Shape Measurement System Using a Multi-Sided Mirror (KY, HF, II), pp. 823–828.
- CASE-2007-YogeswaranPT #algorithm #heuristic #hybrid #problem #search-based
- An hybrid heuristic using genetic algorithm and simulated annealing algorithm to solve machine loading problem in FMS (MY, SGP, MKT), pp. 182–187.
- CASE-2007-YoonHMSR #algorithm #image #navigation #performance
- Efficient Navigation Algorithm Using 1D Panoramic Images (SY, WH, SKM, YS, KSR), pp. 536–541.
- CASE-2007-YuanZCC #automation
- Automatic Mixing of Bio-Samples Using Micro-Channel and Centrifugation (LY, YFZ, WC, MC), pp. 634–639.
- CASE-2007-ZuHT #coordination #generative #integer #linear #programming
- Trajectory Generation in Relative Velocity Coordinates Using Mixed Integer Linear Programming with IHDR Guidance (DZ, JH, DT), pp. 1125–1130.
- CC-2007-JeonSH #data access #layout
- Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
- CC-2007-LeeRBM #constraints #control flow #graph
- Correcting the Dynamic Call Graph Using Control-Flow Constraints (BL, KR, MDB, KSM), pp. 80–95.
- CC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling
- Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
- CC-2007-PazP #garbage collection
- Using Prefetching to Improve Reference-Counting Garbage Collectors (HP, EP), pp. 48–63.
- CC-2007-ScholzB #analysis #composition #data flow #framework
- A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
- CGO-2007-BarthouDCDJ #compilation #composition #kernel #optimisation
- Loop Optimization using Hierarchical Compilation and Kernel Decomposition (DB, SD, PC, AD, WJ), pp. 170–184.
- CGO-2007-CavazosFABOT #compilation #optimisation #performance
- Rapidly Selecting Good Compiler Optimizations using Performance Counters (JC, GF, FVA, EVB, MFPO, OT), pp. 185–197.
- CGO-2007-DaiLH #execution #network #pipes and filters
- Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
- CGO-2007-GrzegorczykSKW #feedback
- Isla Vista Heap Sizing: Using Feedback to Avoid Paging (CG, SS, CK, RW), pp. 325–340.
- COCV-2007-FangS #bidirectional #compilation #generative #java
- Generating Java Compiler Optimizers Using Bidirectional CTL (LF, MS), pp. 49–63.
- DAC-2007-AksoyCFM #metric #optimisation
- Optimization of Area in Digital FIR Filters using Gate-Level Metrics (LA, EACdC, PFF, JCM), pp. 420–423.
- DAC-2007-ChenL #statistics #testing
- Extraction of Statistical Timing Profiles Using Test Data (YYC, JJL), pp. 509–514.
- DAC-2007-CzajkowskiB
- Using Negative Edge Triggered FFs to Reduce Glitching Power in FPGA Circuits (TSC, SDB), pp. 324–329.
- DAC-2007-DengBWYZ #named #performance #satisfiability
- EHSAT: An Efficient RTL Satisfiability Solver Using an Extended DPLL Procedure (SD, JB, WW, XY, YZ), pp. 588–593.
- DAC-2007-DongL #performance #simulation
- Accelerating Harmonic Balance Simulation Using Efficient Parallelizable Hierarchical Preconditioning (WD, PL), pp. 436–439.
- DAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics
- Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
- DAC-2007-GhodratLR #analysis #estimation #hybrid
- Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
- DAC-2007-HallschmidS #automation #energy #modelling
- Automatic Cache Tuning for Energy-Efficiency using Local Regression Modeling (PH, RS), pp. 732–737.
- DAC-2007-KangKIAR #estimation #metric #online #reliability
- Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
- DAC-2007-KangKR #design #power management
- Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop (KK, KK, KR), pp. 934–939.
- DAC-2007-KocKEO #embedded #memory management #multi
- Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
- DAC-2007-LiuLC #algorithm #approximate #multi #optimisation
- A Provably Good Approximation Algorithm for Power Optimization Using Multiple Supply Voltages (HYL, WPL, YWC), pp. 887–890.
- DAC-2007-RamalingamSNOP #analysis #composition #modelling
- Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
- DAC-2007-YeZL #optimisation #performance #power management #statistics
- Statistical Leakage Power Minimization Using Fast Equi-Slack Shell Based Optimization (XY, YZ, PL), pp. 853–858.
- DAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance
- Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
- DAC-2007-ZhuGSDK #architecture #power management #towards
- Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors (CZ, Z(G, LS, RPD, RGK), pp. 312–317.
- DATE-2007-AnisN #architecture #debugging #interactive #low cost
- Interactive presentation: Low cost debug architecture using lossy compression for silicon debug (EA, NN), pp. 225–230.
- DATE-2007-BorremansLWR #analysis #multi
- Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
- DATE-2007-ChangLR #performance
- Improve CAM power efficiency using decoupled match line scheme (YJC, YHL, SJR), pp. 165–170.
- DATE-2007-CiesielskiAGGB #data flow #diagrams
- Data-flow transformations using Taylor expansion diagrams (MJC, SA, DGP, JG, EB), pp. 455–460.
- DATE-2007-ClausZMS #configuration management #hardware #video
- Using partial-run-time reconfigurable hardware to accelerate video processing in driver assistance system (CC, JZ, FHM, WS), pp. 498–503.
- DATE-2007-ErdoganO #analysis
- An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
- DATE-2007-FaragES #2d #configuration management
- Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
- DATE-2007-GhoshBR #adaptation #scheduling #synthesis
- Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling (SG, SB, KR), pp. 1532–1537.
- DATE-2007-GuptaOJWB #comprehension #distributed #multi #network
- Understanding voltage variations in chip multiprocessors using a distributed power-delivery network (MSG, JLO, RJ, GYW, DMB), pp. 624–629.
- DATE-2007-HaastregtK #interactive #optimisation #performance #random
- Interactive presentation: Feasibility of combined area and performance optimization for superscalar processors using random search (SvH, PMWK), pp. 606–611.
- DATE-2007-HosseinabadyDN #testing
- Using the inter- and intra-switch regularity in NoC switch testing (MH, AD, ZN), pp. 361–366.
- DATE-2007-HuangT #analysis #correlation #multi #performance
- Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
- DATE-2007-KraemerLAM #interactive #parallel #program transformation #source code
- Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
- DATE-2007-KroeningS #image #interactive #proving #refinement #word
- Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs (DK, NS), pp. 1325–1330.
- DATE-2007-LaouamriA #framework #network #testing
- Remote testing and diagnosis of System-on-Chips using network management frameworks (OL, CA), pp. 373–378.
- DATE-2007-LataireVP #design #interactive #multi #optimisation
- Interactive presentation: Optimizing analog filter designs for minimum nonlinear distortions using multisine excitations (JL, GV, RP), pp. 267–272.
- DATE-2007-MangassarianVSNA #estimation #process #pseudo #satisfiability
- Maximum circuit activity estimation using pseudo-boolean satisfiability (HM, AGV, SS, FNN, MSA), pp. 1538–1543.
- DATE-2007-MarianiBC #design
- Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
- DATE-2007-MuellerGS #design #polynomial #programming #trade-off
- Trade-off design of analog circuits using goal attainment and “Wave Front” sequential quadratic programming (DM, HEG, US), pp. 75–80.
- DATE-2007-NardiTNAGLS #analysis #design #statistics
- Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
- DATE-2007-QuSN #configuration management #energy #interactive #runtime #scalability
- Interactive presentation: Using dynamic voltage scaling to reduce the configuration energy of run time reconfigurable devices (YQ, JPS, JN), pp. 147–152.
- DATE-2007-RenterghemDVVQ #compilation #development
- Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
- DATE-2007-RousseauMGMLDG #certification #configuration management
- Enabling certification for dynamic partial reconfiguration using a minimal flow (BR, PM, DG, DM, JDL, FD, YG), pp. 983–988.
- DATE-2007-SeongM #performance #taxonomy
- An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
- DATE-2007-SheldonVL #design #interactive #paradigm
- Interactive presentation: Soft-core processor customization using the design of experiments paradigm (DS, FV, SL), pp. 821–826.
- DATE-2007-TadesseSLBG #analysis #modelling #satisfiability
- Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
- DATE-2007-TongbongMC #evaluation #interactive #metric #multi #statistics #testing
- Interactive presentation: Evaluation of test measures for LNA production testing using a multinormal statistical model (JT, SM, JLC), pp. 731–736.
- DATE-2007-WangCW #optimisation #scheduling #testing
- SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling (ZW, KC, SW), pp. 201–206.
- DATE-2007-Wong #equation #performance #symmetry
- Fast positive-real balanced truncation of symmetric systems using cross Riccati equations (NW), pp. 1496–1501.
- DATE-2007-YonedaIF #algorithm #configuration management #interactive #scheduling
- Interactive presentation: An SoC test scheduling algorithm using reconfigurable union wrappers (TY, MI, HF), pp. 231–236.
- DATE-2007-ZhouB #approach #reduction #scheduling #testing
- Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
- HPCA-2007-ClarkHYMF #hardware #lightweight
- Liquid SIMD: Abstracting SIMD Hardware using Lightweight Dynamic Mapping (NC, AH, SY, SAM, KF), pp. 216–227.
- HPDC-2007-HackerM #queue #reliability
- Using queue structures to improve job reliability (TJH, ZM), pp. 43–54.
- HPDC-2007-KimKMBS #network
- Using content-addressable networks for load balancing in desktop grids (JSK, PJK, MAM, BB, AS), pp. 189–198.
- HPDC-2007-MullerGSF #case study #game studies #multi #online #replication #scalability
- Scaling multiplayer online games using proxy-server replication: a case study of Quake 2 (JM, SG, TS, SF), pp. 219–220.
- ISMM-2007-NguyenR #detection #memory management
- Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
- LCTES-2007-AbouGhazalehFRXLCMM #cpu #machine learning #scalability
- Integrated CPU and l2 cache voltage scaling using machine learning (NA, APF, CR, RX, FL, BRC, DM, RGM), pp. 41–50.
- LCTES-2007-HinesTW
- Addressing instruction fetch bottlenecks by using an instruction register file (SRH, GST, DBW), pp. 165–174.
- PDP-2007-ChongHF #java #memory management
- Pretenuring in Java by Object Lifetime and Reference Density Using Scratch-Pad Memory (KFC, CYH, ASF), pp. 205–212.
- PDP-2007-PlazaVBP #detection #image #network #parallel
- Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations (AP, DV, SB, JP), pp. 333–340.
- PDP-2007-Talia
- Using Grids for Exploiting Data Abundance in Science (DT).
- PPoPP-2007-GontmakherMS #energy #multi #performance #thread
- Using fine grain multithreading for energy efficient computing (AG, AM, AS), pp. 259–269.
- PPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread
- Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
- PPoPP-2007-MamidalaNVSP #on the #performance #scalability #trade-off
- On using connection-oriented vs. connection-less transport for performance and scalability of collective and one-sided operations: trade-offs and impact (ARM, SN, AV, GS, DKP), pp. 46–54.
- SOSP-2007-RossbachHPRAW #hardware #memory management #named #operating system #transaction
- TxLinux: using and managing hardware transactional memory in an operating system (CJR, OSH, DEP, HER, BA, EW), pp. 87–102.
- SOSP-2007-VandiverBLM #commit #fault #scheduling #transaction
- Tolerating byzantine faults in transaction processing systems using commit barrier scheduling (BV, HB, BL, SM), pp. 59–72.
- WRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #verification
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
- ESOP-2007-LeinoS #invariant #verification
- Using History Invariants to Verify Observers (KRML, WS), pp. 80–94.
- FASE-2007-KleinG #diagrams #specification
- Joint Structural and Temporal Property Specification Using Timed Story Scenario Diagrams (FK, HG), pp. 185–199.
- FoSSaCS-2007-BengtsonP #formal method #logic #π-calculus
- Formalising the π-Calculus Using Nominal Logic (JB, JP), pp. 63–77.
- TACAS-2007-YuCL #bound #diagrams #reachability
- Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
- A-MOST-2007-ChenPU #analysis #dependence #generative #modelling #testing
- Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
- A-MOST-2007-FraserW #generative #ltl #model checking #performance #testing
- Using LTL rewriting to improve the performance of model-checker based test-case generation (GF, FW), pp. 64–74.
- CADE-2007-GeBT #modulo theories #quantifier #satisfiability #verification
- Solving Quantified Verification Conditions Using Satisfiability Modulo Theories (YG, CB, CT), pp. 167–182.
- CADE-2007-Harrison #automation #proving
- Automating Elementary Number-Theoretic Proofs Using Gröbner Bases (JH), pp. 51–66.
- CADE-2007-KoprowskiM #dependence #predict #satisfiability
- Predictive Labeling with Dependency Pairs Using SAT (AK, AM), pp. 410–425.
- CADE-2007-MotikSH #logic #reasoning
- Optimized Reasoning in Description Logics Using Hypertableaux (BM, RS, IH), pp. 67–83.
- CADE-2007-TiwariG #logic #program analysis #proving #theorem proving
- Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
- CAV-2007-SinhaC #composition #lazy evaluation #learning #satisfiability #verification
- SAT-Based Compositional Verification Using Lazy Learning (NS, EMC), pp. 39–54.
- CAV-2007-WangYGI #precise #reachability
- Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra (CW, ZY, AG, FI), pp. 352–365.
- ICLP-2007-NieuwenborghCV #fuzzy #set
- Computing Fuzzy Answer Sets Using dlvhex (DVN, MDC, DV), pp. 449–450.
- ICLP-2007-West #animation #logic programming #programming language #specification
- The Use of a Logic Programming Language in the Animation of Z Specifications (MMW), pp. 451–452.
- ISSTA-2007-Koster #consistency #quality
- Using portfolio theory for better and more consistent quality (KK), pp. 108–117.
- ISSTA-2007-NainarCRL #debugging #statistics
- Statistical debugging using compound boolean predicates (PAN, TC, JR, BL), pp. 5–15.
- ISSTA-2007-ShohamYFP #abstraction #mining #specification
- Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
- MBT-2007-DadeauLB #java #ml #specification #testing
- Measuring a Java Test Suite Coverage Using JML Specifications (FD, YL, LdB), pp. 21–32.
- MBT-2007-OuimetL #automation #consistency #satisfiability #specification #state machine #verification
- Automated Verification of Completeness and Consistency of Abstract State Machine Specifications using a SAT Solver (MO, KL), pp. 85–97.
- SAT-2007-DeKV
- Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
- TAP-2007-Gargantini #detection #fault #model checking #testing
- Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
- TAP-2007-LiuMS #automation #contract #generative #quality #query #testing
- Using Contracts and Boolean Queries to Improve the Quality of Automatic Test Generation (L(L, BM, BS), pp. 114–130.
- TAP-2007-RummerS #calculus #java #logic #proving #source code
- Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
- VMCAI-2007-BouillaguetKWZR #data type #first-order #proving #theorem proving #verification
- Using First-Order Theorem Provers in the Jahob Data Structure Verification System (CB, VK, TW, KZ, MCR), pp. 74–88.
- CBSE-2006-CangussuCW #component #multi #process
- Multi Criteria Selection of Components Using the Analytic Hierarchy Process (JWC, KMLC, WEW), pp. 67–81.
- CBSE-2006-CervantesC #architecture #lightweight #product line #workflow
- Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture (HC, SCV), pp. 198–205.
- DocEng-2006-GormishS #documentation #editing #image #standard
- Standards based high resolution Document editing using low resolution proxy images (MJG, ELS), p. 33.
- DocEng-2006-QeliF #aspect-oriented #documentation #programming #xml #xpath
- Filtering XML documents using XPath expressions and aspect-oriented programming (EQ, BF), pp. 85–87.
- DocEng-2006-QeliGF #detection #documentation #xml #xpath
- Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
- DRR-2006-TaghvaBCBPN #automation #information management #relational
- Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
- ECDL-2006-AmatoBDFRS #experience #library #multi
- Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience (GA, PB, FD, FF, FR, PS), pp. 379–390.
- ECDL-2006-ParkKKLK #personalisation
- Personalized Digital E-library Service Using Users’ Profile Information (WP, WK, SK, HL, YKK), pp. 528–531.
- ECDL-2006-SmithKN #replication #repository
- Repository Replication Using NNTP and SMTP (JAS, MK, MLN), pp. 51–62.
- ECDL-2006-SzlavikTL #retrieval #summary #xml
- The Use of Summaries in XML Retrieval (ZS, AT, ML), pp. 75–86.
- HT-2006-Delort #documentation #identification
- Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
- HT-2006-Ruddle #hypermedia #navigation #string
- Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
- JCDL-2006-JordanWG #algorithm #feedback #generative #query
- Using controlled query generation to evaluate blind relevance feedback algorithms (CJ, CRW, QG), pp. 286–295.
- JCDL-2006-KaczmarekHE #certification #evaluation #repository
- Repository software evaluation using the audit checklist for certification of trusted digital repositories (JK, TGH, JE), pp. 107–108.
- JCDL-2006-KulesKS #categorisation #category theory #web
- Categorizing web search results into meaningful and stable categories using fast-feature techniques (BK, JK, BS), pp. 210–219.
- JCDL-2006-McMartinIMWM #library
- Factors motivating use of digital libraries (FPM, ERI, CM, AJW, GM), pp. 254–255.
- JCDL-2006-MedelyanW #consistency
- Measuring inter-indexer consistency using a thesaurus (OM, IHW), pp. 274–275.
- JCDL-2006-OnELKP #approach #clique #effectiveness #library #problem
- An effective approach to entity resolution problem using quasi-clique and its application to digital libraries (BWO, EE, DL, JK, JP), pp. 51–52.
- JCDL-2006-ReckerP #education #library
- Using resources across educational digital libraries (MR, BP), pp. 240–241.
- JCDL-2006-ReichherzerB #documentation #requirements
- Quantifying software requirements for supporting archived office documents using emulation (TR, GB), pp. 86–94.
- PODS-2006-GoelGM #modelling #optimisation
- Asking the right questions: model-driven optimization using probes (AG, SG, KM), pp. 203–212.
- SIGMOD-2006-DengR #approximate #detection #streaming
- Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
- SIGMOD-2006-GawlickKL #database #declarative
- Using the oracle database as a declarative RSS hub (DG, MK, ZHL), p. 722.
- SIGMOD-2006-GouKC #evaluation #performance #query
- Query evaluation using overlapping views: completeness and efficiency (GG, MK, RC), pp. 37–48.
- SIGMOD-2006-KoudasMS #case study #experience
- Using SPIDER: an experience report (NK, AM, DS), p. 719.
- SIGMOD-2006-LimLLWS #data type #query
- Continuous query processing in data streams using duality of data and queries (HSL, JGL, MJL, KYW, IYS), pp. 313–324.
- SIGMOD-2006-OnoseDPC #query #xml
- Rewriting nested XML queries using nested views (NO, AD, YP, EC), pp. 443–454.
- VLDB-2006-BunemanCFK #distributed #partial evaluation #query
- Using Partial Evaluation in Distributed Query Evaluation (PB, GC, WF, AK), pp. 211–222.
- VLDB-2006-DasGKT #query
- Answering Top-k Queries Using Views (GD, DG, NK, DT), pp. 451–462.
- VLDB-2006-HuangCLL #evolution #xml
- XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
- VLDB-2006-LakshmananWZ #query
- Answering Tree Pattern Queries Using Views (LVSL, WHW, Z(Z), pp. 571–582.
- VLDB-2006-MorfoniosI
- CURE for Cubes: Cubing Using a ROLAP Engine (KM, YEI), pp. 379–390.
- VLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity
- Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
- VLDB-2006-ZhangZWSP #feedback #image #interactive
- Using High Dimensional Indexes to Support Relevance Feedback Based Interactive Images Retrival (JZ, XZ, WW, BS, JP), pp. 1211–1214.
- CSEET-2006-BurgeT #case study #challenge #education #re-engineering
- Rising to the Challenge: Using Business-Oriented Case Studies in Software Engineering Education (JEB, DT), pp. 43–50.
- ITiCSE-2006-AssuncaoO #dot-net #education #framework #platform #web #web service
- Teaching web services using .NET platform (LA, ALO), p. 339.
- ITiCSE-2006-Chamillard #education #performance #predict #student
- Using student performance predictions in a computer science curriculum (ATC), pp. 260–264.
- ITiCSE-2006-DaviesCT #education #ontology
- Using a computing ontology for educational purposes (GD, LNC, HT), p. 334.
- ITiCSE-2006-Godejord #education #social
- Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
- ITiCSE-2006-HoodH #education #project management #simulation
- Teaching software project management using simulations (DJH, CSH), pp. 289–293.
- ITiCSE-2006-LeidigFL #information management
- The use of community-based non-profit organizations in information systems capstone projects (PML, RCF, JL), pp. 148–152.
- ITiCSE-2006-ShanmugasundaramJH #visualisation
- Knowledge building using visualizations (VS, PJ, CDH), pp. 23–27.
- ITiCSE-2006-SpaccoHPEHP #case study #design #experience #programming #testing
- Experiences with marmoset: designing and using an advanced submission and testing system for programming courses (JS, DH, WP, FE, JKH, NPP), pp. 13–17.
- ITiCSE-2006-ThomasWS #automation
- Using patterns in the automatic marking of ER-diagrams (PGT, KGW, NS), pp. 83–87.
- ITiCSE-2006-Utting #education #java #problem #programming
- Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME (IU), pp. 193–196.
- SIGITE-2006-Rutherfoord #case study
- Using personality inventories to form teams for class projects: a case study (RHR), pp. 9–14.
- SCAM-J-2005-ZhangBCD06
- Using source transformation to test and model check implicit-invocation systems (HZ, JSB, JRC, JD), pp. 209–227.
- CSMR-2006-GraafWD #architecture #migration #model transformation
- Migrating Supervisory Control Architectures Using Model Transformations (BG, SW, AvD), pp. 153–164.
- CSMR-2006-IvkovicK #architecture #framework #model transformation #refactoring #semantics
- A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations (II, KK), pp. 135–144.
- CSMR-2006-TonuAT #approach #architecture
- Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
- CSMR-2006-WierdaDS #architecture #case study #clustering
- Using Version Information in Architectural Clustering — A Case Study (AW, ED, LJS), pp. 214–228.
- ICPC-2006-BermanDGG #comprehension
- The Sound of Software: Using Sonification to Aid Comprehension (LIB, SD, KBG, NG), pp. 225–229.
- ICPC-2006-JetleyZI #analysis #slicing
- Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
- ICPC-2006-JinC #reverse engineering #tool support
- Integrating Reverse Engineering Tools Using a Service-Sharing Methodology (DJ, JRC), pp. 94–99.
- ICPC-2006-KothariSMH #clustering #evolution
- Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
- ICPC-2006-LawrieFB #assessment #information retrieval #quality
- Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
- ICPC-2006-SafyallahS #dynamic analysis #execution #mining
- Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
- ICPC-2006-StefikFA #comprehension #debugging #effectiveness #music #runtime
- Layered Program Auralization: Using Music to Increase Runtime Program Comprehension and Debugging Effectiveness (AS, KF, RTA), pp. 89–93.
- ICSM-2006-CanforaCP #co-evolution #identification #on the
- On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
- ICSM-2006-FisherCZ #comprehension #difference
- Using Sex Differences to Link Spatial Cognition and Program Comprehension (MF, AC, LZ), pp. 289–298.
- ICSM-2006-GoldHLM #approach #bound #concept #source code
- Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
- ICSM-2006-Hou #constraints #design #source code
- Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
- ICSM-2006-JaffriK #delivery #performance
- Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
- ICSM-2006-LuciaPOZ #comprehension #named #traceability
- COCONUT: COde COmprehension Nurturant Using Traceability (ADL, MDP, RO, FZ), pp. 274–275.
- ICSM-2006-TonellaAS #ranking #testing
- Using the Case-Based Ranking Methodology for Test Case Prioritization (PT, PA, AS), pp. 123–133.
- ICSM-2006-ZhangCZ #e-commerce #process #re-engineering #user interface
- Reengineering User Interfaces of E-Commerce Applications Using Business Processes (QZ, RC, YZ), pp. 428–437.
- MSR-2006-GermanRS #comprehension
- Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
- MSR-2006-KakimotoMKTTM #identification
- Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
- MSR-2006-SagerBPK #algorithm #detection #java
- Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
- MSR-2006-TsunodaMKKM #developer
- Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
- SCAM-2006-BoogerdM #profiling
- Prioritizing Software Inspection Results using Static Profiling (CB, LM), pp. 149–160.
- SCAM-2006-PanKW #classification #debugging #metric #slicing
- Bug Classification Using Program Slicing Metrics (KP, SK, EJWJ), pp. 31–42.
- SCAM-2006-WalensteinMCL #normalisation #term rewriting
- Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
- WCRE-2006-BeyerH #evolution #visualisation
- Animated Visualization of Software History using Evolution Storyboards (DB, AEH), pp. 199–210.
- WCRE-2006-Cerulo #development #on the #process
- On the Use of Process Trails to Understand Software Development (LC), pp. 303–304.
- WCRE-2006-CleveHH #dependence #graph #reverse engineering
- Data Reverse Engineering using System Dependency Graphs (AC, JH, JLH), pp. 157–166.
- WCRE-2006-KoschkeFF #clone detection #detection #syntax
- Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
- WCRE-2006-LormansGDSS #case study #industrial #monitoring #requirements
- Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study (ML, HGG, AvD, RvS, AS), pp. 275–284.
- CIAA-2006-AntoniouHIMP #automaton #finite
- Finding Common Motifs with Gaps Using Finite Automata (PA, JH, CSI, BM, PP), pp. 69–77.
- DLT-2006-Domaratzki
- Characterizing DNA Bond Shapes Using Trajectories (MD), pp. 180–191.
- ICALP-v1-2006-Radhakrishnan #lazy evaluation #random
- Gap Amplification in PCPs Using Lazy Random Walks (JR), pp. 96–107.
- ICALP-v2-2006-DodisR #on the #quantum
- On the Impossibility of Extracting Classical Randomness Using a Quantum Computer (YD, RR), pp. 204–215.
- FM-2006-Boute #formal method #independence #problem
- Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
- FM-2006-DelahayeED #security
- Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
- FM-2006-Preoteasa #logic #pointer #recursion #verification
- Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
- FM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving
- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
- FM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented
- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
- RTA-2006-Bruggink #finite #higher-order #product line #proving
- A Proof of Finite Family Developments for Higher-Order Rewriting Using a Prefix Property (HJSB), pp. 372–386.
- RTA-2006-Bryant #infinity #verification
- Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
- SEFM-2006-RodriguesBCFG #approach
- A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
- SEFM-2006-ZhangHW #component #declarative #modelling #performance #scheduling #uml
- Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time (YZ, TH, JW), pp. 246–258.
- SFM-2006-Harrison #float #proving #theorem proving #verification
- Floating-Point Verification Using Theorem Proving (JH), pp. 211–242.
- FLOPS-2006-DiscoloHMJS #data type #haskell
- Lock Free Data Structures Using STM in Haskell (AD, TH, SM, SLPJ, SS), pp. 65–80.
- FLOPS-2006-Tozawa #transducer #type checking #xml
- XML Type Checking Using High-Level Tree Transducer (AT), pp. 81–96.
- ICFP-2006-HickeyNYK #hybrid #representation
- Mechanized meta-reasoning using a hybrid HOAS/de bruijn representation and reflection (JH, AN, XY, AK), pp. 172–183.
- IFL-2006-TrojahnerGS #array #on the #optimisation #source code
- On Optimising Shape-Generic Array Programs Using Symbolic Structural Information (KT, CG, SBS), pp. 1–18.
- AIIDE-2006-JohanssonO #multi
- Using Multi-Agent System Technology in Risk Bots (SJJ, FO), pp. 42–47.
- AIIDE-2006-Kacmarcik #natural language
- Using Natural Language to Manage NPC Dialog (GK), pp. 115–117.
- AIIDE-2006-Knight #lightweight #network #simulation
- Lightweight Simulation of Air Traffic Control Using Simple Temporal Networks (RK), pp. 48–53.
- AIIDE-2006-McAlindenLCT
- Using Environmental Annotations and Affordances to Model Culture (RM, MvL, WC, WT), pp. 145–146.
- AIIDE-2006-PriceG #network #re-engineering
- Plausible Environment Reconstruction Using Bayesian Networks (RGP, SDG), pp. 130–132.
- AIIDE-2006-SturtevantB #abstraction #collaboration
- Improving Collaborative Pathfinding Using Map Abstraction (NRS, MB), pp. 80–85.
- CIG-2006-ConradieE #game studies #optimisation
- Training Bao Game-Playing Agents using Coevolutionary Particle Swarm Optimization (JC, APE), pp. 67–74.
- CIG-2006-GordonR #game studies #identification #set
- Trappy Minimax - using Iterative Deepening to Identify and Set Traps in Two-Player Games (VSG, AR), pp. 205–210.
- CIG-2006-HeinzKGBL #empirical #game studies #realtime #recognition #smarttech
- Using Wearable Sensors for Real-Time Recognition Tasks in Games of Martial Arts - An Initial Experiment (EAH, KSK, MG, DB, PL), pp. 98–102.
- CIG-2006-MillerMC #detection #network
- Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network (IM, SM, BC), pp. 236–242.
- CIG-2006-NakashimaITN #evolution
- The Effect of Using Match History on the Evolution of RoboCup Soccer Team Strategies (TN, HI, MT, MN), pp. 60–66.
- CIG-2006-ReynoldsAA #algorithm #game studies #optimisation #problem
- Optimization Problem Solving using Predator/Prey Games and Cultural Algorithms (RGR, MZA, RSA), pp. 119–125.
- CIG-2006-RiceMSS #game studies
- A Player for Tactical Air Strike Games Using Evolutionary Computation (AJR, JRM, AS, SS), pp. 83–89.
- CIG-2006-WittkampB #adaptation #evolution #game studies #programming #search-based
- Evolving Adaptive Play for the Game of Spoof Using Genetic Programming (MW, LB), pp. 164–172.
- ICGT-2006-BaresiS #alloy #graph transformation #on the
- On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
- ICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability
- Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
- CHI-2006-BentleyMH #music
- Personal vs. commercial content: the similarities between consumer use of photos and music (FB, CJM, GH), pp. 667–676.
- CHI-2006-BonhardHMS #recommendation #similarity
- Accounting for taste: using profile similarity to improve recommender systems (PB, CH, JDM, MAS), pp. 1057–1066.
- CHI-2006-CosleyFTR #community #overview
- Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
- CHI-2006-DillonKCB #visual notation
- Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
- CHI-2006-GrossmanHBAB
- Hover widgets: using the tracking state to extend the capabilities of pen-operated devices (TG, KH, PB, MA, RB), pp. 861–870.
- CHI-2006-JiangOMS #interactive #pointer
- Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
- CHI-2006-KramerOF #communication
- Using linguistic features to measure presence in computer-mediated communication (ADIK, LMO, SRF), pp. 913–916.
- CHI-2006-LukPLMLH #design #interactive #mobile #prototype
- A role for haptics in mobile interaction: initial design using a handheld tactile display prototype (JL, JP, SL, KEM, VL, VH), pp. 171–180.
- CHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online
- Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
- CHI-2006-PrabakerBC #authoring #documentation #evaluation #programming
- An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
- CHI-2006-PuVF
- Increasing user decision accuracy using suggestions (PP, PV, BF), pp. 121–130.
- CHI-2006-WeiszEK
- Synchronous broadcast messaging: the use of ICT (JDW, TE, WAK), pp. 1293–1302.
- CHI-2006-WilsonA #game studies
- Text entry using a dual joystick game controller (ADW, MA), pp. 475–478.
- CHI-2006-ZhaoAH #multi
- Zone and polygon menus: using relative position to increase the breadth of multi-stroke marking menus (SZ, MA, KH), pp. 1077–1086.
- CSCW-2006-KayanFS #difference
- Cultural differences in the use of instant messaging in Asia and North America (SK, SRF, LDS), pp. 525–528.
- CSCW-2006-TangLMLD #interactive
- Unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction (JCT, SBL, MJM, JL, CD), pp. 479–482.
- SOFTVIS-2006-AlspaughTB #social #visualisation
- Using social agents to visualize software scenarios (TAA, BT, EB), pp. 87–94.
- SOFTVIS-2006-Reiss #abstraction #execution #visualisation
- Visualizing program execution using user abstractions (SPR), pp. 125–134.
- EDOC-2006-BarrettP #automation #composition #modelling #semantics #web #web service
- Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics (RB, CP), pp. 417–422.
- EDOC-2006-DongYZ #composition #petri net #testing #web #web service
- Testing BPEL-based Web Service Composition Using High-level Petri Nets (WLD, HY, YBZ), pp. 441–444.
- EDOC-2006-KunduB #xml
- Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
- EDOC-2006-YanZY #contract #modelling #ontology #owl #semantics
- Ontology Modeling for Contract: Using OWL to Express Semantic Relations (YY, JZ, MY), pp. 409–412.
- ICEIS-AIDSS-2006-AbdullahPBK #architecture #development #information management #knowledge-based #modelling #uml
- Knowledge Engineering Using the UML Profile — Adopting the Model-Driven Architecture for Knowledge-Based System Development (MSA, RFP, IDB, CK), pp. 74–81.
- ICEIS-AIDSS-2006-ProchazkaKK #fuzzy #information management #petri net #process
- Various Process Wizard for Information Systems — Using Fuzzy Petri Nets for Process Definition (JP, JK, CK), pp. 235–242.
- ICEIS-AIDSS-2006-ThuD #predict #risk management
- Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
- ICEIS-DISI-2006-BraunerCBL
- Using Gazetteers to Annotate Geographic Catalog Entries (DFB, MAC, KKB, LAPPL), pp. 215–220.
- ICEIS-DISI-2006-Eessaar #database #relational #repository
- Using Relational Databases in the Engineering Repository Systems (EE), pp. 30–37.
- ICEIS-DISI-2006-PatroARMB #case study #database #information management #integration
- Databases and Information Systems Integration Using CALOPUS: A Case Study (PKP, PA, MR, RMV, SB), pp. 200–207.
- ICEIS-HCI-2006-Bakhtyari #automation #feedback #generative #ontology #student
- Automatic Feedback Generation — Using Ontology in an Intelligent Tutoring System for Both Learner and Author Based on Student Model (PB), pp. 116–123.
- ICEIS-HCI-2006-LiSB #correlation #hybrid #recognition #sketching #synthesis
- Face Recognition from Sketches Using Advanced Correlation Filters Using Hybrid Eigenanalysis for Face Synthesis (YhL, MS, VB), pp. 11–18.
- ICEIS-ISAS-2006-BokhariP #information management #petri net #validation
- Validation of Information Systems Using Petri Nets (AB, WFSP), pp. 284–289.
- ICEIS-ISAS-2006-ChengP #aspect-oriented #development #embedded #overview #realtime #resource management #scheduling
- Using Aspect-Oriented Software Development in Real-Time Embedded Systems Software — A Review of Scheduling, Resource Allocation and Synchronization (PLC, GAP), pp. 388–393.
- ICEIS-ISAS-2006-CostelloFMLD #approach #distributed #framework #modelling #named #process
- iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
- ICEIS-ISAS-2006-DasguptaSKG #hybrid #modelling #re-engineering
- Hybrid Modeling Using I* and Agentspeak(L) Agents in Agent Oriented Software Engineering (AD, FS, AK, AKG), pp. 420–425.
- ICEIS-ISAS-2006-ShishkovQ #modelling #process #refinement
- Refinement of SDBC Business Process Models Using ISDL (BS, DACQ), pp. 61–69.
- ICEIS-ISAS-2006-ZdravkovicH #flexibility #process
- Flexible Realization of Business Processes Using Existing Services (JZ, MH), pp. 165–172.
- ICEIS-J-2006-PourrazV #approach #architecture #evolution
- Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
- ICEIS-SAIC-2006-KoutsomitropoulosMKP #information management #logic
- OWL-Based Knowledge Discovery Using Description Logics Reasoners (DAK, DPM, ANK, TSP), pp. 43–50.
- ICEIS-SAIC-2006-MartinelliSS
- E-Procurement Adoption among Italian Firms by Using Domain Names (MM, IS, MS), pp. 124–131.
- ICEIS-SAIC-2006-SchwindG #combinator #grid #resource management
- Using Shadow Prices for Resource Allocation in a Combinatorial Grid with Proxy-Bidding Agents (MS, OG), pp. 11–18.
- CIKM-2006-BoydellS #community #personalisation #web
- Capturing community search expertise for personalized web search using snippet-indexes (OB, BS), pp. 277–286.
- CIKM-2006-ChirkovaS #optimisation #query
- Query optimization using restructured views (RC, FS), pp. 642–651.
- CIKM-2006-HoseLS #distributed #summary
- Processing relaxed skylines in PDMS using distributed data summaries (KH, CL, KUS), pp. 425–434.
- CIKM-2006-LiC #detection #topic
- Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
- CIKM-2006-MarsoloPR #query
- Structure-based querying of proteins using wavelets (KM, SP, KR), pp. 24–33.
- CIKM-2006-Melucci #ranking
- Ranking in context using vector spaces (MM), pp. 866–867.
- CIKM-2006-QamraTC #clustering #mining
- Mining blog stories using community-based and temporal clustering (AQ, BLT, EYC), pp. 58–67.
- CIKM-2006-RanganathanL #database #information retrieval #query #relational #semantics
- Information retrieval from relational databases using semantic queries (AR, ZL), pp. 820–821.
- CIKM-2006-YangJZNX #clustering #documentation #ranking #validation
- Document re-ranking using cluster validation and label propagation (LY, DHJ, GZ, NY, GX), pp. 690–697.
- CIKM-2006-ZhuangC #query #ranking
- Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
- CIKM-2006-ZieglerSL #automation #proximity #semantics #taxonomy
- Automatic computation of semantic proximity using taxonomic knowledge (CNZ, KS, GL), pp. 465–474.
- ECIR-2006-ChenOT #image #memory management
- Browsing Personal Images Using Episodic Memory (Time + Location) (CC, MPO, JT), pp. 362–372.
- ECIR-2006-KarbasiB #documentation #effectiveness #normalisation #scalability
- Document Length Normalization Using Effective Level of Term Frequency in Large Collections (SK, MB), pp. 72–83.
- ECIR-2006-RodeH #query
- Using Query Profiles for Clarification (HR, DH), pp. 205–216.
- ECIR-2006-WanY #documentation #similarity
- Using Proportional Transportation Distances for Measuring Document Similarity (XW, JY), pp. 25–36.
- ECIR-2006-WenRB #behaviour #online #topic
- The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
- ECIR-2006-YamoutOT #feedback
- Relevance Feedback Using Weight Propagation (FY, MPO, JT), pp. 575–578.
- ECIR-2006-ZhouZH #approach #concept #information retrieval #modelling
- Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
- ICML-2006-AbbeelQN #learning #modelling
- Using inaccurate models in reinforcement learning (PA, MQ, AYN), pp. 1–8.
- ICML-2006-BezakovaKS #graph
- Graph model selection using maximum likelihood (IB, AK, RS), pp. 105–112.
- ICML-2006-BowlingMJNW #learning #policy #predict
- Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
- ICML-2006-DeCoste #collaboration #matrix #predict
- Collaborative prediction using ensembles of Maximum Margin Matrix Factorizations (DD), pp. 249–256.
- ICML-2006-LeeGW #classification
- Using query-specific variance estimates to combine Bayesian classifiers (CHL, RG, SW), pp. 529–536.
- ICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process
- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
- ICML-2006-RainaNK #learning
- Constructing informative priors using transfer learning (RR, AYN, DK), pp. 713–720.
- ICML-2006-SilvaBBE #detection
- Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
- ICML-2006-TeoV #array #kernel #performance #string
- Fast and space efficient string kernels using suffix arrays (CHT, SVNV), pp. 929–936.
- ICML-2006-XiKSWR #classification #performance #reduction
- Fast time series classification using numerosity reduction (XX, EJK, CRS, LW, CAR), pp. 1033–1040.
- ICPR-v1-2006-AhmadL #image #multi #recognition #sequence
- HMM-based Human Action Recognition Using Multiview Image Sequences (MA, SWL), pp. 263–266.
- ICPR-v1-2006-ArandjelovicC #classification #set
- Face Set Classification using Maximally Probable Mutual Modes (OA, RC), pp. 511–514.
- ICPR-v1-2006-AsharafM #clustering #scalability
- Scalable non-linear Support Vector Machine using hierarchical clustering (SA, MNM), pp. 908–911.
- ICPR-v1-2006-BabaMA #geometry
- A Unified Camera Calibration Using Geometry and Blur of Feature Points (MB, MM, NA), pp. 816–819.
- ICPR-v1-2006-BartelsWM #generative
- DTM Generation from LIDAR Data using Skewness Balancing (MB, HW, DCM), pp. 566–569.
- ICPR-v1-2006-Bayro-CorrochanoM #algebra #fuzzy #geometry #logic
- Object Manipulation using Fuzzy Logic and Geometric Algebra (EBC, RMC), pp. 1120–1123.
- ICPR-v1-2006-BenjellounTM #detection
- Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
- ICPR-v1-2006-Bernier #3d #realtime
- Real-Time 3D Articulated Pose Tracking using Particle Filters Interacting through Belief Propagation (OB), pp. 90–93.
- ICPR-v1-2006-BerrettiBP #3d #clustering
- Partitioning of 3D Meshes using Reeb Gra (SB, ADB, PP), pp. 19–22.
- ICPR-v1-2006-BhattacharyaRD #clustering #fuzzy #image #representation #retrieval #semantics
- Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 929–935.
- ICPR-v1-2006-BuenaposadaM #animation #independence #performance
- Performance driven facial animation using illumination independent appearance-based tracking (JMB, EM), pp. 303–306.
- ICPR-v1-2006-CaoXF #constant #self
- Self-Calibration Using Constant Camera Motion (XC, JX, HF), pp. 595–598.
- ICPR-v1-2006-ChangCYY #estimation #interactive #realtime
- An Intelligent Bulletin Board System with Real-time Vision-based Interaction Using Head Pose Estimation (CYC, PCC, YSY, JFY), pp. 1140–1143.
- ICPR-v1-2006-ChaoTTJ #detection #fault
- Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
- ICPR-v1-2006-ChenCLT #algorithm #automation #graph #image #segmentation
- Automatic Segmentation of Lung Fields from Radiographic Images of SARS Patients Using a New Graph Cuts Algorithm (SC, LC, JL, XT), pp. 271–274.
- ICPR-v1-2006-ChenHHH #segmentation
- Segmentation of Human Body Parts Using Deformable Triangulation (CCC, JWH, YTH, CYH), pp. 355–358.
- ICPR-v1-2006-ConduracheA #2d #classification #image #linear #segmentation
- Vessel Segmentation in 2D-Projection Images Using a Supervised Linear Hysteresis Classifier (AC, TA), pp. 343–346.
- ICPR-v1-2006-DongWH #gesture #segmentation #sequence #similarity #video
- Gesture Segmentation from a Video Sequence Using Greedy Similarity Measure (QD, YW, ZH), pp. 331–334.
- ICPR-v1-2006-DoYC #detection #estimation
- Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
- ICPR-v1-2006-DuCXL #interactive #network #process
- Recognizing Interaction Activities using Dynamic Bayesian Network (YD, FC, WX, YL), pp. 618–621.
- ICPR-v1-2006-FaggianPC #recognition #segmentation #video
- Face Recognition From Video using Active Appearance Model Segmentation (NF, APP, TJC), pp. 287–290.
- ICPR-v1-2006-FrippWCO #3d #automation #modelling #segmentation
- Automatic Segmentation of the Knee Bones using 3D Active Shape Models (JF, SKW, SC, SO), pp. 167–170.
- ICPR-v1-2006-FuTC #orthogonal
- Specular Free Spectral Imaging Using Orthogonal Subspace Projection (ZF, RTT, TC), pp. 812–815.
- ICPR-v1-2006-GaoWFZ #recognition
- Face Recognition Using Most Discriminative Local and Global Features (YG, YW, XF, XZ), pp. 351–354.
- ICPR-v1-2006-ItoO #detection #invariant #recognition
- Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
- ICPR-v1-2006-Katayama
- Camera Calibration with a Transparent Calibration Tool Using Color Filters: Application to Stereo Camera Calibration for a Distant Object (YK), pp. 607–612.
- ICPR-v1-2006-KaufholdCHR #classification #recognition #segmentation
- Recognition and Segmentation of Scene Content using Region-Based Classification (JPK, RC, AH, PR), pp. 755–760.
- ICPR-v1-2006-KawasakiFN #3d
- 3D acquisition system using uncalibrated line-laser projec (HK, RF, YN), pp. 1071–1075.
- ICPR-v1-2006-KimK #classification
- Simultaneous Classification and VisualWord Selection using Entropy-based Minimum Description Length (SK, ISK), pp. 650–653.
- ICPR-v1-2006-KimK06a #parametricity
- Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
- ICPR-v1-2006-KushalRFPH #locality #modelling #visual notation
- Audio-Visual Speaker Localization Using Graphical Models (AK, MR, FFL, JP, TSH), pp. 291–294.
- ICPR-v1-2006-LaggerF #multi
- Using Specularities to Recover Multiple Light Sources in the Presence of Texture (PL, PF), pp. 587–590.
- ICPR-v1-2006-Lhuillier #effectiveness #fault
- Effective and Generic Structure from Motion using Angular Error (ML), pp. 67–70.
- ICPR-v1-2006-LiangA
- Fingerprint Matching Using Minutia Polygons (XL, TA), pp. 1046–1049.
- ICPR-v1-2006-LiSH #image #recognition
- Face Recognition using Patch-based Spin Images (YL, WAPS, ERH), pp. 408–411.
- ICPR-v1-2006-LiuLYAL #coordination
- Object Tracking Using Globally Coordinated Nonlinear Manifolds (CBL, RSL, MHY, NA, SEL), pp. 844–847.
- ICPR-v1-2006-LladoBA #parametricity #re-engineering
- Euclidean Reconstruction of Deformable Structure Using a Perspective Camera with Varying Intrinsic Parameters (XL, ADB, LdA), pp. 139–142.
- ICPR-v1-2006-Lopez-FrancoB #algebra #geometry #invariant #navigation
- Omnidirectional Vision and Invariant Theory for Robot Navigation Using Conformal Geometric Algebra (CLF, EBC), pp. 570–573.
- ICPR-v1-2006-LublinermanOZC #linear #process #recognition #validation
- Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
- ICPR-v1-2006-MarmoAC #classification #set
- Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
- ICPR-v1-2006-MenezesLD #3d #data fusion #gesture
- Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot (PM, FL, JD), pp. 464–467.
- ICPR-v1-2006-MiaoQS #composition #principle
- Unsupervised Decomposition of Mixed Pixels Using the Maximum Entropy Principle (LM, HQ, HS), pp. 1067–1070.
- ICPR-v1-2006-OhayonR #3d #estimation #robust
- Robust 3D Head Tracking Using Camera Pose Estimation (SO, ER), pp. 1063–1066.
- ICPR-v1-2006-PerrinDZ #2d #3d #assessment #parametricity #process
- 2D and 3D Vegetation Resource Parameters Assessment using Marked Point Processes (GP, XD, JZ), pp. 1–4.
- ICPR-v1-2006-PongC #3d #detection #modelling
- Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
- ICPR-v1-2006-PradeepR
- Improving Shape from Focus Using Defocus Information (KSP, ANR), pp. 731–734.
- ICPR-v1-2006-PrehnS #adaptation #algorithm #classification #clustering #incremental #robust
- An Adaptive Classification Algorithm Using Robust Incremental Clustering (HP, GS), pp. 896–899.
- ICPR-v1-2006-PupilliC #3d #modelling #realtime
- Real-Time Camera Tracking Using Known 3D Models and a Particle Filter (MP, AC), pp. 199–203.
- ICPR-v1-2006-QiuGDC #image #optimisation
- Tone Mapping for HDR Image using Optimization A New Closed Form Solution (GQ, JG, JD, MC), pp. 996–999.
- ICPR-v1-2006-RavulapalliS #video
- Association of Sound to Motion in Video using Perceptual Organization (SR, SS), pp. 1216–1219.
- ICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering
- 3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
- ICPR-v1-2006-RiponTKI #algorithm #clustering #multi #search-based
- Multi-Objective Evolutionary Clustering using Variable-Length Real Jumping Genes Genetic Algorithm (KSNR, CHT, SK, MKI), pp. 1200–1203.
- ICPR-v1-2006-SungLK #realtime #recognition
- A Real-Time Facial Expression Recognition using the STAAM (JS, SL, DK), pp. 275–278.
- ICPR-v1-2006-TakeshimaIK #detection #self
- Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
- ICPR-v1-2006-TakizawaY #3d #modelling #re-engineering
- Surface Reconstruction from Stereovision Data Using a 3-D MRF of Discrete Object Models (HT, SY), pp. 27–30.
- ICPR-v1-2006-TanakaHOK
- Use of Viewpoint Information for Example Selection in CBIR (KT, MH, NO, EK), p. 1054.
- ICPR-v1-2006-TongWZJ #multi
- Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
- ICPR-v1-2006-TrujilloO #detection #evolution #how
- Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
- ICPR-v1-2006-WangB #3d #automation #estimation
- Automatic Estimation of 3D Transformations using Skeletons for Object Alignment (TW, AB), pp. 51–54.
- ICPR-v1-2006-WeiB #data analysis #segmentation #statistics
- Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
- ICPR-v1-2006-WijewickremaPE #image #re-engineering
- Reconstruction of Spheres using Occluding Contours from Stereo Images (SNRW, APP, CEE), pp. 151–154.
- ICPR-v1-2006-WongC #classification #gesture #recognition
- Continuous Gesture Recognition using a Sparse Bayesian Classifier (SFW, RC), pp. 1084–1087.
- ICPR-v1-2006-WuW #graph
- Stereo Correspondence Using Stripe Adjacency Graph (CCW, ZFW), pp. 123–126.
- ICPR-v1-2006-XieL #animation #markov #modelling #speech
- Speech Animation Using Coupled Hidden Markov Models (LX, ZQL), pp. 1128–1131.
- ICPR-v1-2006-YingZ06a #image
- Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
- ICPR-v1-2006-YinWLB #3d #interactive
- Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
- ICPR-v1-2006-YouZCWT #representation
- Face Representation By Using Non-tensor Product Wavelets (XY, DZ, QC, PSPW, YYT), pp. 503–506.
- ICPR-v1-2006-ZengL #markov #random #segmentation
- Stroke Segmentation of Chinese Characters Using Markov Random Fields (JZ, ZQL), pp. 868–871.
- ICPR-v1-2006-ZhangFX #detection #image #orthogonal
- Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
- ICPR-v1-2006-ZhangSL #multi #segmentation
- Motion Segmentation by Multibody Trifocal Tensor Using Line Correspondence (JZ, FS, YL), pp. 599–602.
- ICPR-v1-2006-ZhangT #documentation #image
- RestoringWarped Document Images using Shape-from-Shading and Surface Interpolation (LZ, CLT), pp. 642–645.
- ICPR-v1-2006-ZhongMH
- Camera Calibration Using Circle and Right Angles (HZ, FM, YSH), pp. 646–649.
- ICPR-v1-2006-ZhouW06a #verification
- Face Verification Using GaborWavelets and AdaBoost (MZ, HW), pp. 404–407.
- ICPR-v2-2006-AhnKB #estimation #graph #robust #segmentation
- Robust Object Segmentation Using Graph Cut with Object and Background Seed Estimation (JHA, KCK, HB), pp. 361–364.
- ICPR-v2-2006-AndelicSKK #hybrid #kernel #modelling #speech
- A Hybrid HMM-Based Speech Recognizer Using Kernel-Based Discriminants as Acoustic Models (EA, MS, MK, SEK), pp. 1158–1161.
- ICPR-v2-2006-ArivazhaganGK #classification #statistics
- Texture classification using Curvelet Statistical and Co-occurrence Features (SA, LG, TGSK), pp. 938–941.
- ICPR-v2-2006-BarakatB
- Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
- ICPR-v2-2006-BhattacharyaRD06a #clustering #fuzzy #image #representation #retrieval #semantics
- Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 1162–1168.
- ICPR-v2-2006-BhuiyanN #classification #detection #image
- Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
- ICPR-v2-2006-ChenB #classification #invariant
- Invariant Texture Classification Using Ridgelet Packets (GC, PB), pp. 464–467.
- ICPR-v2-2006-ChenW #analysis #component #independence #segmentation
- Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
- ICPR-v2-2006-ChenY #modelling #video
- Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
- ICPR-v2-2006-ChiangK #classification
- Classification of Line and Character Pixels on Raster Maps Using Discrete Cosine Transformation Coefficients and Support Vector Machine (YYC, CAK), pp. 1034–1037.
- ICPR-v2-2006-ChiuL #invariant
- Matching Interest Points Using Affine Invariant Concentric Circles (HPC, TLP), pp. 167–170.
- ICPR-v2-2006-ChoiLY #classification #feature model
- Feature Extraction for Bank Note Classification Using Wavelet Transform (EC, JL, JY), pp. 934–937.
- ICPR-v2-2006-CourteilleDM #problem
- A Global Solution to the SFS Problem Using B-spline Surface and Simulated Annealing (FC, JDD, GM), pp. 332–335.
- ICPR-v2-2006-DornaikaD #modelling #recognition
- Facial Expression Recognition using Auto-regressive Models (FD, FD), pp. 520–523.
- ICPR-v2-2006-DowsonBK #image
- Image template matching using Mutual Information and NP-Windows (NDHD, RB, TK), pp. 1186–1191.
- ICPR-v2-2006-Ekbal #classification #predict
- Improvement of Prediction Accuracy Using Discretization and Voting Classifier (AE), pp. 695–698.
- ICPR-v2-2006-FangC #detection #robust #statistics
- Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
- ICPR-v2-2006-FloreaBRB #image #representation
- Using texture-based symbolic features for medical image representation (FF, EB, AR, AB), pp. 946–949.
- ICPR-v2-2006-FuLHB #image #retrieval
- Content-based Image Retrieval Using Gabor-Zernike Features (XF, YL, RWH, SB), pp. 417–420.
- ICPR-v2-2006-GanD #relational
- Differentiating Between Many Similar Features using Relational Information in Space and Scale (TSYG, TD), pp. 638–641.
- ICPR-v2-2006-GongY #estimation #orthogonal #programming
- Disparity Flow Estimation using Orthogonal Reliability-based Dynamic Programming (MG, YHY), pp. 70–73.
- ICPR-v2-2006-GrimHSP #approach #modelling
- A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
- ICPR-v2-2006-Guo #perspective
- Plane Rectification Using a Circle and Points from a Single View (FG), pp. 9–12.
- ICPR-v2-2006-GuptaD #detection #multi
- Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
- ICPR-v2-2006-HaindlM #approach #modelling #multi #segmentation
- Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
- ICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string
- Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
- ICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation
- New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
- ICPR-v2-2006-Kita #detection
- Change detection using joint intensity histogram (YK), pp. 351–356.
- ICPR-v2-2006-KuijperOBG #2d #set #symmetry
- Matching 2D Shapes using their Symmetry Sets (AK, OFO, PB, PJG), pp. 179–182.
- ICPR-v2-2006-LeS #detection #named #robust
- Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
- ICPR-v2-2006-LiLL #framework #geometry #multi
- A Geometric Active Contour Framework using Multi-Cue and Local Feature (ZL, QL, HL), pp. 113–116.
- ICPR-v2-2006-LiLWH #detection #framework #image #novel
- A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
- ICPR-v2-2006-LimCG #identification
- Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
- ICPR-v2-2006-Liu #classification #feature model #polynomial #recognition
- High Accuracy Handwritten Chinese Character Recognition Using Quadratic Classifiers with Discriminative Feature Extraction (CLL), pp. 942–945.
- ICPR-v2-2006-LiuL #classification #image
- Genus-Zero Shape Classification Using Spherical Normal Image (SL, JL), pp. 126–129.
- ICPR-v2-2006-LocteauRALHT #algorithm #approximate #multi #search-based
- Approximation of Digital Curves using a Multi-Objective Genetic Algorithm (HL, RR, SA, YL, PH, ÉT), pp. 716–719.
- ICPR-v2-2006-Mainar-RuizP #approximate #multi #nearest neighbour
- Approximate Nearest Neighbor Search using a Single Space-filling Curve and Multiple Representations of the Data Points (GMR, JCPC), pp. 502–505.
- ICPR-v2-2006-MakkapatiM #encoding
- Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
- ICPR-v2-2006-Mancas-ThillouG
- Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
- ICPR-v2-2006-MaZSCG #estimation #robust
- Robust Head Pose Estimation Using LGBP (BM, WZ, SS, XC, WG), pp. 512–515.
- ICPR-v2-2006-MeleMS #categorisation #image #probability
- Image Categorization Using Local Probabilistic Descriptors (KM, JM, DS), pp. 336–340.
- ICPR-v2-2006-NedzvedAU #pseudo
- Gray-scale thinning by using a pseudo-distance map (AN, SA, SU), pp. 239–242.
- ICPR-v2-2006-OsawaWWY #3d
- Human Tracking by Particle Filtering Using Full 3D Model of Both Target and Environment (TO, XW, KW, TY), pp. 25–28.
- ICPR-v2-2006-PanBD #bottom-up #contest #functional #image #segmentation
- Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional (YP, JDB, SMD), pp. 117–121.
- ICPR-v2-2006-PriorW #fault #parametricity #probability #random
- Parameter Tuning using the Out-of-Bootstrap Generalisation Error Estimate for Stochastic Discrimination and Random Forests (MP, TW), pp. 498–501.
- ICPR-v2-2006-QiaoY06a #bidirectional #image #multi
- Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search (YQ, MY), pp. 970–973.
- ICPR-v2-2006-RamalhoM #detection #image
- Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
- ICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation
- A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
- ICPR-v2-2006-ShiratoriGK #performance
- An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
- ICPR-v2-2006-SomolP #algorithm #feature model #keyword #multi #prototype
- Multi-Subset Selection for Keyword Extraction and Other Prototype Search Tasks Using Feature Selection Algorithms (PS, PP), pp. 736–739.
- ICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering
- Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
- ICPR-v2-2006-Sun06a #multi #recognition
- Multi-Linguistic Optical Font Recognition Using Stroke Templates (HMS), pp. 889–892.
- ICPR-v2-2006-SunV #detection #linear #multi #performance
- Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
- ICPR-v2-2006-TangT #analysis #linear #performance
- Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
- ICPR-v2-2006-TerradesTV #adaptation
- Combination of shape descriptors using an adaptation of boosting (ORT, ST, EV), pp. 764–767.
- ICPR-v2-2006-UsoPSG #clustering #multi
- Clustering-based multispectral band selection using mutual information (AMU, FP, JMS, PGS), pp. 760–763.
- ICPR-v2-2006-WangH #equation #probability
- Probabilistic Relaxation using the Heat Equation (HW, ERH), pp. 666–669.
- ICPR-v2-2006-WangZC #locality #performance
- Efficient Topological Localization Using Orientation Adjacency Coherence Histograms (JW, HZ, RC), pp. 271–274.
- ICPR-v2-2006-YangG #composition #invariant
- Line-Based Affine Invariant Object Location Using Transformation Space Decomposition (RY, YG), pp. 646–649.
- ICPR-v2-2006-YangQHE #adaptation #geometry #image #recognition #retrieval
- Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids (MY, GQ, JH, DE), pp. 958–961.
- ICPR-v2-2006-YangS #detection #random
- Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
- ICPR-v2-2006-YaslanC #classification #feature model #music
- Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ZÇ), pp. 573–576.
- ICPR-v2-2006-YokobayashiW #correlation #recognition
- Binarization and Recognition of Degraded Characters Using a Maximum Separability Axis in Color Space and GAT Correlation (MY, TW), pp. 885–888.
- ICPR-v2-2006-YuC #image #segmentation #semantics
- Joint Image Segmentation and Interpretation Using Iterative Semantic Region Growing on SAR Sea Ice Imagery (QY, DAC), pp. 223–226.
- ICPR-v2-2006-ZhangJHW #detection
- Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
- ICPR-v2-2006-Zheng #recognition
- Machine Printed Arabic Character Recognition Using S-GCM (LZ), pp. 893–896.
- ICPR-v2-2006-ZhouBS #image
- Extracting Lines in Noisy Image Using Directional Information (JZ, WFB, GASA), pp. 215–218.
- ICPR-v3-2006-AbateNRS #3d #fourier #recognition
- 3D Face Recognition using Normal Sphere and General Fourier Descriptor (AFA, MN, DR, GS), pp. 1183–1186.
- ICPR-v3-2006-AbdallahHB #composition #image #performance #robust
- A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
- ICPR-v3-2006-AgrawalK #locality #realtime
- Real-time Localization in Outdoor Environments using Stereo Vision and Inexpensive GPS (MA, KK), pp. 1063–1068.
- ICPR-v3-2006-AlleneP #image #optimisation
- Image Renaissance Using Discrete Optimization (CA, NP), pp. 631–634.
- ICPR-v3-2006-ArreolaFB #classification #linear #performance
- Fast Support Vector Machine Classification using linear SVMs (KZA, JF, HB), pp. 366–369.
- ICPR-v3-2006-AsanoTTTANTHM
- Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology (AA, TT, AT, CMA, TN, KT, TH, MM), pp. 988–991.
- ICPR-v3-2006-AssabieB #recognition
- Ethiopic Character Recognition Using Direction Field Tensor (YA, JB), pp. 284–287.
- ICPR-v3-2006-BarbuRLAHT #algorithm #classification #graph #recognition #search-based
- Graph Classification Using Genetic Algorithm and Graph Probing Application to Symbol Recognition (EB, RR, HL, SA, PH, ÉT), pp. 296–299.
- ICPR-v3-2006-BeleznaiFB #multi
- Multiple Object Tracking Using Local PCA (CB, BF, HB), pp. 79–82.
- ICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes
- A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
- ICPR-v3-2006-BianchiniMS #locality #network #recursion
- Object Localization Using Input/Output Recursive Neural Networks (MB, MM, LS), pp. 95–98.
- ICPR-v3-2006-BouchaffraT #markov #recognition
- Protein Fold Recognition using a Structural Hidden Markov Model (DB, JT), pp. 186–189.
- ICPR-v3-2006-CaronV #evaluation #image #modelling #quality
- Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
- ICPR-v3-2006-ChairunnandaGC #distance #edit distance #sequence
- Enhancing Edit Distance on Real Sequences Filters using Histogram Distance on Fixed Reference Ordering (PC, VG, LC), pp. 582–585.
- ICPR-v3-2006-ChoiAB #segmentation
- Face Alignment Using Segmentation and a Combined AAM in a PTZ Camera (KC, JHA, HB), pp. 1191–1194.
- ICPR-v3-2006-EmmsHW #graph #quantum
- Graph Matching using Interference of Coined Quantum Walks (DE, ERH, RCW), pp. 133–136.
- ICPR-v3-2006-ErikssonA #image
- Bijective Image Registration using Thin-Plate Splines. (APE, KÅ), pp. 798–801.
- ICPR-v3-2006-GuoL #image #multi
- Multi-modality Image Registration Using Mutual Information Based on Gradient Vector Flow (YG, CCL), pp. 697–700.
- ICPR-v3-2006-GutmanWLCT #analysis
- Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
- ICPR-v3-2006-HuangL #image
- A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
- ICPR-v3-2006-KananFE #locality #performance #recognition
- An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
- ICPR-v3-2006-KlausSK #adaptation #difference #self
- Segment-Based Stereo Matching Using Belief Propagation and a Self-Adapting Dissimilarity Measure (AK, MS, KFK), pp. 15–18.
- ICPR-v3-2006-KohmuraW #algorithm #search-based
- Determining Optimal Filters for Binarization of Degraded Characters in Color Using Genetic Algorithms (HK, TW), pp. 661–664.
- ICPR-v3-2006-KyweFM #algorithm #image #realtime #scheduling
- Scheduling of Image Processing Using Anytime Algorithm for Real-time System (WWK, DF, KM), pp. 1095–1098.
- ICPR-v3-2006-LakamperL #3d
- Using Extended EM to Segment Planar Structures in 3D (RL, LJL), pp. 1077–1082.
- ICPR-v3-2006-LamL #identification
- Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
- ICPR-v3-2006-LeeE06a
- Simultaneous Inference of View and Body Pose using Torus Manifolds (CSL, AME), pp. 489–494.
- ICPR-v3-2006-LeoputraTL #distributed
- Non-overlapping Distributed Tracking using Particle Filter (WSL, TT, FLL), pp. 181–185.
- ICPR-v3-2006-LernerV #classification #fuzzy #image #search-based
- Image Classification for Genetic Diagnosis using Fuzzy ARTMAP (BL, BV), pp. 362–365.
- ICPR-v3-2006-LiC #classification #nearest neighbour #probability
- Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), pp. 1220–1223.
- ICPR-v3-2006-LiPKZ #multimodal
- Multimodal Registration using the Discrete Wavelet Frame Transform (SL, JP, JTK, JZ), pp. 877–880.
- ICPR-v3-2006-MakkapatiM06a
- Vector Quantization Using Reflections of Triangular Subcodevectors (VM, PRM), pp. 701–704.
- ICPR-v3-2006-NgOFGN #automation #image #information management #segmentation
- Automatic Segmentation of Muscles of Mastication from Magnetic Resonance Images Using Prior Knowledge (HPN, SHO, KWCF, PSG, WLN), pp. 968–971.
- ICPR-v3-2006-NguyenSQN #fuzzy #predict
- Traffic Prediction Using Ying-Yang Fuzzy Cerebellar Model Articulation Controller (MNN, DS, CQ, GSN), pp. 258–261.
- ICPR-v3-2006-NieuwenhuisY #image #knowledge base #network
- Knowledge Based Image Enhancement Using Neural Networks (CN, MY), pp. 814–817.
- ICPR-v3-2006-PalenichkaZ #image #network
- Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), pp. 1216–1219.
- ICPR-v3-2006-ParkJKKH #multi #named #visual notation
- ViSE: Visual Search Engine Using Multiple Networked Cameras (UP, AKJ, IK, KK, NH), pp. 1204–1207.
- ICPR-v3-2006-ParkLL #3d
- Superimposing 3D Virtual Objects using Markerless Tracking (SCP, SWL, SWL), pp. 897–900.
- ICPR-v3-2006-PetterssonKB #automation #segmentation
- Automatic Hip Bone Segmentation Using Non-Rigid Registration (JP, HK, MB), pp. 946–949.
- ICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability
- Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
- ICPR-v3-2006-QiuH #graph
- Graph Matching using Commute Time Spanning Trees (HQ, ERH), pp. 1224–1227.
- ICPR-v3-2006-QiuXT #clustering #feedback #kernel #performance
- Efficient Relevance Feedback Using Semi-supervised Kernel-specified K-means Clustering (BQ, CX, QT), pp. 316–319.
- ICPR-v3-2006-RendekW #consistency #set
- Extraction of Consistent Subsets of Descriptors using Choquet Integral (JR, LW), pp. 208–211.
- ICPR-v3-2006-SakaiA #detection #metric
- Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
- ICPR-v3-2006-ScheundersB #component #image #multi
- Wavelet denoising of multicomponent images, using a Gaussian Scale Mixture model (PS, SDB), pp. 754–757.
- ICPR-v3-2006-SchlapbachB #identification #modelling
- Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
- ICPR-v3-2006-ShinozakiUGR #image
- Correction of intensity of a color image using a range intensity image (MS, KU, GG, MR), pp. 774–777.
- ICPR-v3-2006-SmithKHI #recognition
- Face Recognition Using Angular LDA and SVM Ensembles (RSS, JK, MH, JI), pp. 1008–1012.
- ICPR-v3-2006-TianK06a #algorithm #distance #performance
- An Efficient Algorithm for Point Matching Using Hilbert Scanning Distance (LT, SiK), pp. 873–876.
- ICPR-v3-2006-Wang06a #analysis
- Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
- ICPR-v3-2006-WangGZLZ #identification
- Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
- ICPR-v3-2006-WangWKH #probability #video
- Tracking a Variable Number of Human Groups in Video Using Probability Hypothesis Density (YDW, JKW, AAK, WH), pp. 1127–1130.
- ICPR-v3-2006-WongWC #classification #robust
- Robust Appearance-based Tracking using a sparse Bayesian classifier (SFW, KYKW, RC), pp. 47–50.
- ICPR-v3-2006-XueD #2d #3d #locality #multi
- 3D+2D Face Localization Using Boosting in Multi-Modal Feature Space (FX, XD), pp. 499–502.
- ICPR-v3-2006-XueLF #image
- Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator (FX, QSL, WF), pp. 766–769.
- ICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel
- Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
- ICPR-v3-2006-YamazoeUA #constraints #geometry #multi #optimisation
- Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints (HY, AU, SA), pp. 960–963.
- ICPR-v3-2006-YangL06a #3d #image #learning #sequence
- Reconstructing 3D Human Body Pose from Stereo Image Sequences Using Hierarchical Human Body Model Learning (HDY, SWL), pp. 1004–1007.
- ICPR-v3-2006-YuL #distance #recognition
- Shape Recognition using Curve Segment Hausdorff Distance (XY, MKHL), pp. 441–444.
- ICPR-v3-2006-YunBK #dependence #realtime #recognition #relational #visual notation
- Real-time Object Recognition using Relational Dependency based on Graphical Model (WHY, SYB, DK), pp. 28–32.
- ICPR-v3-2006-ZhangY #image #multi
- Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
- ICPR-v3-2006-ZouariHL #comparison
- Experimental Comparison of Combination Rules using Simulated Data (HZ, LH, YL), pp. 152–155.
- ICPR-v4-2006-AndersenJM #estimation
- Estimation of Dynamic Light Changes in Outdoor Scenes Without the use of Calibration Objects (MSA, TJ, CBM), pp. 91–94.
- ICPR-v4-2006-ChenLL #video
- Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
- ICPR-v4-2006-ChikkerurPJRB #locality #representation
- Fingerprint Representation Using Localized Texture Features (SC, SP, AJ, NKR, RMB), pp. 521–524.
- ICPR-v4-2006-Choi #cumulative #recognition #robust #speech
- A Noise Robust Front-end for Speech Recognition Using Hough Transform and Cumulative Distribution Mapping (EHCC), pp. 286–289.
- ICPR-v4-2006-CuiZZS #multi #people #robust
- Robust Tracking of Multiple People in Crowds Using Laser Range Scanners (JC, HZ, HZ, RS), pp. 857–860.
- ICPR-v4-2006-DhandraHHM #analysis #image #segmentation
- Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
- ICPR-v4-2006-FengC #invariant
- Fingerprint Indexing Using Ridge Invariants (JF, AC), pp. 433–436.
- ICPR-v4-2006-FusseneggerOP #locality #segmentation
- Object localization/segmentation using generic shape priors (MF, AO, AP), pp. 41–44.
- ICPR-v4-2006-Garcia-PerezMBB #image #retrieval
- Object-Based Image Retrieval Using Active Nets (DGP, AMG, SB, ADB), pp. 750–753.
- ICPR-v4-2006-HafezJ #estimation #visual notation
- Target Model Estimation using Particle Filters for Visual Servoing (AHAH, CVJ), pp. 651–654.
- ICPR-v4-2006-HeYTWX #image #matrix #novel #retrieval #symmetry
- Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices (ZH, XY, YYT, PSPW, YX), pp. 161–164.
- ICPR-v4-2006-JainCD
- Pores and Ridges: Fingerprint Matching Using Level 3 Features (AKJ, YC, MD), pp. 477–480.
- ICPR-v4-2006-KimPL #3d
- Tracking 3D Human Body using Particle Filter in Moving Monocular Camera (SK, CBP, SWL), pp. 805–808.
- ICPR-v4-2006-KropotovPVV #kernel #on the #principle
- On Kernel Selection in Relevance Vector Machines Using Stability Principle (DK, NP, OV, DV), pp. 233–236.
- ICPR-v4-2006-KryszczukD #detection
- Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
- ICPR-v4-2006-KwonYKL #clustering
- Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
- ICPR-v4-2006-KyweYM #lens
- Contact Lens Extraction by Using Thermo-Vision (WWK, MY, KM), pp. 570–573.
- ICPR-v4-2006-LaurendeauB #distance
- Shape-Based Contour Interpolation and Extrapolation Using Distance Mapping (DL, OB), pp. 659–662.
- ICPR-v4-2006-LiC06a #classification #nearest neighbour #probability
- Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), p. 954.
- ICPR-v4-2006-LienY #performance #predict
- A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
- ICPR-v4-2006-LiL06a #identification
- Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
- ICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation
- A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
- ICPR-v4-2006-LuC06a #3d #analysis #metric
- Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
- ICPR-v4-2006-MacenkoCM #detection #segmentation
- Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
- ICPR-v4-2006-MellakhPD
- Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics (MAM, DPD, BD), pp. 574–577.
- ICPR-v4-2006-MoncrieffVW #modelling
- Unifying Background Models over Complex Audio using Entropy (SM, SV, GAWW), pp. 249–253.
- ICPR-v4-2006-NagaharaMIYS #generative #video
- High-resolution Video Generation Using Morphing (HN, TM, YI, MY, TS), pp. 338–341.
- ICPR-v4-2006-NagarC #design #fuzzy #symmetry
- Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
- ICPR-v4-2006-NiuG #network
- Recovering Non-overlapping Network Topology Using Far-field Vehicle Tracking Data (CN, EG), pp. 944–949.
- ICPR-v4-2006-NosratighodsAE #novel #set #verification
- Speaker Verification Using A Novel Set of Dynamic Features (MN, EA, JE), pp. 266–269.
- ICPR-v4-2006-Onoguchi #correlation #detection
- Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
- ICPR-v4-2006-PalenichkaZ06a #image #network
- Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), p. 953.
- ICPR-v4-2006-QiuH06a #graph
- Graph Matching using Commute Time Spanning Tr (HQ, ERH), p. 955.
- ICPR-v4-2006-QuanZ
- Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
- ICPR-v4-2006-ReisertB #3d #data-driven #database #integration #invariant
- Invariant Features for 3D-Data based on Group Integration using Directional Information and Spherical Harmonic Expansion (MR, HB), pp. 206–209.
- ICPR-v4-2006-Rivera-RoveloB #algebra #framework #geometry #realtime
- Non-Rigid Alignment and Real-Time Tracking Using the Geometric Algebra Framework (JRR, EBC), pp. 675–678.
- ICPR-v4-2006-ShaZT #set
- Minutiae-based Fingerprint Matching Using Subset Combination (LS, FZ, XT), pp. 566–569.
- ICPR-v4-2006-ShibuyaU #image #mobile #self #standard
- Self-Localization of a Mobile Robot Using Compressed Image Data of Average and Standard Deviation (NS, KU), pp. 614–617.
- ICPR-v4-2006-SmithH
- Estimating Cast Shadows using SFS and Class-based Surface Completion (WAPS, ERH), pp. 86–90.
- ICPR-v4-2006-SvenssonGFSOS #composition #framework #fuzzy #image
- Using a fuzzy framework for delineation and decomposition of Immunoglobulin G in cryo electron tomographic images (SS, MG, DF, US, LGO, SS), pp. 687–690.
- ICPR-v4-2006-TodorovicA #3d #classification #segmentation
- 3D Texture Classification Using the Belief Net of a Segmentation Tree (ST, NA), pp. 33–36.
- ICPR-v4-2006-UranishiNYIMC #metric
- Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror (YU, MN, YY, MI, YM, KC), pp. 866–869.
- ICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime
- Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
- ICPR-v4-2006-WangAC #identification #multi #recognition
- Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
- ICPR-v4-2006-WangC #detection #video
- Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
- ICPR-v4-2006-WangK #approach #automation #estimation
- Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
- ICPR-v4-2006-WangWLJK #analysis #classification #component #independence
- Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
- ICPR-v4-2006-WangXC #2d #automation #classification #pseudo #video
- Automatic Sports Video Genre Classification using Pseudo-2D-HMM (JW, CX, EC), pp. 778–781.
- ICPR-v4-2006-WuQ #geometry #identification
- A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
- ICPR-v4-2006-YamaguchiKN #detection #estimation
- Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
- ICPR-v4-2006-YangG06a #multi #verification
- Multi-SNR GMMs-Based Noise-Robust Speaker Verification Using 1/fa Noises (LY, WG), pp. 241–244.
- ICPR-v4-2006-YaoLYZL06a #algorithm #recognition
- Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
- ICPR-v4-2006-YiA
- An Omnidirectional Stereo Vision System Using a Single Camera (SY, NA), pp. 861–865.
- ICPR-v4-2006-YuanMZL #matrix #recognition
- Ear Recognition using Improved Non-Negative Matrix Factorization (LY, ZM, YZ, KL), pp. 501–504.
- ICPR-v4-2006-YuC06a #segmentation #statistics
- Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
- ICPR-v4-2006-ZaimQSIT #clustering #image #robust #segmentation
- A Robust and Accurate Segmentation of Iris Images Using Optimal Partitioning (AZ, MKQ, JS, JI, RT), pp. 578–581.
- ICPR-v4-2006-ZhaoCLP #recognition
- Gait Recognition Using Fractal Scale and Wavelet Moments (GZ, LC, HL, MP), pp. 453–456.
- ICPR-v4-2006-ZhaoG06a #automation #energy #estimation #modelling
- Automated Face Pose Estimation Using Elastic Energy Models (SZ, YG), pp. 618–621.
- ICPR-v4-2006-ZhaoSC #clustering
- Fingerprint Registration Using Minutia Clusters and Centroid Structure 1 (DZ, FS, AC), pp. 413–416.
- ICPR-v4-2006-ZhengLZ #encryption #generative
- Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
- KDD-2006-BarbaraDR #detection #statistics #testing
- Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
- KDD-2006-KeCN #approach #correlation #mining
- Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
- KDD-2006-LiuZBX #analysis
- Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
- KDD-2006-LoekitoB #diagrams #mining #performance
- Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
- KDD-2006-ManiyarN #algorithm #data mining #mining #visual notation #visualisation
- Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
- KDD-2006-NathBM #approach #classification #clustering #scalability
- Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
- KDD-2006-RattiganMJ #approximate #network #performance
- Using structure indices for efficient approximation of network properties (MJR, MEM, DJ), pp. 357–366.
- KDD-2006-WangP #modelling #probability
- Summarizing itemset patterns using probabilistic models (CW, SP), pp. 730–735.
- KDD-2006-XuWPWSF
- Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
- KR-2006-BonetG #heuristic
- Heuristics for Planning with Penalties and Rewards using Compiled Knowledge (BB, HG), pp. 452–462.
- KR-2006-ClassenL #knowledge-based #source code
- Foundations for Knowledge-Based Programs using ES (JC, GL), pp. 318–328.
- SEKE-2006-HuangC #probability #rule-based #similarity
- Using Conditional Probability to Measure Rule-based Knowledge Similarity (CJH, MYC), pp. 41–44.
- SEKE-2006-HungL #data mining #mining #performance
- Using Data Mining Schemes for Improvement on System Performance in Virtual Environments (SSH, DSML), pp. 61–66.
- SEKE-2006-KuleszaLAG #aspect-oriented #generative
- Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
- SEKE-2006-MazzoleniVFMB #image #towards
- Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
- SEKE-2006-Merz #approach #java #security
- Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
- SEKE-2006-MichielsRBBD #modelling #testing
- Program Testing Using High-Level Property-Driven Models (IM, CDR, JB, EGB, TD), pp. 489–494.
- SEKE-2006-PilskalnsA #design #ocl #security #testing #uml
- Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
- SEKE-2006-SornilS #detection
- Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
- SEKE-2006-SteinmacherLH #analysis #process #simulation #workflow
- Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
- SEKE-2006-YuLSH #modelling
- Modeling Complex Software Systems Using an Aspect Extension of Object-Z (HY, DL, ZS, XH), pp. 11–16.
- SIGIR-2006-AlonsoG #clustering
- Clustering of search results using temporal attributes (OA, MG), pp. 597–598.
- SIGIR-2006-AnhM #evaluation #query
- Pruned query evaluation using pre-computed impacts (VNA, AM), pp. 372–379.
- SIGIR-2006-AslamPY #evaluation #statistics
- A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
- SIGIR-2006-DiazM #corpus #estimation #modelling #scalability
- Improving the estimation of relevance models using large external corpora (FD, DM), pp. 154–161.
- SIGIR-2006-FernandezVC #rank
- Using historical data to enhance rank aggregation (MF, DV, PC), pp. 643–644.
- SIGIR-2006-LiR #named #web
- DeWild: a tool for searching the web using wild cards (HL, DR), p. 731.
- SIGIR-2006-MacdonaldO06a #framework #platform
- Searching for expertise using the terrier platform (CM, IO), p. 732.
- SIGIR-2006-MayfieldM #documentation #retrieval
- Improving QA retrieval using document priors (JM, PM), pp. 677–678.
- SIGIR-2006-MinkovCN #ambiguity #email #graph
- Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
- SIGIR-2006-ParikhK #feedback #named #query
- Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
- SIGIR-2006-RadlinskiD #personalisation #web
- Improving personalized web search using result diversification (FR, STD), pp. 691–692.
- SIGIR-2006-RamirezWV #xml
- Using small XML elements to support relevance (GR, TW, APdV), pp. 693–694.
- SIGIR-2006-TreeratpitukC #automation #case study #clustering #statistics
- An experimental study on automatically labeling hierarchical clusters using statistical features (PT, JPC), pp. 707–708.
- SIGIR-2006-VaradarajanHL #web
- Searching the web using composed pages (RV, VH, TL), pp. 713–714.
- SIGIR-2006-VassilvitskiiB #distance #feedback #web
- Using web-graph distance for relevance feedback in web search (SV, EB), pp. 147–153.
- ECMDA-FA-2006-BraheO #modelling #process #uml
- Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles (SB, KØ), pp. 241–255.
- ECMDA-FA-2006-EngelPK #model merging
- Using a Model Merging Language for Reconciling Model Versions (KDE, RFP, DSK), pp. 143–157.
- MoDELS-2006-DuarteKU #information management
- Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
- MoDELS-2006-DucasseG #execution #metalanguage #smalltalk
- Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
- Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
- SPL-BOOK-2006-Engelsma #diagrams #evolution #incremental #integration #multi #product line
- Incremental Systems Integration within Multidisciplinary Product Line Engineering Using Configuration Item Evolution Diagrams (EE), pp. 523–555.
- SPLC-2006-HallsteinsenSSF #adaptation #product line
- Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
- SPLC-2006-SpinczykP #feature model #modelling
- Using Feature Models for Product Derivation (OS, HP), p. 225.
- SPLC-2006-TraskRPB #component #modelling #product line
- Using Model-Driven Engineering to Complement Software Product Line Engineering in Developing Software Defined Radio Components and Applications (BT, AR, DP, VB), pp. 192–202.
- MoDELS-2006-DuarteKU #information management
- Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
- MoDELS-2006-DucasseG #execution #metalanguage #smalltalk
- Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
- Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
- OOPSLA-2006-CavazosO #compilation
- Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
- OOPSLA-2006-FairbanksGS #design #framework
- Design fragments make using frameworks easier (GF, DG, WLS), pp. 75–88.
- OOPSLA-2006-Hutchins #prototype
- Eliminating distinctions of class: using prototypes to model virtual classes (DH), pp. 1–20.
- OOPSLA-2006-KitMB #analysis #requirements #semantics
- Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
- QAPL-2005-BinderH06 #bytecode #cpu #metric
- Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
- AdaEurope-2006-Maurer #ada
- Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
- LOPSTR-2006-ArroyoRSV #graph #partial evaluation
- Improving Offline Narrowing-Driven Partial Evaluation Using Size-Change Graphs (GA, JGR, JS, GV), pp. 60–76.
- LOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code
- Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
- LOPSTR-2006-Payet #detection #term rewriting
- Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
- PADL-2006-GouraudG #functional #java #testing #virtual machine
- Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine (SDG, AG), pp. 1–15.
- PADL-2006-NavasBH #analysis #clique #performance #top-down
- Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
- PADL-2006-QuesadaRDC #problem
- Using Dominators for Solving Constrained Path Problems (LQ, PVR, YD, RC), pp. 73–87.
- PEPM-2006-Edwards #fixpoint #simulation
- Using program specialization to speed SystemC fixed-point simulation (SAE), pp. 21–28.
- PLDI-2006-LauAHC #online #optimisation #performance
- Online performance auditing: using hot optimizations without getting burned (JL, MA, MH, BC), pp. 239–251.
- QAPL-2006-BinderH06a #bytecode #profiling #virtual machine
- Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
- SAS-2006-Arnold #analysis #logic #refinement
- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
- SAS-2006-ChangHN #analysis #low level
- Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
- SIGAda-2006-Carlisle #ada #automation #generative #object-oriented #parsing
- Automatic OO parser generation using visitors for Ada 2005 (MCC), pp. 3–8.
- SIGAda-2006-Klein #ada
- Use of Ada in Lockheed Martin for air traffic management and beyond (JK), p. 1.
- SIGAda-2006-Taft #ada #exclamation #why
- Why you should be using Ada 2005 now! (STT), p. 75.
- RE-2006-AlencarMACSM #aspect-oriented
- Using Aspects to Simplify iModels (FMRA, AMDM, JA, JC, CTLLS, JM), pp. 328–329.
- RE-2006-Gonzalez-BaixauliLL #elicitation #interactive #non-functional #requirements
- Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory (BGB, JCSdPL, MAL), pp. 340–341.
- RE-2006-GordijnPW #comprehension #modelling
- Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
- RE-2006-KaiyaS #elicitation #ontology #requirements
- Using Domain Ontology as Domain Knowledge for Requirements Elicitation (HK, MS), pp. 186–195.
- ASE-2006-Antkiewicz #modelling
- Round-Trip Engineering of Framework-Based Software using Framework-Specific Modeling Languages (MA), pp. 323–326.
- ASE-2006-FalbRA #automation #design #interactive #specification #synthesis #user interface
- Using communicative acts in interaction design specifications for automated synthesis of user interfaces (JF, TR, EA), pp. 261–264.
- ASE-2006-HassanZ #certification #predict
- Using Decision Trees to Predict the Certification Result of a Build (AEH, KZ), pp. 189–198.
- ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving
- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
- ASE-2006-LiuYR #library #model checking
- Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
- ASE-2006-RobbyDH #framework #model checking
- Domain-specific Model Checking Using The Bogor Framework (R, MBD, JH), pp. 369–370.
- FSE-2006-GirouxR #detection #testing
- Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
- FSE-2006-HalfondOM #evaluation #injection #sql
- Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
- FSE-2006-KerstenM
- Using task context to improve programmer productivity (MK, GCM), pp. 1–11.
- FSE-2006-StorzerRRT #classification #java #source code
- Finding failure-inducing changes in java programs using change classification (MS, BGR, XR, FT), pp. 57–68.
- ICSE-2006-AbeMKKH #classification #estimation
- Estimation of project success using Bayesian classifier (SA, OM, TK, NK, MH), pp. 600–603.
- ICSE-2006-Dolins #process
- Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
- ICSE-2006-FrantzeskouSGK #effectiveness #identification #source code
- Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
- ICSE-2006-HalfondO #injection #sql
- Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
- ICSE-2006-Holmes #reuse #scalability
- Unanticipated reuse of large-scale software features (RH), pp. 961–964.
- ICSE-2006-JiamthubthugsinS #development
- Portfolio management of software development projects using COCOMO II (WJ, DS), pp. 889–892.
- ICSE-2006-KrugerMM #architecture #aspect-oriented #performance
- Efficient exploration of service-oriented architectures using aspects (IHK, RM, MM), pp. 62–71.
- ICSE-2006-NakamichiSSM #behaviour #detection #usability #web
- Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
- ICSE-2006-RundleD #agile
- Using return on investment to compare agile and plan-driven practices in undergraduate group projects (PJR, RGD), pp. 649–654.
- ICSE-2006-Sindhgatta #information retrieval #source code
- Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
- ICSE-2006-YangBC #estimation #integration #off the shelf
- Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
- ICSE-2006-ZouZ #automation #e-commerce #evolution #framework #generative #process
- A framework for automatic generation of evolvable e-commerce workplaces using business processes (YZ, QZ), pp. 799–802.
- SAC-2006-AlmeidaG #algorithm #database #incremental #nearest neighbour #network
- Using Dijkstra’s algorithm to incrementally find the k-Nearest Neighbors in spatial network databases (VTdA, RHG), pp. 58–62.
- SAC-2006-AltLM #linear #on the #probability #problem
- On the numerical solution to linear problems using stochastic arithmetic (RA, JLL, SM), pp. 1635–1639.
- SAC-2006-Bellur #consistency #object-oriented #on the #workflow
- On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
- SAC-2006-BernsteinK #ontology #retrieval #similarity #towards
- Imprecise RDQL: towards generic retrieval in ontologies using similarity joins (AB, CK), pp. 1684–1689.
- SAC-2006-BonnetEV #ad hoc #mobile #network
- Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts (FB, PDE, EV), pp. 670–674.
- SAC-2006-ChongL
- An extension of dead end elimination for protein side-chain conformation using merge-decoupling (KFC, HWL), pp. 195–199.
- SAC-2006-CraigL #classification #learning
- Protein classification using transductive learning on phylogenetic profiles (RAC, LL), pp. 161–166.
- SAC-2006-CutelloNP #algorithm #hybrid #optimisation
- Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
- SAC-2006-DinechinLM #verification
- Assisted verification of elementary functions using Gappa (FdD, CQL, GM), pp. 1318–1322.
- SAC-2006-GuoW #data mining #mining #on the #privacy
- On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
- SAC-2006-JacquenetL #documentation
- Using the structure of documents to improve the discovery of unexpected information (FJ, CL), pp. 1036–1042.
- SAC-2006-KacemKJD #architecture #uml
- Describing dynamic software architectures using an extended UML model (MHK, AHK, MJ, KD), pp. 1245–1249.
- SAC-2006-KatsimpaPSTT #modelling #reverse engineering
- Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
- SAC-2006-KramerMH #case study #elicitation #mobile
- Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
- SAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set
- Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
- SAC-2006-SauvagnatHB #question #retrieval #what #xml
- XML retrieval: what about using contextual relevance? (KS, LH, MB), pp. 1114–1115.
- SAC-2006-SharminAA #adaptation #middleware #resource management #self #usability
- Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) (MS, SA, SIA), pp. 1013–1017.
- SAC-2006-SinghXMH #geometry #linear #locality #problem #programming
- Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
- SAC-2006-SoaresB #kernel #parametricity
- Selecting parameters of SVM using meta-learning and kernel matrix-based meta-features (CS, PB), pp. 564–568.
- SAC-2006-SzlavikTL #interactive #retrieval #summary #xml
- Investigating the use of summarisation for interactive XML retrieval (ZS, AT, ML), pp. 1068–1072.
- SAC-2006-WuBGRM #compilation #development
- Separation of concerns in compiler development using aspect-orientation (XW, BRB, JGG, SR, MM), pp. 1585–1590.
- SAC-2006-YuJV #kernel #privacy
- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
- SAC-2006-ZhouAL #database #image #interactive #retrieval #similarity
- Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph (XMZ, CHA, TWL), pp. 46–51.
- GPCE-2006-BromanNF #constraints #equation
- Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
- ASPLOS-2006-ChilimbiG #debugging #detection #identification #named
- HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
- ASPLOS-2006-KgilDSBDMRF #3d #energy #multi #named #performance
- PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessor (TK, SD, AGS, NLB, RGD, TNM, SKR, KF), pp. 117–128.
- ASPLOS-2006-NarayanasamyPC #dependence #memory management
- Recording shared memory dependencies using strata (SN, CP, BC), pp. 229–240.
- ASPLOS-2006-TarditiPO #named #parallel
- Accelerator: using data parallelism to program GPUs for general-purpose uses (DT, SP, JO), pp. 325–335.
- CASE-2006-ChaoSZJM #analysis #automation #information management
- Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
- CASE-2006-GuoLX #modelling #on the #petri net
- On Modeling a Soccer Robot System Using Petri Nets (BG, ZL, SX), pp. 460–465.
- CASE-2006-HuSHL #modelling #probability
- Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
- CASE-2006-KwokHLF #image #multi #optimisation
- Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
- CASE-2006-KwokLWY #framework #platform #replication
- Evolutionary Replication of Calligraphic Characters By A Robot Drawing Platform Using Experimentally Acquired Brush Footprint (KWK, KWL, SMW, YY), pp. 466–471.
- CASE-2006-LamiriX
- Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
- CASE-2006-LiLWC #automation #component #equation #generative #graph #linear
- Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
- CASE-2006-LopatinY #algorithm #approximate #polynomial
- Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator’s control in an unknown environment (PKL, ASY), pp. 206–211.
- CASE-2006-RaghavanV #optimisation #parallel #product line #scheduling
- Scheduling Parallel Batch Processors with Incompatible Job Families Using Ant Colony Optimization (NRSR, MV), pp. 507–512.
- CASE-2006-SchiffG #automation #network
- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
- CASE-2006-ShaoHM #algorithm #analysis #component #linear #multi
- Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
- CASE-2006-XuLT #visual notation
- Visual Positioning Using Four-Point Planar Patterns (DX, YL, MT), pp. 600–605.
- CASE-2006-XuWZZ #algorithm #automation #detection
- An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
- CASE-2006-YoungSB #implementation #interactive
- Implementing Bubblegrams: The Use of Haar-Like Features for Human-Robot Interaction (JEY, ES, JEB), pp. 298–303.
- CC-2006-DiasR #assembly #declarative
- Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
- CC-2006-Necula #dependent type #low level #type system
- Using Dependent Types to Port Type Systems to Low-Level Languages (GCN), p. 1.
- CGO-2006-AgakovBCFFOTTW #machine learning #optimisation
- Using Machine Learning to Focus Iterative Optimization (FVA, EVB, JC, BF, GF, MFPO, JT, MT, CKIW), pp. 295–305.
- CGO-2006-NandaLLC #named #runtime
- BIRD: Binary Interpretation using Runtime Disassembly (SN, WL, LCL, TcC), pp. 358–370.
- DAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis
- Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
- DAC-2006-BrahmbhattZWQ #adaptation #algorithm #encoding #hybrid #power management
- Low-power bus encoding using an adaptive hybrid algorithm (ARB, JZ, QW, QQ), pp. 987–990.
- DAC-2006-BrierM #architecture #c #c++ #modelling #verification
- Use of C/C++ models for architecture exploration and verification of DSPs (DB, RSM), pp. 79–84.
- DAC-2006-ChaoCWCW #analysis
- Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
- DAC-2006-FatemiNP #analysis #logic #statistics
- Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
- DAC-2006-GoffioulVDDC #consistency #design #object-oriented
- Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
- DAC-2006-GopalakrishnanLP #architecture #metric
- Architecture-aware FPGA placement using metric embedding (PG, XL, LTP), pp. 460–465.
- DAC-2006-GuthausSB #programming
- Clock buffer and wire sizing using sequential programming (MRG, DS, RBB), pp. 1041–1046.
- DAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics
- Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
- DAC-2006-TanimotoYNH #realtime
- A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
- DAC-2006-WangGDK #design #optimisation
- Design space exploration using time and resource duality with the ant colony optimization (GW, WG, BD, RK), pp. 451–454.
- DAC-2006-YuhYC
- Placement of digital microfluidic biochips using the t-tree formulation (PHY, CLY, YWC), pp. 931–934.
- DAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry
- Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
- DAC-2006-ZhaoPSYF #algorithm #linear #megamodelling #performance #programming
- A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming (MZ, RP, SS, SY, YF), pp. 217–222.
- DATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis
- Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
- DATE-2006-AhmedM #design #performance #uml
- Faster exploration of high level design alternatives using UML for better partitions (WA, DM), pp. 579–580.
- DATE-2006-Al-JunaidK #modelling
- HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope (HAJ, TJK), pp. 644–645.
- DATE-2006-AmelifardFP
- Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
- DATE-2006-BanerjeeRMB #fine-grained #logic #power management #synthesis
- Low power synthesis of dynamic logic circuits using fine-grained clock gating (NB, KR, HMM, SB), pp. 862–867.
- DATE-2006-Beutel #framework #platform #prototype
- Fast-prototyping using the BTnode platform (JB), pp. 977–982.
- DATE-2006-BudnikR #distributed #network #novel #power management
- Minimizing ohmic loss and supply voltage variation using a novel distributed power supply network (MMB, KR), pp. 1116–1121.
- DATE-2006-ChaoWCWC
- Coverage loss by using space compactors in presence of unknown values (MCTC, SW, STC, WW, KTC), pp. 1053–1054.
- DATE-2006-CherrounDF #constraints #equation #scheduling
- Scheduling under resource constraints using dis-equations (HC, AD, PF), pp. 1067–1072.
- DATE-2006-DuttA #incremental #locality #performance
- Efficient timing-driven incremental routing for VLSI circuits using DFS and localized slack-satisfaction computations (SD, HA), pp. 768–773.
- DATE-2006-FrehseKR #abstraction #refinement #verification
- Verifying analog oscillator circuits using forward/backward abstraction refinement (GF, BHK, RAR), pp. 257–262.
- DATE-2006-GandhiM #energy #multi
- Exploiting data-dependent slack using dynamic multi-VDD to minimize energy consumption in datapath circuits (KRG, NRM), pp. 1001–1006.
- DATE-2006-GuillotBRCGA #diagrams #performance
- Efficient factorization of DSP transforms using taylor expansion diagrams (JG, EB, QR, MJC, DGP, SA), pp. 754–755.
- DATE-2006-HabibiTSLM #performance #verification
- Efficient assertion based verification using TLM (AH, ST, AS, DL, OAM), pp. 106–111.
- DATE-2006-HeniaE #multi
- Improved offset-analysis using multiple timing-references (RH, RE), pp. 450–455.
- DATE-2006-HosangadiFK #optimisation
- Optimizing high speed arithmetic circuits using three-term extraction (AH, FF, RK), pp. 1294–1299.
- DATE-2006-KanajanZPS #architecture #distributed #integration #trade-off
- Exploring trade-off’s between centralized versus decentralized automotive architectures using a virtual integration environment (SK, HZ, CP, ALSV), pp. 548–553.
- DATE-2006-KarlssonEP #design #petri net #representation #verification
- Formal verification of systemc designs using a petri-net based representation (DK, PE, ZP), pp. 1228–1233.
- DATE-2006-KavousianosKN #multi #performance #testing
- Efficient test-data compression for IP cores using multilevel Huffman coding (XK, EK, DN), pp. 1033–1038.
- DATE-2006-KempfKWALM #estimation #fine-grained #framework #performance
- A SW performance estimation framework for early system-level-design using fine-grained instrumentation (TK, KK, SW, GA, RL, HM), pp. 468–473.
- DATE-2006-KimHG #execution #parallel
- Parallel co-simulation using virtual synchronization with redundant host execution (DK, SH, RG), pp. 1151–1156.
- DATE-2006-KooM #functional #generative #pipes and filters #testing #validation
- Functional test generation using property decompositions for validation of pipelined processors (HMK, PM), pp. 1240–1245.
- DATE-2006-KrautzP0TWV #detection #fault #formal method #logic
- Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
- DATE-2006-LeeKKCY #adaptation
- A network-on-chip with 3Gbps/wire serialized on-chip interconnect using adaptive control schemes (SJL, KK, HK, NC, HJY), pp. 79–80.
- DATE-2006-LiuI #optimisation #scheduling
- Test scheduling with thermal optimization for network-on-chip systems using variable-rate on-chip clocking (CL, VI), pp. 652–657.
- DATE-2006-MartinezLC #order #reduction
- Nonlinear model order reduction using remainder functions (JAM, SPL, DMC), pp. 281–282.
- DATE-2006-Maurer #simulation #symmetry
- Using conjugate symmetries to enhance gate-level simulations (PMM), pp. 638–643.
- DATE-2006-MeiR #analysis #performance
- Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
- DATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread
- An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
- DATE-2006-SethuramanV #architecture #automation #generative #multi #named
- optiMap: a tool for automated generation of noc architectures using multi-port routers for FPGAs (BS, RV), pp. 947–952.
- DATE-2006-SridharanC #modelling #multi
- Modeling multiple input switching of CMOS gates in DSM technology using HDMR (JS, TC), pp. 626–631.
- DATE-2006-TanjiWKA #analysis #scalability
- Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
- DATE-2006-TsengLC #2d
- A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap (TWT, JFL, DMC), pp. 53–58.
- DATE-2006-WangBC #performance
- Efficient unknown blocking using LFSR reseeding (SW, KJB, STC), pp. 1051–1052.
- DATE-2006-WangCG #fault #formal method #probability #testing
- Test set enrichment using a probabilistic fault model and the theory of output deviations (ZW, KC, MG), pp. 1270–1275.
- DATE-2006-WildHO #architecture #evaluation #performance #simulation #transaction
- Performance evaluation for system-on-chip architectures using trace-based transaction level simulation (TW, AH, RO), pp. 248–253.
- DATE-2006-ZengI #concurrent #testing
- Concurrent core test for SOC using shared test set and scan chain disable (GZ, HI), pp. 1045–1050.
- DATE-2006-ZhouSMS #analysis #composition #grid #power management #scalability
- Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
- HPCA-2006-JosephVT #analysis #linear #modelling #performance
- Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
- HPDC-2006-AliL #performance
- Improving the Performance of Remote I/O Using Asynchronous Primitives (NA, ML), pp. 218–228.
- HPDC-2006-ChungH #automation #case study #performance #scalability #source code
- A Case Study Using Automatic Performance Tuning for Large-Scale Scientific Programs (IHC, JKH), pp. 45–56.
- HPDC-2006-SandholmLOO #grid #performance #predict #resource management
- Market-Based Resource Allocation using Price Prediction in a High Performance Computing Grid for Scientific Applications (TS, KL, JAO, JO), pp. 132–143.
- HPDC-2006-YehAWCT #performance
- Using File Grouping to Improve the Disk Performance (TY, JA, JSW, IFC, KHT), pp. 365–366.
- LCTES-2006-KreahlingHWT #comparison #cost analysis #specification
- Reducing the cost of conditional transfers of control by using comparison specifications (WCK, SH, DBW, GST), pp. 64–71.
- OSDI-2006-ZhouCABEHNB #named
- SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques (FZ, JC, ZRA, IB, RE, MH, GCN, EAB), pp. 45–60.
- PDP-2006-AlbrechtDPSS #design #parallel #thread
- Impact of Coprocessors on a Multithreaded Processor Design Using Prioritized Threads (CA, ACD, FP, TS, HS), pp. 109–115.
- PDP-2006-BorkowskiKT #grid #parallel #source code
- Application Control on Grid Using Predicates Defined on Global States of Co-Operating Parallel Programs (JB, DK, MT), pp. 248–255.
- PDP-2006-GarciaHL #communication #petri net #protocol #validation
- Validation of a Protocol for Communication Management in CSCW Systems Using a Coloured-Petri Net Modelization (ÉG, JH, JCL), pp. 272–275.
- PDP-2006-Hosseini-MoghaddamN
- A New Processor Allocation Strategy Using ESS (Expanding Square Strategy) (SMHM, MN), pp. 137–140.
- PDP-2006-RibasG #branch #predict
- Evaluating Branch Prediction Using Two-Level Perceptron Table (LVMR, RAdLG), pp. 145–148.
- FASE-2006-KobW #calculus #debugging
- Fundamentals of Debugging Using a Resolution Calculus (DK, FW), pp. 278–292.
- FASE-2006-RobbyDK #design #flexibility #metric #predict
- Using Design Metrics for Predicting System Flexibility (R, SAD, VAK), pp. 184–198.
- STOC-2006-Clarkson
- Building triangulations using epsilon-nets (KLC), pp. 326–335.
- STOC-2006-KhandekarRV #clustering #graph
- Graph partitioning using single commodity flows (RK, SR, UVV), pp. 385–390.
- TACAS-2006-ThomasCP #performance #reachability
- Efficient Guided Symbolic Reachability Using Reachability Expressions (DT, SC, PKP), pp. 120–134.
- A-MOST-J-2005-Robinson-MallettLMG06 #identification #model checking #verification
- Extended state identification and verification using a model checker (CRM, PL, TM, UG), pp. 981–992.
- CAV-2006-JainIGSW #abstraction #invariant #refinement
- Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop (HJ, FI, AG, IS, CW), pp. 137–151.
- CAV-2006-KahlonGS #concurrent #model checking #on the fly #partial order #source code #transaction
- Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions (VK, AG, NS), pp. 286–299.
- FATES-RV-2006-ElmasQT #named
- Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets (TE, SQ, ST), pp. 193–208.
- FATES-RV-2006-ErnitsKRV #generative #model checking #modelling #refinement #testing
- Generating Tests from EFSM Models Using Guided Model Checking and Iterated Search Refinement (JPE, AK, KR, JV), pp. 85–99.
- ICLP-2006-BaralDT #composition #metaprogramming #set
- Macros, Macro Calls and Use of Ensembles in Modular Answer Set Programming (CB, JD, HT), pp. 376–390.
- ICLP-2006-Brain #declarative #problem #semantics #set
- Declarative Problem Solving Using Answer Set Semantics (MB), pp. 459–460.
- ICLP-2006-CabalarOPV #equilibrium #logic #semantics
- Analysing and Extending Well-Founded and Partial Stable Semantics Using Partial Equilibrium Logic (PC, SPO, DP, AV), pp. 346–360.
- ICLP-2006-MeraLPCH #estimation #execution #logic programming #profiling #static analysis
- Using Combined Static Analysis and Profiling for Logic Program Execution Time Estimation (EM, PLG, GP, MC, MVH), pp. 431–432.
- ICLP-2006-OrtizV #combinator #logic #natural language
- Natural Language Processing Using Lexical and Logical Combinators (JFO, JV), pp. 444–446.
- ICLP-2006-QuintanoR #database #framework #logic programming #natural language #query
- Using a Logic Programming Framework to Control Database Query Dialogues in Natural Language (LQ, IPR), pp. 406–420.
- ICLP-2006-RamakrishnanRW #deduction #logic programming #spreadsheet
- Deductive Spreadsheets Using Tabled Logic Programming (CRR, IVR, DSW), pp. 391–405.
- ICLP-2006-SchwaigerF #assessment #automation #compilation #programming #testing
- Using Answer Set Programming for the Automatic Compilation of Assessment Tests (PS, BF), pp. 300–314.
- IJCAR-2006-SutcliffeSCG #finite
- Using the TPTP Language for Writing Derivations and Finite Interpretations (GS, SS, KC, AVG), pp. 67–81.
- ISSTA-2006-KiviluomaKM #architecture #aspect-oriented #behaviour #monitoring #runtime
- Run-time monitoring of architecturally significant behaviors using behavioral profiles and aspects (KK, JK, TM), pp. 181–190.
- ISSTA-2006-SiegelMAC #execution #model checking #parallel #source code #symbolic computation #verification
- Using model checking with symbolic execution to verify parallel numerical programs (SFS, AM, GSA, LAC), pp. 157–168.
- ISSTA-2006-VisserPP #generative #java
- Test input generation for java containers using state matching (WV, CSP, RP), pp. 37–48.
- LICS-2006-BarthM #linear #logic
- Managing Digital Rights using Linear Logic (AB, JCM), pp. 127–136.
- LICS-2006-Bryant #infinity #verification
- Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 3–4.
- LICS-2006-CoquandS #normalisation #proving
- A Proof of Strong Normalisation using Domain Theory (TC, AS), pp. 307–316.
- MBT-2006-KervinenMK #architecture #testing
- Controlling Testing Using Three-Tier Model Architecture (AK, MM, MK), pp. 53–66.
- SAT-2006-JainBC #satisfiability
- Satisfiability Checking of Non-clausal Formulas Using General Matings (HJ, CB, EMC), pp. 75–89.
- SAT-2006-NishimuraRS #satisfiability
- Solving #SAT Using Vertex Covers (NN, PR, SS), pp. 396–409.
- TestCom-2006-BerradaCFS #bound #realtime #testing
- Test Case Minimization for Real-Time Systems Using Timed Bound Traces (IB, RC, PF, AS), pp. 289–305.
- TestCom-2006-KeumKKBC #finite #generative #state machine #testing #web #web service
- Generating Test Cases for Web Services Using Extended Finite State Machine (CK, SK, IYK, JB, YIC), pp. 103–117.
- TestCom-2006-Nyberg #testing
- Use of TTCN-3 for Software Module Testing (AJN), pp. 161–176.
- TestCom-2006-WangWYST #communication #realtime #testing
- Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems (ZW, JW, XY, XS, BT), pp. 324–340.
- TestCom-2006-YalcinY #sequence
- Using Distinguishing and UIO Sequences Together in a Checking Sequence (MCY, HY), pp. 259–273.
- CBSE-2005-CooperCLSSW #component #empirical #fuzzy #logic #specification
- An Empirical Study on the Specification and Selection of Components Using Fuzzy Logic (KMLC, JWC, RL, GS, RS, WEW), pp. 155–170.
- CBSE-2005-LiuG #performance #predict #protocol
- Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
- WICSA-2005-SmedaOK #uml
- Mapping ADLs into UML 2.0 Using a Meta ADL (AS, MO, TK), pp. 247–248.
- WICSA-2005-TekinerdoganSA #analysis #architecture #reliability
- Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
- WICSA-2005-WoodsR #architecture
- Using Architectural Perspectives (EW, NR), pp. 25–35.
- WICSA-2005-ZhuLGB #benchmark #generative #metric
- Customized Benchmark Generation Using MDA (LZ, YL, IG, NBB), pp. 35–44.
- DocEng-2005-MacdonaldBB #component #encapsulation
- Encapsulating and manipulating component object graphics (COGs) using SVG (AJM, DFB, SRB), pp. 61–63.
- DocEng-2005-ThomasB #documentation #xml
- Enhancing composite digital documents using XML-based standoff markup (PLT, DFB), pp. 177–186.
- DRR-2005-MaD #identification
- Font identification using the grating cell texture operator (HM, DSD), pp. 148–156.
- DRR-2005-OertelOBB #documentation #recognition #validation #web
- Using the web to validate document recognition results: experiments with business cards (CO, SO, AB, DB), pp. 17–27.
- DRR-2005-ShiG #documentation #image #normalisation #segmentation
- Historical document image segmentation using background light intensity normalization (ZS, VG), pp. 167–174.
- DRR-2005-TaghvaCPN #markov #modelling
- Address extraction using hidden Markov models (KT, JSC, RP, TAN), pp. 119–126.
- ECDL-2005-AlmpanidisKP #crawling #semantics
- Focused Crawling Using Latent Semantic Indexing — An Application for Vertical Search Engines (GA, CK, IP), pp. 402–413.
- ECDL-2005-FulopKKM #metadata
- Using a Metadata Schema Registry in the National Digital Data Archive of Hungary (CF, GK, LK, AM), pp. 314–322.
- ECDL-2005-GohSZWLTHC #learning #personalisation
- Managing Geography Learning Objects Using Personalized Project Spaces in G-Portal (DHLG, AS, WZ, DW, EPL, YLT, JGH, CHC), pp. 336–343.
- ECDL-2005-PesenhoferBR #perspective
- Supporting ECDL’05 Using TCeReview (AP, HB, AR), pp. 535–536.
- ECDL-2005-SunHW #comprehension #information management
- Aiding Comprehension in Electronic Books Using Contextual Information (YS, DJH, SNKW), pp. 504–506.
- ECDL-2005-VakkariT #case study
- The Influence of the Scatter of Literature on the Use of Electronic Resources Across Disciplines: A Case Study of FinELib (PV, ST), pp. 207–217.
- ECDL-2005-WeaverDTN #library
- Using a Path-Based Thesaurus Model to Enhance a Domain-Specific Digital Library (MW, LMLD, TT, MLN), pp. 511–512.
- HT-2005-BerlangaG #adaptation #design #learning #modelling #navigation #specification
- Modelling adaptive navigation support techniques using the IMS learning design specification (AJB, FJG), pp. 148–150.
- HT-2005-BhagwatP #file system #semantics
- Searching a file system using inferred semantic links (DB, NP), pp. 85–87.
- HT-2005-MantratzisOC #analysis #html #navigation
- Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
- ICDAR-2005-AlonAS #online #prototype #recognition
- Online and Offline Character Recognition Using Alignment to Prototypes (JA, VA, SS), pp. 839–845.
- ICDAR-2005-BaiH #case study #online #recognition
- A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition (ZLB, QH), pp. 262–266.
- ICDAR-2005-BarbuHAT #clustering #documentation #image #representation
- Clustering document images using a bag of symbols representation (EB, PH, SA, ÉT), pp. 1216–1220.
- ICDAR-2005-BeheraLI #documentation #geometry #identification
- Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution (AB, DL, RI), pp. 468–472.
- ICDAR-2005-BhagvatiD #classification
- Classification of Liquid and Viscous Inks using HSV Colour Space (CB, HD), pp. 660–664.
- ICDAR-2005-ChengB #heuristic #segmentation #word
- The Neural-based Segmentation of Cursive Words using Enhanced Heuristics (CKC, MB), pp. 650–654.
- ICDAR-2005-ChenS #verification
- Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
- ICDAR-2005-DrakeB #geometry
- Distinguishing Mathematics Notation from English Text using Computational Geometry (DMD, HSB), pp. 1270–1274.
- ICDAR-2005-El-HajjLM #markov #modelling #recognition
- Arabic Handwriting Recognition Using Baseline Dependant Features and Hidden Markov Modeling (REH, LLS, CM), pp. 893–897.
- ICDAR-2005-HadjarI #logic
- Logical Labeling of Arabic Newspapers using Artificial Neural Nets (KH, RI), pp. 426–431.
- ICDAR-2005-HandleyNZ #comprehension #context-free grammar #documentation #probability
- Document Understanding System Using Stochastic Context-Free Grammars (JCH, AMN, RZ), pp. 511–515.
- ICDAR-2005-HtweHLY #network #online
- Transliteration of Online Handwritten Phonetic Pitman’s Shorthand with the Use of a Bayesian Network (SMH, CH, GL, MY), pp. 1090–1094.
- ICDAR-2005-KeyesSW #modelling #recognition #statistics #visual notation
- Graphical Object Recognition using Statistical Language Models (LK, AO, ACW), pp. 1095–1099.
- ICDAR-2005-KimPK #image
- Text Locating from Natural Scene Images Using Image Intensitie (JSK, SCP, SHK), pp. 655–659.
- ICDAR-2005-KumarKCJ #image
- Locating Text in Images using Matched Wavelets (SK, NK, SC, SDJ), pp. 595–599.
- ICDAR-2005-LamH #data type #performance
- A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access (YKL, QH), pp. 506–510.
- ICDAR-2005-LeeKO #documentation #image #retrieval
- Hangul Document Image Retrieval System Using Rank-based Recognitio (DRL, WYK, ISO), pp. 615–619.
- ICDAR-2005-LiuCL #identification #image #machine learning
- Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
- ICDAR-2005-LiuD #classification #multi #polynomial #recognition
- Handwritten Character Recognition Using Gradient Feature and Quadratic Classifier with Multiple Discrimination Schemes (HL, XD), pp. 19–25.
- ICDAR-2005-LiuMK #classification #feature model #recognition #scalability #set
- Building Compact Classifier for Large Character Set Recognition Using Discriminative Feature Extraction (CLL, RM, MK), pp. 846–850.
- ICDAR-2005-MouchereAR #adaptation #fuzzy #online #recognition
- On-line Writer Adaptation for Handwriting Recognition using Fuzzy Inference Systems (HM, ÉA, NR), p. 1075.
- ICDAR-2005-MozaffariFZ #encoding #recognition #representation
- Character Representation and Recognition Using Quadtree-based Fractal Encoding Scheme (SM, KF, MZ), pp. 819–823.
- ICDAR-2005-NelPH #markov #modelling #multi
- Estimating the Pen Trajectories of Multi-Path Static Scripts Using Hidden Markov Models (EMN, JAdP, BMH), pp. 41–47.
- ICDAR-2005-NicolasKPH #documentation #markov #random #segmentation
- Handwritten Document Segmentation Using Hidden Markov Random Fields (SN, YK, TP, LH), pp. 212–216.
- ICDAR-2005-OjimaKW #algorithm #search-based
- Determining Optimal Filters for Binarization of Degraded Grayscale Characters Using Genetic Algorithms (YO, SK, TW), pp. 555–559.
- ICDAR-2005-PanSB #identification
- Script Identification Using Steerable Gabor Filters (WP, CYS, TDB), pp. 883–887.
- ICDAR-2005-RussellHBHM #verification
- Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
- ICDAR-2005-RusuG #algorithm #interactive #proving #recognition
- A Human Interactive Proof Algorithm Using Handwriting Recognition (AIR, VG), pp. 967–971.
- ICDAR-2005-ShiSG #adaptation #documentation #image
- Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map (ZS, SS, VG), pp. 794–798.
- ICDAR-2005-ShivakumaraKVRN #documentation #estimation #image #word
- A New Moments based Skew Estimation Technique using Pixels in the Word for Binary Document Images (PS, GHK, HSV, SR, MRRN), pp. 151–156.
- ICDAR-2005-SteinkrauSB #algorithm #machine learning
- Using GPUs for Machine Learning Algorithms (DS, PYS, IB), pp. 1115–1119.
- ICDAR-2005-SunHKN #recognition
- Camera based Degraded Text Recognition Using Grayscale Feature (JS, YH, YK, SN), pp. 182–186.
- ICDAR-2005-UlgesLB #documentation #estimation #image #robust
- Document Image Dewarping using Robust Estimation of Curled Text Lines (AU, CHL, TMB), pp. 1001–1005.
- ICDAR-2005-WangC #classification
- A Hierarchical Classifier Using New Support Vector Machine (YCFW, DC), pp. 851–855.
- ICDAR-2005-YinLH #documentation #image
- Financial Document Image Coding with Regions of Interest Using JPEG2000 (XCY, CPL, ZH), pp. 96–100.
- ICDAR-2005-YokobayashiW #correlation #image #recognition #segmentation
- Segmentation and Recognition of Characters in Scene Images Using Selective Binarization in Color Space and GAT Correlation (MY, TW), pp. 167–171.
- ICDAR-2005-YoonCCT #profiling
- Writer Profiling Using Handwriting Copybook Styles (SY, SSC, SHC, CCT), p. 600.
- ICDAR-2005-YosefBKD #image
- Extraction of Specified Objects from Binary Images Using Object Based Erosion Transform: Application to Hebrew Calligraphic Manuscripts (IBY, IB, KK, ID), pp. 878–882.
- ICDAR-2005-ZaidiRM #design #hardware #online #recognition
- Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform (RZ, SR, MY), pp. 91–95.
- ICDAR-2005-ZhangBZ #fuzzy #logic
- Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions (LZ, DB, RZ), pp. 972–976.
- ICDAR-2005-ZhouS #approach #fault #recognition
- Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach (JZ, CYS), pp. 484–488.
- JCDL-2005-BekaertLS05a #design #development #library #standard
- Using standards in digital library design & development (JB, XL, HVdS), p. 423.
- JCDL-2005-FoulonneauCHS #metadata
- Using collection descriptions to enhance an aggregation of harvested item-level metadata (MF, TWC, TGH, SLS), pp. 32–41.
- JCDL-2005-FuKM #automation #classification #framework #multi
- Automated text classification using a multi-agent framework (YF, WK, JM), pp. 157–158.
- JCDL-2005-HanZG #ambiguity #clustering
- Name disambiguation in author citations using a K-way spectral clustering method (HH, HZ, CLG), pp. 334–343.
- JCDL-2005-HuLCMZ #automation #documentation #machine learning
- Automatic extraction of titles from general documents using machine learning (YH, HL, YC, DM, QZ), pp. 145–154.
- JCDL-2005-OnLKM #ambiguity #case study #comparative #framework #problem #scalability
- Comparative study of name disambiguation problem using a scalable blocking-based framework (BWO, DL, JK, PM), pp. 344–353.
- JCDL-2005-ReckerDDHLMPP #development #education #library
- You can lead a horse to water: teacher development and use of digital library resources (MR, JD, DD, SH, YL, XM, BP, JP), pp. 1–8.
- JCDL-2005-RichardsonF #concept #library #resource management
- Using concept maps in digital libraries as a cross-language resource discovery tool (RR, EAF), pp. 256–257.
- SIGMOD-2005-BoulosDMMRS #named
- MYSTIQ: a system for finding more answers by using probabilities (JB, NND, BM, SM, CR, DS), pp. 891–893.
- SIGMOD-2005-ChenLL #on the #pattern matching #xml
- On Boosting Holism in XML Twig Pattern Matching using Structural Indexing Techniques (TC, JL, TWL), pp. 455–466.
- SIGMOD-2005-GovindarajuRM #approximate #mining #performance
- Fast and Approximate Stream Mining of Quantiles and Frequencies Using Graphics Processors (NKG, NR, DM), pp. 611–622.
- VLDB-2005-AugstenBG #approximate
- Approximate Matching of Hierarchical Data Using pq-Grams (NA, MHB, JG), pp. 301–312.
- VLDB-2005-HuSCS #data type
- Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype (YH, SS, TC, JS), pp. 1140–1151.
- VLDB-2005-MeierWAS #classification #fuzzy #query
- Using a Fuzzy Classification Query Language for Customer Relationship Management (AM, NW, MA, MS), pp. 1089–1096.
- VLDB-2005-MetwallyAA #detection #network #web
- Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
- VLDB-2005-SayyadianLDR
- Tuning Schema Matching Software using Synthetic Scenarios (MS, YL, AD, AR), pp. 994–1005.
- VLDB-2005-WangWLJLL #performance #query #xml
- Efficient Processing of XML Path Queries Using the Disk-based F&B Index (WW, HW, HL, HJ, XL, JL), pp. 145–156.
- VLDB-2005-XuO #query #xpath
- Rewriting XPath Queries Using Materialized Views (WX, ZMÖ), pp. 121–132.
- CSEET-2005-DutoitWPBR #education #re-engineering
- Using Rationale for Software Engineering Education (AHD, TW, BP, LB, JR), pp. 129–136.
- CSEET-2005-Liu #communication #issue tracking #learning #re-engineering #student #tool support
- Using Issue Tracking Tools to Facilitate Student Learning of Communication Skills in Software Engineering Courses (CL), pp. 61–68.
- CSEET-2005-PavlovY #education #object-oriented #uml
- Using Pantomime in Teaching OOA&OOD with UML (VLP, AY), pp. 77–84.
- CSEET-2005-WangS #analysis #architecture #student
- Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
- ITiCSE-2005-BassL #education
- Teaching to analyze solutions using FGA (IB, DL), p. 360.
- ITiCSE-2005-Guimaraes #database #dot-net #framework
- Constructing database applications for PDA using the .NET framework (MG), p. 417.
- ITiCSE-2005-HoodH #concept #education #programming
- Teaching programming and language concepts using LEGOs (CSH, DJH), pp. 19–23.
- ITiCSE-2005-MaiaMP #education #framework #operating system
- A constructivist framework for operating systems education: a pedagogic proposal using the SOsim (LPM, FBM, ACPJ), pp. 218–222.
- ITiCSE-2005-MarquesAMC #programming #student
- Using Octave to introduce programming to technical science students (NCM, FA, CM, JFC), pp. 198–202.
- ITiCSE-2005-MedeirosDGM #programming
- Using a PC simulator to illustrate input-output programming techniques (PDM, VD, MCG, RFM), p. 388.
- ITiCSE-2005-MendesGEMBR #collaboration #simulation
- Using simulation and collaboration in CS1 and CS2 (AJM, AJG, ME, MJM, CB, MAR), pp. 193–197.
- ITiCSE-2005-PaisB05a #education #programming #user interface
- Use of flash movies for teaching GUI programming (RP, JPB), p. 390.
- ITiCSE-2005-PatersonHBM #data type #ide
- Using the BlueJ IDE in a data structures course (JHP, JH, MB, AM), p. 349.
- ITiCSE-2005-Rosenthal #multi #recursion
- Introducing recursion by using multimedia (TR), p. 374.
- ITiCSE-2005-TobinW #education #security
- Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
- ITiCSE-2005-XinogalosS #concept #object-oriented #process #student
- Using hands-on activities for motivating students with OOP concepts before they are asked to implement them (SX, MS), p. 380.
- SIGITE-2005-Bailey #network
- Malware resistant networking using system diversity (MGB), pp. 191–197.
- SIGITE-2005-CampbellC #education
- Using system administrator education in eeveloping an IT eegree in a computer science department (WC, RC), pp. 319–321.
- SIGITE-2005-ChastineP #2d #array #education #realtime #video
- Teaching 2D arrays using real-time video filters (JWC, JAP), pp. 133–137.
- SIGITE-2005-GuimaraesV #development #modelling
- Comparing software development models using CDM (LRG, PRSV), pp. 339–347.
- SIGITE-2005-HiggsS #online #towards
- Towards using online portfolios in computing courses (BH, MS), pp. 323–328.
- SIGITE-2005-MarchantT #learning #student
- Using pre-release software to SPUR student learning (AM, BT), pp. 143–148.
- SIGITE-2005-Matthews #approach #education #network
- Hands-on approach to teaching computer networking using packet traces (JNM), pp. 361–367.
- SIGITE-2005-McMahon #education
- Teaching information technology using the perry stages (REM), pp. 277–281.
- CSMR-2005-BoronatCR #automation #logic #re-engineering
- Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine (AB, JÁC, IR), pp. 228–231.
- CSMR-2005-GreevyD #analysis #approach #correlation
- Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
- ICSM-2005-BriandLL #aspectj #distributed
- Tracing Distributed Systems Executions Using AspectJ (LCB, YL, JL), pp. 81–90.
- ICSM-2005-HaoZZMS #case study #fault #locality #reduction #testing
- Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study (DH, LZ, HZ, HM, JS), pp. 683–686.
- ICSM-2005-KorelTH #modelling
- Test Prioritization Using System Models (BK, LHT, MH), pp. 559–568.
- ICSM-2005-Sorkowitz #maintenance #metric #testing
- Using Metrics to Improve Maintenance Testing (AS), p. 725.
- ICSM-2005-StorzerG #analysis #aspect-oriented #evolution
- Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
- ICSM-2005-SusaniD #contract #maintenance #specification
- Cross-Organizational Service Maintenance Using Temporal Availability Specification and Contracts (OvS, PD), pp. 230–239.
- ICSM-2005-ZhangZ #configuration management #evolution #maintenance #self
- Using Self-Reconfigurable Workplaces to Automate the Maintenance of Evolving Business Applications (QZ, YZ), pp. 219–229.
- ICSM-IT-2005-ShepherdRP #aspect-oriented #evolution
- Using AOP to Ease Evolution (DS, TR, LLP), pp. 16–25.
- IWPC-2005-EnglishBCL #c++ #empirical
- An Empirical Study of the Use of Friends in C++ Software (ME, JB, TC, KL), pp. 329–332.
- MSR-2005-ConklinHC #analysis #collaboration #repository
- Collaboration using OSSmole: a repository of FLOSS data and analyses (MC, JH, KC), pp. 76–80.
- MSR-2005-KimN #comprehension #evolution
- Using a clone genealogy extractor for understanding and supporting evolution of code clones (MK, DN), pp. 1–5.
- MSR-2005-NeamtiuFH #abstract syntax tree #comprehension #evolution #source code #syntax
- Understanding source code evolution using abstract syntax tree matching (IN, JSF, MWH), pp. 81–85.
- MSR-2005-OhiraOOM #collaboration #network #social
- Accelerating cross-project knowledge collaboration using collaborative filtering and social networks (MO, NO, TO, KiM), pp. 71–75.
- SCAM-2005-ZhangBCD #implementation #verification
- Implementation and Verification of Implicit-Invocation Systems Using Source Transformation (HZ, JSB, JRC, JD), pp. 87–96.
- WCRE-2005-WangCD #security
- Enhancing Security Using Legality Assertions (LW, JRC, TRD), pp. 35–44.
- CIAA-2005-JurdzinskiO #automaton #strict
- Restricting the Use of Auxiliary Symbols for Restarting Automata (TJ, FO), pp. 176–187.
- CIAA-2005-SubramanianS #automaton #documentation #finite #recursion #xml
- Compressing XML Documents Using Recursive Finite State Automata (HS, PS), pp. 282–293.
- FM-2005-DonaldsonM #automation #detection #model checking #symmetry
- Automatic Symmetry Detection for Model Checking Using Computational Group Theory (AFD, AM), pp. 481–496.
- FM-2005-Johnson #debugging #formal method
- The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions (CWJ), pp. 9–25.
- FM-2005-PierikCB
- Controlling Object Allocation Using Creation Guards (CP, DC, FSdB), pp. 59–74.
- IFM-2005-BostromW #development #distributed #fault tolerance #grid
- Development of Fault Tolerant Grid Applications Using Distributed B (PB, MAW), pp. 167–186.
- IFM-2005-LamP #consistency #diagrams #sequence chart #statechart #π-calculus
- Consistency Checking of Sequence Diagrams and Statechart Diagrams Using the π-Calculus (VSWL, JAP), pp. 347–365.
- SEFM-2005-BarthePS #analysis #logic #memory management #precise
- Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
- SEFM-2005-CeroneLC #analysis #formal method #human-computer #interactive #model checking
- Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
- SEFM-2005-SubramaniamS #protocol
- Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
- SEFM-2005-Trakhtenbrot #debugging #testing #verification
- Use of Verification for Testing and Debugging of Complex Reactive Systems (MBT), pp. 13–22.
- SEFM-2005-Trentelman #correctness #proving
- Proving Correctness of JavaCard DL Taclets using Bali (KT), pp. 160–169.
- TLCA-2005-MatwinFHC #data mining #formal method #mining #privacy
- Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
- Haskell-2005-AbelBBHN #haskell #source code #type system #verification
- Verifying haskell programs using constructive type theory (AA0, MB, AB, JH, UN), pp. 62–73.
- ICFP-2005-Nilsson #algebra #data type #functional #optimisation #programming
- Dynamic optimization for functional reactive programming using generalized algebraic data types (HN), pp. 54–65.
- IFL-2005-ShafarenkoSHGT #case study #equation #experience #implementation #lessons learnt
- Implementing a Numerical Solution of the KPI Equation Using Single Assignment C: Lessons and Experiences (AVS, SBS, SH, CG, KT), pp. 160–177.
- AIIDE-2005-SchaefferCCMORS #interactive
- Interactive Story Writing Using ScriptEase (JS, MC, MC, MM, CO, TR, DS), pp. 163–164.
- AIIDE-2005-ShapiroAPNKT #artificial reality
- The Trial The Trail, Act 3: A Virtual Reality Drama Using Intelligent Agents (SCS, JA, DEP, TDN, MK, OT), pp. 157–158.
- CIG-2005-BradleyH #adaptation #game studies #learning
- Adapting Reinforcement Learning for Computer Games: Using Group Utility Functions (JB, GH).
- CIG-2005-ChisholmF #case study #game studies #machine learning
- A Study of Machine Learning using the Game of Fox and Geese (KC, DF).
- CIG-2005-LeenF #game studies
- Training an AI Player to play Pong Using the GTM (GL, CF).
- CIG-2005-PapacostantisEF #algorithm #game studies #optimisation #probability
- Coevolving Probabilistic Game Playing Agents using Particle Swarm Optimization Algorithm (EP, APE, NF).
- CIG-2005-Steffens #modelling #similarity
- Similarity-based Opponent Modelling using Imperfect Domain Theories (TS).
- DiGRA-2005-KatchabawH #execution #game studies #quality
- Bringing New HOPE to Networked Games: Using Optimistic Execution to Improve Quality of Service (MK, RH).
- DiGRA-2005-MulliganDM #game studies #video
- The use of Video Game Technology for Investigating Perceptual and Cognitive Awareness in Sports (DEM, MWD, JM).
- DiGRA-2005-OwstonKHP #evaluation #game studies #simulation #usability
- Evaluation of Web-based Games and Simulations Using the Virtual Usability Laboratory (RDO, AK, FH, KP).
- DiGRA-2005-PeitzEB #game studies
- Augmented Board Games - Using Electronics to Enhance Gameplay in Board Games (JP, DE, SB).
- DiGRA-2005-SchaefferCSCMORGK #game studies #interactive
- Interactive Story Writing in the Classroom: Using Computer Games (JS, MC, DS, MC, MM, CO, TR, SG, SK).
- DiGRA-2005-Stevenson #game studies
- Affective Gaming: Using pupil dilation to determine player arousal (CS).
- DiGRA-2005-Weiler #game studies #music #visualisation
- Computer Games to Visualize Music: Using a 270-year-old Tradition to Imagine Digital Possibilities (MW).
- CHI-2005-Ahlstrom #modelling
- Modeling and improving selection in cascading pull-down menus using Fitts’ law, the steering law and force fields (DA), pp. 61–70.
- CHI-2005-CostanzaIA #interface #mobile #towards
- Toward subtle intimate interfaces for mobile devices using an EMG controller (EC, SAI, RA), pp. 481–489.
- CHI-2005-HoI #mobile
- Using context-aware computing to reduce the perceived burden of interruptions from mobile devices (JH, SSI), pp. 909–918.
- CHI-2005-Johnson #design #interactive #lessons learnt #simulation
- Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuation simulations (CWJ), pp. 651–660.
- CHI-2005-MarshallB
- Saving and using encountered information: implications for electronic periodicals (CCM, SAB), pp. 111–120.
- CHI-2005-SadasivanGGD #eye tracking
- Use of eye movements as feedforward training for a synthetic aircraft inspection task (SS, JSG, AKG, ATD), pp. 141–149.
- CHI-2005-YeeP #learning #named #online
- StudioBRIDGE: using group, location, and event information to bridge online and offline encounters for co-located learning groups (SY, KSP), pp. 551–560.
- SOFTVIS-2005-BaloianBL #algorithm #concept #visualisation
- Algorithm visualization using concept keyboards (NAB, HB, WL), pp. 7–16.
- SOFTVIS-2005-GhoniemCFJ #constraints #graph #programming #visualisation
- Peeking in solver strategies using explanations visualization of dynamic graphs for constraint programming (MG, HC, JDF, NJ), pp. 27–36.
- SOFTVIS-2005-JohannesSW #algorithm #analysis #animation #visualisation
- Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
- SOFTVIS-2005-StoreyCG #development #framework #on the #overview #process #visualisation
- On the use of visualization to support awareness of human activities in software development: a survey and a framework (MADS, DC, DMG), pp. 193–202.
- VISSOFT-2005-BalzerD #graph
- Exploring Relations within Software Systems Using Treemap Enhanced Hierarchical Graphs (MB, OD), pp. 89–94.
- VISSOFT-2005-DucasseLR #comprehension #multi
- Multi-level Method Understanding Using Microprints (SD, ML, RR), pp. 33–38.
- CAiSE-2005-DongenAV #petri net #reduction #verification
- Verification of EPCs: Using Reduction Rules and Petri Nets (BFvD, WMPvdA, HMWV), pp. 372–386.
- CAiSE-2005-Evermann #analysis #concept #modelling #ontology
- The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
- CAiSE-2005-Franch #lightweight #modelling #on the
- On the Lightweight Use of Goal-Oriented Models for Software Package Selection (XF), pp. 551–566.
- CAiSE-2005-HodelHD #documentation #editing
- Using Text Editing Creation Time Meta Data for Document Management (TBH, RH, KRD), pp. 105–118.
- CAiSE-2005-NecibF #ontology #query
- Query Processing Using Ontologies (CBN, JCF), pp. 167–186.
- CAiSE-2005-TheodoratosD #graph #query
- Querying Tree-Structured Data Using Dimension Graphs (DT, TD), pp. 201–215.
- EDOC-2005-QuartelDS #approach
- An approach to relate business and application services using ISDL (DACQ, RMD, MvS), pp. 157–168.
- EDOC-2005-WangWCWFUCGL #adaptation #enterprise #monitoring
- Service Level Management using QoS Monitoring, Diagnostics, and Adaptation for Networked Enterprise Systems (GW, CW, AC, HW, CKF, SAU, YLC, WG, JL), pp. 239–250.
- EDOC-2005-WitthawaskulJ #modelling #transaction
- Transaction Support Using Unit of Work Modeling in the Context of MDA (WW, REJ), pp. 131–141.
- ICEIS-v1-2005-FaverioSB #enterprise #implementation #process
- Using Critical Success Factors for Assessing Critical Activities in ERP Implementation within SMEs (PF, DS, GB), pp. 285–292.
- ICEIS-v1-2005-Fernandez #design #security #uml
- Security Patterns and Secure Systems Design Using UML (EBF), p. 21.
- ICEIS-v1-2005-PequenoA #semantics
- Using Correspondence Assertions to Specify the Semantics of Views in an Object-Relational Data Warehouse (VMP, JNA), pp. 219–225.
- ICEIS-v2-2005-AhmanH #approach #game studies #reduction #simulation
- Using a Game Theoretical Approach for Experimental Simulation of Brood Reduction — Conflict and Co-Operation, Effect on Brood Size with Limited Resources (FÅ, LH), pp. 220–225.
- ICEIS-v2-2005-CarrascoVG #clustering
- Using DMFSQL for Financial Clustering (RAC, MAVM, JG), pp. 135–141.
- ICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based
- Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
- ICEIS-v2-2005-Fu
- Construction of Decision Trees Using Data Cube (LF), pp. 119–126.
- ICEIS-v2-2005-KumarKDB #clustering #mining #web
- Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
- ICEIS-v2-2005-NilssonFX #classification
- Clinical Decision Support by Time Series Classification Using Wavelets (MN, PF, NX), pp. 169–175.
- ICEIS-v3-2005-TanL #enterprise #framework #modelling #problem #simulation
- Enterprise Infrastructure Planning — Modelling and Simulation Using the Problem Articulation Method (ST, KL), pp. 240–245.
- ICEIS-v4-2005-CardosoSS #ontology #web
- Using Ontologies to Prospect Offers on the Web (RCC, FdFdS, ACS), pp. 200–207.
- ICEIS-v4-2005-RamirezB #enterprise #web #web service
- Integrating Agent Technologies into Enterprise Systems Using Web Services (EHR, RFB), pp. 11–15.
- ICEIS-v4-2005-SaleemB #algorithm #grid #scheduling #search-based
- Job Scheduling in Computational Grid Using Genetic Algorithm (MS, SB), pp. 163–169.
- ICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network
- An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
- ICEIS-v5-2005-DixitM #classification #documentation
- Electronic Document Classification Using Support Vector Machine — An Application for E-Learning (SD, LKM), pp. 191–198.
- ICEIS-v5-2005-GarciaLMGGL #empirical #usability
- A Controlled Experiment for Measuring the Usability of Webapps Using Patterns (FJG, MDL, FMS, JAG, PG, CL), pp. 67–74.
- CIKM-2005-AfratiLL #adaptation #query #web
- Answering aggregation queries on hierarchical web sites using adaptive sampling (FNA, PVL, CL), pp. 237–238.
- CIKM-2005-AminiTULG #documentation #learning #xml
- Learning to summarise XML documents using content and structure (MRA, AT, NU, ML, PG), pp. 297–298.
- CIKM-2005-BaiSBNC #information retrieval #modelling #query
- Query expansion using term relationships in language models for information retrieval (JB, DS, PB, JYN, GC), pp. 688–695.
- CIKM-2005-BotWCL #automation #classification #concept #documentation #generative
- Generating better concept hierarchies using automatic document classification (RSB, YfBW, XC, QL), pp. 281–282.
- CIKM-2005-ChiritaDN #detection #named #ranking
- MailRank: using ranking for spam detection (PAC, JD, WN), pp. 373–380.
- CIKM-2005-Collins-ThompsonC #modelling #query #random
- Query expansion using random walk models (KCT, JC), pp. 704–711.
- CIKM-2005-GuptaNR #performance
- Efficient data dissemination using locale covers (SG, JN, CVR), pp. 243–244.
- CIKM-2005-HalachevST #sequence
- Exact match search in sequence data using suffix trees (MH, NS, AT), pp. 123–130.
- CIKM-2005-HaradaH #order
- Order checking in a CPOE using event analyzer (LH, YH), pp. 549–555.
- CIKM-2005-JiangZ #markov #modelling
- Accurately extracting coherent relevant passages using hidden Markov models (JJ, CZ), pp. 289–290.
- CIKM-2005-KangHLM #feedback #modelling #statistics
- Establishing value mappings using statistical models and user feedback (JK, TSH, DL, PM), pp. 68–75.
- CIKM-2005-KanT #classification #performance
- Fast webpage classification using URL features (MYK, HONT), pp. 325–326.
- CIKM-2005-KoloniariPPT #query
- Query workload-aware overlay construction using histograms (GK, YP, EP, TT), pp. 640–647.
- CIKM-2005-LeonardiB #approach #database #detection #documentation #relational #xml
- Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
- CIKM-2005-MangoldSM #database #information management #intranet
- Improving intranet search-engines using context information from databases (CM, HS, BM), pp. 349–350.
- CIKM-2005-Melucci #modelling
- Context modeling and discovery using vector space bases (MM), pp. 808–815.
- CIKM-2005-MiaoKM #clustering #comparative #documentation #evaluation #n-gram
- Document clustering using character N-grams: a comparative evaluation with term-based and word-based clustering (YM, VK, EEM), pp. 357–358.
- CIKM-2005-OrlandicLY #clustering #effectiveness #performance #reduction
- Clustering high-dimensional data using an efficient and effective data space reduction (RO, YL, WGY), pp. 201–208.
- CIKM-2005-PrasadK #performance #query #sequence #xml
- Efficient indexing and querying of XML data using modified Prüfer sequences (KHP, PSK), pp. 397–404.
- CIKM-2005-TheodoratosDKG #data flow #query #semantics
- Semantic querying of tree-structured data sources using partially specified tree patterns (DT, TD, AK, NHG), pp. 712–719.
- CIKM-2005-VuG #retrieval
- Using RankBoost to compare retrieval systems (HTV, PG), pp. 309–310.
- CIKM-2005-WhitelawGA #analysis #sentiment
- Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
- ECIR-2005-AyacheQC #classification #video
- Video Shot Classification Using Lexical Context (SA, GQ, MC), pp. 549–551.
- ECIR-2005-CliftonT #framework #named
- Knowing-Aboutness: Question-Answering Using a Logic-Based Framework (TC, WJT), pp. 230–244.
- ECIR-2005-CoyleS #interactive #web
- Enhancing Web Search Result Lists Using Interaction Histories (MC, BS), pp. 543–545.
- ECIR-2005-SiersdorferW #classification #strict
- Using Restrictive Classification and Meta Classification for Junk Elimination (SS, GW), pp. 287–299.
- ECIR-2005-YangJZY #documentation #effectiveness #retrieval
- Improving Retrieval Effectiveness by Using Key Terms in Top Retrieved Documents (LY, DHJ, GZ, NY), pp. 169–184.
- ICML-2005-BurgesSRLDHH #learning #rank
- Learning to rank using gradient descent (CJCB, TS, ER, AL, MD, NH, GNH), pp. 89–96.
- ICML-2005-CalinonB #framework #gesture #probability #recognition
- Recognition and reproduction of gestures using a probabilistic framework combining PCA, ICA and HMM (SC, AB), pp. 105–112.
- ICML-2005-CarneyCDL #network #predict #probability
- Predicting probability distributions for surf height using an ensemble of mixture density networks (MC, PC, JD, CL), pp. 113–120.
- ICML-2005-GuptaG #clustering #hybrid #robust
- Robust one-class clustering using hybrid global and local search (GG, JG), pp. 273–280.
- ICML-2005-IeWNL #adaptation #multi #recognition
- Multi-class protein fold recognition using adaptive codes (EI, JW, WSN, CSL), pp. 329–336.
- ICML-2005-JinCS #information retrieval
- Learn to weight terms in information retrieval using category information (RJ, JYC, LS), pp. 353–360.
- ICML-2005-JinZ #algorithm #probability
- A smoothed boosting algorithm using probabilistic output codes (RJ, JZ), pp. 361–368.
- ICML-2005-KolterM #concept
- Using additive expert ensembles to cope with concept drift (JZK, MAM), pp. 449–456.
- ICML-2005-LiuXC #graph #predict
- Predicting protein folds with structural repeats using a chain graph model (YL, EPX, JGC), pp. 513–520.
- ICML-2005-MadsenKE #modelling #word
- Modeling word burstiness using the Dirichlet distribution (REM, DK, CE), pp. 545–552.
- ICML-2005-MichelsSN #learning
- High speed obstacle avoidance using monocular vision and reinforcement learning (JM, AS, AYN), pp. 593–600.
- ICML-2005-Pietraszek #analysis #classification #optimisation
- Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
- ICML-2005-PoczosL #analysis #independence
- Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
- ICML-2005-SajamaO05a #modelling #reduction
- Supervised dimensionality reduction using mixture models (S, AO), pp. 768–775.
- ICML-2005-WilliamsLXC #classification
- Incomplete-data classification using logistic regression (DW, XL, YX, LC), pp. 972–979.
- KDD-2005-FujimakiYM #approach #detection #kernel #problem
- An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
- KDD-2005-ManeSH #classification #independence
- Estimating missed actual positives using independent classifiers (SM, JS, SYH), pp. 648–653.
- KDD-2005-NasraouiCR #metric #mining #retrieval #similarity #web
- Using retrieval measures to assess similarity in mining dynamic web clickstreams (ON, CC, CR), pp. 439–448.
- KDD-2005-NevilleSJKPG #information management #relational
- Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
- KDD-2005-Petrushin #mining #multi #self #video
- Mining rare and frequent events in multi-camera surveillance video using self-organizing maps (VAP), pp. 794–800.
- KDD-2005-Sandler #classification #linear #on the #programming
- On the use of linear programming for unsupervised text classification (MS), pp. 256–264.
- KDD-2005-WangLLMZ #web
- Web object indexing using domain knowledge (MW, ZL, LL, WYM, NZ), pp. 294–303.
- KDD-2005-ZakiR #mining #reasoning #set
- Reasoning about sets using redescription mining (MJZ, NR), pp. 364–373.
- KDD-2005-ZhouFSU #feature model #streaming
- Streaming feature selection using alpha-investing (JZ, DPF, RAS, LHU), pp. 384–393.
- LSO-2005-DingsoyrB
- Using Open Space Technology as a Method to Share Domain Knowledge (TD, FOB), pp. 102–106.
- LSO-2005-SantosMRFMAPA #development #information management #process
- Using a Software Development Environment with Knowledge Management to Support Deploying Software Processes in Small and Medium Size Companies (GS, MM, ARR, SF, SM, AA, BDP, MA), pp. 72–76.
- LSO-2005-ZuserG #feedback
- Using Feedback for Supporting Software Team Improvement (WZ, TG), pp. 119–123.
- MLDM-2005-BarbuHAT #clustering #documentation #graph #image #summary
- Clustering Document Images Using Graph Summaries (EB, PH, SA, ÉT), pp. 194–202.
- MLDM-2005-EickRBV #assessment #clustering #distance #similarity
- Using Clustering to Learn Distance Functions for Supervised Similarity Assessment (CFE, AR, AB, RV), pp. 120–131.
- MLDM-2005-GuptaKB #classification #concept analysis #incremental
- Incremental Classification Rules Based on Association Rules Using Formal Concept Analysis (AG, NK, VB), pp. 11–20.
- MLDM-2005-HalveyKS #clustering #internet #navigation #predict
- Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
- MLDM-2005-HanCY #analysis #component #feature model #image #independence
- Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
- MLDM-2005-LegrandN #feature model
- Feature Selection Method Using Preferences Aggregation (GL, NN), pp. 203–217.
- MLDM-2005-LiFKL #automation #image #modelling #segmentation
- Automatic Clinical Image Segmentation Using Pathological Modelling, PCA and SVM (SL, TF, AK, SL), pp. 314–324.
- MLDM-2005-MakrehchiK #classification
- Text Classification Using Small Number of Features (MM, MSK), pp. 580–589.
- MLDM-2005-OhnishiI #analysis #component #detection #independence
- Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
- MLDM-2005-SiaL #clustering #dataset #scalability
- Clustering Large Dynamic Datasets Using Exemplar Points (WS, MML), pp. 163–173.
- MLDM-2005-SilvaJNP #geometry #learning #metric
- Diagnosis of Lung Nodule Using Reinforcement Learning and Geometric Measures (ACS, VRdSJ, AdAN, ACdP), pp. 295–304.
- MLDM-2005-VermaVV #approach #mining
- Temporal Approach to Association Rule Mining Using T-Tree and P-Tree (KV, OPV, RV), pp. 651–659.
- SEKE-2005-BabarNJ #architecture #framework #overview
- Assessing a Framework of Comparing Architecture Review Methods Using CMMI (MAB, MN, DRJ), pp. 400–403.
- SEKE-2005-BasitRJ #empirical #unification
- An Empirical Study on Limits of Clone Unification Using Generics (HAB, DCR, SJ), pp. 109–114.
- SEKE-2005-BenavidesTC #constraints #feature model #modelling #programming
- Using Constraint Programming to Reason on Feature Models (DB, PT, ARC), pp. 677–682.
- SEKE-2005-BrandaoSL #design #knowledge-based #multi #reasoning #verification
- Multi-Agent System Design Verification Using Knowledge-based Reasoning (AB, VTdS, CJPdL), pp. 602–607.
- SEKE-2005-CangussuK #evaluation #integration #modelling #testing
- Using Dynamic Models for the Evaluation of Integration and System Testing (JWC, RMK), pp. 436–441.
- SEKE-2005-ChiangTK #classification #multi #performance
- Fast Class Rendering Using Multiresolution Classification in Discrete Cosine Transform Domain (TWC, TT, LJK), pp. 689–694.
- SEKE-2005-FalboRM #ontology #re-engineering #semantics
- Using Ontologies to Add Semantics to a Software Engineering Environment (RdAF, FBR, RDM), pp. 151–156.
- SEKE-2005-GuanG #constraints #web #web service
- Dealing with Web Service QoS factors using Constraint Hierarchy (YG, AKG), pp. 578–583.
- SEKE-2005-LiCLY #analysis #design #evolution #feature model #legacy
- Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
- SEKE-2005-LungXZ #architecture #composition
- Software Architecture Decomposition Using Attributes (CHL, XX, MZ), pp. 747–752.
- SEKE-2005-MarewKB #aspect-oriented #case study #composition #development #functional #product line
- Case Study on Systematic Functional Decomposition in a Product Line using Aspect Oriented Software Development (TM, JK, DHB), pp. 152–157.
- SEKE-2005-NabliFG #adaptation #algebra #data flow #multi
- Adapting Multidimensional Schemes to Data sources using Algebraic Operators (AN, JF, FG), pp. 713–718.
- SEKE-2005-WangDS #alloy #reasoning
- Reasoning Support for SWRL-FOL Using Alloy (HHW, JSD, JS), pp. 626–631.
- SIGIR-2005-AnhM #similarity
- Simplified similarity scoring using term ranks (VNA, AM), pp. 226–233.
- SIGIR-2005-BeitzelJFGLCK #automation #classification #query #web
- Automatic web query classification using labeled and unlabeled training data (SMB, ECJ, OF, DAG, DDL, AC, AK), pp. 581–582.
- SIGIR-2005-ChiritaNPK #metadata #personalisation
- Using ODP metadata to personalize search (PAC, WN, RP, CK), pp. 178–185.
- SIGIR-2005-CuiSLKC #dependence #retrieval
- Question answering passage retrieval using dependency relations (HC, RS, KL, MYK, TSC), pp. 400–407.
- SIGIR-2005-FergusonSGW #retrieval #scalability #set
- Top subset retrieval on large collections using sorted indices (PF, AFS, CG, PW), pp. 599–600.
- SIGIR-2005-Grivolla #approach #automation #documentation #natural language #query #retrieval
- Using Oracle for natural language document retrieval an automatic query reformulation approach (JG), pp. 605–606.
- SIGIR-2005-JinC #information retrieval #online
- Study of cross lingual information retrieval using on-line translation systems (RJ, JYC), pp. 619–620.
- SIGIR-2005-KurlandL #modelling #rank #ranking
- PageRank without hyperlinks: structural re-ranking using links induced by language models (OK, LL), pp. 306–313.
- SIGIR-2005-KurlandLD #clustering #modelling #pseudo
- Better than the real thing?: iterative pseudo-query processing using cluster-based language models (OK, LL, CD), pp. 19–26.
- SIGIR-2005-LiangDT #order #query #summary
- Using query term order for result summarisation (SFL, SD, JT), pp. 629–630.
- SIGIR-2005-RennieJ #detection
- Using term informativeness for named entity detection (JDMR, TSJ), pp. 353–360.
- SIGIR-2005-ShenTZ #feedback #information management #information retrieval
- Context-sensitive information retrieval using implicit feedback (XS, BT, CZ), pp. 43–50.
- SIGIR-2005-SunSZYLC #summary
- Web-page summarization using clickthrough data (JTS, DS, HJZ, QY, YL, ZC), pp. 194–201.
- SIGIR-2005-TanCWXGG #classification
- Using dragpushing to refine centroid text classifiers (ST, XC, BW, HX, MG, YG), pp. 653–654.
- SIGIR-2005-TryfonopoulosIK #information retrieval #network
- Publish/subscribe functionality in IR environments using structured overlay networks (CT, SI, MK), pp. 322–329.
- SIGIR-2005-UdaniDDS #induction #web
- Noun sense induction using web search results (GU, SD, AD, TS), pp. 657–658.
- SIGIR-2005-ViolaN #context-free grammar #learning
- Learning to extract information from semi-structured text using a discriminative context free grammar (PAV, MN), pp. 330–337.
- SIGIR-2005-XiFFZCYZ #matrix #named #similarity
- SimFusion: measuring similarity using unified relationship matrix (WX, EAF, WF, BZ, ZC, JY, DZ), pp. 130–137.
- SIGIR-2005-XueLYXZYC #clustering #collaboration #scalability
- Scalable collaborative filtering using cluster-based smoothing (GRX, CL, QY, WX, HJZ, YY, ZC), pp. 114–121.
- SIGIR-2005-ZhangLLJXFCM #graph #web
- Improving web search results using affinity graph (BZ, HL, YL, LJ, WX, WF, ZC, WYM), pp. 504–511.
- SIGIR-2005-ZhuJXG #classification #multi
- Multi-labelled classification using maximum entropy method (SZ, XJ, WX, YG), pp. 274–281.
- ECMDA-FA-2005-BurgstallerWFBF #development #distributed #monitoring
- Using Domain Driven Development for Monitoring Distributed Systems (RB, EW, LF, MB, TF), pp. 19–24.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- MoDELS-2005-SandersMKB #composition #specification #uml
- Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- MoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support
- Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
- SPLC-2005-HelferichHS #deployment #named #product line #quality
- QFD-PPP: Product Line Portfolio Planning Using Quality Function Deployment (AH, GH, SS), pp. 162–173.
- SPLC-2005-LamineJG #component #estimation #off the shelf #product line
- Cost Estimation for Product Line Engineering Using COTS Components (SBABL, LLJ, HHBG), pp. 113–123.
- SPLC-2005-ReiserW #set
- Using Product Sets to Define Complex Product Decisions (MOR, MW), pp. 21–32.
- SPLC-2005-TessierGTG #modelling #product line #system family
- Using Variation Propagation for Model-Driven Management of a System Family (PT, SG, FT, JMG), pp. 222–233.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- MoDELS-2005-SandersMKB #composition #specification #uml
- Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- MoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support
- Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
- OOPSLA-2005-ArnoldWR #performance #repository #virtual machine
- Improving virtual machine performance using a cross-run profile repository (MA, AW, VTR), pp. 297–311.
- OOPSLA-2005-DoorenS #exception #flexibility #robust
- Combining the robustness of checked exceptions with the flexibility of unchecked exceptions using anchored exception declarations (MvD, ES), pp. 455–471.
- OOPSLA-2005-MartinLL #fault #query #security
- Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
- OOPSLA-2005-SangalJSJ #architecture #dependence #modelling
- Using dependency models to manage complex software architecture (NS, EJ, VS, DJ), pp. 167–176.
- OOPSLA-2005-ZdunA #design pattern #modelling
- Modeling architectural patterns using architectural primitives (UZ, PA), pp. 133–146.
- AdaEurope-2005-RogersW #ada #fault tolerance
- The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95 (PR, AJW), pp. 236–247.
- AdaEurope-2005-VergnaudPK #component #distributed #middleware
- Using the AADL to Describe Distributed Applications from Middleware to Software Components (TV, LP, FK), pp. 67–78.
- LOPSTR-2005-PettorossiPS #array #protocol #verification
- Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
- PADL-2005-BaileyS #constraints #satisfiability #set
- Discovery of Minimal Unsatisfiable Subsets of Constraints Using Hitting Set Dualization (JB, PJS), pp. 174–186.
- POPL-2005-GulwaniN #analysis #interprocedural #precise #random
- Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
- POPL-2005-XieA #detection #fault #satisfiability #scalability
- Scalable error detection using boolean satisfiability (YX, AA), pp. 351–363.
- PPDP-2005-SahaR #analysis #incremental #logic programming #points-to
- Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
- SAS-2005-BagnaraRZ #algebra #generative #invariant
- Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra (RB, ERC, EZ), pp. 19–34.
- SAS-2005-HarrenN #assembly #dependent type #safety
- Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
- SIGAda-2005-AusdenN #c++
- Using ASIS to generate C++ bindings (HA, KAN), pp. 23–30.
- SIGAda-2005-Ruocco #case study #experience
- Experiences using SPARK in an undergraduate CS course (ASR), pp. 37–40.
- RE-2005-BittnerBPRW #requirements #reuse #scalability #variability
- Managing Variability and Reuse of Features and Requirements for Large and Complex Organizational Structures (MB, AB, AP, MOR, MW), pp. 469–470.
- RE-2005-DiazPM #interactive #modelling
- Modeling Interactions using Role-Driven Patterns (ID, OP, AM), pp. 209–220.
- RE-2005-LutzNPFT #analysis #identification #requirements
- Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
- RE-2005-PottF #modelling #requirements
- Using Cognitive Modeling for Requirements Engineering in Anesthesiology (CP, JlF), pp. 491–492.
- RE-2005-RobinsonWW #analysis #design #probability #requirements
- Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
- RE-2005-WassonSLK #fault #requirements
- Using Occurrence Properties of Defect Report Data to Improve Requirements (KSW, KNS, RRL, JCK), pp. 253–262.
- ASE-2005-AgarwalSWS #concurrent #detection #runtime
- Optimized run-time race detection and atomicity checking using partial discovered types (RA, AS, LW, SDS), pp. 233–242.
- ASE-2005-DiaconescuM #automation #component #enterprise #performance
- Automating the performance management of component-based enterprise systems through the use of redundancy (AD, JM), pp. 44–53.
- ASE-2005-FalbPRJAK #automation #specification #synthesis #user interface
- Using communicative acts in high-level specifications of user interfaces for their automated synthesis (JF, RP, TR, HJ, EA, HK), pp. 429–430.
- ASE-2005-GuptaHZG
- Locating faulty code using failure-inducing chops (NG, HH, XZ, RG), pp. 263–272.
- ASE-2005-VisserPP #abstraction #generative
- Test input generation for red-black trees using abstraction (WV, CSP, RP), pp. 414–417.
- ESEC-FSE-2005-GearB #component #re-engineering #towards
- Reengineering towards components using “Reconn-exion” (ALG, JB), pp. 370–373.
- ESEC-FSE-2005-MetzLG #approach #hybrid #performance
- Performance data collection using a hybrid approach (EM, RL, TFG), pp. 126–135.
- ESEC-FSE-2005-PetterssonJ #approach #experience #industrial #lightweight #product line #web
- Industrial experience with building a web portal product line using a lightweight, reactive approach (UP, SJ), pp. 326–335.
- GTTSE-2005-BenavidesSMC #analysis #automation #csp #feature model #java #modelling
- Using Java CSP Solvers in the Automated Analyses of Feature Models (DB, SS, PTMA, ARC), pp. 399–408.
- GTTSE-2005-BravenboerGV #domain-specific language #stratego
- MetaBorg in Action: Examples of Domain-Specific Language Embedding and Assimilation Using Stratego/XT (MB, RdG, EV), pp. 297–311.
- GTTSE-2005-EkmanH #analysis #composition #jastadd #java
- Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
- GTTSE-2005-Galhardas #ajax #framework
- Data Cleaning and Transformation Using the AJAX Framework (HG), pp. 327–343.
- GTTSE-2005-Mens #graph transformation #on the #refactoring
- On the Use of Graph Transformations for Model Refactoring (TM), pp. 219–257.
- GTTSE-2005-WinterB #program transformation
- Program Transformation Using HATS 1.84 (VLW, JB), pp. 378–396.
- ICSE-2005-ApiwattanapongOH #impact analysis #performance #precise #sequence
- Efficient and precise dynamic impact analysis using execute-after sequences (TA, AO, MJH), pp. 432–441.
- ICSE-2005-DemskyR #data type #reasoning
- Data structure repair using goal-directed reasoning (BD, MCR), pp. 176–185.
- ICSE-2005-HolmesM #recommendation #source code
- Using structural context to recommend source code examples (RH, GCM), pp. 117–125.
- ICSE-2005-NagappanB #fault #metric #predict
- Use of relative code churn measures to predict system defect density (NN, TB), pp. 284–292.
- ICSE-2005-RockmanK #development
- The software engineer and the development, management and use of intellectual property (HBR, VK), pp. 708–709.
- ICSE-2005-ZeidE #development #education #framework
- Using peer reviews in teaching framework development (AZ, ME), pp. 627–628.
- SAC-2005-AgyemangBA #mining #n-gram #web
- Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
- SAC-2005-BalsaraR #model checking #predict #search-based
- Prediction of inherited and genetic mutations using the software model checker SPIN (ZB, SR), pp. 208–209.
- SAC-2005-BeigbederM #fuzzy #information retrieval #proximity
- An information retrieval model using the fuzzy proximity degree of term occurences (MB, AM), pp. 1018–1022.
- SAC-2005-BuenoTT #algorithm #approximate #query #search-based #similarity
- Accelerating approximate similarity queries using genetic algorithms (RB, AJMT, CTJ), pp. 617–622.
- SAC-2005-CaetanoST #process
- Using roles and business objects to model and understand business processes (AC, ARS, JMT), pp. 1308–1313.
- SAC-2005-CaoBZBROA #modelling
- Marshaling and unmarshaling models using the entity-relationship model (FC, BRB, WZ, CCB, RRR, AMO, MA), pp. 1553–1557.
- SAC-2005-ChenA #analysis #approach #comparative #predict #sequence
- A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
- SAC-2005-ChoC #database #image #recognition #symmetry
- Contour-based partial object recognition using symmetry in image databases (JSC, JC), pp. 1190–1194.
- SAC-2005-FlanaginGRAS #automation #generative #overview
- Automated terrain generation using LIDAR and waterbody survey data (MF, AG, JJR, MA, KS), pp. 1185–1189.
- SAC-2005-HastingsLOKPCJS #data transformation #distributed #xml
- Grid-based management of biomedical data using an XML-based distributed data management system (SH, SL, SO, TMK, TP, ÜVÇ, DJ, JHS), pp. 105–109.
- SAC-2005-InoueU #image
- Retrieving lightly annotated images using image similarities (MI, NU), pp. 1031–1037.
- SAC-2005-JayadevaprakashMP #generative #graph #transitive
- Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
- SAC-2005-JinD #metadata
- Sanitizing using metadata in MetaXQuery (HJ, CED), pp. 1732–1736.
- SAC-2005-KvaleLC #aspect-oriented #case study #programming
- A case study on building COTS-based system using aspect-oriented programming (AAK, JL, RC), pp. 1491–1498.
- SAC-2005-LambertMS #constraints
- Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
- SAC-2005-LawL #constraints #matrix #modelling #symmetry
- Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
- SAC-2005-LiY #classification #predict #recursion
- Using recursive classification to discover predictive features (FL, YY), pp. 1054–1058.
- SAC-2005-Lu #correctness #declarative
- Use of correctness assertions in declarative diagnosis (LL), pp. 1404–1408.
- SAC-2005-MitchellP #metric #runtime
- Using object-level run-time metrics to study coupling between objects (ÁM, JFP), pp. 1456–1462.
- SAC-2005-RaposoPAV #automation #maintenance #query #web
- Automatic wrapper maintenance for semi-structured web sources using results from previous queries (JR, AP, MÁ, ÁV), pp. 654–659.
- SAC-2005-ReddyC #bound
- Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
- SAC-2005-SpohnG #network #problem #set
- A solution for the location problem in arbitrary computer networks using generic dominating sets (MAS, JJGLA), pp. 739–743.
- SAC-2005-TangsripairojS #repository #self #visualisation
- Organizing and visualizing software repositories using the growing hierarchical self-organizing map (ST, MHS), pp. 1539–1545.
- SAC-2005-TruongS #behaviour #modelling #uml #verification
- Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
- SAC-2005-WalkerMH #re-engineering
- Surface reconstruction using shadow profilometry (CPW, NM, MGH), pp. 1250–1251.
- SAC-2005-WanMA #array #markov #random #similarity
- Cleaning microarray expression data using Markov random fields based on profile similarity (RW, HM, KFA), pp. 206–207.
- ATEM-2004-GirbaFD05 #evolution #metamodelling #model transformation
- Using Meta-Model Transformation to Model Software Evolution (TG, JMF, SD), pp. 57–64.
- GPCE-2005-WuL #programming #reasoning #source code
- Shadow Programming: Reasoning About Programs Using Lexical Join Point Information (PW, KJL), pp. 141–156.
- LDTA-2005-SloaneW #eclipse #education #eli #programming language
- Eclipse Support for Using Eli and Teaching Programming Languages (AMS, WMW), pp. 189–194.
- CASE-2005-CengicALYF #composition #implementation
- Implementation of full synchronous composition using IEC 61499 function blocks (GC, KÅ, BL, CY, PMF), pp. 267–272.
- CASE-2005-ChangLJ #detection #fault #network
- Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
- CASE-2005-ChengY #bound
- Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
- CASE-2005-FalkmanLT #algebra #petri net #process #specification
- Specification of a batch plant using process algebra and Petri nets (PF, BL, MT), pp. 339–344.
- CASE-2005-FigueiredoJ
- Nonholonomic systems stabilization and tracking control using discontinuous control (LCF, FGJ), pp. 142–147.
- CASE-2005-JainR #analysis #modelling
- Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
- CASE-2005-KimD #metric #process #quality
- Quality measurement of production process plan using tolerance chart (IHK, ZD), pp. 25–30.
- CASE-2005-KimKYT #identification #realtime
- Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
- CASE-2005-LiuHL #flexibility #scheduling
- Dynamic scheduling of flexible manufacturing system using support vector machines (YHL, HPH, YSL), pp. 387–392.
- CASE-2005-LowWW #development #on the #realtime
- On the development of a real time control system by using xPC Target: solution to robotic system control (KHL, HW, MYW), pp. 345–350.
- CASE-2005-MillerSSLM #analysis
- Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
- CASE-2005-SchmidW
- Path planning for a humanoid using NURBS curves (AJS, HW), pp. 351–356.
- CASE-2005-SongHQG #automation #documentation
- Automating inspection and documentation of remote building construction using a robotic camera (DS, QH, NQ, KG), pp. 172–177.
- CASE-2005-TanonkouBBX #approach #probability #problem
- Solving a stochastic inventory-location problem using Lagrangian relaxation approach (GAT, LB, RB, XX), pp. 279–284.
- CASE-2005-WangCL #capacity #robust
- Using shared resource capacity for robust control of failure prone manufacturing systems (SW, SFC, MAL), pp. 369–374.
- CASE-2005-WangLWK #architecture #distributed #simulation
- Collision resolution simulation for distributed control architectures using LonWorks (MW, EL, EW, MK), pp. 319–326.
- CASE-2005-WeiL #concurrent #policy #programming
- A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
- CC-2005-JiangMHLZZZ #multi #performance
- Boosting the Performance of Multimedia Applications Using SIMD Instructions (WJ, CM, BH, JL, JZ, BZ, CZ), pp. 59–75.
- CC-2005-LeLH #interprocedural #jit #optimisation
- Using Inter-Procedural Side-Effect Information in JIT Optimizations (AL, OL, LJH), pp. 287–304.
- CC-2005-Padovani #c++ #compilation
- Compilation of Generic Regular Path Expressions Using C++ Class Templates (LP), pp. 27–42.
- CC-2005-SadeSS #c #memory management #optimisation #parallel #thread
- Optimizing C Multithreaded Memory Management Using Thread-Local Storage (YS, SS, RS), pp. 137–155.
- CGO-2005-DaiZHY #compilation #framework #optimisation
- A General Compiler Framework for Speculative Optimizations Using Data Speculative Code Motion (XD, AZ, WCH, PCY), pp. 280–290.
- CGO-2005-StephensonA #classification #predict
- Predicting Unroll Factors Using Supervised Classification (MS, SPA), pp. 123–134.
- DAC-2005-AgarwalCBZ #analysis #optimisation #statistics
- Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
- DAC-2005-AminID #approximate
- Piece-wise approximations of RLCK circuit responses using moment matching (CSA, YII, FD), pp. 927–932.
- DAC-2005-BhuniaBCMR #approach #novel #power management #reduction #synthesis
- A novel synthesis approach for active leakage power reduction using dynamic supply gating (SB, NB, QC, HMM, KR), pp. 479–484.
- DAC-2005-HuLWD #analysis #integration #novel
- Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
- DAC-2005-KimYH
- Trace-driven HW/SW cosimulation using virtual synchronization technique (DK, YY, SH), pp. 345–348.
- DAC-2005-LuoYYB #design #network #power management
- Low power network processor design using clock gating (YL, JY, JY, LNB), pp. 712–715.
- DAC-2005-MitraYP #named #performance #simulation
- RADAR: RET-aware detailed routing using fast lithography simulations (JM, PY, DZP), pp. 369–372.
- DAC-2005-NookalaCLS #approach #architecture #design #statistics
- Microarchitecture-aware floorplanning using a statistical design of experiments approach (VN, YC, DJL, SSS), pp. 579–584.
- DAC-2005-PengL #named #performance #power management
- Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method (YP, XL), pp. 813–818.
- DAC-2005-VolkerinkM #architecture
- Response compaction with any number of unknowns using a new LFSR architecture (EHV, SM), pp. 117–122.
- DAC-2005-ZhangPHS #abstraction #satisfiability
- Dynamic abstraction using SAT-based BMC (LZ, MRP, MSH, TS), pp. 754–757.
- DATE-2005-AgarwalCB #optimisation #statistics
- Statistical Timing Based Optimization using Gate Sizing (AA, KC, DB), pp. 400–405.
- DATE-2005-BalakrishnanT #configuration management #linear
- Reconfigurable Linear Decompressors Using Symbolic Gaussian Elimination (KJB, NAT), pp. 1130–1135.
- DATE-2005-EeckelaertMG #multi #performance #synthesis
- Efficient Multiobjective Synthesis of Analog Circuits using Hierarchical Pareto-Optimal Performance Hypersurfaces (TE, TM, GGEG), pp. 1070–1075.
- DATE-2005-GadkariR #automation #monitoring #specification #synthesis #visual notation
- Automated Synthesis of Assertion Monitors using Visual Specifications (AAG, SR), pp. 390–395.
- DATE-2005-GanaiGA #embedded #memory management #modelling #performance #verification
- Verification of Embedded Memory Systems using Efficient Memory Modeling (MKG, AG, PA), pp. 1096–1101.
- DATE-2005-HanlaiMJ #control flow #graph #memory management #optimisation #performance
- Extended Control Flow Graph Based Performance Optimization Using Scratch-Pad Memory (PH, LM, JJ), pp. 828–829.
- DATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #safety
- The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
- DATE-2005-KangPR #analysis #statistics
- Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
- DATE-2005-KeezerGMT #low cost #multi
- Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL (DCK, CG, AMM, NT), pp. 152–157.
- DATE-2005-LiLLPN #modelling #order #parametricity #performance #reduction #variability
- Modeling Interconnect Variability Using Efficient Parametric Model Order Reduction (PL, FL, XL, LTP, SRN), pp. 958–963.
- DATE-2005-LyseckyV #case study #clustering #hardware
- A Study of the Speedups and Competitiveness of FPGA Soft Processor Cores using Dynamic Hardware/Software Partitioning (RLL, FV), pp. 18–23.
- DATE-2005-MartensG #integration #orthogonal #polynomial #simulation
- Time-Domain Simulation of Sampled Weakly Nonlinear Systems Using Analytical Integration and Orthogonal Polynomial Series (EM, GGEG), pp. 120–125.
- DATE-2005-MaslovYMD #quantum
- Quantum Circuit Simplification Using Templates (DM, CY, DMM, GWD), pp. 1208–1213.
- DATE-2005-MishchenkoBJVY #equation #performance
- Efficient Solution of Language Equations Using Partitioned Representations (AM, RKB, JHRJ, TV, NY), pp. 418–423.
- DATE-2005-NaculG #compilation #embedded #lightweight #multi
- Lightweight Multitasking Support for Embedded Systems using the Phantom Serializing Compiler (ACN, TG), pp. 742–747.
- DATE-2005-NegreirosCS #evaluation #low cost
- Noise Figure Evaluation Using Low Cost BIST (MN, LC, AAS), pp. 158–163.
- DATE-2005-NeiroukhS #statistics
- Improving the Process-Variation Tolerance of Digital Circuits Using Gate Sizing and Statistical Techniques (ON, XS), pp. 294–299.
- DATE-2005-OgrasM #approach #architecture #communication #composition #energy #synthesis
- Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach (ÜYO, RM), pp. 352–357.
- DATE-2005-SuCP #configuration management
- Yield Enhancement of Digital Microfluidics-Based Biochips Using Space Redundancy and Local Reconfiguration (FS, KC, VKP), pp. 1196–1201.
- DATE-2005-Takeuchi #debugging #lightweight #monitoring #virtual machine
- OS Debugging Method Using a Lightweight Virtual Machine Monitor (TT), pp. 1058–1059.
- DATE-2005-VargheseCY #analysis
- Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
- DATE-2005-YangHSP #logic #multi #quantum #synthesis
- Exact Synthesis of 3-Qubit Quantum Circuits from Non-Binary Quantum Gates Using Multiple-Valued Logic and Group Theory (GY, WNNH, XS, MAP), pp. 434–435.
- HPCA-2005-JaleelJ #memory management
- Using Virtual Load/Store Queues (VLSQs) to Reduce the Negative Effects of Reordered Memory Instructions (AJ, BLJ), pp. 191–200.
- HPCA-2005-MartyBHHMW #multi
- Improving Multiple-CMP Systems Using Token Coherence (MRM, JDB, MDH, AJH, MMKM, DAW), pp. 328–339.
- HPDC-2005-AlbrechtTSV #distributed
- Distributed application management using Plush (JRA, CT, ACS, AV), pp. 281–282.
- HPDC-2005-GrothMFWZM #empirical
- Recording and using provenance in a protein compressibility experiment (PTG, SM, WF, SCW, KPZ, LM), pp. 201–208.
- HPDC-2005-HuangS #adaptation #self
- Building self-adapting services using service-specific knowledge (ACH, PS), pp. 34–43.
- PDP-2005-CalderonCCPS #fault tolerance #file system #implementation #parallel
- A Fault Tolerant MPI-IO Implementation using the Expand Parallel File System (AC, FGC, JC, JMP, LMS), pp. 274–281.
- PDP-2005-ClematisDGM #framework #parallel #visualisation
- Using a CCA Compliant Framework for Parallel Remote Visualization (AC, DD, AG, MM), pp. 227–234.
- PDP-2005-GuitartCTAL #analysis #web
- Tuning Dynamic Web Applications using Fine-Grain Analysis (JG, DC, JT, EA, JL), pp. 84–91.
- PDP-2005-ManciniVMRT #development #web #web service
- Performance-Driven Development of a Web Services Application using MetaPL/HeSSE (EM, UV, NM, MR, RT), pp. 12–19.
- PPoPP-2005-FreehL #clustering #energy #multi #source code
- Using multiple energy gears in MPI programs on a power-scalable cluster (VWF, DKL), pp. 164–173.
- PPoPP-2005-ShachamSS #information management #model checking #scalability
- Scaling model checking of dataraces using dynamic information (OS, MS, AS), pp. 107–118.
- SOSP-2005-SoulesG #named
- Connections: using context to enhance file search (CANS, GRG), pp. 119–132.
- SOSP-2005-WitchelRA #linux #memory management #named
- Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
- WRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #verification
- Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
- ESOP-2005-LeeYY #analysis #automation #grammarware #pointer #source code #verification
- Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
- FASE-2005-EichbergSM
- Using Annotations to Check Structural Properties of Classes (ME, TS, MM), pp. 237–252.
- FASE-2005-HammoudaHPK #variability
- Managing Variability Using Heterogeneous Feature Variation Patterns (IH, JH, MP, KK), pp. 145–159.
- FASE-2005-RodriguesRU #component #concurrent #predict #reliability
- Using Scenarios to Predict the Reliability of Concurrent Component-Based Software Systems (GNR, DSR, SU), pp. 111–126.
- FoSSaCS-2005-BouyerCD #automaton #fault
- Fault Diagnosis Using Timed Automata (PB, FC, DD), pp. 219–233.
- TACAS-2005-BouquetDLU #ml #named #specification
- JML-Testing-Tools: A Symbolic Animator for JML Specifications Using CLP (FB, FD, BL, MU), pp. 551–556.
- TACAS-2005-Marrero
- Using BDDs to Decide CTL (WM), pp. 222–236.
- TACAS-2005-VardhanSVA #verification
- Using Language Inference to Verify ω-Regular Properties (AV, KS, MV, GA), pp. 45–60.
- TACAS-2005-XieMSN #execution #framework #generative #named #object-oriented #symbolic computation #testing
- Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic Execution (TX, DM, WS, DN), pp. 365–381.
- SAT-J-2004-GummadiNV05 #algorithm #independence #satisfiability #set
- Algorithms for Satisfiability Using Independent Sets of Variables (RG, NSN, VR), pp. 133–144.
- SAT-J-2004-HuangD05 #performance
- Using DPLL for Efficient OBDD Construction (JH, AD), pp. 157–172.
- A-MOST-2005-ClermontP #testing
- Using information about functions in selecting test cases (MC, DLP), pp. 96–102.
- A-MOST-2005-KarrP #distributed #modelling #performance #statistics #testing
- Distributed performance testing using statistical modeling (AFK, AAP), pp. 77–83.
- A-MOST-2005-SherriffNWV #estimation #fault #haskell #metric
- Early estimation of defect density using an in-process Haskell metrics model (MS, NN, LAW, MAV), pp. 64–69.
- CADE-2005-Lev-AmiIRSSY #data type #first-order #linked data #logic #open data #reachability #simulation #verification
- Simulating Reachability Using First-Order Logic with Applications to Verification of Linked Data Structures (TLA, NI, TWR, SS, SS, GY), pp. 99–115.
- CAV-2005-BarnerGR #concurrent #debugging #formal method #named
- Wolf — Bug Hunter for Concurrent Software Using Formal Methods (SB, ZG, IR), pp. 153–157.
- CAV-2005-DwyerHHR #framework #model checking
- Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework (MBD, JH, MH, R), pp. 148–152.
- ICLP-2005-Ferreira #database #deduction
- The MYDDAS Project: Using a Deductive Database for Traffic Characterization (MF), pp. 424–426.
- ICLP-2005-Fruhwirth #analysis #confluence #constraints
- Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
- ICLP-2005-Saidi #bound #mining #process
- Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
- ICLP-2005-Santos #concurrent #logic #semantics #transaction
- Denotational Semantics Using Horn Concurrent Transaction Logic (MVS), pp. 431–432.
- ICLP-2005-Wilson #logic programming
- Use of Logic Programming for Complex Business Rules (WGW), pp. 14–20.
- LICS-2005-WashburnW #data flow #parametricity
- Generalizing Parametricity Using Information-flow (GW, SW), pp. 62–71.
- SAT-2005-HeuleM #bound #linear #programming #random #satisfiability
- Observed Lower Bounds for Random 3-SAT Phase Transition Density Using Linear Programming (MH, HvM), pp. 122–134.
- SAT-2005-LingSB #logic #quantifier #satisfiability #synthesis
- FPGA Logic Synthesis Using Quantified Boolean Satisfiability (ACL, DPS, SDB), pp. 444–450.
- TestCom-2005-BatoriA #framework #independence #modelling #platform #testing
- Using TTCN-3 for Testing Platform Independent Models (GB, DA), pp. 304–317.
- TestCom-2005-FlochRSV #empirical #lessons learnt #testing
- Some Lessons from an Experiment Using TTCN-3 for the RIPng Testing (AF, FR, AS, CV), pp. 318–332.
- TestCom-2005-LeeJL #analysis #detection #smarttech
- Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
- TestCom-2005-LiL #anti #diagrams #thread #uml
- Using Anti-Ant-like Agents to Generate Test Threads from the UML Diagrams (HL, CPL), pp. 69–80.
- VMCAI-2005-SankaranarayananSM #analysis #linear #programming #scalability
- Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
- CBSE-2004-MinCK #component #off the shelf #problem
- Using Smart Connectors to Resolve Partial Matching Problems in COTS Component Acquisition (HGM, SWC, SDK), pp. 40–47.
- WICSA-2004-BachmannBKS #architecture #design #experience
- Experience Using an Expert System to Assist an Architect in Designing for Modifiability (FB, LJB, MK, CPS), pp. 281–284.
- WICSA-2004-PettitG #architecture #behaviour #concurrent #modelling #petri net
- Modeling Behavioral Patterns of Concurrent Software Architectures Using Petri Nets (RGPI, HG), pp. 57–68.
- DocEng-2004-BagleyB #composition
- Page composition using PPML as a link-editing script (SRB, DFB), pp. 134–136.
- DocEng-2004-HardyBT #xml
- Creating structured PDF files using XML templates (MRBH, DFB, PLT), pp. 99–108.
- DocEng-2004-UlgesLB #documentation
- Document capture using stereo vision (AU, CHL, TMB), pp. 198–200.
- DocEng-2004-WatanabeSYO
- A question answer system using mails posted to a mailing list (YW, KS, KY, YO), pp. 67–73.
- DRR-2004-Najman #documentation #estimation
- Using mathematical morphology for document skew estimation (LN), pp. 182–191.
- DRR-2004-ShinJKKK #adaptation #image #polynomial
- Block-adaptive binarization of business card images in PDA using modified quadratic filter (KTS, IHJ, NCK, CHK, TSK), pp. 92–101.
- DRR-2004-ZhangSH #image #retrieval #word
- Word image retrieval using binary features (BZ, SNS, CH), pp. 45–53.
- ECDL-2004-Brase #library
- Using Digital Library Techniques — Registration of Scientific Primary Data (JB), pp. 488–494.
- ECDL-2004-OkadaTA #component #markov #modelling
- Bibliographic Component Extraction Using Support Vector Machines and Hidden Markov Models (TO, AT, JA), pp. 501–512.
- HT-2004-HorieY #analysis #documentation #set #web
- Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
- JCDL-2004-BartoloLPPSVS
- Use of MatML with software applications for e-learning (LMB, CSL, ACP, DRS, JV, KS), pp. 190–191.
- JCDL-2004-JerezLHS #multi #repository
- The multi-faceted use of the OAI-PMH in the lanl repository (HNJ, XL, PH, HVdS), pp. 11–20.
- JCDL-2004-SealesL
- Digital restoration using volumetric scanning (WBS, YL), pp. 117–124.
- JCDL-2004-WangMFSG #fuzzy #generative #image #metadata #semantics
- Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram (YW, FM, JF, LS, DQG), pp. 202–211.
- JCDL-2004-WangTCLC #approach #library #query
- Translating unknown cross-lingual queries in digital libraries using a web-based approach (JHW, JWT, PJC, WHL, LFC), pp. 108–116.
- JCDL-2004-YangL #approach #fault #segmentation #statistics
- Error anaylsis of Chinese text segmentation using statistical approach (CCY, KWL), pp. 256–257.
- PODS-2004-Tsaparas #ranking #web
- Using Non-Linear Dynamical Systems for Web Searching and Ranking (PT), pp. 59–70.
- SIGMOD-2004-AgrawalAS #information management #web #web service
- Enabling Sovereign Information Sharing Using Web Services (RA, DA, RS), pp. 873–877.
- SIGMOD-2004-BowmanS #optimisation #query #semantics
- Optimization of Query Streams Using Semantic Prefetching (ITB, KS), pp. 179–190.
- SIGMOD-2004-ChaudhuriDS #effectiveness #estimation #statistics
- Effective Use of Block-Level Sampling in Statistics Estimation (SC, GD, US), pp. 287–298.
- SIGMOD-2004-GovindarajuLWLM #database #performance
- Fast Computation of Database Operations using Graphics Processors (NKG, BL, WW, MCL, DM), pp. 215–226.
- SIGMOD-2004-IpeirotisG #database
- When one Sample is not Enough: Improving Text Database Selection Using Shrinkage (PGI, LG), pp. 767–778.
- SIGMOD-2004-JainCW #adaptation #resource management
- Adaptive Stream Resource Management Using Kalman Filters (AJ, EYC, YFW), pp. 11–22.
- SIGMOD-2004-LermanGMK #automation #segmentation #web
- Using the Structure of Web Sites for Automatic Segmentation of Tables (KL, LG, SM, CAK), pp. 119–130.
- SIGMOD-2004-TianDPRMM #database #implementation #relational #scalability #xml
- Implementing a Scalable XML Publish/Subscribe System Using a Relational Database System (FT, BR, HP, TM, JM), pp. 479–490.
- VLDB-2004-BalminOBCP #framework #query #xml #xpath
- A Framework for Using Materialized XPath Views in XML Query Processing (AB, FÖ, KSB, RC, HP), pp. 60–71.
- VLDB-2004-JohnsonKCKV #matrix #order #scalability
- Compressing Large Boolean Matrices using Reordering Techniques (DSJ, SK, JC, SK, SV), pp. 13–23.
- CSEET-2004-HassonC #case study #re-engineering #requirements #specification
- A Case Study Involving the Use of Z to Aid Requirements Specification in the Software Engineering Course (PH, SC), pp. 84–90.
- CSEET-2004-LeBlancLS #education #generative #re-engineering #source code
- Generating Undergraduate Software Engineering Courses/Programs Using the Computing Curricula Software Engineering Volume (RJL, TCL, AEKS), pp. 167–168.
- CSEET-2004-McKimE #design #education #multi #object-oriented #programming
- Using a Multiple Term Project to Teach Object Oriented Programming and Design (JCM, HJCE), pp. 59–64.
- ITiCSE-2004-AdamsT #compilation #xml
- Using XML in a compiler course (DRA, CT), pp. 4–6.
- ITiCSE-2004-CasselFLPKIG
- Using CITIDEL to develop and share class plans (LNC, EAF, JL, MAPQ, DK, JI, CLG), p. 270.
- ITiCSE-2004-ConradF #object-oriented #paradigm #source code
- Using the synergies between the object-oriented paradigm and mathematics in joint mathematics/computer science programs (MC, TF), p. 254.
- ITiCSE-2004-English #assessment #automation #source code #user interface
- Automated assessment of GUI programs using JEWL (JE), pp. 137–141.
- ITiCSE-2004-Garner #learning #programming
- The use of a code restructuring tool in the learning of programming (SG), p. 277.
- ITiCSE-2004-Hamer #approach #composition #design pattern #education
- An approach to teaching design patterns using musical composition (JH), pp. 156–160.
- ITiCSE-2004-ImpagliazzoL
- Using history to enhance computing courses (JI, JANL), p. 238.
- ITiCSE-2004-JippingKKL #network #programmable
- Investigating wired and wireless networks using a java-based programmable sniffer (MJJ, AJK, NK, KL), pp. 12–16.
- ITiCSE-2004-Leska #education #programming
- Introducing undergraduates to programming using robots in the general education curriculum (CL), p. 263.
- ITiCSE-2004-LeskaR #concept #game studies #learning
- Learning O-O concepts in CS I using game projects (CL, JRR), p. 237.
- ITiCSE-2004-Lopez-HerrejonS #case study #experience #interactive #java
- Using interactive technology in a short java course: an experience report (RELH, MS), pp. 203–207.
- ITiCSE-2004-ThomasM #database #education #research #scalability
- Use of large databases for group projects at the nexus of teaching and research (RCT, RM), pp. 161–165.
- ITiCSE-2004-Waraich #education #logic
- Using narrative as a motivating device to teach binary arithmetic and logic gates (AW), pp. 97–101.
- ITiCSE-WGR-2004-CanningMRR #c
- Reading types in C using the right left walk method (JC, WM, AR, DR), pp. 52–54.
- SIGITE-2004-BierreP #java #programming
- The use of MUPPETS in an introductory java programming course (KJB, AMP), pp. 122–127.
- SIGITE-2004-EdwardsB #case study #experience #programming #tablet
- Experiences using tablet PCs in a programming laboratory (SHE, NDB), pp. 160–164.
- SIGITE-2004-Fernandez #community #student
- Engaging students with community organizations by using computer technology (JDF), pp. 1–5.
- SIGITE-2004-Fulbright #education
- Teaching critical thinking skills in IT using PINE-TRIZ (RF), pp. 38–42.
- SIGITE-2004-SwainS #design #development #network #object-oriented #programming
- Design and development of computer networking modules using virtual instruments and object oriented programming (NS, MS), p. 270.
- SIGITE-2004-TabriziCOL #development #implementation #object-oriented #uml
- Implementation of object-orientation using UML in entry level software development courses (MHNT, CBC, EO, KL), pp. 128–131.
- CSMR-2004-Al-EkramK #composition #concept #slicing #source code
- Source Code Modularization Using Lattice of Concept Slices (RAE, KK), pp. 195–203.
- CSMR-2004-HammoudaH #maintenance
- Documenting Maintenance Tasks Using Maintenance Patterns (IH, MH), pp. 37–47.
- CSMR-2004-RatiuDGM #design #detection
- Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
- CSMR-2004-Zdun #maintenance #re-engineering
- Using Split Objects for Maintenance and Reengineering Tasks (UZ), pp. 105–114.
- ICSM-2004-DangLMPPT #design #realtime #video #visual notation
- Design Recovery of Real-Time Graphical Applications Using Video (CD, AVL, AM, KCP, TQP, JT), pp. 338–347.
- ICSM-2004-MohanGL #approach #complexity #comprehension #concept
- An Approach to Understanding Program Comprehensibility Using Spatial Complexity, Concept Assignment and Typographical Style (AM, NG, PJL), p. 530.
- ICSM-2004-WernickH #evolution #programming
- The Impact of Using Pair Programming on System Evolution: A Simulation-Based Study (PW, TH), pp. 422–426.
- ICSM-2004-WhiteR #analysis #industrial #realtime #testing
- Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
- ICSM-2004-Woodworth #metric #quality
- Using Metrics to Drive Quality Improvements and Value — Company Wide (BW), p. 2.
- IWPC-2004-DanicicLH #execution #slicing
- Building Executable Union Slices using Conditioned Slicing (SD, ADL, MH), pp. 89–99.
- IWPC-2004-HassanH #architecture #development
- Using Development History Sticky Notes to Understand Software Architecture (AEH, RCH), pp. 183–193.
- IWPC-2004-KuzniarzSW #comprehension #empirical #modelling #uml
- An Empirical Study on Using Stereotypes to Improve Understanding of UML Models (LK, MS, CW), pp. 14–23.
- SCAM-2004-BruntinkD #metric #object-oriented #predict #testing
- Predicting Class Testability using Object-Oriented Metrics (MB, AvD), pp. 136–145.
- SCAM-2004-FatiregunHH #algorithm #evolution #search-based #sequence
- Evolving Transformation Sequences using Genetic Algorithms (DF, MH, RMH), pp. 66–75.
- SCAM-2004-MaruyamaY #automation #framework #java #platform #representation #source code #xml
- A CASE Tool Platform Using an XML Representation of Java Source Code (KM, SY), pp. 158–167.
- SCAM-2004-Rothermel #analysis #source code
- Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
- SCAM-2004-TourweM #concept analysis #mining
- Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
- WCRE-2004-AbbasTC
- Using DDL to Understand and Modify SimpleScalar (NA, ST, JEC), pp. 296–297.
- WCRE-2004-EmmerikW #decompiler
- Using a Decompiler for Real-World Source Recovery (MVE, TW), pp. 27–36.
- WCRE-2004-MarinDM #analysis #aspect-oriented #identification
- Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
- WCRE-2004-MohanGL #approach #complexity #concept
- An Initial Approach to Assessing Program Comprehensibility Using Spatial Complexity, Number of Concepts and Typographical Style (AM, NG, PJL), pp. 246–255.
- WCRE-2004-WuHH #evolution
- Exploring Software Evolution Using Spectrographs (JW, RCH, AEH), pp. 80–89.
- CIAA-2004-Polak #automaton #nondeterminism
- Minimalizations of NFA Using the Universal Automaton (LP), pp. 325–326.
- ICALP-2004-AbbottAG #induction #representation
- Representing Nested Inductive Types Using W-Types (MA, TA, NG), pp. 59–71.
- IFM-2004-Bujorianu #integration #specification
- Integration of Specification Languages Using Viewpoints (MCB), pp. 421–440.
- IFM-2004-PickinJ #diagrams #sequence chart #uml
- Using UML Sequence Diagrams as the Basis for a Formal Test Description Language (SP, JMJ), pp. 481–500.
- RTA-2004-Takai #abstract interpretation #term rewriting #verification
- A Verification Technique Using Term Rewriting Systems and Abstract Interpretation (TT), pp. 119–133.
- SEFM-2004-BertoliniFFO #analysis #automaton #generative #network #probability #testing
- Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
- SEFM-2004-Fronk #algebra #analysis #approach #automation #petri net
- Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
- SEFM-2004-KazhamiakinPR #case study #requirements #verification #web #web service
- Formal Verification of Requirements using SPIN: A Case Study on Web Services (RK, MP, MR), pp. 406–415.
- SEFM-2004-Roy #finite #infinity #verification
- Symbolic Verification of Infinite Systems using a Finite Union of DFAs (SR), pp. 56–66.
- SEFM-2004-SistlaWZ
- Checking Extended CTL properties Using Guarded Quotient Structures (APS, XW, MZ), pp. 87–94.
- SEFM-2004-ZhangXW #constraints #execution #generative #symbolic computation #testing #theorem proving
- Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques (JZ, CX, XW), pp. 242–250.
- FLOPS-2004-HagiyaTYS #abstraction #analysis #automaton #logic
- Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
- ICFP-2004-TolmachAN #functional #implementation #logic #multi #thread
- Implementing functional logic languages using multiple threads and stores (APT, SA, MN), pp. 90–102.
- ICGT-2004-CherchagoH #graph transformation #specification #web #web service
- Specification Matching of Web Services Using Conditional Graph Transformation Rules (AC, RH), pp. 304–318.
- ICGT-2004-Rensink #first-order #graph #logic #representation
- Representing First-Order Logic Using Graphs (AR), pp. 319–335.
- CHI-2004-LudfordCFT #community #difference #online
- Think different: increasing online community participation using uniqueness and group dissimilarity (PJL, DC, DF, LGT), pp. 631–638.
- CHI-2004-VemuriDBS #recognition #speech
- Improving speech playback using time-compression and speech recognition (SV, PD, WB, CS), pp. 295–302.
- CSCW-2004-BeenenLWCFRK #community #motivation #online #social
- Using social psychology to motivate contributions to online communities (GB, KSL, XW, KC, DF, PR, REK), pp. 212–221.
- CAiSE-2004-MunozO #adaptation #development #metadata #ontology #standard
- Adaptive Web-Based Courseware Development Using Metadata Standards and Ontologies (LSM, JPMdO), pp. 414–428.
- CAiSE-2004-NuffelenCDAB #integration
- Data Integration Using ID-Logic (BVN, ACC, MD, OA, MB), pp. 67–81.
- CAiSE-2004-SalinesiEZ #approach #evolution #modelling #requirements #similarity
- A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
- EDOC-2004-JaegerRM #composition #web #web service #workflow
- QoS Aggregation for Web Service Composition using Workflow Patterns (MCJ, GRG, GM), pp. 149–159.
- EDOC-2004-Patrascoiu #web #web service
- Mapping EDOC to Web Services using YATL (OP), pp. 286–297.
- EDOC-2004-PignatonVAB #component
- Developing QoS-aware Component-Based Applications Using MDA Principles (RP, VAV, JIA, JB), pp. 172–183.
- EDOC-2004-TandonG #modelling
- Using Subject-Oriented Modeling to Develop Jini Applications (GT, SG), pp. 111–122.
- ICEIS-v1-2004-BaiHM #query #semantics
- Improving View Selection in Query Rewriting Using Domain Semantics (QB, JH, MFM), pp. 177–183.
- ICEIS-v1-2004-FengMR #multi #performance #query
- Improving Query Performance on OLAP-Data Using Enhanced Multidimensional Indices (YF, AM, HR), pp. 282–289.
- ICEIS-v1-2004-FerrandinC #consistency #database #integration #power of #semistructured data #xml
- Referencial Integrity Model for XML Data Integrated from Heterogeneous Databases Systems — Using the Power of XML for Consistent Data Integration (MF, MSdC), pp. 15–20.
- ICEIS-v1-2004-LuciaST #clone detection #identification #similarity #web
- Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
- ICEIS-v1-2004-Riaz-ud-DinK #adaptation #database #multi #named
- ACME-DB: An Adaptive Caching Mechanism Using Multiple Experts For Database Buffers (FRuD, MK), pp. 192–201.
- ICEIS-v1-2004-ZhouNB #c++ #implementation #performance
- An Efficient B+-Tree Implementation in C++ Using the STL Style (JZ, BN, GB), pp. 163–168.
- ICEIS-v2-2004-HamzaY #constraints #mining #regular expression
- Mining Sequential Patterns with Regular Expression Constraints Using Sequential Pattern Tree (MH, KM, MY), pp. 116–121.
- ICEIS-v2-2004-KooptiwootS #mining #set
- Mining the Relationships in the Form of the Predisposing Factors and Coincident Factors Among Numerical Dynamic Attributes in Time Series Data Set by Using the Combination of Some Existing Techniques (SK, MAS), pp. 327–334.
- ICEIS-v2-2004-KooptiwootS04a #idea #mining #set
- Mining the Relationships in the Form of Predisposing Factor and Coincident Factor in Time Series Data Set by Using the Combination of some Existing Ideas with a new Idea from the Fact in the Chemical Reaction (SK, MAS), pp. 531–534.
- ICEIS-v2-2004-KotsiantisP #classification #hybrid
- A Hybrid Decision Support Tool — Using Ensemble of Classifiers (SBK, PEP), pp. 448–456.
- ICEIS-v2-2004-LesslerERK
- Dynamic Interest Profiles: Tracking User Interests Using Personal Information (JL, SE, JR, VK), pp. 281–288.
- ICEIS-v2-2004-MoutinhoTNC #approach #detection #network
- Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
- ICEIS-v2-2004-MuesHVB #diagrams #visualisation
- Comprehensible Credit-Scoring Knowledge Visualization Using Decision Tables and Diagrams (CM, JH, JV, BB), pp. 226–232.
- ICEIS-v2-2004-NetoCVMM #estimation #network
- Monthly Flow Estimation Using Elman Neural Networks (LBN, PHGC, MLFV, JCCBSdM, LAM), pp. 153–158.
- ICEIS-v2-2004-SilvaCSGN #multi #network
- Multiple Organ Failure Diagnosis Using Adverse Events and Neural Networks (ÁMS, PC, MFS, LG, JN), pp. 401–408.
- ICEIS-v2-2004-WuW #predict #probability #web
- Predicting Web Requests Efficiently Using a Probability Model (SW, WW), pp. 48–53.
- ICEIS-v3-2004-AllouiO #architecture #process #uml
- Describing Software-Intensive Process Architectures Using a UML-Based ADL (IA, FO), pp. 201–208.
- ICEIS-v3-2004-BragaMG #development #pattern matching
- System Development Using a Pattern Language-Based Tool (RTVB, PCM, FSRG), pp. 155–162.
- ICEIS-v3-2004-Hiramatsu #concept #modelling #ontology #taxonomy
- Ontology Modeling Tool Using Concept Dictionary and Inference (YH), pp. 225–230.
- ICEIS-v3-2004-MouratidisGM #design #information management #security
- Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
- ICEIS-v3-2004-MukkamalaSAR #adaptation #detection
- Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
- ICEIS-v3-2004-Salimifard #component #modelling #petri net
- Component-Based Modelling of Organisational Resources Using Coloured Petri Nets (KS), pp. 577–580.
- ICEIS-v3-2004-Tu #security
- Using SAP System Configuration Security Test to Comply with Sarbanesoxley Act (JHT), pp. 581–583.
- ICEIS-v3-2004-VachonM #aspect-oriented #development #requirements
- Achieving Supplementary Requirements Using Aspect-Oriented Development (JV, FM), pp. 584–587.
- ICEIS-v4-2004-KotinurmiLJS #design #documentation #framework
- Integrating Design Document Management Systems Using the Rosettanet E-Business Framework (PK, HL, KJ, TS), pp. 502–509.
- ICEIS-v4-2004-MavromoustakosA #design #quality #web
- Designing Quality Web Applications Using Patterns (SM, ASA), pp. 421–424.
- ICEIS-v4-2004-PoggiTT #composition
- Using Agent Platforms for Service Composition (AP, MT, PT), pp. 98–105.
- ICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #protocol
- Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
- ICEIS-v5-2004-Gouveia
- Using Visuals to Convey Information (LBG), pp. 216–220.
- ICEIS-v5-2004-RousseauBMFM #multi #personalisation #profiling #repository #resource management
- Personalised Resource Discovery Searching over Multiple Repository Types: Using User and Information Provider Profiling (BR, PB, PM, PF, VM), pp. 35–43.
- CIKM-2004-AghiliAA #geometry
- Protein structure alignment using geometrical features (SAA, DA, AEA), pp. 148–149.
- CIKM-2004-BotW #algorithm #documentation #feedback
- Improving document representations using relevance feedback: the RFA algorithm (RSB, YfBW), pp. 270–278.
- CIKM-2004-ChomickiMS #consistency #query
- Computing consistent query answers using conflict hypergraphs (JC, JM, SS), pp. 417–426.
- CIKM-2004-ChungJM #clustering #dataset #mining
- Mining gene expression datasets using density-based clustering (SC, JJ, DM), pp. 150–151.
- CIKM-2004-Efron #documentation #web
- The liberal media and right-wing conspiracies: using cocitation information to estimate political orientation in web documents (ME), pp. 390–398.
- CIKM-2004-MaG #detection #feedback #information retrieval
- Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
- CIKM-2004-MaZMS #framework #learning #query #similarity
- A framework for refining similarity queries using learning techniques (YM, QZ, SM, DYS), pp. 158–159.
- CIKM-2004-MekhaldiLI #clustering #documentation #speech
- Using bi-modal alignment and clustering techniques for documents and speech thematic segmentations (DM, DL, RI), pp. 69–77.
- CIKM-2004-TomitaNI #graph #representation #similarity
- Calculating similarity between texts using graph-based text representation model (JT, HN, MI), pp. 248–249.
- CIKM-2004-XueZCYMXF #optimisation #web
- Optimizing web search using web click-through data (GRX, HJZ, ZC, YY, WYM, WX, WF), pp. 118–126.
- CIKM-2004-ZouLC #query #xml
- Using a compact tree to index and query XML data (QZ, SL, WWC), pp. 234–235.
- ECIR-2004-ChenTH #corpus #identification #novel
- Identification of Relevant and Novel Sentences Using Reference Corpus (HHC, MFT, MHH), pp. 85–98.
- ECIR-2004-CloughS04a #ambiguity #information retrieval #word
- Cross-Language Information Retrieval Using EuroWordNet and Word Sense Disambiguation (PDC, MS), pp. 327–337.
- ECIR-2004-StokesNCS #analysis
- Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
- ICML-2004-BlumLRR #learning #random
- Semi-supervised learning using randomized mincuts (AB, JDL, MRR, RR).
- ICML-2004-FungDBR #algorithm #kernel #performance
- A fast iterative algorithm for fisher discriminant using heterogeneous kernels (GF, MD, JB, RBR).
- ICML-2004-GabrilovichM #categorisation #feature model
- Text categorization with many redundant features: using aggressive feature selection to make SVMs competitive with C4.5 (EG, SM).
- ICML-2004-HerschtalR #optimisation
- Optimising area under the ROC curve using gradient descent (AH, BR).
- ICML-2004-NguyenS #clustering #learning
- Active learning using pre-clustering (HTN, AWMS).
- ICML-2004-NguyenWJ #classification #detection #distributed #kernel
- Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
- ICML-2004-RosalesAF #clustering #learning
- Learning to cluster using local neighborhood structure (RR, KA, BJF).
- ICML-2004-SimsekB #abstraction #identification #learning
- Using relative novelty to identify useful temporal abstractions in reinforcement learning (ÖS, AGB).
- ICML-2004-Zhang #algorithm #linear #predict #probability #problem #scalability
- Solving large scale linear prediction problems using stochastic gradient descent algorithms (TZ0).
- ICML-2004-ZhangYK #algorithm #kernel #learning #matrix
- Bayesian inference for transductive learning of kernel matrix using the Tanner-Wong data augmentation algorithm (ZZ, DYY, JTK).
- ICPR-v1-2004-AllierE #documentation #image #segmentation
- Segmentation and Typography Extraction in Document Images Using Geodesic Active Regions (BA, HE), pp. 409–412.
- ICPR-v1-2004-BhowmickB #approximate
- Approximate Fingerprint Matching Using Kd-Tree (PB, BBB), pp. 544–547.
- ICPR-v1-2004-BourlaiMK #architecture #smarttech #verification
- Face Verification System Architecture Using Smart Cards (TB, KM, JK), pp. 793–796.
- ICPR-v1-2004-CaoF #metric
- Simple Calibration Without Metric Information Using an Isoceles Trapezoid (XC, HF), pp. 104–107.
- ICPR-v1-2004-CevikalpW #recognition
- Face Recognition by Using Discriminative Common Vectors (HC, DMW), pp. 326–329.
- ICPR-v1-2004-ChengLLC #classification #component #independence #kernel
- Texture Classification Using Kernel Independent Component Analysi (JC, QL, HL, YWC), pp. 620–623.
- ICPR-v1-2004-ClausiY #comparison #markov #random #segmentation
- Texture Segmentation Comparison Using Grey Level Co-Occurrence Probabilities and Markov Random Fields (DAC, BY), pp. 584–587.
- ICPR-v1-2004-CoskerMRH #animation #markov #speech
- Speech Driven Facial Animation using a Hidden Markov Coarticulation Model (DC, ADM, PLR, YH), pp. 128–131.
- ICPR-v1-2004-FungM #parallel
- Using Multiple Graphics Cards as a General Purpose Parallel Computer : Applications to Computer Vision (JF, SM), pp. 805–808.
- ICPR-v1-2004-HoriSNK #detection #multi #realtime
- A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
- ICPR-v1-2004-HseN #recognition #sketching
- Sketched Symbol Recognition using Zernike Moments (HHH, ARN), pp. 367–370.
- ICPR-v1-2004-KavallieratouS
- Discrimination of Machine-Printed from Handwritten Text Using Simple Structural Characteristics (EK, ES), pp. 437–440.
- ICPR-v1-2004-KimYL #algorithm #distance #graph #relational
- A New Attributed Relational Graph Matching Algorithm Using the Nested Structure of Earth Mover’s Distance (DHK, IDY, SUL), pp. 48–51.
- ICPR-v1-2004-LebrunCC #reduction
- SVM Training Time Reduction using Vector Quantization (GL, CC, HC), pp. 160–163.
- ICPR-v1-2004-LeL #image #markov #modelling
- Recognizing Frontal Face Images Using Hidden Markov Models with One Training Image per Person (HSL, HL), pp. 318–321.
- ICPR-v1-2004-LiBS #image #recognition
- Object Class Recognition using Images of Abstract Regions (YL, JAB, LGS), pp. 40–43.
- ICPR-v1-2004-LiHS #feature model #image #programming #retrieval #search-based #semantics
- Semantic Feature Extraction Using Genetic Programming in Image Retrieval (QL, HH, ZS), pp. 648–651.
- ICPR-v1-2004-NakamuraHFS #image #parallel
- Fingerprint Image Enhancement using a Parallel Ridge Filter (TN, MH, HF, KS), pp. 536–539.
- ICPR-v1-2004-NaroditskyD #3d
- 3D Scanning Using Spatiotemporal Orientation (ON, KD), pp. 5–9.
- ICPR-v1-2004-OnishiF #comprehension #evaluation #image #video
- Shooting the Lecture Scene Using Computer-controlled Cameras Based on Situation Understanding and Evaluation of Video Images (MO, KF), pp. 781–784.
- ICPR-v1-2004-ParkL #distance #fault #identification #image
- Enhancing Low-Resolution Facial Images Using Error Back-Projection for Human Identification at a Distance (JSP, SWL), pp. 346–349.
- ICPR-v1-2004-RahtuSH #multi #recognition
- Convexity Recognition Using Multi-Scale Autoconvolution (ER, MS, JH), pp. 692–695.
- ICPR-v1-2004-ShiG #documentation #image #normalisation
- Historical Document Image Enhancement Using Background Light Intensity Normalization (ZS, VG), pp. 473–476.
- ICPR-v1-2004-SirisathitkulAU #distance #image #performance
- Fast Color Image Quantization using Squared Euclidean Distance of Adjacent Color Points along the Highest Color Variance Axis (YS, SA, BU), pp. 656–659.
- ICPR-v1-2004-TodorovicN #detection #image
- Detection of Artificial Structures in Natural-Scene Images Using Dynamic Trees (ST, MCN), pp. 35–39.
- ICPR-v1-2004-TominagaTK #estimation #multi
- Estimation of Surface Properties of Art Paintings Using a Multi-band Camera (ST, NT, TK), pp. 92–95.
- ICPR-v1-2004-TremblaySM #algorithm #multi #nearest neighbour #optimisation #random #search-based
- Optimizing Nearest Neighbour in Random Subspaces using a Multi-Objective Genetic Algorithm (GT, RS, PM), p. 208.
- ICPR-v1-2004-TsuiTC #image #metric
- Metric Measurement on Arbitrary Planes in 2 Images Using the Conformal Point (PTT, HTT, WkC), pp. 108–111.
- ICPR-v1-2004-ValienteACG #design #image
- Structural Description of Textile and Tile Pattern Designs Using Image Processing (JMV, FA, CC, JMG), pp. 498–503.
- ICPR-v1-2004-Wakahara #adaptation #correlation #modelling #normalisation
- Adaptive Normalization of Handwritten Characters Using GAT Correlation and Mixture Models (TW), pp. 393–396.
- ICPR-v1-2004-WangA #composition #multi #representation
- Compact Representation of Multidimensional Data Using Tensor Rank-One Decomposition (HW, NA), pp. 44–47.
- ICPR-v1-2004-WangJW #approach #detection #integration #multi #novel #video
- A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
- ICPR-v1-2004-YangFTH #detection #multi
- Skin Color Detection Using Multiple Cues (JY, ZF, TT, WH), pp. 632–635.
- ICPR-v2-2004-BaiH04a #detection #documentation #image #multi
- Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
- ICPR-v2-2004-BanerjeeKM #detection
- Corner Detection Using Support Vector Machines (MB, MKK, PM), pp. 819–822.
- ICPR-v2-2004-BeginF #approach
- Blind Super-Resolution Using a Learning-Based Approach (IB, FPF), pp. 85–89.
- ICPR-v2-2004-BeierholmB #music #speech
- Speech Music Discrimination Using Class-Specific Features (TB, PMB), pp. 379–382.
- ICPR-v2-2004-CaetanoCB #algorithm #comparison #distance #metric
- A Comparison of Junction Tree and Relaxation Algorithms for Point Matching using Different Distance Metrics (TSC, TC, DACB), pp. 124–127.
- ICPR-v2-2004-Clocksin #order #recognition
- Handwritten Syriac Character Recognition using Order Structure Invariance (WFC), pp. 562–565.
- ICPR-v2-2004-DengC #image #implementation #segmentation
- Unsupervised Image Segmentation Using A Simple MRF Model with A New Implementation Scheme (HD, DAC), pp. 691–694.
- ICPR-v2-2004-EngWKY #detection #framework #robust
- A Bayesian Framework for Robust Human Detection and Occlusion Handling using Human Shape Model (HLE, JW, AHK, WYY), pp. 257–260.
- ICPR-v2-2004-FarmerBJ #feature model #random #scalability
- Large Scale Feature Selection Using Modified Random Mutation Hill Climbing (MEF, SB, AKJ), pp. 287–290.
- ICPR-v2-2004-FayolleRT #3d #algorithm #modelling #re-engineering #search-based
- 3D Shape Reconstruction of Template Models Using Genetic Algorithms (PAF, CR, CT), pp. 269–272.
- ICPR-v2-2004-FritzPB #information management #recognition
- Object Recognition Using Local Information Content (GF, LP, HB), pp. 15–18.
- ICPR-v2-2004-GaoHBW #analysis #markov #process
- Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
- ICPR-v2-2004-GritaiSS #analysis #invariant #on the
- On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
- ICPR-v2-2004-HuR #classification #clustering #probability
- Probability Table Compression Using Distributional Clustering for Scanning N-Tuple Classifiers (JH, ER), pp. 533–536.
- ICPR-v2-2004-Ikeda #approximate #re-engineering
- An Accurate Shape Reconstruction from Photometric Stereo Using Four Approximations of Surface Normal (OI), pp. 220–223.
- ICPR-v2-2004-IurgelR #classification #documentation #probability
- Spoken Document Classification with SVMs Using Linguistic Unit Weighting and Probabilistic Couplers (UI, GR), pp. 667–670.
- ICPR-v2-2004-KaratzasA #image #segmentation #web
- Text Extraction from Web Images Based on A Split-and-Merge Segmentation Method Using Colour Perception (DK, AA), pp. 634–637.
- ICPR-v2-2004-KimBSCCKC #image #verification
- Scene Text Extraction in Natural Scene Images using Hierarchical Feature Combining and Verification (KCK, HRB, YJS, YWC, SYC, KKK, YC), pp. 679–682.
- ICPR-v2-2004-KimuraKK #image #multi #retrieval #similarity
- Acceleration of Similarity-Based Partial Image Retrieval using Multistage Vector Quantization (AK, TK, KK), pp. 993–996.
- ICPR-v2-2004-LindeL #higher-order #recognition
- Object Recognition Using Composed Receptive Field Histograms of Higher Dimensionality (OL, TL), pp. 1–6.
- ICPR-v2-2004-LinYL #analysis #incremental
- Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
- ICPR-v2-2004-LiuLW
- Free Form Shape Matching Using Deterministic Annealing and Softassign (YL, LL, YW), pp. 128–131.
- ICPR-v2-2004-LourakisAM #approach #graph #information management #similarity
- A Graph-Based Approach to Corner Matching Using Mutual Information as a Local Similarity Measure (MIAL, AAA, KM), pp. 827–830.
- ICPR-v2-2004-MachadoMC #adaptation #clustering #image
- The Influence of the Noise in the Restoration of Solar Radio Images using Adaptive Regularization Techniques Based on Clustering (WRSM, NDAM, JERC), pp. 371–374.
- ICPR-v2-2004-MaD #adaptation #classification #word
- Adaptive Word Style Classification Using a Gaussian Mixture Model (HM, DSD), pp. 606–609.
- ICPR-v2-2004-MozaffarifK #classification #comparison #recognition
- Feature Comparison between Fractal Codes and Wavelet Transform in Handwritten Alphanumeric Recognition Using SVM Classifier (SM, KF, HRK), pp. 331–334.
- ICPR-v2-2004-OhteraH #identification
- Faxed Form Identification using Histogram of the Hough-Space (RO, TH), pp. 566–569.
- ICPR-v2-2004-OudotPMM #adaptation #concept #online #recognition #self
- Self-Supervised Writer Adaptation using Perceptive Concepts: Application to On-Line Text Recognition (LO, LP, AM, MM), pp. 598–601.
- ICPR-v2-2004-QuanZ #adaptation
- Perceptual Criterion Based Fragile Audio Watermarking Using Adaptive Wavelet Packets (XQ, HZ), pp. 867–870.
- ICPR-v2-2004-Rodriguez-DamianCFS #classification
- Pollen Classification using Brightness-Based and Shape-Based Descriptors (MRD, EC, AF, PdSO), pp. 212–215.
- ICPR-v2-2004-SahaDC #metric
- CBIR using Perception based Texture and Colour Measures (SKS, AKD, BC), pp. 985–988.
- ICPR-v2-2004-SantamariaBS #analysis #statistics
- Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
- ICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online
- Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
- ICPR-v2-2004-SchlapbachB #identification
- Off-line Handwriting Identification Using HMM Based Recognizers (AS, HB), pp. 654–658.
- ICPR-v2-2004-SenerG #analysis #component #independence
- Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
- ICPR-v2-2004-SerbyKG #multi #probability
- Probabilistic Object Tracking Using Multiple Features (DS, EKM, LJVG), pp. 184–187.
- ICPR-v2-2004-ShihL #analysis #detection #video
- Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
- ICPR-v2-2004-SuW #normalisation
- Decomposing Chinese Characters into Stroke Segments Using SOGD Filters and Orientation Normalization (YMS, JFW), pp. 351–354.
- ICPR-v2-2004-TahirBKA #classification #feature model
- Feature Selection using Tabu Search for Improving the Classification Rate of Prostate Needle Biopsies (MAT, AB, FK, AA), pp. 335–338.
- ICPR-v2-2004-ToyozumiYMKMST #case study #recognition #segmentation
- A Study of Symbol Segmentation Method for Handwritten Mathematical Formula Recognition using Mathematical Structure Information (KT, NY, KM, TK, KM, YS, TT), pp. 630–633.
- ICPR-v2-2004-VargaB04a #recognition
- Off-line Handwritten Textline Recognition Using a Mixture of Natural and Synthetic Training Data (TV, HB), pp. 545–549.
- ICPR-v2-2004-VillegerAB #image #probability
- Image Disocclusion Using a Probabilistic Gradient Orientation (EV, GA, LBF), pp. 52–55.
- ICPR-v2-2004-Yang
- Sammon’s Nonlinear Mapping Using Geodesic Distances (LY), pp. 303–306.
- ICPR-v2-2004-YuXA #graph #sequence #video
- Reconstructing a Dynamic Surface from Video Sequences Using Graph Cuts in 4D Space-Time (TY, NX, NA), pp. 245–248.
- ICPR-v2-2004-ZhangLG #detection #realtime
- Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces (DZ, SZL, DGP), pp. 411–414.
- ICPR-v2-2004-ZhengZZ #realtime #recognition
- Real-Time Face Recognition Using Gram-Schmidt Orthogonalization for LDA (WZ, CZ, LZ), pp. 403–406.
- ICPR-v2-2004-ZiouB #analysis #finite #image #learning
- Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
- ICPR-v3-2004-BadawyK #retrieval
- Shape Retrieval using Concavity Trees (OEB, MK), pp. 111–115.
- ICPR-v3-2004-BagciAKC #eye tracking #markov #modelling
- Eye Tracking Using Markov Models (AMB, RA, AAK, EC), pp. 818–821.
- ICPR-v3-2004-BaiYH #graph
- Graph Matching using Spectral Embedding and Alignment (XB, HY, ERH), pp. 398–401.
- ICPR-v3-2004-BarnardO #adaptation #robust #segmentation
- Robust Playfield Segmentation using MAP Adaptation (MB, JMO), pp. 610–613.
- ICPR-v3-2004-BoccignoneCMP #segmentation #video
- Using Attention for Video Segmentation (GB, AC, VM, AP), pp. 838–841.
- ICPR-v3-2004-CarneiroJ
- Pruning Local Feature Correspondences Using Shape Context (GC, ADJ), pp. 16–19.
- ICPR-v3-2004-ChenB #3d #image #recognition
- 3D Free-Form Object Recognition in Range Images Using Local Surface Patches (HC, BB), pp. 136–139.
- ICPR-v3-2004-DavidL #search-based
- Signal Discrimination Using a Support Vector Machine for Genetic Syndrome Diagnosis (AD, BL), pp. 490–493.
- ICPR-v3-2004-FaragEGF #detection #recognition
- Detection and Recognition of Lung Abnormalities Using Deformable Templates (AAF, AEB, GLG, RF), pp. 738–741.
- ICPR-v3-2004-FurukawaKMSMT #3d #approximate #estimation #image #physics
- Spine Posture Estimation Method from Human Images Using 3D Spine Model — Computation of the rough approximation of the physical forces working on vertebral bodies (DF, TK, KM, YS, KM, TT), pp. 322–325.
- ICPR-v3-2004-FusseneggerOPA #detection #recognition #segmentation
- Object Recognition Using Segmentation for Feature Detection (MF, AO, AP, PA), pp. 41–44.
- ICPR-v3-2004-GoriMS #graph #random
- Graph matching using Random Walks (MG, MM, LS), pp. 394–397.
- ICPR-v3-2004-HardingE #fourier #gesture
- Recognizing Hand Gesture using Fourier Descriptors (PRGH, TJE), pp. 286–289.
- ICPR-v3-2004-HautamakiKF #detection #graph #nearest neighbour
- Outlier Detection Using k-Nearest Neighbour Graph (VH, IK, PF), pp. 430–433.
- ICPR-v3-2004-HuangMP #hybrid #markov #random #recognition
- A Hybrid Face Recognition Method using Markov Random Fields (RH, DNM, VP), pp. 157–160.
- ICPR-v3-2004-IrnigerB #database #graph
- Graph Database Filtering Using Decision Trees (CI, HB), pp. 383–388.
- ICPR-v3-2004-IshiiO #3d
- Perfect Perspective Projection using a Varifocal Mirror and Its Application to Three-Dimensional Close-Up Imaging (AI, RO), pp. 270–273.
- ICPR-v3-2004-JagmohanSA #estimation #kernel
- Dense Stereo Matching Using Kernel Maximum Likelihood Estimation (AJ, MKS, NA), pp. 28–31.
- ICPR-v3-2004-KawanishiKKT #adaptation #algorithm #performance
- A Fast Template Matching Algorithm with Adaptive Skipping Using Inner-Subtemplates’ Distances (TK, TK, KK, ST), pp. 654–657.
- ICPR-v3-2004-KuhlKWK #classification
- Training of Classifiers Using Virtual Samples Only (AK, LK, CW, UK), pp. 418–421.
- ICPR-v3-2004-LanMZ #detection #multimodal
- Multi-level Anchorperson Detection Using Multimodal Association (DJL, YFM, HZ), pp. 890–893.
- ICPR-v3-2004-LiH #recognition
- Face Recognition using Shading-Based Curvature Attributes (YL, ERH), pp. 538–541.
- ICPR-v3-2004-MaPH #recognition
- Using B-Spline Curves for Hand Recognition (YM, FEP, WTH), pp. 274–277.
- ICPR-v3-2004-MatsuiCUM #markov #monte carlo #recognition
- Bayesian Face Recognition using a Markov Chain Monte Carlo Method (AM, SC, FU, TM), pp. 918–921.
- ICPR-v3-2004-McCallT #analysis #invariant
- Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
- ICPR-v3-2004-MoW #modelling #segmentation #video
- Video Modelling and Segmentation Using Gaussian Mixture Models (XM, RW), pp. 854–857.
- ICPR-v3-2004-NaderiMC #algorithm #image #optimisation #verification
- 1D-HMM for Face Verification: Model Optimization Using Improved Algorithm and Intelligent Selection of Training Images (SN, MSM, NMC), pp. 330–333.
- ICPR-v3-2004-NaganumaTMM #analysis
- Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
- ICPR-v3-2004-NishiF #analysis #video
- Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
- ICPR-v3-2004-NovakLCMAHA #analysis #markov #modelling
- Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
- ICPR-v3-2004-PalenichkaMZ #image #locality #multi #performance
- Fast Object Localization using Multi-Scale Image Relevance Function (RMP, RM, MBZ), pp. 227–230.
- ICPR-v3-2004-Pernkopf #3d
- 3D Surface Inspection using Coupled HMMs (FP), pp. 223–226.
- ICPR-v3-2004-RamstromC #detection
- Object Detection using Background Context (OR, HIC), pp. 45–48.
- ICPR-v3-2004-ReiterR #classification #multi #programming #segmentation
- Segmentation and Classification of Meeting Events using Multiple Classifier Fusion and Dynamic Programming (SR, GR), pp. 434–437.
- ICPR-v3-2004-SalbergH #estimation #segmentation
- Object Segmentation and Feature Estimation Using Shadows (ABS, AH), pp. 674–678.
- ICPR-v3-2004-SatakeS #multi
- Multiple Target Tracking by Appearance-Based Condensation Tracker using Structure Information (JS, TS), pp. 294–297.
- ICPR-v3-2004-ShanWQT #gesture #recognition
- Gesture Recognition Using Temporal Template Based Trajectories (CS, YW, XQ, TT), pp. 954–957.
- ICPR-v3-2004-SolemH
- Estimating Surface Shape and Extending Known Structure using Specular Reflections (JES, AH), pp. 173–176.
- ICPR-v3-2004-SotocaPK #image #multi
- Unsupervised Band Selection for Multispectral Images using Information Theory (JMS, FP, ACK), pp. 510–513.
- ICPR-v3-2004-SotocaSP #multi #naive bayes #set
- Attribute Relevance in Multiclass Data Sets Using the Naive Bayes Rule (JMS, JSS, FP), pp. 426–429.
- ICPR-v3-2004-SugimotoTTO #detection #image #sequence #visualisation
- Obstacle Detection Using Millimeter-Wave Radar and Its Visualization on Image Sequence (SS, HT, HT, MO), pp. 342–345.
- ICPR-v3-2004-UmedaGR #constraints #image
- Registration of Range and Color Images Using Gradient Constraints and Range Intensity Images (KU, GG, MR), pp. 12–15.
- ICPR-v3-2004-VosBASMVV #statistics
- A Statistical Shape Model without Using Landmarks (FV, PWdB, JGMA, GJS, MM, LJvV, AMV), pp. 714–717.
- ICPR-v3-2004-WuZZ #feature model #linear
- Relevant Linear Feature Extraction Using Side-information and Unlabeled Data (FW, YZ, CZ), pp. 582–585.
- ICPR-v3-2004-ZhangM #recognition
- Recognition of Expression Variant Faces Using Weighted Subspaces (YZ, AMM), pp. 149–152.
- ICPR-v4-2004-ArnabatCM #3d #consistency #modelling #multi #sequence
- 3D Modeling from Turntable Sequences Using Dense Stereo Carving and Multi-View Consistency (JA, SC, GGM), pp. 36–39.
- ICPR-v4-2004-BelkhoucheQGJ #2d #image
- Binary Image Transformation Using Two-Dimensional Chaotic Maps (FB, UQ, IG, DJ), pp. 823–826.
- ICPR-v4-2004-BhanuZ #recognition
- Face Recognition from Face Profile Using Dynamic Time Warping (BB, XZ), pp. 499–502.
- ICPR-v4-2004-BoubchirFB #approximate
- Bayesian Denoising in the Wavelet-Domain Using an Analytical Approximate a-Stable Prior (LB, MJF, DB), pp. 889–892.
- ICPR-v4-2004-BradleyL #estimation
- Sample Size Estimation using the Receiver Operating Characteristic Curve (APB, IDL), pp. 428–431.
- ICPR-v4-2004-ChanHSP #detection #semantics #video
- Detecting Rare Events in Video Using Semantic Primitives with HMM (MTC, AH, JS, MP), pp. 150–154.
- ICPR-v4-2004-CongEPB #equation #morphism
- Shape Metamorphism using p-Laplacian Equation (GC, ME, BP, GB), pp. 15–18.
- ICPR-v4-2004-DebiollesOA #network
- Combined Use of Partial Least Squares Regression and Neural Network for Diagnosis Tasks (AD, LO, PA), pp. 573–576.
- ICPR-v4-2004-DehaisDMC #artificial reality #perspective #realtime #sequence #video
- Augmented Reality through Real-Time Tracking of Video Sequences Using a Panoramic View (CD, MD, GM, VC), pp. 995–998.
- ICPR-v4-2004-DharaC #approach #estimation #hybrid #predict #video
- Video Motion Estimation Using Prediction Based Hybrid Approach (BCD, BC), pp. 737–740.
- ICPR-v4-2004-FabletJB #automation #estimation #image #learning #statistics
- Automatic Fish Age Estimation from Otolith Images using Statistical Learning (RF, NLJ, AB), pp. 503–506.
- ICPR-v4-2004-FanL #image #verification
- The Using of Thermal Images of Palm-dorsa Vein-patterns for Biometric Verification (KCF, CLL), pp. 450–453.
- ICPR-v4-2004-FigueroaLBCM #graph #representation
- Tracking Soccer Players using the Graph Representation (PJF, NJL, RMLB, IC, GGM), pp. 787–790.
- ICPR-v4-2004-FuYHT #clustering #detection #multi
- Mixture Clustering Using Multidimensional Histograms for Skin Detection (ZF, JY, WH, TT), pp. 549–552.
- ICPR-v4-2004-GaoA #parallel
- Single Camera Stereo using Planar Parallel Plate (CG, NA), pp. 108–111.
- ICPR-v4-2004-Gong #estimation #programming
- Motion Estimation using Dynamic Programming with Selective Path Search (MG), pp. 203–206.
- ICPR-v4-2004-HagaSY #analysis #detection
- Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
- ICPR-v4-2004-HanafiahYNK #comprehension
- Understanding Inexplicit Utterances Using Vision for Helper Robots (ZMH, CY, AN, YK), pp. 925–928.
- ICPR-v4-2004-HaritC #video
- Video Shot Interpretation using Principles of Perceptual Prominence and Perceptual Grouping in Spatio-Temporal Domain (GH, SC), pp. 256–259.
- ICPR-v4-2004-HottaKM #category theory #nearest neighbour #pattern matching #pattern recognition #recognition
- Pattern Recognition Using Average Patterns of Categorical k-Nearest Neighbors (SH, SK, SM), pp. 412–415.
- ICPR-v4-2004-IrfanogluGA #3d #automation #recognition
- 3D Shape-based Face Recognition using Automatically Registered Facial Surfaces (MOI, BG, LA), pp. 183–186.
- ICPR-v4-2004-KangCM #invariant
- Object Reacquisition Using Invariant Appearance Model (JK, IC, GGM), pp. 759–762.
- ICPR-v4-2004-KimP #hypermedia
- Geographic Hypermedia using Search Space Transformation (SSK, JHP), pp. 368–371.
- ICPR-v4-2004-KimPL #bound
- Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
- ICPR-v4-2004-KobayashiO #higher-order #identification #multi #polynomial
- Action and Simultaneous Multiple-Person Identification Using Cubic Higher-Order Local Auto-Correlation (TK, NO), pp. 741–744.
- ICPR-v4-2004-KrichenMGD #identification
- Iris Identification Using Wavelet Packets (EK, MAM, SGS, BD), pp. 335–338.
- ICPR-v4-2004-LiuSCH #clustering #personalisation #verification
- Personalized Face Verification System Using Owner-Specific Cluster-Dependent LDA-Subspace (HCL, CHS, YHC, YPH), pp. 344–347.
- ICPR-v4-2004-Lopez-FrancoB #algebra #framework #geometry
- Unified Model for Omnidirectional Vision Using the Conformal Geometric Algebra Framework (CLF, EBC), pp. 48–51.
- ICPR-v4-2004-MaityK #image
- An Image Watermarking Scheme using HVS Characteristics and Spread Transform (SPM, MKK), pp. 869–872.
- ICPR-v4-2004-McKennaN #learning
- Learning Spatial Context from Tracking using Penalised Likelihoods (SJM, HNC), pp. 138–141.
- ICPR-v4-2004-MurakitaII #markov #monte carlo
- Human Tracking using Floor Sensors based on the Markov Chain Monte Carlo Method (TM, TI, HI), pp. 917–920.
- ICPR-v4-2004-NakamuraFTMYMTI #image #recognition
- Eigen Nodule: View-Based Recognition of Lung Nodule in Chest X-ray CT Images Using Subspace Method (YN, GF, HT, SM, SY, TM, YT, TI), pp. 681–684.
- ICPR-v4-2004-NumadaNKKT #image #polynomial
- Sharpening of CT Images by Cubic Interpolation using B-Spline (MN, TN, KK, HK, HT), pp. 701–704.
- ICPR-v4-2004-OuMF #classification #multi #network
- Multiclass Pattern Classification Using Neural Networks (GO, YLM, LAF), pp. 585–588.
- ICPR-v4-2004-OyekoyaS #behaviour #visual notation
- Exploring Human Eye Behaviour using a Model of Visual Attention (OO, FS), pp. 945–948.
- ICPR-v4-2004-PeursumBVW #segmentation
- Human Action Segmentation via Controlled Use of Missing Data in HMMs (PP, HHB, SV, GAWW), pp. 440–445.
- ICPR-v4-2004-PrasadSK #image #set
- Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images (MNP, AS, IK), pp. 515–518.
- ICPR-v4-2004-SangiHS #analysis #difference #metric
- Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
- ICPR-v4-2004-SatoKYI #interface
- An Immersive Telepresence System with a Locomotion Interface Using High-Resolution Omnidirectional Movies (SI, TS, MK, NY), pp. 396–399.
- ICPR-v4-2004-StevensSEM #navigation
- Motion Imagery Navigation Using Terrain Estimates (MRS, MS, RSE, JCM), pp. 272–275.
- ICPR-v4-2004-SungLPL #bound #locality #recognition
- Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
- ICPR-v4-2004-TaguchiOA #performance #visual notation
- Fast Visual Search Using Simplified Pruning Rules — Streamlined Active Search (ST, SO, HA), pp. 937–940.
- ICPR-v4-2004-TanakaOKK #locality #mobile #probability
- Probabilistic Localization for Mobile Robots using Incomplete Maps (KT, NO, EK, YK), pp. 709–712.
- ICPR-v4-2004-TanCZ #image #kernel #metric #robust
- Robust Image Denoising Using Kernel-Induced Measures (KT, SC, DZ), pp. 685–688.
- ICPR-v4-2004-TothSWA #clustering #detection
- Detection of Moving Shadows using Mean Shift Clustering and a Significance Test (DT, IS, AW, TA), pp. 260–263.
- ICPR-v4-2004-WallhoffZRP
- Face Tracking in Meeting Room Scenarios Using Omnidirectional Views (FW, MZ, GR, IP), pp. 933–936.
- ICPR-v4-2004-WuWZ #energy #recognition
- Palmprint Recognition Using Directional Line Energy Feature (XW, KW, DZ), pp. 475–478.
- ICPR-v4-2004-XuTAA #generative #graph #image
- Generating Omnifocus Images Using Graph Cuts and a New Focus Measure (NX, KHT, HA, NA), pp. 697–700.
- ICPR-v4-2004-YamamotoYS #gesture #interface
- Arm-Pointing Gesture Interface Using Surrounded Stereo Cameras System (YY, IY, KS), pp. 965–970.
- ICPR-v4-2004-YingH04a #detection
- Catadioptric Line Features Detection using Hough Transform (XY, ZH), pp. 839–842.
- ICPR-v4-2004-ZaveriMD #image #information retrieval #modelling #multi #sequence
- Tracking of Point Targets in IR Image Sequence using Multiple Model Based Particle Filtering and MRF Based Data Association (MAZ, SNM, UBD), pp. 729–732.
- ICPR-v4-2004-ZhaiRS #detection #finite #state machine
- Conversation Detection in Feature Films Using Finite State Machines (YZ, ZR, MS), pp. 458–461.
- ICPR-v4-2004-ZhangLT #analysis #image #recognition #word
- Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
- ICPR-v4-2004-ZhouWG #estimation
- Tracking Periodic Motion using Bayesian Estimation (HZ, AMW, PRG), pp. 725–728.
- KDD-2004-AliS #architecture #collaboration #distributed #named #recommendation
- TiVo: making show recommendations using a distributed collaborative filtering architecture (KA, WvS), pp. 394–401.
- KDD-2004-JaroszewiczS #network
- Interestingness of frequent itemsets using Bayesian networks as background knowledge (SJ, DAS), pp. 178–186.
- KDD-2004-MorinagaY #finite #roadmap #topic
- Tracking dynamics of topic trends using a finite mixture model (SM, KY), pp. 811–816.
- KDD-2004-TruongLB #dataset #learning #random
- Learning a complex metabolomic dataset using random forests and support vector machines (YT, XL, CB), pp. 835–840.
- KDD-2004-WuGH #clustering #mining #network
- Mining scale-free networks using geodesic clustering (AYW, MG, JH), pp. 719–724.
- KDD-2004-ZhaoLTS #coordination #design #named #parallel #testing
- V-Miner: using enhanced parallel coordinates to mine product design and test data (KZ, BL, TMT, AS), pp. 494–502.
- KR-2004-AmgoudC #on the
- On the Use of an ATMS for Handling Conflicting Desires (LA, CC), pp. 194–202.
- LSO-2004-FalboRBT #how #learning #risk management
- Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
- SEKE-2004-CostagliolaFGTV #development #predict #web
- Using COSMIC-FFP for Predicting Web Application Development Effort (GC, FF, CG, GT, GV), pp. 439–444.
- SEKE-2004-Cruz-LemusGORP #diagrams #fuzzy #predict #statechart #uml
- Predicting UML Statechart Diagrams Understandability Using Fuzzy Logic-Based Techniques (JACL, MG, JAO, FPR, MP), pp. 238–245.
- SEKE-2004-CubraniM #automation #categorisation #debugging
- Automatic bug triage using text categorization (DC, GCM), pp. 92–97.
- SEKE-2004-GermanHJ #evolution #visualisation
- Visualizing the evolution of software using softChange (DMG, AH, NJ), pp. 336–341.
- SEKE-2004-GomesPCPSFB #composition #diagrams #reuse #uml
- Reuse of UML Class Diagrams Using Case-Based Composition (PG, FCP, PC, PP, NS, JLF, CB), pp. 258–263.
- SEKE-2004-Hobbs #design pattern #specification
- Using A Scenario Specification Language to Add Context to Design Patterns (RLH), pp. 330–335.
- SEKE-2004-JahnkeB #architecture #clustering #reverse engineering
- Reverse Engineering Software Architecture using Rough Clusters (JHJ, YB), pp. 270–275.
- SEKE-2004-LiLCWL
- Extracting Minimal Non-Redundant Implication Rules by Using Quantized Closed Itemset Lattice (YL, ZL, WC, QW, WL), pp. 402–405.
- SEKE-2004-WeigangCDM #distributed #grid #knowledge base #realtime
- Distributed Knowledge Based System Using Grid Computing for Real Time Air Traffic Synchronization — ATFMGC (WL, DAC, MVPD, ACMAdM), pp. 396–401.
- SEKE-2004-WihartoS #logic #xml
- Future Proofing and Retargeting Application Logic Using O2XML (MW, PS), pp. 173–178.
- SIGIR-2004-AmitayCLS #evaluation #scalability #set
- Scaling IR-system evaluation using term relevance sets (EA, DC, RL, AS), pp. 10–17.
- SIGIR-2004-BellGL #challenge
- Challenges in using lifetime personal information stores (GB, JG, RL), p. 1.
- SIGIR-2004-Cowans #information retrieval #process
- Information retrieval using hierarchical dirichlet processes (PJC), pp. 564–565.
- SIGIR-2004-DiazJ #precise #predict #query
- Using temporal profiles of queries for precision prediction (FD, RJ), pp. 18–24.
- SIGIR-2004-FanGLX #automation #concept #image #representation
- Automatic image annotation by using concept-sensitive salient objects for image content representation (JF, YG, HL, GX), pp. 361–368.
- SIGIR-2004-GreevyS
- Classifying racist texts using a support vector machine (EG, AFS), pp. 468–469.
- SIGIR-2004-GuL #comparison #documentation #feedback #information retrieval
- Comparison of using passages and documents for blind relevance feedback in information retrieval (ZG, ML), pp. 482–483.
- SIGIR-2004-KimCK #dependence #documentation
- Refining term weights of documents using term dependencies (HSK, IC, MK), pp. 552–553.
- SIGIR-2004-KimSR #approach #information retrieval #word
- Information retrieval using word senses: root sense tagging approach (SBK, HCS, HCR), pp. 258–265.
- SIGIR-2004-LiuC #clustering #modelling #retrieval
- Cluster-based retrieval using language models (XL, WBC), pp. 186–193.
- SIGIR-2004-MaS #information management
- Information extraction using two-phase pattern discovery (LM, JS), pp. 534–535.
- SIGIR-2004-MladenicBGM #classification #feature model #interactive #linear #modelling
- Feature selection using linear classifier weights: interaction with classification models (DM, JB, MG, NMF), pp. 234–241.
- SIGIR-2004-Ogilvie #comprehension #generative #information retrieval #modelling #probability
- Understanding combination of evidence using generative probabilistic models for information retrieval (PO), p. 603.
- SIGIR-2004-Zhang #adaptation #classification
- Using bayesian priors to combine classifiers for adaptive filtering (YZ0), pp. 345–352.
- SIGIR-2004-ZhangPZ #machine learning #recognition
- Focused named entity recognition using machine learning (LZ, YP, TZ), pp. 281–288.
- SIGIR-2004-ZhangV #automation #information retrieval #web
- Using the web for automated translation extraction in cross-language information retrieval (YZ, PV), pp. 162–169.
- SPLC-2004-CzarneckiHE #feature model #modelling #staged
- Staged Configuration Using Feature Models (KC, SH, UWE), pp. 266–283.
- SPLC-2004-Greenfield04a #domain-specific language #framework #tool support
- Using Domain-Specific Languages, Patterns, Frameworks, and Tools to Assemble Applications (JG), p. 324.
- UML-2004-DologN #collaboration #diagrams #feature model #modelling #uml
- Using UML-based Feature Models and UML Collaboration Diagrams to Information Modelling for Web-Based Applications (PD, WN), pp. 425–439.
- UML-2004-GoniE #concurrent #ocl #precise #uml
- Building Precise UML Constructs to Model Concurrency Using OCL (AG, YE), pp. 212–225.
- ECOOP-2004-SutterTD #constraints #java #library
- Customization of Java Library Classes Using Type Constraints and Profile Information (BDS, FT, JD), pp. 585–610.
- ECOOP-2004-VitenbergKS #concurrent #database #program analysis
- Increasing Concurrency in Databases Using Program Analysis (RV, KK, AKS), pp. 341–363.
- AdaEurope-2004-AlvarezPOSN #ada #education #framework #platform #realtime
- Teaching Real-Time Systems Around a Digital Model Railroad Platform Using Ada (BÁ, JAP, FJO, PS, PJNL), pp. 213–224.
- AdaEurope-2004-VrandecicS #ada #xml
- XML4Ada95 Accessing XML Using the DOM in Ada95 (ZV, DS), pp. 178–189.
- LOPSTR-2004-Lopez-GarciaBH #analysis #logic programming #source code
- Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
- PADL-2004-MoralesCH #c #compilation #prolog
- Improved Compilation of Prolog to C Using Moded Types and Determinism Information (JFM, MC, MVH), pp. 86–103.
- PDCL-2004-ColvinGHHNS #logic programming #refinement #source code #specification
- Developing Logic Programs from Specifications Using Stepwise Refinement (RC, LG, IJH, DH, RN, PAS), pp. 66–89.
- PDCL-2004-LeuschelCBV #deduction
- Specialising Interpreters Using Offline Partial Deduction (ML, SJC, MB, WV), pp. 340–375.
- PLDI-2004-WhaleyL #alias #analysis #diagrams #pointer
- Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
- PLDI-2004-YahavR #abstraction #safety #verification
- Verifying safety properties using separation and heterogeneous abstractions (EY, GR), pp. 25–34.
- PLDI-2004-ZhongOSD #array
- Array regrouping and structure splitting using whole-program reference affinity (YZ, MO, XS, CD), pp. 255–266.
- POPL-2004-GulwaniN #random
- Global value numbering using random interpretation (SG, GCN), pp. 342–352.
- POPL-2004-SankaranarayananSM #generative #invariant
- Non-linear loop invariant generation using Gröbner bases (SS, HS, ZM), pp. 318–329.
- SIGAda-2004-Brown #ada #education
- Teaching graphics using Ada (CWB), pp. 47–50.
- RE-2004-LaneyBJN #problem #requirements
- Composing Requirements Using Problem Frames (RCL, LB, MJ, BN), pp. 122–131.
- RE-2004-LinNIJ #bound #problem #security
- Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
- RE-2004-NurmulianiZW #requirements #sorting
- Using Card Sorting Technique to Classify Requirements Change (NN, DZ, SPW), pp. 240–248.
- SAC-J-2003-BorgerCR04 #formal method #on the #state machine #uml
- On formalizing UML state machines using ASM (EB, AC, ER), pp. 287–292.
- ASE-2004-Arshad #automation #configuration management
- Automated Dynamic Reconfiguration using AI Planning (NA), pp. 402–405.
- ASE-2004-Betin-CanB #concurrent #programming
- Verifiable Concurrent Programming Using Concurrency Controllers (ABC, TB), pp. 248–257.
- ASE-2004-BreuK #mining
- Aspect Mining Using Event Traces (SB, JK), pp. 310–315.
- ASE-2004-HotzKW
- Using a Structure-based Configuration Tool for Product Derivation (LH, TK, KW), pp. 388–391.
- ASE-2004-KhorG #algorithm #automation #branch #concept analysis #search-based #testing
- Using a Genetic Algorithm and Formal Concept Analysis to Generate Branch Coverage Test Data Automatically (SK, PG), pp. 346–349.
- ASE-2004-MemonX #automation #fault #persistent #testing
- Using Transient/Persistent Errors to Develop Automated Test Oracles for Event-Driven Software (AMM, QX), pp. 186–195.
- FSE-2004-CabalT #database #metric #sql #testing
- Using an SQL coverage measurement for testing database applications (MJSC, JT), pp. 253–262.
- FSE-2004-DingelL #analysis #automation #concurrent #safety #source code #txl
- Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
- FSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support
- Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
- ICSE-2004-BriandLW #empirical #simulation #statechart #test coverage
- Using Simulation to Empirically Investigate Test Coverage Criteria Based on Statechart (LCB, YL, YW), pp. 86–95.
- ICSE-2004-CervantesH #adaptation #component
- Autonomous Adaptation to Dynamic Availability Using a Service-Oriented Component Model (HC, RSH), pp. 614–623.
- ICSE-2004-ChatterjeeAASV #database #development #version control
- Using Data Versioning in Database Application Development (RC, GA, SA, BS, RV), pp. 315–325.
- ICSE-2004-Jones #fault #locality #visualisation
- Fault Localization Using Visualization of Test Information (JAJ), pp. 54–56.
- ICSE-2004-RyanW #evolution #protocol
- Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
- ICSE-2004-TurnerZKRBBBKLR #case study #experience #web #web service
- Using Web Service Technologies to Create an Information Broker: An Experience Report (MT, FZ, IAK, MR, DB, KHB, PB, JAK, PJL, MR), pp. 552–561.
- ICSE-2004-WangR #bytecode #java #slicing #source code
- Using Compressed Bytecode Traces for Slicing Java Programs (TW, AR), pp. 512–521.
- ICSE-2004-ZhangGZ #diagrams #dynamic analysis #order #performance #slicing
- Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams (XZ, RG, YZ), pp. 502–511.
- SAC-2004-AbulAPB #generative
- Finding differentially expressed genes: pattern generation using Q-values (OA, RA, FP, KB), pp. 138–142.
- SAC-2004-Al-SadiA #algorithm #fault tolerance #performance
- Efficient fault-tolerant routing algorithm for OTIS-cube using unsafety vectors (JAS, AMA), pp. 1426–1430.
- SAC-2004-AversanoBCET #approach #evolution #process #towards
- Evolution of business processes towards eBusiness using a critiquing approach (LA, TB, GC, RE, MT), pp. 1351–1358.
- SAC-2004-BistarelliFO #constraints #detection #modelling #problem
- Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
- SAC-2004-BlaserSMJKL #fault
- Potential prevention of medical errors in casualty surgery by using information technology (RB, MS, DM, PJ, KK, RL), pp. 285–290.
- SAC-2004-BoughaciD #metaheuristic #optimisation #problem #satisfiability
- Solving weighted Max-Sat optimization problems using a Taboo Scatter Search metaheuristic (DB, HD), pp. 35–36.
- SAC-2004-BrowneS #feedback #information retrieval #video
- Video information retrieval using objects and ostensive relevance feedback (PB, AFS), pp. 1084–1090.
- SAC-2004-CaldeiraMR #algorithm #hybrid #problem
- Using a hybrid Evolutionary-Taboo Algorithm to solve Job Shop Problem (JPC, FM, ACR), pp. 1446–1451.
- SAC-2004-CarvalhoCSBF #mobile #network #security
- Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
- SAC-2004-Cebulla #architecture #concept #modelling
- Modeling sociotechnical specifics using architectural concepts (MC), pp. 1559–1563.
- SAC-2004-CoutoMS #biology #web
- Classifying biological articles using web resources (FMC, BM, MJS), pp. 111–115.
- SAC-2004-IoannidisSSPHM #standard #xml
- Using XML and related standards to support Location Based Services (AI, MS, PS, GP, SH, LFM), pp. 1629–1633.
- SAC-2004-KarabudakHB #algorithm #search-based
- A call admission control scheme using genetic algorithms (DK, CCH, BB), pp. 1151–1158.
- SAC-2004-KasturiA #clustering
- Clustering of diverse genomic data using information fusion (JK, RA), pp. 116–120.
- SAC-2004-Liew #algorithm #search-based
- Using a genetic algorithm to optimize the gape of a snake jaw (CWL), pp. 975–979.
- SAC-2004-LosadaDBB #ad hoc #fuzzy #quantifier #retrieval
- Experiments on using fuzzy quantified sentences in adhoc retrieval (DEL, FDH, AB, SB), pp. 1059–1064.
- SAC-2004-MarkWC #automation #code generation #modelling
- Using semi-lagrangian formulations with automatic code generation for environmental modeling (PvdM, LW, GC), pp. 229–234.
- SAC-2004-MatsushitaKI #distributed #peer-to-peer
- Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
- SAC-2004-MichaelsonHS #automaton #bound #named #programming
- FSM-Hume: programming resource-limited systems using bounded automata (GM, KH, JS), pp. 1455–1461.
- SAC-2004-PardedeRT #on the #xml
- On using collection for aggregation and association relationships in XML object-relational storage (EP, JWR, DT), pp. 703–710.
- SAC-2004-PereiraS #architecture #enterprise #framework
- A method to define an Enterprise Architecture using the Zachman Framework (CMP, PMAS), pp. 1366–1371.
- SAC-2004-PinhoT #image #physics
- Morphing of image represented objects using a physical methodology (RRP, JMRST), pp. 10–15.
- SAC-2004-RahalP #approach #categorisation
- An optimized approach for KNN text categorization using P-trees (IR, WP), pp. 613–617.
- SAC-2004-RamirezS #concurrent #constraints #distributed #logic programming #source code
- Concurrent and distributed programming using constraint logic programs (RR, AES), pp. 508–509.
- SAC-2004-SilvaCG #image
- Diagnosis of lung nodule using Gini coefficient and skeletonization in computerized tomography images (ACS, PCPC, MG), pp. 243–248.
- SAC-2004-TangMC #embedded #fixpoint #implementation #mobile #performance #verification
- Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic (TYT, YSM, KCC), pp. 821–825.
- SAC-2004-VincentR #analysis #framework
- A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
- SAC-2004-WeisserK #identification #metric #sequence #statistics
- Identification of fundamental building blocks in protein sequences using statistical association measures (DKW, JKS), pp. 154–161.
- GPCE-2004-SeefriedCK #domain-specific language #embedded #haskell #optimisation
- Optimising Embedded DSLs Using Template Haskell (SS, MMTC, GK), pp. 186–205.
- LDTA-2004-GoldreiS #attribute grammar #formal method #off the shelf #verification
- Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties (SG, AMS), pp. 33–54.
- ASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics
- Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
- ASPLOS-2004-HuhCBS
- Coherence decoupling: making use of incoherence (JH, JC, DB, GSS), pp. 97–106.
- CC-2004-JohnsonM #memory management #multi
- Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
- CC-2004-OzerNG #approximate #probability
- Stochastic Bit-Width Approximation Using Extreme Value Theory for Customizable Processors (EÖ, AN, DG), pp. 250–264.
- CGO-2004-HuS
- Using Dynamic Binary Translation to Fuse Dependent Instructions (SH, JES), pp. 213–226.
- CGO-2004-RastelloFG #constraints #optimisation
- Optimizing Translation Out of SSA Using Renaming Constraints (FR, FdF, CG), pp. 265–278.
- CGO-2004-WuPSRCA #memory management #profiling
- Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
- DAC-2004-Baron #configuration management #platform #roadmap
- Trends in the use of re-configurable platforms (MB), p. 415.
- DAC-2004-LeeZB #analysis
- Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
- DAC-2004-LiLH #configuration management #reduction
- FPGA power reduction using configurable dual-Vdd (FL, YL, LH), pp. 735–740.
- DAC-2004-LiYYYL #adaptation #algorithm #design #representation
- A packing algorithm for non-manhattan hexagon/triangle placement design by using an adaptive o-tree representation (JL, TY, BY, JY, CL), pp. 646–651.
- DAC-2004-LuJ #verification
- Verifying a gigabit ethernet switch using SMV (YL, MJ), pp. 230–233.
- DAC-2004-NakamuraHKYY #c #c++ #communication #hardware #performance
- A fast hardware/software co-verification method for system-on-a-chip by using a C/C++ simulator and FPGA emulator with shared register communication (YN, KH, IK, KY, TY), pp. 299–304.
- DAC-2004-ObermeierJ #polynomial
- Quadratic placement using an improved timing model (BO, FMJ), pp. 705–710.
- DAC-2004-OhbaT #design #embedded
- An SoC design methodology using FPGAs and embedded microprocessors (NO, KT), pp. 747–752.
- DAC-2004-SrivastavaSB #optimisation #power management #process #statistics
- Statistical optimization of leakage power considering process variations using dual-Vth and sizing (AS, DS, DB), pp. 773–778.
- DAC-2004-SrivastavaSB04a #power management
- Power minimization using simultaneous gate sizing, dual-Vdd and dual-Vth assignment (AS, DS, DB), pp. 783–787.
- DAC-2004-VanderhaegenB #automation #design #geometry #programming
- Automated design of operational transconductance amplifiers using reversed geometric programming (JPV, RWB), pp. 133–138.
- DATE-DF-2004-BainbridgePF #design #self
- The Design and Test of a Smartcard Chip Using a CHAIN Self-Timed Network-on-Chip (WJB, LAP, SBF), pp. 274–279.
- DATE-DF-2004-ChenYSMGH #design
- Demonstration of a SiGe RF LNA Design Using IBM Design Kits in 0.18um SiGe BiCMOS Technology (YC, XY, DS, JM, JG, DLH), pp. 22–27.
- DATE-DF-2004-SchmittR #design #low cost #prototype #verification
- Verification of a Microcontroller IP Core for System-on-a-Chip Designs Using Low-Cost Prototyping Environments (SS, WR), pp. 96–101.
- DATE-v1-2004-BhuniaRR #analysis
- Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
- DATE-v1-2004-BjesseK #abstraction #debugging #refinement
- Using Counter Example Guided Abstraction Refinement to Find Complex Bugs (PB, JHK), pp. 156–161.
- DATE-v1-2004-BurnsSKY #synthesis #tool support
- An Asynchronous Synthesis Toolset Using Verilog (FPB, DS, AK, AY), pp. 724–725.
- DATE-v1-2004-CaiL #power management
- Dynamic Power Management Using Data Buffers (LC, YHL), pp. 526–531.
- DATE-v1-2004-DebJO #design
- System Design for DSP Applications Using the MASIC Methodology (AKD, AJ, JÖ), pp. 630–635.
- DATE-v1-2004-KielyG #modelling #performance
- Performance Modeling of Analog Integrated Circuits Using Least-Squares Support Vector Machines (TK, GGEG), pp. 448–453.
- DATE-v1-2004-ManoliosS #automation #liveness #modelling #safety #verification #web
- Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements (PM, SKS), pp. 168–175.
- DATE-v1-2004-PadmanabanT #fault #identification #performance
- Using BDDs and ZBDDs for Efficient Identification of Testable Path Delay Faults (SP, ST), pp. 50–55.
- DATE-v1-2004-PerezMT #scheduling
- A New Optimized Implemention of the SystemC Engine Using Acyclic Scheduling (DGP, GM, OT), pp. 552–557.
- DATE-v1-2004-RanjanVASVG #modelling #performance #synthesis
- Fast, Layout-Inclusive Analog Circuit Synthesis using Pre-Compiled Parasitic-Aware Symbolic Performance Models (MR, WV, AA, HS, RV, GGEG), pp. 604–609.
- DATE-v1-2004-SehgalC #architecture #composition #performance #testing
- Efficient Modular Testing of SOCs Using Dual-Speed TAM Architectures (AS, KC), pp. 422–427.
- DATE-v1-2004-SrinivasanBCC #metric #performance
- Efficient Test Strategy for TDMA Power Amplifiers Using Transient Current Measurements: Uses and Benefit (GS, SB, SC, AC), pp. 280–285.
- DATE-v1-2004-StefanovZTKD #approach #design #network #process
- System Design Using Kahn Process Networks: The Compaan/Laura Approach (TS, CZ, AT, BK, EFD), pp. 340–345.
- DATE-v1-2004-ZambrenoCSN #flexibility #hardware
- Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
- DATE-v1-2004-ZhangV #memory management
- Using a Victim Buffer in an Application-Specific Memory Hierarchy (CZ, FV), pp. 220–227.
- DATE-v1-2004-ZhanS #optimisation #polynomial #programming
- Optimization of Integrated Spiral Inductors Using Sequential Quadratic Programming (YZ, SSS), pp. 622–629.
- DATE-v2-2004-BobrekPNPT #approach #hybrid #modelling #simulation
- Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach (AB, JJP, JEN, JMP, DET), pp. 1144–1149.
- DATE-v2-2004-CheungPHC #equivalence #named
- MINCE: Matching INstructions Using Combinational Equivalence for Extensible Processor (NC, SP, JH, JC), pp. 1020–1027.
- DATE-v2-2004-KumarBK #algorithm #analysis #array #embedded #memory management #named #reduction
- MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
- DATE-v2-2004-LampropoulosAR
- Minimization of Crosstalk Noise, Delay and Power Using a Modified Bus Invert Technique (ML, BMAH, PMR), pp. 1372–1373.
- DATE-v2-2004-LaouamriA #network #protocol #testing
- Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
- DATE-v2-2004-LeiningerGM #configuration management
- Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
- DATE-v2-2004-LorenzM #algorithm #code generation #search-based
- Phase Coupled Code Generation for DSPs Using a Genetic Algorithm (ML, PM), pp. 1270–1275.
- DATE-v2-2004-MillbergNTJ #network
- Guaranteed Bandwidth Using Looped Containers in Temporally Disjoint Networks within the Nostrum Network on Chip (MM, EN, RT, AJ), pp. 890–895.
- DATE-v2-2004-MondalCM #analysis #approach #logic
- A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
- DATE-v2-2004-OlbrichB #locality #probability
- Placement Using a Localization Probability Model (LPM) (MO, EB), p. 1412.
- DATE-v2-2004-YooYBJD #concept #design #multi
- Multi-Processor SoC Design Methodology Using a Concept of Two-Layer Hardware-Dependent Software (SY, MWY, AB, AAJ, MDN), pp. 1382–1383.
- DATE-v2-2004-ZhouZLLZC #analysis
- Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
- DATE-v2-2004-ZhuM #architecture #communication #framework #multi #platform #prototype #specification
- Using a Communication Architecture Specification in an Application-Driven Retargetable Prototyping Platform for Multiprocessing (XZ, SM), pp. 1244–1249.
- HPCA-2004-EhrhartP #predict #scheduling
- Reducing the Scheduling Critical Cycle Using Wakeup Prediction (TEE, SJP), pp. 222–231.
- HPCA-2004-KharbutliISL
- Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses (MK, KI, YS, JL), pp. 288–299.
- HPCA-2004-NarayanasamyHSC #convergence #string
- Creating Converged Trace Schedules Using String Matching (SN, YH, SS, BC), pp. 210–221.
- HPCA-2004-NesbitS
- Data Cache Prefetching Using a Global History Buffer (KJN, JES), pp. 96–105.
- HPCA-2004-ZhuDDLZC #energy #power management
- Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management (QZ, FMD, CFD, ZL, YZ, PC), pp. 118–129.
- HPDC-2004-HuangS #configuration management #self
- Building Self-Configuring Services Using Service-Specific Knowledge (ACH, PS), pp. 45–54.
- HPDC-2004-KramerM #grid
- Utilization of a Local Grid of Mac OS X-Based Computers using Xgrid (DAK, MM), pp. 264–265.
- HPDC-2004-WalkerM #coordination #workflow
- Orchestrating and Coordinating Scientific/Engineering Workflows using GridShell (EW, TM), pp. 270–271.
- HPDC-2004-WeinbergJDFH #execution #matrix #query
- Gridflow Description, Query, and Execution at SCEC using the SDSC Matrix (JW, AJ, AD, MF, YH), pp. 262–263.
- HPDC-2004-ZangrilliL #monitoring #network
- Using Passive Traces of Application Traffic in a Network Monitoring System (MZ, BL), pp. 77–86.
- HPDC-2004-ZhangKPCNWS #algorithm #parallel
- Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms (XZ, TMK, TP, ÜVÇ, SN, PW, JHS), pp. 4–13.
- LCTES-2004-ImH #multi #realtime #scalability #scheduling
- Dynamic voltage scaling for real-time multi-task scheduling using buffers (CI, SH), pp. 88–94.
- OSDI-2004-BarhamDIM #modelling
- Using Magpie for Request Extraction and Workload Modelling (PB, AD, RI, RM), pp. 259–272.
- OSDI-2004-YangTEM #fault #file system #model checking
- Using Model Checking to Find Serious File System Errors (JY, PT, DRE, MM), pp. 273–288.
- PDP-2004-GuiradoRRL #performance #predict
- Performance Prediction Using an Application-Oriented Mapping Tool (FG, AR, CR, EL), pp. 184–191.
- PDP-2004-LiuSK #energy #multi #optimisation
- Optimizing Bus Energy Consumption of On-Chip Multiprocessors Using Frequent Values (CL, AS, MTK), p. 340–?.
- DATE-2005-BernardiMQR04 #approach #logic #testing
- Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study (PB, GM, FQ, MSR), pp. 228–233.
- DATE-2005-Hillman04 #power management #reduction
- Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm (DH), pp. 240–246.
- FASE-2004-ChoppyR #case study #requirements #specification
- Improving Use Case Based Requirements Using Formally Grounded Specifications (CC, GR), pp. 244–260.
- FASE-2004-HeG #automation #debugging
- Automated Debugging Using Path-Based Weakest Preconditions (HH, NG), pp. 267–280.
- FASE-2004-KimRFL #data access #modelling #uml
- Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
- FASE-2004-OlveczkyM #analysis #maude #realtime #specification
- Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
- FoSSaCS-2004-GenestMMP #partial order #specification #verification
- Specifying and Verifying Partial Order Properties Using Template MSCs (BG, MM, AM, DP), pp. 195–210.
- STOC-2004-HealyVV #nondeterminism
- Using nondeterminism to amplify hardness (AH, SPV, EV), pp. 192–201.
- STOC-2004-KleinbergS #collaboration #modelling
- Using mixture models for collaborative filtering (JMK, MS), pp. 569–578.
- TACAS-2004-DiethersH #design #named #object-oriented #verification
- Vooduu: Verification of Object-Oriented Designs Using UPPAAL (KD, MH), pp. 139–143.
- TACAS-2004-KrcalY #analysis #automaton #decidability #problem #scheduling
- Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
- TACAS-2004-MailundW #graph #reachability
- Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method (TM, MW), pp. 177–191.
- TACAS-2004-RasmussenLS #automaton #scheduling
- Resource-Optimal Scheduling Using Priced Timed Automata (JIR, KGL, KS), pp. 220–235.
- TACAS-2004-RobbyRDH #framework #model checking #specification
- Checking Strong Specifications Using an Extensible Software Model Checking Framework (R, ER, MBD, JH), pp. 404–420.
- CAV-2004-ChangBD #design #interface #refinement #verification
- Using Interface Refinement to Integrate Formal Verification into the Design Cycle (JC, SB, DLD), pp. 122–134.
- CAV-2004-RayH #deduction #first-order #pipes and filters #quantifier #verification
- Deductive Verification of Pipelined Machines Using First-Order Quantification (SR, WAHJ), pp. 31–43.
- FATES-2004-BlomHJP #automaton #generative #specification #testing
- Specifying and Generating Test Cases Using Observer Automata (JB, AH, BJ, PP), pp. 125–139.
- FATES-2004-HongU #cost analysis #generative #model checking #testing
- Using Model Checking for Reducing the Cost of Test Generation (HSH, HU), pp. 110–124.
- FATES-2004-LarsenMN #online #realtime #testing
- Online Testing of Real-time Systems Using Uppaal (KGL, MM, BN), pp. 79–94.
- FATES-2004-YoonKSC #analysis #component #empirical #fault #injection #mutation testing #testing
- Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
- ICLP-2004-ErdemW #programming #set
- Rectilinear Steiner Tree Construction Using Answer Set Programming (EE, MDFW), pp. 386–399.
- ICLP-2004-Smaus #logic programming #source code #termination
- Termination of Logic Programs Using Various Dynamic Selection Rules (JGS), pp. 43–57.
- IJCAR-2004-DenneyFS #automation #proving #theorem proving
- Using Automated Theorem Provers to Certify Auto-generated Aerospace Software (ED, BF, JS), pp. 198–212.
- IJCAR-2004-MengP #interactive #proving
- Experiments on Supporting Interactive Proof Using Resolution (JM, LCP), pp. 372–384.
- IJCAR-2004-ThiemannGS #composition #dependence #proving #termination
- Improved Modular Termination Proofs Using Dependency Pairs (RT, JG, PSK), pp. 75–90.
- LICS-2004-SeshiaB #bound #quantifier
- Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds (SAS, REB), pp. 100–109.
- SAT-2004-GummadiNV #algorithm #independence #satisfiability #set
- Algorithms for Satisfiability using Independent Sets of Variables (RG, NSN, VR), pp. 56–63.
- SAT-2004-HuangD #performance
- Using DPLL for Efficient OBDD Construction (JH, AD), pp. 127–136.
- SAT-2004-ManquinhoM #bound #optimisation #pseudo #satisfiability
- Using Lower-Bound Estimates in SAT-Based Pseudo-Boolean Optimization (VMM, JPMS), pp. 120–126.
- TestCom-2004-NeukirchenDG #communication #realtime #requirements #testing
- Communication Patterns for Expressing Real-Time Requirements Using MSC and Their Application to Testing (HN, ZRD, JG), pp. 144–159.
- TestCom-2004-Vassiliou-GiolesDS #execution
- Execution of External Applications using TTCN-3 (TVG, GD, IS), pp. 209–223.
- VMCAI-2004-Etessami #analysis #data flow #equation #game studies #graph #recursion
- Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
- VMCAI-2004-HatcliffRD #concurrent #model checking #object-oriented #specification #verification
- Verifying Atomicity Specifications for Concurrent Object-Oriented Software Using Model-Checking (JH, R, MBD), pp. 175–190.
- VMCAI-2004-PaceS #difference #kernel #model checking
- Model Checking Polygonal Differential Inclusions Using Invariance Kernels (GJP, GS), pp. 110–121.
- DocEng-2003-Bulterman #interactive #multi
- Using SMIL to encode interactive, peer-level multimedia annotations (DCAB), pp. 32–41.
- DocEng-2003-MongB #visual notation #web
- Using SVG as the rendering model for structured and graphically complex web material (JCM, DFB), pp. 88–91.
- DRR-2003-MaderlechnerS #recognition #set
- Extraction of valid data sets in registers using recognition of invalidation lines (GM, PS), pp. 67–72.
- DRR-2003-SuwaN #algorithm #composition #image
- Separation algorithm of superimposed pattern using directional decomposition of an image (MS, SN), pp. 278–285.
- HT-2003-DelortBR #documentation #summary #web
- Enhanced web document summarization using hyperlinks (JYD, BBM, MR), pp. 208–215.
- HT-2003-FallensteinLHA #named #web
- Storm: using P2P to make the desktop part of the web (BF, TJL, HH, TA), pp. 150–151.
- HT-2003-SugiyamaHYU #refinement #web
- Refinement of TF-IDF schemes for web pages using their hyperlinked neighboring pages (KS, KH, MY, SU), pp. 198–207.
- ICDAR-2003-AlamKNRTW #design #documentation #summary
- Structured and Unstructured Document Summarization: Design of a Commercial Summarizer using Lexical Chains (HA, AK, MN, AFRR, YT, CW), pp. 1147–1152.
- ICDAR-2003-AllierE #prototype
- Font Type Extraction and Character Prototyping Using Gabor Filters (BA, HE), pp. 799–803.
- ICDAR-2003-BaldiMS #classification #set
- Using tree-grammars for training set expansion in page classification (SB, SM, GS), pp. 829–833.
- ICDAR-2003-BrittoSSSB #algorithm #clustering #low cost #parallel
- A Low-Cost Parallel K-Means VQ Algorithm Using Cluster Computing (AdSBJ, PSLdS, RS, SdRSdS, DLB), pp. 839–843.
- ICDAR-2003-BulacuSV #identification
- Writer Identification Using Edge-Based Directional Features (MB, LS, LV), pp. 937–941.
- ICDAR-2003-ChangC #algorithm #component
- A Component-Labeling Algorithm Using Contour Tracing Technique (FC, CJC), pp. 741–745.
- ICDAR-2003-ChaTS #algorithm #optimisation #recognition #search-based #similarity
- Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition (SHC, CCT, SNS), pp. 662–665.
- ICDAR-2003-El-NasanVN #n-gram #recognition
- Handwriting Recognition Using Position Sensitive Letter N-Gram Matching (AEN, SV, GN), p. 577–?.
- ICDAR-2003-GuestCFP #analysis #automation #classification #geometry #sequence
- Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
- ICDAR-2003-HuoF #modelling #performance
- Improving Chinese/English OCR Performance by Using MCE-based Character-Pair Modeling and Negative Training (QH, ZDF), pp. 364–368.
- ICDAR-2003-LauYT #image #sequence
- Recovery of Writing Sequence of Static Images of Handwriting using UWM (KKL, PCY, YYT), pp. 1123–1127.
- ICDAR-2003-LeedhamC #identification
- Writer Identification using Innovative Binarised Features of Handwritten Numerals (GL, SC), pp. 413–417.
- ICDAR-2003-LiWZ #approach #image #statistics #string
- String Extraction From Color Airline Coupon Image Using Statistical Approach (YL, ZW, HZ), pp. 289–293.
- ICDAR-2003-LooT #image #segmentation
- Using Irregular Pyramid for Text Segmentation and Binarization of Gray Scale Image (PKL, CLT), pp. 594–598.
- ICDAR-2003-LuoL #approach #recognition
- Engineering Drawings Recognition Using a Case-based Approach (YL, LW), pp. 190–194.
- ICDAR-2003-Mori #feature model #recognition #video
- Video text recognition using feature compensation as category-dependent feature extraction (MM), pp. 645–649.
- ICDAR-2003-MoritaSBS03a #algorithm #feature model #multi #recognition #search-based #word
- Unsupervised Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Word Recognition (MEM, RS, FB, CYS), pp. 666–670.
- ICDAR-2003-MuramatsuKSA #evaluation #flexibility #recognition #standard
- Improvement of Matching and Evaluation in Handwritten Numeral Recognition Using Flexible Standard Patterns (HM, TK, TS, KA), pp. 273–277.
- ICDAR-2003-NishimuraT #online #recognition
- Off-line Character Recognition using On-line Character Writing Information (HN, TT), pp. 168–172.
- ICDAR-2003-PechwitzM #approach #database #recognition #word
- HMM Based Approach for Handwritten Arabic Word Recognition Using the IFN/ENIT- Database (MP, VM), pp. 890–894.
- ICDAR-2003-RadtkeOSW #algorithm #design #multi
- Intelligent Zoning Design Using Multi-Objective Evolutionary Algorithms (PVWR, LESdO, RS, TW), pp. 824–828.
- ICDAR-2003-SchenkerLBK #classification #documentation #graph #web
- Classification of Web Documents Using a Graph Model (AS, ML, HB, AK), pp. 240–244.
- ICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #verification
- A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
- ICDAR-2003-ShiG #detection #documentation #fuzzy #image
- Skew Detection for Complex Document Images Using Fuzzy Runlength (ZS, VG), pp. 715–719.
- ICDAR-2003-SimardSBCC #recognition #segmentation
- Using Character Recognition and Segmentation to Tell Computer from Humans (PYS, RS, JB, JC, IC), pp. 418–423.
- ICDAR-2003-SouzaCNS #assessment #automation #image #quality
- Automatic Filter Selection Using Image Quality Assessment (AS, MC, SN, CYS), p. 508–?.
- ICDAR-2003-TomaiS
- Combination of Type III Digit Recognizers using the Dempster-Shafer Theory of Evidence (CIT, SNS), pp. 854–858.
- ICDAR-2003-UchidaS #recognition
- Handwritten character recognition using elastic matching based on a class-dependent deformation model (SU, HS), pp. 163–167.
- ICDAR-2003-Ueda #pattern matching #verification
- Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
- ICDAR-2003-Wakahara #correlation #recognition
- Shape Matching Using GAT Correlation against Nonlinear Distortion and its Application to Handwritten Numeral Recognition (TW), p. 54–?.
- ICDAR-2003-WangDL #identification #linear
- Writer Identification Using Directional Element Features and Linear Transform (XW, XD, HL), pp. 942–945.
- ICDAR-2003-WendlingT #geometry #recognition
- Recognition of Arrows in Line Drawings based on the Aggregation of Geometric Criteria using the Choquet Integral (LW, ST), pp. 299–303.
- ICDAR-2003-WuA #approach #automation #multi
- Automatic Thresholding of Gray-level Using Multi-stage Approach (SW, AA), pp. 493–497.
- ICDAR-2003-YamazakiNK #markov #modelling #verification
- Text-indicated Writer Verification Using Hidden Markov Models (YY, TN, NK), pp. 329–332.
- ICDAR-2003-YangVN #recognition #scalability #set
- Accelerating Large Character Set Recognition using Pivots (YY, OV, MN), pp. 262–267.
- ICDAR-2003-YouK #approach #network #segmentation #string
- An approach for locating segmentation points of handwritten digit strings using a neural network (DY, GK), p. 142–?.
- ICDAR-2003-ZhangS #analysis #word
- Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
- ICDAR-2003-ZhengLD03a #documentation #identification #image #markov #random
- Text Identification in Noisy Document Images Using Markov Random Field (YZ, HL, DSD), p. 599–?.
- ICDAR-2003-ZouTLL #analysis #online #verification
- On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
- JCDL-2003-HanGMZZF #automation #documentation #metadata
- Automatic Document Metadata Extraction Using Support Vector Machines (HH, CLG, EM, HZ, ZZ, EAF), pp. 37–48.
- PODS-2003-GarofalakisK #correlation #data type #distance #edit distance #xml
- Correlating XML data streams using tree-edit distance embeddings (MNG, AK), pp. 143–154.
- PODS-2003-GrahneT #constraints #query
- Query containment and rewriting using views for regular path queries under constraints (GG, AT), pp. 111–122.
- PODS-2003-HeerenJP
- Optimal indexing using near-minimal space (CH, HVJ, LP), pp. 244–251.
- SIGMOD-2003-DeHaanTCO #encoding #sql #xquery
- A Comprehensive XQuery to SQL Translation using Dynamic Interval Encoding (DD, DT, MPC, MTÖ), pp. 623–634.
- SIGMOD-2003-GotoK #integration #mobile
- Integration of Electronic Tickets and Personal Guide System for Public Transport using Mobile Terminals (KG, YK), pp. 642–646.
- SIGMOD-2003-KimC #adaptation #clustering #feedback #image #named #retrieval
- Qcluster: Relevance Feedback Using Adaptive Clustering for Content-Based Image Retrieval (DHK, CWC), pp. 599–610.
- SIGMOD-2003-KriegelBKPS #set #similarity
- Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects (HPK, SB, PK, MP, MS), pp. 587–598.
- SIGMOD-2003-ZhangDWEMPMDR #multi #named #optimisation #xml
- Rainbow: Multi-XQuery Optimization Using Materialized XML Views (XZ, KD, LW, MES, BM, BP, MM, LD, EAR), p. 671.
- SIGMOD-2003-ZuzartePMCLW
- WinMagic : Subquery Elimination Using Window Aggregation (CZ, HP, WM, QC, LL, KW), pp. 652–656.
- VLDB-2003-HardingLM #named #xml
- XISS/R: XML Indexing and Storage System using RDBMS (PJH, QL, BM), pp. 1073–1076.
- VLDB-2003-MiklauS #encryption
- Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
- VLDB-2003-NieKH #effectiveness #integration #mining #named #statistics
- BibFinder/StatMiner: Effectively Mining and Using Coverage and Overlap Statistics in Data Integration (ZN, SK, TH), pp. 1097–1100.
- VLDB-2003-Schoning #database
- Commercial Use of Database Technology (HS), p. 1034.
- VLDB-2003-WitkowskiBBFGSS #modelling #spreadsheet #sql
- Business Modelling Using SQL Spreadsheets (AW, SB, TB, NF, AG, LS, SS), pp. 1117–1120.
- ITiCSE-2003-BarrosEDPS #programming
- Using lab exams to ensure programming practice in an introductory programming course (JPB, LE, RD, RP, ES), pp. 16–20.
- ITiCSE-2003-Becker03a #programming
- Grading programming assignments using rubrics (KB), p. 253.
- ITiCSE-2003-Cassel
- Using CITIDEL resources to support documenting objectives and outcomes (LNC), p. 255.
- ITiCSE-2003-CasselIKGFLP #education #library
- Using an education oriented digital library to organize and present classes in computing and information (LNC, JI, DK, CLG, EAF, JL, MAPQ), p. 260.
- ITiCSE-2003-DemetriadisTP #learning #multi #student #towards
- A phenomenographic study of students’ attitudes toward the use of multiple media for learning (SND, ET, ASP), pp. 183–187.
- ITiCSE-2003-Fone #education #performance
- Using semiotics to analyze the efficiency of a model in teaching (WF), p. 232.
- ITiCSE-2003-HollowayR #development #programming #student
- Development of a MLE by students for students using extreme programming techniques (JH, MR), p. 225.
- ITiCSE-2003-HuangS #design #education
- Teaching undergraduate software design in a liberal arts environment using RoboCup (TH, FS), pp. 114–118.
- ITiCSE-2003-JulianoCK #architecture #education
- Observations from using two modes of teaching undergraduate computer architecture (BAJ, CHC, EK), p. 248.
- ITiCSE-2003-KnoxCI #education
- Using the NSDL and CITIDEL to enhance teaching (DK, LNC, JI), p. 246.
- ITiCSE-2003-KolasF #game studies #motivation
- Increasing assignment motivation using a game Al tournament (ØK, IF), p. 269.
- ITiCSE-2003-KoldehofePT #case study #distributed #visualisation
- Integrating a simulation-visualisation environment in a basic distributed systems course: a case study using LYDIAN (BK, MP, PT), pp. 35–39.
- ITiCSE-2003-LassCBCPHZ #off the shelf #scalability #tool support
- Tools and techniques for large scale grading using Web-based commercial off-the-shelf software (RNL, CDC, NTB, BWC, JLP, NH, PZ), pp. 168–172.
- ITiCSE-2003-Leska #java #learning #user interface
- Learning to develop GUIs in Java using closed labs (CL), p. 228.
- ITiCSE-2003-MeedenNBK #difference #gender
- Using departmental surveys to assess computing culture: quantifying gender differences in the classroom (LM, TN, DSB, DK), pp. 188–192.
- ITiCSE-2003-NevisonW #case study #design pattern #education #java
- Teaching objects early and design patterns in Java using case studies (CN, BW), pp. 94–98.
- ITiCSE-2003-PapadopoulosP #algorithm #authoring #education
- Using ToolBook authoring tool to facilitate the teaching of algorithms (GP, HMP), p. 277.
- ITiCSE-2003-PatersonH #database #education #ide #java #object-oriented
- Teaching Java: using an object-oriented database and the BlueJ IDE (JHP, JH), p. 273.
- ITiCSE-2003-SchwarmV #assessment #concept #elicitation #information management #student
- Making connections: using classroom assessment to elicit students’ prior knowledge and construction of concepts (SES, TV), pp. 65–69.
- ITiCSE-2003-Sojka03a #agile #evaluation #multi #testing #tex
- Rapid evaluation using multiple choice tests and TeX (PS), p. 265.
- ITiCSE-2003-Sojka03b #education #interactive #javascript
- Interactive teaching materials in PDF using JavaScript (PS), p. 275.
- CSMR-2003-CasanovaSJ #component #development #evolution #library
- Supporting Evolution in Component-Based Development Using Component Libraries (MC, RVDS, VJ), pp. 123–132.
- CSMR-2003-ClarkeMG #identification #object-oriented #taxonomy
- Using a Taxonomy Tool to Identify Changes in OO Softwar (PJC, BAM, JPG), pp. 213–222.
- CSMR-2003-JinCD #adaptation #concept #integration #reverse engineering #tool support #transaction
- Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter (DJ, JRC, TRD), pp. 399–408.
- CSMR-2003-Latendresse #c #c++ #evaluation #performance #preprocessor #symbolic computation
- Fast Symbolic Evaluation of C/C++ Preprocessing Using Conditional Value (ML), p. 170–?.
- CSMR-2003-MoeCP #distributed #refinement
- Using Observation and Refinement to Improve Distributed Systems Test (JM, DAC, MP), pp. 153–159.
- CSMR-2003-RaoS #empirical #maintenance #outsourcing
- Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
- CSMR-2003-SaeedMBHS #algorithm #clustering
- Software Clustering Techniques and the Use of Combined Algorithm (MS, OM, HAB, SZH, SMS), pp. 301–306.
- CSMR-2003-SciascioDMP #design #maintenance #model checking #web
- Web Applications Design and Maintenance Using Symbolic Model Checking (EDS, FMD, MM, GP), pp. 63–72.
- CSMR-2003-TourweM #identification #logic #metaprogramming #refactoring
- Identifying Refactoring Opportunities Using Logic Meta Programming (TT, TM), pp. 91–100.
- ICSM-2003-AntoniolP #information management #library
- Library Miniaturization Using Static and Dynamic Information (GA, MDP), p. 235–?.
- ICSM-2003-BaldassarreCV #estimation
- Software Renewal Projects Estimation Using Dynamic Calibration (MTB, DC, GV), pp. 105–115.
- ICSM-2003-JohnsonD #experience #information management #legacy #reverse engineering
- Experience in developing interoperations among legacy information systems using partial reverse engineering (MJ, CNGD), pp. 369–372.
- ICSM-2003-LovrekJKLCHDL #maintenance
- Improving Software Maintenance by using Agent-based Remote Maintenance Shell (IL, GJ, MK, IL, AC, DH, SD, OL), pp. 440–449.
- ICSM-2003-MensPG #maintenance #source code
- Using Intentional Source-Code Views to Aid Software Maintenance (KM, BP, SG), pp. 169–178.
- ICSM-2003-Mul #internet #legacy
- Making maximum use of legacy code: Transavia internet booking engine (CM), p. 466.
- ICSM-2003-QuahT #metric #network #object-oriented #predict #quality
- Application of Neural Networks for Software Quality Prediction Using Object-Oriented Metrics (TSQ, MMTT), p. 116–?.
- IWPC-2003-AntoniolPM #abstract syntax tree #ocl
- YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs (GA, MDP, EM), pp. 13–22.
- IWPC-2003-ChiricotaJM #clustering #component #graph
- Software Components Capture Using Graph Clustering (YC, FJ, GM), pp. 217–226.
- IWPC-2003-Cordy #agile #semiparsing #source code #xml
- Generalized Selective XML Markup of Source Code Using Agile Parsing (JRC), pp. 144–153.
- IWPC-2003-CoxC #analysis #approximate #semiparsing
- Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
- IWPC-2003-GschwindOP #comprehension #runtime
- Using Run-Time Data for Program Comprehension (TG, JO, MP), pp. 245–250.
- IWPC-2003-MarcusFM #3d #analysis #comprehension #visualisation
- Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
- IWPC-2003-RiccaT #clustering #migration #web
- Using Clustering to Support the Migration from Static to Dynamic Web Pages (FR, PT), pp. 207–216.
- IWPC-2003-RillingK #complexity #comprehension #identification #metric #slicing
- Identifying Comprehension Bottlenecks Using Program Slicing and Cognitive Complexity Metric (JR, TK), pp. 115–124.
- SCAM-2003-GuoCD #java
- Unique Renaming of Java Using Source Transformation (XG, JRC, TRD), pp. 151–160.
- SCAM-2003-Leitao #2d #detection
- Detection of Redundant Code using R2D2 (AML), pp. 183–192.
- SCAM-2003-Verhoef #analysis #multi #source code
- Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
- WCRE-2003-BodhuinGT #migration #web
- Migration of non-decomposable software systems to the Web using screen proxies (TB, EG, MT), pp. 165–174.
- WCRE-2003-DahnM #c #program transformation #source code
- Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
- WCRE-2003-ZouG #analysis #detection
- Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
- CIAA-2003-FerroDFL #programming #robust #semiparsing
- Robust Parsing Using Dynamic Programming (MVF, VMD, JVF, LRL), pp. 258–268.
- CIAA-2003-Fritz #automaton #linear #logic #simulation
- Constructing Büchi Automata from Linear Temporal Logic Using Simulation Relations for Alternating Büchi Automata (CF), pp. 35–48.
- CIAA-2003-XieLD #complexity #equation #linear #problem
- New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (GX, CL, ZD), pp. 163–175.
- FME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security
- SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
- FME-2003-Henderson #correctness #proving
- Proving the Correctness of Simpson’s 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method (NH), pp. 244–263.
- FME-2003-Lettrari #abstraction #heuristic #object-oriented
- Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems (ML), pp. 462–481.
- FME-2003-StidolphW #formal method
- Managerial Issues for the Consideration and Use of Formal Methods (DCS, EJWJ), pp. 170–186.
- SEFM-2003-BeckertS #verification
- Program Verification Using Change Information (BB, PHS), p. 91–?.
- SEFM-2003-GawanmehTW #design #verification
- Formal Verification of ASM Designs Using the MDG Tool (AG, ST, KW), pp. 210–219.
- SEFM-2003-McCombS #animation #specification
- Animation of Object-Z Specifications Using a Z Animator (TM, GS), p. 191–?.
- SEFM-2003-Sangiorgi #mobile #process
- Taming Mobile Processes Using Types (DS), p. 64–?.
- IFL-2003-Choppella #equation #polymorphism #re-engineering
- Polymorphic Type Reconstruction Using Type Equations (VC), pp. 53–68.
- DiGRA-2003-ChristensenJJ #hybrid #usability
- Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar (LJC, TTYJ, AHJ).
- DiGRA-2003-KirriemuirM #game studies #video
- Use of Computer and Video Games in the Classroom (JK, AM).
- AGTIVE-2003-DottiRS #analysis #behaviour #fault #graph grammar #specification
- Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
- AGTIVE-2003-Rotschke #graph transformation #re-engineering
- Re-engineering a Medical Imaging System Using Graph Transformations (TR), pp. 185–201.
- CHI-2003-ChiRSWRCRDCC #automation #usability #web
- The bloodhound project: automating discovery of web usability issues using the InfoScent simulator (EHhC, AR, GS, AW, CR, CC, ER, BD, JC, SBC), pp. 505–512.
- CHI-2003-ForlizziLH
- The kinedit system: affective messages using dynamic texts (JF, JCL, SEH), pp. 377–384.
- CHI-2003-FurnasQ #interactive
- Using pixel rewrites for shape-rich interaction (GWF, YQ), pp. 369–376.
- CHI-2003-GrossmanBS #interface
- An interface for creating and manipulating curves using a high degree-of-freedom curve input device (TG, RB, KS), pp. 185–192.
- CHI-2003-VertegaalWSC #named #video
- GAZE-2: conveying eye contact in group video conferencing using eye-controlled camera direction (RV, IW, CS, CC), pp. 521–528.
- CHI-2003-YamauchiWB
- Information use of service technicians in difficult cases (YY, JW, DGB), pp. 81–88.
- VISSOFT-2003-WheeldonCK #comprehension #named
- AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 48–52.
- VISSOFT-2003-WheeldonCK1 #comprehension #named
- AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 56–57.
- CAiSE-2003-DammHG #ontology
- Translating and Searching Service Descriptions Using Ontologies (DD, FH, AG), pp. 308–323.
- EDOC-2003-DebusmannSSK #monitoring
- Unified Service Level Monitoring using CIM (MD, MS, MS, RK), pp. 76–85.
- EDOC-2003-TrastourPC #integration #semantics #web
- Using Semantic Web Technology to Enhance Current Business-to-Business Integration Approaches (DT, CP, DC), pp. 222–231.
- ICEIS-v1-2003-FatoohiG #distributed #execution #web
- A Distributed Job Execution Environment Using Asynchronous Messaging and Web Technologies (RF, NG), pp. 246–251.
- ICEIS-v1-2003-LeongL #approach #component #development #generative #named
- REPCOM: A Customisable Report Generator Component System Using XML-Driven, Component-Based Development Approach (CHL, SPL), pp. 499–504.
- ICEIS-v1-2003-MedcraftSB #integration #named
- DIA: Data Integration Using Agents (PSM, US, CdSB), pp. 79–86.
- ICEIS-v1-2003-Seriai #named #object-oriented #query
- QUEROM: An Object-Oriented Model to Rewriting Query Using Views (AS), pp. 389–395.
- ICEIS-v1-2003-SilvaSL
- Updating GIS Data Using Personal Digital Assistants (HS, AVS, JCL), pp. 566–569.
- ICEIS-v1-2003-ZarourBS
- Using Information Technologies for Managing Cooperative Information Agent-Based Systems (NZ, MB, LS), pp. 430–440.
- ICEIS-v2-2003-Abdel-WahaabBHH #3d #invariant #network #recognition
- Three-Dimensional Object Recognition Using Support Vector Machine Neural Network Based on Moment Invariant Features (MSAW, SFB, ASH, DMH), pp. 583–588.
- ICEIS-v2-2003-BaesensMBVS
- Building Intelligent Credit Scoring Systems Using Decision Tables (BB, CM, MDB, JV, RS), pp. 19–25.
- ICEIS-v2-2003-CamposGM #abduction #network #probability
- Partial Abductive Inference in Bayesian Networks By Using Probability Trees (LMdC, JAG, SM), pp. 83–91.
- ICEIS-v2-2003-ChadesSC #markov #multi #process
- Planning Cooperative Homogeneous Multiagent Systems Using Markov Decision Processes (IC, BS, FC), pp. 426–429.
- ICEIS-v2-2003-Drori #documentation #identification #information management #research
- Using Knowledge Engineering Tool to Identify the Subject of a Document — Research Results (OD), pp. 442–445.
- ICEIS-v2-2003-HattoriKY03a #fourier
- Extraction of Feeling Information From Characters Using a Modified Fourier Transform (TH, HK, TY), pp. 461–464.
- ICEIS-v2-2003-HogoLS #clustering #network
- Conventional Versus Interval Clustering Using Kohonen Networks (MH, PL, MS), pp. 250–257.
- ICEIS-v2-2003-KeeniGS #learning #network #on the #performance
- On Fast Learning of Neural Networks Using Back Propagation (KK, KG, HS), pp. 266–271.
- ICEIS-v2-2003-KuusikL #approach #data mining #mining
- An Approach of Data Mining Using Monotone Systems (RK, GL), pp. 482–485.
- ICEIS-v2-2003-MendesA
- Using the I. S. as a (Dis)Organization Gauge (PM, PA), pp. 171–176.
- ICEIS-v2-2003-NetoCMG #analysis #network #simulation
- Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
- ICEIS-v2-2003-OrtegaDA #design #evolution
- Using Grammatical Evolution to Design Curves with a Given Fractal Dimension (AO, ALAD, MA), pp. 395–398.
- ICEIS-v2-2003-SalemSA #algorithm #self
- Improving Self-Organizing Feature Map (SOFM) Training Algorithm Using K-Means Initialization (ABMS, MMS, AFA), pp. 399–405.
- ICEIS-v2-2003-SilvaIE #analysis #database #identification #information management
- Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
- ICEIS-v2-2003-TchikouG #process
- Production Activity Control Using Autonomous Agents (MT, EG), pp. 365–371.
- ICEIS-v2-2003-TolbaMGA #algorithm #analysis #image #multi #segmentation
- MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
- ICEIS-v2-2003-Zarri #information management #representation #semantics #web
- Semantic Annotations and Semantic Web Using NKRL (Narrative Knowledge Representation Language) (GPZ), pp. 387–394.
- ICEIS-v2-2003-ZhengE #automation #documentation #summary #web
- Using Specialized Knowledge in Automated Web Document Summarization (ZZ, GE), pp. 579–582.
- ICEIS-v3-2003-AllouiMO #approach #architecture #generative #modelling
- Modelling and Generating Business-To-Business Applications Using an Architecture Description Language — Based Approach (IA, KM, FO), pp. 201–210.
- ICEIS-v3-2003-CarchioloLM #specification #workflow
- Using Lotos in Workflow Specification (VC, AL, MM), pp. 364–369.
- ICEIS-v3-2003-CaveroMVC #modelling #query #uml
- Modelling ORDB Queries Using UML (JMC, EM, BV, CC), pp. 535–539.
- ICEIS-v3-2003-DarrasGP #deployment #enterprise
- Using Model of Enterprise and Software for Deployment of ERP Software (FD, PG, HP), pp. 558–565.
- ICEIS-v3-2003-Honkaranta #content management #documentation #enterprise #lens
- Developing Document and Content Management in Enterprises Using a “Genre Lens” (AH), pp. 334–340.
- ICEIS-v3-2003-MangoldRM #named #semistructured data
- Föderal: Management of Engineering Data Using a Semistructured Data Model (CM, RR, BM), pp. 382–389.
- ICEIS-v3-2003-MouratidisMGG #information management #requirements #security
- Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
- ICEIS-v3-2003-YamaguchiWS #design #petri net #reliability
- A High Reliability Design for Nfs Server Software By Using an Extended Petri Net (SY, KW, YS), pp. 498–502.
- ICEIS-v4-2003-BalavijendranCM #experience #personalisation
- Enhancing News Reading Experience Through Personalization of News Content and Services Using Intelligent Agents (LB, SNC, AKM), pp. 404–407.
- ICEIS-v4-2003-KoideNKGM #scalability
- Operation-Support System for Large-Scale System Using Information Technology (SK, HN, YK, AG, RM), pp. 430–437.
- ICEIS-v4-2003-LimP #clustering #web
- Dynamically Reconstructive Web Server Cluster Using a Hierarchical Grouping Mechanism (SiL, MSP), pp. 271–279.
- ICEIS-v4-2003-LopesO #distributed
- Application Scenarios for Distributed Management Using Snmp Expressions (RPL, JLO), pp. 49–54.
- ICEIS-v4-2003-NagaoK #architecture #evaluation #web #web service
- Evaluation of Mainframe Computer System Using Web Service Architecture (MN, YK), pp. 460–463.
- ICEIS-v4-2003-Oriogun #analysis #case study #online #re-engineering #reliability
- Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
- ICEIS-v4-2003-PennacchioR #automation #e-commerce #mobile
- Automatic E-Commerce Using a Mobile Agents Model (SP, FMR), pp. 468–472.
- ICEIS-v4-2003-SonneckM #graph #personalisation #web
- One-To-One Personalization of Web Applications Using a Graph Based Model (GS, TAM), pp. 95–102.
- CIKM-2003-BeitzelJCG #automation #evaluation #taxonomy
- Using titles and category names from editor-driven taxonomies for automatic evaluation (SMB, ECJ, AC, DAG), pp. 17–23.
- CIKM-2003-BillerbeckSWZ #query
- Query expansion using associated queries (BB, FS, HEW, JZ), pp. 2–9.
- CIKM-2003-BroderCHSZ #evaluation #performance #process #query #retrieval
- Efficient query evaluation using a two-level retrieval process (AZB, DC, MH, AS, JYZ), pp. 426–434.
- CIKM-2003-CampbellMCD #email #identification
- Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
- CIKM-2003-LinK #mining #web
- Question answering from the web using knowledge annotation and knowledge mining techniques (JJL, BK), pp. 116–123.
- CIKM-2003-MayfieldMPP
- Lattice-based tagging using support vector machines (JM, PM, CDP, CP), pp. 303–308.
- CIKM-2003-OgrasF #approximate #reduction
- Dimensionality reduction using magnitude and shape approximations (ÜYO, HF), pp. 99–107.
- CIKM-2003-RadevT #evaluation #summary
- Summarization evaluation using relative utility (DRR, DT), pp. 508–511.
- CIKM-2003-ZhangOR #learning
- Learning cross-document structural relationships using boosting (ZZ, JO, DRR), pp. 124–130.
- ECIR-2003-Bigi #categorisation #distance
- Using Kullback-Leibler Distance for Text Categorization (BB), pp. 305–319.
- ECIR-2003-CachedaCGV #data type #hybrid #optimisation #strict #web
- Optimization of Restricted Searches in Web Directories Using Hybrid Data Structures (FC, VC, CG, ÁV), pp. 436–451.
- ECIR-2003-XuYTXW #classification
- Representative Sampling for Text Classification Using Support Vector Machines (ZX, KY, VT, XX, JW), pp. 393–407.
- ICML-2003-Bar-HillelHSW #distance #equivalence #learning
- Learning Distance Functions using Equivalence Relations (ABH, TH, NS, DW), pp. 11–18.
- ICML-2003-BrownW #ambiguity #composition #learning #network
- The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods (GB, JLW), pp. 67–74.
- ICML-2003-Elkan #difference
- Using the Triangle Inequality to Accelerate k-Means (CE), pp. 147–153.
- ICML-2003-Harrington #algorithm #collaboration #online #ranking
- Online Ranking/Collaborative Filtering Using the Perceptron Algorithm (EFH), pp. 250–257.
- ICML-2003-LachicheF #classification #multi #probability
- Improving Accuracy and Cost of Two-class and Multi-class Probabilistic Classifiers Using ROC Curves (NL, PAF), pp. 416–423.
- ICML-2003-LeeL #learning
- Learning with Positive and Unlabeled Examples Using Weighted Logistic Regression (WSL, BL), pp. 448–455.
- ICML-2003-LiWL #classification #generative #keyword #probability
- Text Classification Using Stochastic Keyword Generation (CL, JRW, HL), pp. 464–471.
- ICML-2003-McGovernJ #identification #learning #multi #predict #relational
- Identifying Predictive Structures in Relational Data Using Multiple Instance Learning (AM, DJ), pp. 528–535.
- ICML-2003-Mesterharm #algorithm #multi
- Using Linear-threshold Algorithms to Combine Multi-class Sub-experts (CM), pp. 544–551.
- ICML-2003-PerkinsT #feature model #online
- Online Feature Selection using Grafting (SP, JT), pp. 592–599.
- ICML-2003-ZhuGL #learning
- Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions (XZ, ZG, JDL), pp. 912–919.
- KDD-2003-AliK #clustering #divide and conquer #web
- Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
- KDD-2003-BilenkoM #adaptation #detection #metric #similarity #string
- Adaptive duplicate detection using learnable string similarity measures (MB, RJM), pp. 39–48.
- KDD-2003-CasaliCL #semantics
- Extracting semantics from data cubes using cube transversals and closures (AC, RC, LL), pp. 69–78.
- KDD-2003-DuZ #data mining #mining #privacy #random
- Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
- KDD-2003-EirinakiVV #named #personalisation #process #semantics #taxonomy #web
- SEWeP: using site semantics and a taxonomy to enhance the Web personalization process (ME, MV, IV), pp. 99–108.
- KDD-2003-SripadaRHY #generative #summary
- Generating English summaries of time series data using the Gricean maxims (SS, ER, JH, JY), pp. 187–196.
- KDD-2003-SteinbachTKKP #clustering
- Discovery of climate indices using clustering (MS, PNT, VK, SAK, CP), pp. 446–455.
- KDD-2003-TaoMF #framework #mining
- Weighted Association Rule Mining using weighted support and significance framework (FT, FM, MMF), pp. 661–666.
- KDD-2003-WangFYH #classification #concept #data type #mining
- Mining concept-drifting data streams using ensemble classifiers (HW, WF, PSY, JH), pp. 226–235.
- KDD-2003-YuYH #clustering #scalability #set
- Classifying large data sets using SVMs with hierarchical clusters (HY, JY, JH), pp. 306–315.
- KDD-2003-ZakiG #mining #performance
- Fast vertical mining using diffsets (MJZ, KG), pp. 326–335.
- MLDM-2003-Barsi #graph #self
- Neural Self-Organization Using Graphs (AB), pp. 343–352.
- MLDM-2003-BicegoMF #clustering #markov #modelling #sequence #similarity
- Similarity-Based Clustering of Sequences Using Hidden Markov Models (MB, VM, MATF), pp. 86–95.
- MLDM-2003-DeventerDNK #modelling #testing
- Using Test Plans for Bayesian Modeling (RD, JD, HN, OK), pp. 307–316.
- MLDM-2003-KimJ #network
- Using Bayesian Networks to Analyze Medical Data (ICK, YGJ), pp. 317–327.
- MLDM-2003-LazliS #fuzzy #logic #probability #recognition #speech
- Connectionist Probability Estimators in HMM Arabic Speech Recognition Using Fuzzy Logic (LL, MS), pp. 379–388.
- MLDM-2003-MagnussonV #network #sequence #visualisation
- Visualizing Sequences of Texts Using Collocational Networks (CM, HV), pp. 276–283.
- MLDM-2003-MiteranBB #approximate #bound #classification #image #realtime #segmentation
- Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
- MLDM-2003-TanakaU #analysis #component #multi #principle
- Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
- SEKE-2003-BarberL #architecture #framework #specification
- Specifying and Analyzing Agent Architectures using the Agent Competency Framework (KSB, DNL), pp. 232–239.
- SEKE-2003-Cebulla #adaptation #architecture #reasoning #variability
- Reasoning about Variability and structural Adaptation in Sociotechnical Systems Using Dynamic Architectures (MC), pp. 406–413.
- SEKE-2003-GomesPPSCFB #design pattern #reuse
- Selection and Reuse of Software Design Patterns Using CBR and WordNet (PG, FCP, PP, NS, PC, JLF, CB), pp. 289–296.
- SEKE-2003-GomesPPSCFB03a #diagrams #reuse #uml
- Case-Based Reuse of UML Diagrams (PG, FCP, PP, NS, PC, JLF, CB), pp. 335–339.
- SEKE-2003-JiangH
- Exploring UDDI Registries Using Modified OFDAV Browser (BJ, MLH), pp. 119–123.
- SEKE-2003-NetiniantiE #approach #aspect-oriented #verification
- Adding Verification Property of Inter-Processes Using Aspect-Oriented Approach (PN, TE), pp. 54–60.
- SEKE-2003-Ochs #assessment #off the shelf #requirements #risk management
- Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
- SEKE-2003-PeriniS #design
- Dealing with software design issues using an Agent-Oriented methodology (AP, AS), pp. 224–231.
- SEKE-2003-SouzaORGR #consistency #detection #modelling #nondeterminism #re-engineering
- Using Critiquing Systems for Inconsistency Detection in Software Engineering Models (CRBdS, HLRO, CRPdR, KMG, DFR), pp. 196–203.
- SEKE-2003-ThwinQ #maintenance #metric #network #object-oriented
- Application of Neural Networks for Estimating Software Maintainability Using Object-Oriented Metrics (MMTT, TSQ), pp. 69–73.
- SIGIR-2003-Anick #feedback #refinement #web
- Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
- SIGIR-2003-BeitzelJCGF #automation #evaluation #retrieval #web
- Using manually-built web directories for automatic evaluation of known-item retrieval (SMB, ECJ, AC, DAG, OF), pp. 373–374.
- SIGIR-2003-Bennett #classification #probability #symmetry
- Using asymmetric distributions to improve text classifier probability estimates (PNB), pp. 111–118.
- SIGIR-2003-Broder #graph #modelling #web
- Keynote Address — exploring, modeling, and using the web graph (AZB), p. 1.
- SIGIR-2003-BruzaS #comparison #dependence #modelling #probability
- A comparison of various approaches for using probabilistic dependencies in language modeling (PB, DS), pp. 419–420.
- SIGIR-2003-ChoiK #concept #topic
- Topic distillation using hierarchy concept tree (IC, MK), pp. 371–372.
- SIGIR-2003-JeonLM #automation #image #modelling #retrieval
- Automatic image annotation and retrieval using cross-media relevance models (JJ, VL, RM), pp. 119–126.
- SIGIR-2003-JiZ #independence #programming #segmentation
- Domain-independent text segmentation using anisotropic diffusion and dynamic programming (XJ, HZ), pp. 322–329.
- SIGIR-2003-LinNNNSTNA #multimodal #video
- User-trainable video annotation using multimodal cues (CYL, MRN, AN, CN, JRS, BLT, HJN, WHA), pp. 403–404.
- SIGIR-2003-PintoMWC #random
- Table extraction using conditional random fields (DP, AM, XW, WBC), pp. 235–242.
- SIGIR-2003-TeevanK #analysis #development #empirical #exponential #probability #retrieval
- Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
- SIGIR-2003-TsaiMT #classification #hybrid #image #network
- Image classification using hybrid neural networks (CFT, KM, JT), pp. 431–432.
- SIGIR-2003-YangCWK
- Structured use of external knowledge for event-based open domain question answering (HY, TSC, SW, CKK), pp. 33–40.
- SIGIR-2003-YuJR #keyword #query #xml
- Querying XML using structures and keywords in timber (CY, HVJ, DRR), p. 463.
- SIGIR-2003-ZhangL #classification
- Question classification using support vector machines (DZ, WSL), pp. 26–32.
- UML-2003-DologN #adaptation #generative #navigation #sequence #uml #xmi
- Using UML and XMI for Generating Adaptive Navigation Sequences in Web-Based Systems (PD, WN), pp. 205–219.
- UML-2003-StraetenMSJ #consistency #logic #maintenance #modelling #uml
- Using Description Logic to Maintain Consistency between UML Models (RVDS, TM, JS, VJ), pp. 326–340.
- OOPSLA-2003-TipKB #constraints #refactoring
- Refactoring for generalization using type constraints (FT, AK, DB), pp. 13–26.
- AdaEurope-2003-AlvesJH #ada #xml
- The Use of Ada, GNAT.Spitbol, and XML in the Sol-Eu-Net Project (MAA, AJ, MH), pp. 196–207.
- AdaEurope-2003-BliebergerB #evaluation #symbolic computation
- Eliminating Redundant Range Checks in GNAT Using Symbolic Evaluation (JB, BB), pp. 153–167.
- AdaEurope-2003-JeppuKS #ada #realtime #safety #testing
- Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
- AdaEurope-2003-Mikkonen #case study #experience #specification #tool support
- Experiences on Developing and Using a Tool Support for Formal Specification (TM), pp. 297–308.
- AdaEurope-2003-MinguetGFL #metric
- Getting System Metrics Using POSIX Tracing Services (AEM, VLG, AGF, ACiL), pp. 220–231.
- AdaEurope-2003-OrtizAPS #architecture #case study #evaluation #performance #realtime #uml
- A Case Study in Performance Evaluation of Real-Time Teleoperation Software Architectures Using UML-MAST (FJO, BÁ, JAP, PS), pp. 417–428.
- LOPSTR-2003-BerghammerM #algorithm #approximate #development #verification
- Formal Development and Verification of Approximation Algorithms Using Auxiliary Variables (RB, MMO), pp. 59–74.
- LOPSTR-2003-LehmannL #generative #induction #proving #theorem proving
- Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
- PADL-2003-ErdemLNR #programming #set
- Reconstructing the Evolutionary History of Indo-European Languages Using Answer Set Programming (EE, VL, LN, DR), pp. 160–176.
- PLDI-2003-BerndlLQHU #analysis #points-to
- Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
- POPL-2003-GulwaniN #random
- Discovering affine equalities using random interpretation (SG, GCN), pp. 74–84.
- SAS-2003-HermenegildoPBL #abstract interpretation #development #preprocessor
- Program Development Using Abstract Interpretation (And The Ciao System Preprocessor) (MVH, GP, FB, PLG), pp. 127–152.
- SAS-2003-KremenekE #approximate #named #static analysis #statistics
- Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations (TK, DRE), pp. 295–315.
- REFSQ-J-2002-CrookIN03 #modelling #policy #requirements
- Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
- RE-2003-Barnes #ambiguity #convergence #design #process #requirements
- Using Convergent Design Processes to Surface Hidden Ambiguity and Conflict in Requirements (RJB), p. 281.
- RE-2003-BushF #assessment #requirements
- Requirements Stability Assessment Using Scenarios (DB, AF), pp. 23–32.
- RE-2003-RifautMMPSLV #analysis #formal method #named #specification #tool support
- FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
- RE-2003-SenguptaC #modelling #requirements #sequence chart
- Refinement-Based Requirements Modeling Using TriggeredMessage Sequence Charts (BS, RC), pp. 95–104.
- ASE-2003-AbergLSMM #aspect-oriented #automation #evolution #kernel #logic #on the
- On the automatic evolution of an OS kernel using temporal logic and AOP (RAÅ, JLL, MS, GM, AFLM), pp. 196–204.
- ASE-2003-ChoiH #abstraction #model checking #reduction #requirements #specification
- Model Checking Software Requirement Specifications using Domain Reduction Abstraction (YC, MPEH), pp. 314–317.
- ASE-2003-DiazTB #automation #metaheuristic #testing
- Automated Software Testing Using a Metaheuristic Technique Based on Tabu Search (ED, JT, RB), pp. 310–313.
- ASE-2003-Moore #communication #requirements #user interface
- Communicating Requirements Using End-User GUI Constructions with Argumentation (JMM), pp. 360–363.
- ASE-2003-ShlyakhterSJST #debugging #declarative #modelling #satisfiability
- Debugging Overconstrained Declarative Models Using Unsatisfiable Cores (IS, RS, DJ, MS, MT), pp. 94–105.
- ESEC-FSE-2003-CangussuDM #approach #monitoring #process #statistics #testing
- Monitoring the software test process using statistical process control: a logarithmic approach (JWC, RAD, APM), pp. 158–167.
- ESEC-FSE-2003-UchitelKM #behaviour #lts
- Behaviour model elaboration using partial labelled transition systems (SU, JK, JM), pp. 19–27.
- ESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
- ICSE-2003-BagertM #education #process #re-engineering
- Using a Web-Based Project Process Throughout the Software Engineering Curriculum (DJB, SAM), pp. 634–640.
- ICSE-2003-Kylmakoski #agile #authoring #documentation #performance
- Efficient Authoring of Software Documentation Using RaPiD7 (RK), pp. 255–261.
- ICSE-2003-MarcusM #semantics #traceability
- Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing (AM, JIM), pp. 125–137.
- ICSE-2003-SimEH #benchmark #challenge #metric #re-engineering #research
- Using Benchmarking to Advance Research: A Challenge to Software Engineering (SES, SME, RCH), pp. 74–83.
- ICSE-2003-ValettoK #adaptation #coordination #process
- Using Process Technology to Control and Coordinate Software Adaptation (GV, GEK), pp. 262–273.
- SAC-2003-CanWWS #3d #java #named #performance #visualisation
- FPV: Fast Protein Visualization Using Java 3D (TC, YW, YFW, JS), pp. 88–95.
- SAC-2003-Cerrito #estimation #kernel #visualisation
- Data Visualization Using Kernel Density Estimation to Examine Patterns of Physician Practice (PBC), pp. 275–279.
- SAC-2003-Gee #semantics
- Using Latent Semantic Indexing to Filter Spam (KRG), pp. 460–464.
- SAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance
- ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
- SAC-2003-KaramHGR #evaluation #image #retrieval
- Enhancement of Wavelet-Based Medical Image Retrieval Through Feature Evaluation Using an Information Gain Measure (OHK, AMH, SG, SR), pp. 220–226.
- SAC-2003-KimP #replication #xml #xquery
- Xquery Speedup Using Replication in Mapping XML into Relations (JK, SP), pp. 536–543.
- SAC-2003-MaI
- Long Time Step Molecular Dynamics using Targeted Langevin Stabilization (QM, JAI), pp. 178–182.
- SAC-2003-NaganumaTM #3d #estimation #image #multi
- Estimation of 3D Shape and Reflectance using Multiple Moire Images and Shading Model (SN, NT, AM), pp. 943–950.
- SAC-2003-NittoGS #multi #web
- Using Agents for Multi-target Search on the Web (EDN, CG, PS), pp. 828–833.
- SAC-2003-Wainer #hardware #interactive #standard #visualisation
- Interactive Computation and Visualization of Fetch Using Standard Computer Graphics Hardware (MW), pp. 961–965.
- SAC-2003-Weyuker #testing
- Using Operational Distributions to Judge Testing Progress (EJW), pp. 1118–1122.
- SAC-2003-XiangYSRS #quantifier
- Quantification of Trabecular Bone Mass and Orientation Using Gabor Wavelets (YX, VY, JS, TR, MBS), pp. 183–188.
- SAC-2003-YangH #classification #data flow #image
- Image Texture Classification Using Datagrams and Characteristic Views (SY, CCH), pp. 22–26.
- SAC-2003-YuNPC #classification #on the #testing
- On the Use of the Classification-Tree Method by Beginning Software Testers (YTY, SPN, PLP, TYC), pp. 1123–1127.
- SAC-2003-ZhuHY #network #web
- Recognizing the Relations between Web Pages Using Artificial Neural Network (XZ, SH, YY), pp. 1217–1221.
- GPCE-2003-CalcagnoTHL #abstract syntax tree #implementation #multi
- Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection (CC, WT, LH, XL), pp. 57–76.
- CC-2003-GagnonH #bytecode #effectiveness #java #sequence #thread
- Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences (EG, LJH), pp. 170–184.
- CC-2003-JohnsonM #dependence #graph
- Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
- CC-2003-LhotakH #analysis #java #points-to #scalability
- Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
- CC-2003-Reeuwijk #agile #compilation #robust
- Rapid and Robust Compiler Construction Using Template-Based Metacompilation (KvR), pp. 247–261.
- CGO-2003-ChenHC #hardware #monitoring #performance
- Dynamic Trace Selection Using Performance Monitoring Hardware Sampling (HC, WCH, DyC), pp. 79–90.
- CGO-2003-DehnertGBJKKM #adaptation #challenge
- The Transmeta Code Morphing — Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges (JCD, BG, JPB, RJ, TK, AK, JM), pp. 15–24.
- CGO-2003-LinCHY
- Speculative Register Promotion Using Advanced Load Address Table (ALAT) (JL, TC, WCH, PCY), pp. 125–134.
- DAC-2003-AlpertLKD #metric
- Delay and slew metrics using the lognormal distribution (CJA, FL, CVK, AD), pp. 382–385.
- DAC-2003-ClarkeKY #behaviour #bound #c #consistency #model checking #source code
- Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
- DAC-2003-CroixW #analysis #modelling
- Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
- DAC-2003-DescampsBGIP #design #network
- Design of a 17-million gate network processor using a design factory (GED, SB, SG, SI, AP), pp. 844–849.
- DAC-2003-FineZ #functional #generative #network #testing #verification
- Coverage directed test generation for functional verification using bayesian networks (SF, AZ), pp. 286–291.
- DAC-2003-GadN #congruence #order #reduction
- Model order reduction of nonuniform transmission lines using integrated congruence transform (EG, MSN), pp. 238–243.
- DAC-2003-HuangC #embedded #framework #verification
- Using embedded infrastructure IP for SOC post-silicon verification (YH, WTC), pp. 674–677.
- DAC-2003-LauP #algorithm #design
- Fractional-N frequency synthesizer design at the transfer function level using a direct closed loop realization algorithm (CYL, MHP), pp. 526–531.
- DAC-2003-LeeCHY #multi #scalability
- Multilevel floorplanning/placement for large-scale modules using B*-trees (HCL, YWC, JMH, HHY), pp. 812–817.
- DAC-2003-LiYRP #generative #markov
- A scan BIST generation method using a markov source and partial bit-fixing (WL, CY, SMR, IP), pp. 554–559.
- DAC-2003-MishchenkoS #composition #functional #scalability
- Large-scale SOP minimization using decomposition and functional properties (AM, TS), pp. 149–154.
- DAC-2003-NohlGBALSM #architecture #encoding #modelling #synthesis
- Instruction encoding synthesis for architecture exploration using hierarchical processor models (AN, VG, GB, AH, RL, OS, HM), pp. 262–267.
- DAC-2003-OMahonyYHW #design #network
- Design of a 10GHz clock distribution network using coupled standing-wave oscillators (FO, CPY, MH, SSW), pp. 682–687.
- DAC-2003-QinC #reduction
- Realizable parasitic reduction using generalized Y-Delta transformation (ZQ, CKC), pp. 220–225.
- DAC-2003-SehgalIKC #multi #reduction
- Test cost reduction for SOCs using virtual TAMs and lagrange multipliers (AS, VI, MDK, KC), pp. 738–743.
- DAC-2003-SoDH #behaviour #design #synthesis #tool support
- Using estimates from behavioral synthesis tools in compiler-directed design space exploration (BS, PCD, MWH), pp. 514–519.
- DAC-2003-Tahoori #satisfiability #testing
- Using satisfiability in application-dependent testing of FPGA interconnects (MBT), pp. 678–681.
- DAC-2003-TasiranYB #model checking #monitoring #simulation #specification
- Using a formal specification and a model checker to monitor and direct simulation (ST, YY, BB), pp. 356–361.
- DAC-2003-VasudevanR
- Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique (VV, MR), pp. 538–541.
- DAC-2003-WangM #multi #network #optimisation #power management
- On-chip power supply network optimization using multigrid-based technique (KW, MMS), pp. 113–118.
- DAC-2003-ZhuYC #adaptation #algebra #analysis #approach #multi #network
- Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
- DATE-2003-AgarwalBZV #analysis #bound #statistics
- Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
- DATE-2003-Al-ArsGBR #fault #optimisation #simulation #testing
- Optimizing Stresses for Testing DRAM Cell Defects Using Electrical Simulation (ZAA, AJvdG, JB, DR), pp. 10484–10489.
- DATE-2003-CaldariCCCPT #architecture #modelling #transaction
- Transaction-Level Models for AMBA Bus Architecture Using SystemC 2.0 (MC, MC, MC, SC, LP, CT), pp. 20026–20031.
- DATE-2003-CarbognaniLICB #modelling #precise #standard #verification
- Qualifying Precision of Abstract SystemC Models Using the SystemC Verification Standard (FC, CKL, CNI, AC, PB), pp. 20088–20094.
- DATE-2003-Castro-LopezFMR #behaviour #hardware #modelling #simulation
- Behavioural Modelling and Simulation of SigmaDelta Modulators Using Hardware Description Languages (RCL, FVF, FM, ÁRV), pp. 10168–10175.
- DATE-2003-ChoiB #migration #network
- Hierarchical Global Floorplacement Using Simulated Annealing and Network Flow Area Migration (WC, KB), pp. 11104–11105.
- DATE-2003-DebOJ #analysis #embedded #simulation
- Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, JÖ, AJ), pp. 11100–11101.
- DATE-2003-DoboliGD #clustering #modelling #network
- Extraction of Piecewise-Linear Analog Circuit Models from Trained Neural Networks Using Hidden Neuron Clustering (SD, GG, AD), pp. 11098–11099.
- DATE-2003-IskanderDAMHSM #synthesis
- Synthesis of CMOS Analog Cells Using AMIGO (RI, MD, MA, MM, NH, NS, SM), pp. 20297–20302.
- DATE-2003-IyengarCSC #approach #optimisation #testing
- A Unified Approach for SOC Testing Using Test Data Compression and TAM Optimization (VI, AC, SS, KC), pp. 11188–11190.
- DATE-2003-MeiVVML #architecture #configuration management #parallel #scheduling
- Exploiting Loop-Level Parallelism on Coarse-Grained Reconfigurable Architectures Using Modulo Scheduling (BM, SV, DV, HDM, RL), pp. 10296–10301.
- DATE-2003-MoussaGN #modelling #performance #transaction
- Exploring SW Performance Using SoC Transaction-Level Modeling (IM, TG, GN), pp. 20120–20125.
- DATE-2003-OhKWS #architecture #feedback
- Test Pattern Compression Using Prelude Vectors in Fan-Out Scan Chain with Feedback Architecture (NO, RK, TWW, JS), pp. 10110–10115.
- DATE-2003-OhtakeOF #algorithm #fault #generative #testing
- A Method of Test Generation fo Path Delay Faults Using Stuck-at Fault Test Generation Algorithms (SO, KO, HF), pp. 10310–10315.
- DATE-2003-OikonomakosZA #metric #online #self #synthesis #testing
- Versatile High-Level Synthesis of Self-Checking Datapaths Using an On-Line Testability Metric (PO, MZ, BMAH), pp. 10596–10601.
- DATE-2003-RoychoudhuryMK #debugging #protocol
- Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
- DATE-2003-SayintaCPAD #abstraction #case study #verification
- A Mixed Abstraction Level Co-Simulation Case Study Using SystemC for System on Chip Verification (AS, GC, MP, AA, WD), pp. 20095–20100.
- DATE-2003-SeidlEJ
- Performance-Directed Retiming for FPGAs Using Post-Placement Delay Information (US, KE, FMJ), pp. 10770–10777.
- DATE-2003-ShengH #novel #performance
- Efficient Preimage Computation Using A Novel Success-Driven ATPG (SS, MSH), pp. 10822–10827.
- DATE-2003-WangM #multi #optimisation
- Power/Ground Mesh Area Optimization Using Multigrid-Based Technique (KW, MMS), pp. 10850–10855.
- DATE-2003-WedlerSK #encoding #induction
- Using RTL Statespace Information and State Encoding for Induction Based Property Checking (MW, DS, WK), pp. 11156–11157.
- DATE-2003-ZengZHC #correlation #performance
- Fast Computation of Data Correlation Using BDDs (ZZ, QZ, IGH, MJC), pp. 10122–10129.
- DATE-2003-ZhangM #implementation #independence #satisfiability #validation
- Validating SAT Solvers Using an Independent Resolution-Based Checker: Practical Implementations and Other Applications (LZ, SM), pp. 10880–10885.
- HPDC-2003-Cuenca-AcunaPMN #community #information management #named #peer-to-peer
- PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities (FMCA, CP, RPM, TDN), pp. 236–249.
- HPDC-2003-IvanK #component #framework #reuse
- Using Views for Customizing Reusable Components in Component-Based Frameworks (AAI, VK), pp. 194–204.
- HPDC-2003-SundaresanLKPS #adaptation #grid #monitoring
- Adaptive Polling of Grid Resource Monitors Using a Slacker Coherence Model (RS, ML, TMK, SP, JHS), pp. 260–269.
- LCTES-2003-Krishnaswamy #performance
- Enhancing the performance of 16-bit code using augmenting instructions (AK, RG), pp. 254–264.
- PDP-2003-BatistaCM #clustering #consistency
- Computing Binary Space Partition Trees using a Scope Consistent DSM System in a Cluster of Workstations (RBB, ALACC, ACMAdM), pp. 93–100.
- PDP-2003-ProdanFGMFM #architecture #clustering #grid #on the #parametricity #performance
- On Using ZENTURIO for Performance and Parameter Studies on Cluster and Grid Architectures (RP, TF, MG, GM, FF, HM), pp. 185–192.
- PDP-2003-SeragiottoFGMM #automation #distributed #on the #parallel #performance #problem #source code
- On Using Aksum for Semi-Automatically Searching of Performance Problems in Parallel and Distributed Programs (CSJ, TF, MG, GM, HM), pp. 385–392.
- PDP-2003-SuppiSL #distributed
- Web-Based Distributed Computing Using Parasite (RS, MS, EL), pp. 467–474.
- PPoPP-2003-PrabhuO #concurrent #parallel #thread
- Using thread-level speculation to simplify manual parallelization (MKP, KO), pp. 1–12.
- PPoPP-2003-Puppin #adaptation #convergence #machine learning #scheduling
- Adapting convergent scheduling using machine learning (DP), p. 1.
- PPoPP-2003-TanSSAM #design pattern #distributed #generative #memory management #parallel
- Using generative design patterns to generate parallel code for a distributed memory environment (KT, DS, JS, JA, SM), pp. 203–215.
- SOSP-2003-KosticRAV #named
- Bullet: high bandwidth data dissemination using an overlay mesh (DK, AR, JRA, AV), pp. 282–297.
- SOSP-2003-PatelWWLS #mobile #protocol
- Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
- ESOP-2003-AltisenCMR
- Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
- ESOP-2003-Flanagan #automation #model checking
- Automatic Software Model Checking Using CLP (CF), pp. 189–203.
- FASE-2003-HeckelL #development #modelling #visual notation #web
- Model-Based Development of Web Applications Using Graphical Reaction Rules (RH, ML), pp. 170–183.
- FASE-2003-Kruger
- Capturing Overlapping, Triggered, and Preemptive Collaborations Using MSCs (IK), pp. 387–402.
- TACAS-2003-FersmanMPY #analysis #scheduling
- Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
- TACAS-2003-Schmidt #invariant #petri net
- Using Petri Net Invariants in State Space Construction (KS0), pp. 473–488.
- TACAS-2003-UchitelCKM #behaviour #named #tool support
- LTSA-MSC: Tool Support for Behaviour Model Elaboration Using Implied Scenarios (SU, RC, JK, JM), pp. 597–601.
- CAV-2003-BoigelotHJ #automaton #hybrid
- Hybrid Acceleration Using Real Vector Automata (BB, FH, SJ), pp. 193–205.
- CAV-2003-ColonSS #constraints #generative #invariant #linear #theorem proving
- Linear Invariant Generation Using Non-linear Constraint Solving (MC, SS, HS), pp. 420–432.
- CAV-2003-FlanaganJOS #lazy evaluation #proving #theorem proving
- Theorem Proving Using Lazy Proof Explication (CF, RJ, XO, JBS), pp. 355–367.
- CAV-2003-SeshiaB #automaton #bound #model checking
- Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
- FATES-2003-GuoHHD #algorithm #search-based #sequence
- Computing Unique Input/Output Sequences Using Genetic Algorithms (QG, RMH, MH, KD), pp. 164–177.
- FATES-2003-HahnleW #proving #testing #theorem proving
- Using a Software Testing Technique to Improve Theorem Proving (RH, AW), pp. 30–41.
- FATES-2003-HeimdahlRVDG #case study #model checking #sequence #testing
- Auto-generating Test Sequences Using Model Checkers: A Case Study (MPEH, SR, WV, GD, JG), pp. 42–59.
- FATES-2003-HesselLNPS #generative #realtime #testing
- Time-Optimal Real-Time Test Case Generation Using Uppaal (AH, KGL, BN, PP, AS), pp. 114–130.
- FATES-2003-SungC #embedded #fault #hardware #injection #interactive #testing
- Interaction Testing in an Embedded System Using Hardware Fault Injection and Program Mutation (AS, BC), pp. 192–204.
- SAT-2003-LiSB #effectiveness #performance #satisfiability
- A Local Search SAT Solver Using an Effective Switching Strategy and an Efficient Unit Propagation (XYL, MFMS, FB), pp. 53–68.
- SAT-2003-SabharwalBK #learning #performance #problem
- Using Problem Structure for Efficient Clause Learning (AS, PB, HAK), pp. 242–256.
- TestCom-2003-RanganathanDM #protocol #testing #xml
- Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
- VMCAI-2003-Monniaux #abstraction
- Abstraction of Expectation Functions Using Gaussian Distributions (DM), pp. 161–173.
- VMCAI-2003-WinEGKL #algorithm #distributed #execution #verification
- Using Simulated Execution in Verifying Distributed Algorithms (TNW, MDE, SJG, DKK, NAL), pp. 283–297.
- VMCAI-2003-YangRS #encoding #logic #mobile #model checking #process #π-calculus
- A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution (PY, CRR, SAS), pp. 116–131.
- CBSE-2002-LarssonWNC #architecture #embedded #predict #product line
- Using Prediction Enabled Technologies for Embedded Product Line Architectures (ML, AW, CN, IC), p. 12.
- WICSA-2002-ChengGSSSS #architecture #self
- Using Architectural Style as a Basis for System Self-repair (SWC, DG, BRS, JPS, BS, PS), pp. 45–59.
- WICSA-2002-ShiH #architecture #communication #modelling #protocol
- Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
- CBSE-2003-MehlitzP #design pattern #reliability #verification
- Design for Verification: Using Design Patterns to Build Reliable Systems (PCM, JJP), p. 10.
- DocEng-2002-AllierE #approach #image
- Degraded character image restoration using active contours: a first approach (BA, HE), pp. 142–148.
- ECDL-2002-BontchevaMCS #automation #library
- Using Human Language Technology for Automatic Annotation and Indexing of Digital Library Content (KB, DM, HC, HS), pp. 613–625.
- ECDL-2002-Heggland #ad hoc #named #ontology
- OntoLog: Temporal Annotation Using Ad Hoc Ontologies and Application Profiles (JH), pp. 118–128.
- ECDL-2002-Ruthven #feedback #on the
- On the Use of Explanations as Mediating Device for Relevance Feedback (IR), pp. 338–345.
- ECDL-2002-SerralheiroCMT #word
- Word Alignment in Digital Talking Books Using WFSTs (AJS, DC, HM, IT), pp. 508–515.
- HT-2002-SinclairMMW #artificial reality #hypermedia
- Links in the palm of your hand: tangible hypermedia using augmented reality (PASS, KM, DEM, MJW), pp. 127–136.
- HT-2002-WangH #distributed #hypermedia #visual notation
- Supporting distributed meetings using cooperative, visual, process-enabled hypermedia (WW, JMH), pp. 147–148.
- HT-2002-Whitehead #comparison #modelling
- Uniform comparison of data models using containment modeling (EJWJ), pp. 182–191.
- HT-2002-ZhuHH #markov #modelling #predict #web
- Using Markov models for web site link prediction (JZ, JH, JGH), pp. 169–170.
- JCDL-2002-AbbasNS #library
- Middle school children’s use of the ARTEMIS digital library (JMA, CAN, ES), pp. 98–105.
- JCDL-2002-AnanLMNZFFS #architecture
- Preservation and transition of NCSTRL using an OAI-based architecture (HA, XL, KM, MLN, MZ, JCF, EAF, PS), pp. 181–182.
- JCDL-2002-DroettboomFMCDPA #framework #recognition
- Using the Gamera framework for the recognition of cultural heritage materials (MD, IF, KM, GSC, TD, MP, TA), pp. 11–17.
- JCDL-2002-HauptmannJN #information retrieval #multi #recognition #speech #video
- Multi-modal information retrieval from broadcast video using OCR and speech recognition (AGH, RJ, TDN), pp. 160–161.
- JCDL-2002-HuD #comparison #database #query #retrieval
- A comparison of melodic database retrieval techniques using sung queries (NH, RBD), pp. 301–307.
- JCDL-2002-KanK #automation #information retrieval #summary
- Using librarian techniques in automatic text summarization for information retrieval (MYK, JK), pp. 36–45.
- JCDL-2002-McDonaldC #heuristic #rank
- Using sentence-selection heuristics to rank text segments in TXTRACTOR (DM, HC), pp. 28–35.
- JCDL-2002-PintoBCCKLW #named
- QuASM: a system for question answering using semi-structured data (DP, MB, RGC, WBC, MK, WL, XW), pp. 46–55.
- JCDL-2002-PromH #protocol
- Using the open archives initiative protocols with EAD (CJP, TGH), pp. 171–180.
- JCDL-2002-SooLYC #image #ontology
- Using sharable ontology to retrieve historical images (VWS, CYL, JJY, CcC), pp. 197–198.
- JCDL-2002-WactlarC
- Enhanced perspectives for historical and cultural documentaries using informedia technologies (HDW, CcC), pp. 338–339.
- JCDL-2002-Witten #how #library #open source
- How to build a digital library using open-source software (IHW), p. 416.
- PODS-2002-AfratiLM #query
- Answering Queries Using Views with Arithmetic Comparisons (FNA, CL, PM), pp. 209–220.
- PODS-2002-SpielmannTB #automaton #distributed #query #web
- Distributed Computation of Web Queries Using Automata (MS, JT, JVdB), pp. 97–108.
- SIGMOD-2002-KanthRA #comparison
- Quadtree and R-tree indexes in oracle spatial: a comparison using GIS data (KVRK, SR, DA), pp. 546–557.
- SIGMOD-2002-TatarinovVBSSZ #database #order #query #relational #xml
- Storing and querying ordered XML using a relational database system (IT, SV, KSB, JS, EJS, CZ), pp. 204–215.
- SIGMOD-2002-TheobaldW #ontology #retrieval #xml
- The XXL search engine: ranked retrieval of XML data using indexes and ontologies (AT, GW), p. 615.
- SIGMOD-2002-ZhouR #database #implementation
- Implementing database operations using SIMD instructions (JZ, KAR), pp. 145–156.
- VLDB-2002-AshwinGG #adaptation #similarity
- Adaptable Similarity Search using Non-Relevant Information (TVA, RG, SG), pp. 47–58.
- VLDB-2002-BrightR #web
- Using Latency-Recency Profiles for Data Delivery on the Web (LB, LR), pp. 550–561.
- VLDB-2002-ChoN #detection #effectiveness
- Effective Change Detection Using Sampling (JC, AN), pp. 514–525.
- VLDB-2002-ConradGJM #database #logic #physics
- Database Selection Using Actual Physical and Acquired Logical Collection Resources in a Massive Domain-specific Operational Environment (JGC, XSG, PJ, MM), pp. 71–82.
- VLDB-2002-CormodeDIM #data type #how
- Comparing Data Streams Using Hamming Norms (How to Zero In) (GC, MD, PI, SM), pp. 335–345.
- VLDB-2002-CosleyLP #framework #named #recommendation #testing
- REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex (DC, SL, DMP), pp. 35–46.
- VLDB-2002-GotoK #database #mobile
- A New Passenger Support System for Public Transport using Mobile Database Access (KG, YK), pp. 908–919.
- VLDB-2002-LamKR #mobile #monitoring #named #realtime
- RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies (KyL, AK, KR), pp. 1063–1066.
- VLDB-2002-Mohan02a #performance
- An Efficient Method for Performing Record Deletions and Updates Using Index Scans (CM), pp. 940–949.
- VLDB-2002-OhuraTPK #internet #mining #query #web
- Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
- CSEET-2002-BevanWM #guidelines #programming
- Guidelines for the Use of Pair Programming in a Freshman Programming Class (JB, LLW, CEM), pp. 100–107.
- CSEET-2002-FraileyM #education #industrial #source code
- Using SWEBOK for Education Programs in Industry and Academia (DJF, JM), p. 6–?.
- CSEET-2002-ThompsonE #documentation #education #re-engineering
- Workshop 1: Developing Software Engineering Courses Using Computing Curriculum 2001 (CC 2001) Documentation (JBT, HME), pp. 260–261.
- ITiCSE-2002-Barros #concurrent #petri net #programming
- Specific proposals for the use of petri nets in a concurrent programming course (JPB), pp. 165–167.
- ITiCSE-2002-Chalk #aspect-oriented #education #human-computer #learning
- Evaluating the use of a virtual learning environment for teaching aspects of HCI (PC), pp. 125–129.
- ITiCSE-2002-RatteC #collaboration #industrial #on the #simulation #web
- On using the web as a collaboration space in the context of an industrial simulation (SR, JC), pp. 141–145.
- SCAM-J-2001-CordyDMS02 #re-engineering #txl
- Source transformation in software engineering using the TXL transformation system (JRC, TRD, AJM, KAS), pp. 827–837.
- CSMR-2002-AversanoCLG #case study #documentation #tool support #web #workflow #xml
- Integrating Document and Workflow Management Tools using XML and Web Technologies: A Case Study (LA, GC, ADL, PG), p. 24–?.
- CSMR-2002-Baburin #graph #re-engineering
- Using Graph Based Representations in Reengineering (DEB), pp. 203–206.
- CSMR-2002-YuSM #case study #industrial #metric #object-oriented #predict
- Predicting Fault-Proneness using OO Metrics: An Industrial Case Study (PY, TS, HAM), pp. 99–107.
- ICSM-2002-Harrison #adaptation #case study #maintenance #web #web service
- Using Service Specific Proxies to Migrate Web Services to the “Wireless Web”: An Illustrative Case Study of Adaptive Maintenance (WH), pp. 300–309.
- ICSM-2002-KorelTV #analysis #dependence #modelling #reduction #testing
- Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
- ICSM-2002-MoeS #distributed #execution
- Using Execution Trace Data to Improve Distributed Systems (JM, KS), pp. 640–648.
- ICSM-2002-RichnerD #information management
- Using Dynamic Information for the Iterative Recovery of Collaborations and Roles (TR, SD), pp. 34–43.
- IWPC-2002-BurdOW #animation #comprehension #diagrams #sequence chart
- Evaluating Using Animation to Improve Understanding of Sequence Diagrams (EB, DO, AW), pp. 107–113.
- IWPC-2002-DeursenV #combinator #comprehension #tool support #visitor
- Building Program Understanding Tools Using Visitor Combinators (AvD, JV), pp. 137–146.
- IWPC-2002-Moonen #impact analysis #lightweight #semiparsing
- Lightweight Impact Analysis using Island Grammars (LM), pp. 219–228.
- IWPC-2002-SimHE #benchmark #c++ #metric #on the
- On Using a Benchmark to Evaluate C++ Extractors (SES, RCH, SME), pp. 114–123.
- IWPC-2002-TakadaOI #information management #lightweight #slicing
- Dependence-Cache Slicing: A Program Slicing Method Using Lightweight Dynamic Information (TT, FO, KI), pp. 169–177.
- IWPC-2002-WuHH #graph
- Using Graph Patterns to Extract Scenarios (JW, AEH, RCH), pp. 239–247.
- PASTE-2002-BowringOH #monitoring
- Monitoring deployed software using software tomography (JFB, AO, MJH), pp. 2–9.
- PASTE-2002-Naumovich #analysis #data flow #design pattern #implementation
- Using the observer design pattern for implementation of data flow analyses (GN), pp. 61–68.
- SCAM-2002-Balmas #dependence #documentation #graph #source code
- Using Dependence Graphs as a Support to Document Programs (FB), pp. 145–154.
- SCAM-2002-ChangJH #exception #java #static analysis #visualisation
- Visualization of Exception Propagation for Java Using Static Analysis (BMC, JWJ, SHH), p. 173–?.
- SCAM-2002-Ghosh #concurrent #fault #metric #object-oriented #source code #testing #towards
- Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation (SG), pp. 17–25.
- SCAM-2002-RamseyA #framework
- A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language (FVR, JJA), p. 44–?.
- WCRE-2002-BarowskiC #dependence #java
- Extraction and Use of Class Dependency Information for Java (LAB, JHCI), p. 309–?.
- WCRE-2002-BodhuinGT #cobol #design pattern #migration #mvc #web
- Migrating COBOL Systems to the WEB by Using the MVC Design Pattern (TB, EG, MT), pp. 329–338.
- WCRE-2002-DengK #comprehension #concept
- Using Conceptual Roles of Data for Enhanced Program Comprehension (YD, SCK), pp. 119–127.
- WCRE-2002-McArthurMN #representation #source code #xml
- An Extensible Tool for Source Code Representation Using XML (GM, JM, SKKN), p. 199–?.
- WCRE-2002-RillingM #3d #analysis #on the #source code #visual notation
- On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
- WCRE-2002-RivaY #architecture #documentation #generative #xml
- Generation of Architectural Documentation Using XML (CR, YY), p. 161–?.
- WCRE-2002-TahvildariK #graph #maintenance
- A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph (LT, KK), p. 77–?.
- ICALP-2002-BeierSS #data type #energy #geometry #network
- Energy Optimal Routing in Radio Networks Using Geometric Data Structures (RB, PS, NS), pp. 366–376.
- ICALP-2002-HermenegildoPBL #approximate #debugging #semantics #specification #validation
- Program Debugging and Validation Using Semantic Approximations and Partial Specifications (MVH, GP, FB, PLG), pp. 69–72.
- FME-2002-BackesJP #bisimulation #composition #encryption #implementation
- Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation (MB, CJ, BP), pp. 310–329.
- FME-2002-Casset #development #embedded #formal method #java #verification
- Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
- FME-2002-CatanoH #java #specification #static analysis
- Formal Specification and Static Checking of Gemplus’ Electronic Purse Using ESC/Java (NC, MH), pp. 272–289.
- FME-2002-GaravelH #evaluation #functional #on the #performance #verification
- On Combining Functional Verification and Performance Evaluation Using CADP (HG, HH), pp. 410–429.
- FME-2002-Pahl #abstraction #analysis #refinement
- Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
- FME-2002-Rusu #generative #testing #verification
- Verification Using Test Generation Techniques (VR), pp. 252–271.
- IFM-2002-WinterD #model checking
- Model Checking Object-Z Using ASM (KW, RD), pp. 165–184.
- AFP-2002-ClaessenRCHW02 #functional #lazy evaluation #quickcheck #source code #testing
- Testing and Tracing Lazy Functional Programs Using QuickCheck and Hat (KC, CR, OC, JH, MW), pp. 59–99.
- ICFP-2002-LuthG #monad
- Composing monads using coproducts (CL, NG), pp. 133–144.
- IFL-2002-PortilloHLV #automation #cost analysis
- Cost Analysis Using Automatic Size and Time Inference (ÁJRP, KH, HWL, PBV), pp. 232–248.
- ICGT-2002-ReisRASN #execution #graph transformation #process #semantics
- Using Graph Transformation as the Semantical Model for Software Process Execution in the APSEE Environment (CALR, RQR, MMdA, HS, DJN), pp. 254–269.
- CHI-2002-JacobIPP #grid #interface
- A tangible interface for organizing information using a grid (RJKJ, HI, GP, JP), pp. 339–346.
- CSCW-2002-EdwardsNSSBSWI #ad hoc #collaboration #peer-to-peer
- Using speakeasy for ad hoc peer-to-peer collaboration (WKE, MWN, JZS, TFS, DB, DKS, HCW, SI), pp. 256–265.
- CSCW-2002-JonesH #coordination #distributed
- Extreme work teams: using SWAT teams as a model for coordinating distributed robots (HJ, PJH), pp. 372–381.
- CSCW-2002-KrautGF #development #visual notation
- The use of visual information in shared visual spaces: informing the development of virtual co-presence (REK, DG, SRF), pp. 31–40.
- CAiSE-2002-AoumeurS #behaviour #diagrams #logic #prototype #uml
- Integrating and Rapid-Prototyping UML Structural and Behavioural Diagrams Using Rewriting Logic (NA, GS), pp. 296–310.
- CAiSE-2002-BerlinM #database #feature model #machine learning
- Database Schema Matching Using Machine Learning with Feature Selection (JB, AM), pp. 452–466.
- CAiSE-2002-CaiY #approach #performance #requirements
- Addressing Performance Requirements Using a Goal and Scenario-Oriented Approach (ZC, ESKY), pp. 706–710.
- CAiSE-2002-FilhaSLE #query #representation #web
- Using Nested Tables for Representing and Querying Semistructured Web Data (IMREF, ASdS, AHFL, DWE), pp. 719–723.
- CAiSE-2002-IvanDP #approach #complexity #design #middleware #protocol
- Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
- CAiSE-2002-LeonardiL #requirements
- Using Business Rules in EXtreme Requirements (MCL, JCSdPL), pp. 420–435.
- EDOC-2002-MosM #approach #architecture #component #modelling #performance
- Performance Management in Component-Oriented Systems Using a Model Driven ArchitectureTM Approach (AM, JM), pp. 227–237.
- ICEIS-2002-Al-TahatISY #approach #development #framework #multi #web
- Using Hot-Spot-Driven Approach in the Development of a Framework for Multimedia Presentation on the Web (KSAT, SBI, TMTS, MY), pp. 855–860.
- ICEIS-2002-BarjisC #analysis #database #design #modelling #semantics
- Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
- ICEIS-2002-DascaluGF #automaton #modelling
- Using Cellular Automata in Traffic Modeling (MD, SG, EF), pp. 467–472.
- ICEIS-2002-GarveyJR #java #persistent
- Using Persistent Java to Construct a GIS (MG, MJ, MR), pp. 257–262.
- ICEIS-2002-GharibMT #algorithm #clustering
- High Dimensional Data Clustering Using SOFM And K-Means Algorithms (TFG, MGM, MFT), pp. 488–493.
- ICEIS-2002-HillbrandK #approach #metamodelling #network
- Using Artificial Neural Networks to Prove Hypothetic Cause-And-Effect Relations: A Metamodel-Based Approach to Support Strategic Decisions (CH, DK), pp. 367–373.
- ICEIS-2002-KimT #communication #design #enterprise #modelling #ontology #process
- Designing Business Processes and Communication Structures for E-Business Using Ontology-Based Enterprise Models with Mathematical Models (HMK, KDT), pp. 635–641.
- ICEIS-2002-LaraV
- Using AToM3 as a Meta-Case Tool (JdL, HV), pp. 642–649.
- ICEIS-2002-LarreTMT #integration
- Data Integration Using the MONIL Language (ML, JTJ, EFM, ST), pp. 115–120.
- ICEIS-2002-Lopez
- Strategic Position of Firms in Terms of Client’s Needs Using Linguistic and Numerical Information through a New Model of SOFM (RFL), pp. 382–390.
- ICEIS-2002-Mahmoud #enterprise #java
- Developing Enterprise Applications Using Java (QHM), p. 21.
- ICEIS-2002-MahmoudV #internet
- Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices (QHM, LV), pp. 1048–1053.
- ICEIS-2002-PequenoV #self
- Using Full Match Classes for Self-Maintenance of Mediated Views (VMP, VMPV), pp. 148–154.
- ICEIS-2002-SalimifardW #analysis #modelling #performance #petri net #workflow
- Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
- ICEIS-2002-SalterL #analysis #semantics
- Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
- ICEIS-2002-SanchezSVACD #data mining #mining
- Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
- ICEIS-2002-SantosNASR #classification #data mining #database #learning #mining
- Augmented Data Mining over Clinical Databases Using Learning Classifier Systems (MFS, JN, AA, ÁMS, FR), pp. 512–516.
- ICEIS-2002-Veryha #classification #database #fuzzy #implementation #query #relational
- Implementation of Fuzzy Classification Query Language in Relational Databases Using Stored Procedures (YV), pp. 195–202.
- ICEIS-2002-YooM #multi #scheduling
- Using Multi-Agent System for Dynamic Job Shop Scheduling (MJY, JPM), pp. 517–525.
- CIKM-2002-Blake #concept #data transformation #distributed
- Using specification-driven concepts for distributed data management and dissemination (MBB), pp. 629–631.
- CIKM-2002-ChakrabartiF #automation #named #scalability
- F4: large-scale automated forecasting using fractals (DC, CF), pp. 2–9.
- CIKM-2002-CooperCB #detection #documentation
- Detecting similar documents using salient terms (JWC, AC, EWB), pp. 245–251.
- CIKM-2002-DeshpandeK #classification
- Using conjunction of attribute values for classification (MD, GK), pp. 356–364.
- CIKM-2002-LeeMCC #constraints #relational #semantics #xml
- NeT & CoT: translating relational schemas to XML schemas using semantic constraints (DL, MM, FC, WWC), pp. 282–291.
- CIKM-2002-LiPHL #internet
- Using micro information units for internet search (XL, THP, MH, BL), pp. 566–573.
- CIKM-2002-NallapatiA #dependence #modelling
- Capturing term dependencies using a language model based on sentence trees (RN, JA), pp. 383–390.
- CIKM-2002-SistlaHC #automaton #database #query #retrieval #sequence #similarity
- Similarity based retrieval from sequence databases using automata as queries (APS, TH, VC), pp. 237–244.
- CIKM-2002-WuY #adaptation #monitoring #multi #performance #query
- Efficient query monitoring using adaptive multiple key hashing (KLW, PSY), pp. 477–484.
- ECIR-2002-BenammarHM #analysis #automation #documentation
- Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
- ECIR-2002-BoughanemT #case study #documentation #optimisation #query #retrieval #search-based
- A Study on Using Genetic Niching for Query Optimisation in Document Retrieval (MB, LT), pp. 135–149.
- ECIR-2002-KongoviGD #categorisation #empirical
- Text Categorization: An Experiment Using Phrases (MK, JCG, VD), pp. 213–228.
- ECIR-2002-RajapakseD #adaptation #concept #encoding #information retrieval #representation
- Concept Based Adaptive IR Model Using FCA-BAM Combination for Concept Representation and Encoding (RKR, MJD), pp. 150–168.
- ECIR-2002-TsikrikaL #documentation #network #web
- Combining Web Document Representations in a Bayesian Inference Network Model Using Link and Content-Based Evidence (TT, ML), pp. 53–72.
- ECIR-2002-WhiteRJ #feedback #retrieval #web
- The Use of Implicit Evidence for Relevance Feedback in Web Retrieval (RW, IR, JMJ), pp. 93–109.
- ICML-2002-FerriFH #learning
- Learning Decision Trees Using the Area Under the ROC Curve (CF, PAF, JHO), pp. 139–146.
- ICML-2002-KamvarKM #algorithm #approach #clustering #modelling
- Interpreting and Extending Classical Agglomerative Clustering Algorithms using a Model-Based approach (SDK, DK, CDM), pp. 283–290.
- ICML-2002-LebanonL #modelling #named #permutation #probability #ranking
- Cranking: Combining Rankings Using Conditional Probability Models on Permutations (GL, JDL), pp. 363–370.
- ICML-2002-Mladenic #learning #normalisation #word
- Learning word normalization using word suffix and context from unlabeled data (DM), pp. 427–434.
- ICML-2002-OLZ #learning
- Stock Trading System Using Reinforcement Learning with Cooperative Agents (JO, JWL, BTZ), pp. 451–458.
- ICML-2002-RaskuttiFK #classification #clustering #parametricity
- Using Unlabelled Data for Text Classification through Addition of Cluster Parameters (BR, HLF, AK), pp. 514–521.
- ICML-2002-Ryan #automation #behaviour #learning #modelling
- Using Abstract Models of Behaviours to Automatically Generate Reinforcement Learning Hierarchies (MRKR), pp. 522–529.
- ICML-2002-SchapireSMLC #estimation #modelling #nondeterminism
- Modeling Auction Price Uncertainty Using Boosting-based Conditional Density Estimation (RES, PS, DAM, MLL, JAC), pp. 546–553.
- ICML-2002-ShapiroL #learning
- Separating Skills from Preference: Using Learning to Program by Reward (DGS, PL), pp. 570–577.
- ICML-2002-StrensBE #markov #monte carlo #optimisation
- Markov Chain Monte Carlo Sampling using Direct Search Optimization (MJAS, MB, NE), pp. 602–609.
- ICML-2002-ThamDR #classification #learning #markov #monte carlo
- Sparse Bayesian Learning for Regression and Classification using Markov Chain Monte Carlo (SST, AD, KR), pp. 634–641.
- ICML-2002-Ting #classification #evaluation
- Issues in Classifier Evaluation using Optimal Cost Curves (KMT), pp. 642–649.
- ICML-2002-ZhangGYF #image #learning #multi #retrieval
- Content-Based Image Retrieval Using Multiple-Instance Learning (QZ, SAG, WY, JEF), pp. 682–689.
- ICPR-v1-2002-BasuPCB #distributed #image #monitoring #retrieval
- Distributed Retrieval of Wavelet Images Using Bandwidth Monitoring (AB, MHP, LIC, MB), pp. 604–607.
- ICPR-v1-2002-ChazalRH #automation #detection #metric #variability
- Automatic Sleep Apnoea Detection Using Measures of Amplitude and Heart Rate Variability from the Electrocardiogram (PdC, RBR, CH), pp. 775–778.
- ICPR-v1-2002-DuchesneBBC #classification #image #on the
- On the Classification of Temporal Lobe Epilepsy Using MR Image Appearance (SD, NB, AB, DLC), pp. 520–523.
- ICPR-v1-2002-HadidKP #analysis #learning #linear
- Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
- ICPR-v1-2002-HiranoHTOE #3d #image #quantifier
- Quantification of Shrinkage of Lung Lobe from Chest CT Images Using the 3D Extended Voronoi Division and its Application to the Benign/Malignant Discrimination of Tumor Shadows (YH, JiH, JiT, HO, KE), pp. 751–754.
- ICPR-v1-2002-JeongKSS #gesture #linear #recognition
- Two-Hand Gesture Recognition using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 9–12.
- ICPR-v1-2002-KanekoMM #agile #constraints #correlation #difference #image
- Using Constraint Inequality on Estimated Correlation for Rapid Image Search (SK, TM, AM), pp. 87–90.
- ICPR-v1-2002-KangKB #multi #people #realtime
- Real-Time Multiple People Tracking Using Competitive Condensation (HK, DK, SYB), pp. 413–416.
- ICPR-v1-2002-KoB #image #retrieval
- Integrated Region-Based Image Retrieval Using Region??s Spatial Relationships (BK, HB), pp. 196–199.
- ICPR-v1-2002-KuleshPS #recognition #video
- Video Clip Recognition Using Joint Audio-Visual Processing Model (VK, VAP, IKS), pp. 500–503.
- ICPR-v1-2002-LamarreC #modelling
- Background Subtraction Using Competing Models in the Block-DCT Domain (ML, JJC), pp. 299–302.
- ICPR-v1-2002-LiuCR #adaptation #estimation #parametricity
- Accurate Dense Optical Flow Estimation Using Adaptive Structure Tensors and a Parametric Model (HL, RC, AR), pp. 291–294.
- ICPR-v1-2002-LohRW #3d #modelling #process
- Refining 3D Models Using a Two-Stage Neural Network-Based Iterative Process (AWKL, MR, GAWW), pp. 172–175.
- ICPR-v1-2002-MaedaKI #3d #hybrid #modelling #representation
- Shapes Modeling of 3-D Objects Based on A Hybrid Representation Using Extended B-spline Surface Model (MM, KK, KI), pp. 656–659.
- ICPR-v1-2002-MannJE #programming #segmentation
- Trajectory Segmentation Using Dynamic Programming (RM, ADJ, TFEM), pp. 331–334.
- ICPR-v1-2002-MoreauCP #analysis #estimation
- Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
- ICPR-v1-2002-NguyenVWB #behaviour #monitoring #multi #people
- Hierarchical Monitoring of People’s Behaviors in Complex Environments Using Multiple Cameras (NTN, SV, GAWW, HHB), pp. 13–16.
- ICPR-v1-2002-OkataniD #3d #estimation #image #robust
- Robust Estimation of Camera Translation Between Two Images Using a Camera With a 3D Orientation Sensor (TO, KD), pp. 275–278.
- ICPR-v1-2002-OliveiraSBS #algorithm #feature model #multi #recognition #search-based
- Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Digit Recognition (LESdO, RS, FB, CYS), pp. 568–571.
- ICPR-v1-2002-PalenichkaZ #modelling #multi #self
- Multi-Scale Model-Based Skeletonization of Object Shapes Using Self-Organizing Maps (RMP, MBZ), pp. 143–146.
- ICPR-v1-2002-RahmanNI #behaviour
- Recognizing Human Behavior Using Universal Eigenspace (MMR, KN, SI), pp. 295–298.
- ICPR-v1-2002-SebeLCGH #classification #naive bayes #recognition
- Emotion Recognition Using a Cauchy Naive Bayes Classifier (NS, MSL, IC, AG, TSH), p. 17–?.
- ICPR-v1-2002-SongCLC #approach #image #recognition
- A New Approach for Line Recognition in Large-size Images Using Hough Transform (JS, MC, MRL, SC), pp. 33–36.
- ICPR-v1-2002-TakizawaYMTIM #3d #image #markov #modelling #random #recognition
- Recognition of Lung Nodules from X-ray CT Images Using 3D Markov Random Field Models (HT, SY, TM, YT, TI, MM), pp. 99–102.
- ICPR-v1-2002-TuzikovCB #image #optimisation #symmetry
- Brain Symmetry Plane Computation in MR Images Using Inertia Axes and Optimization (AVT, OC, IB), pp. 516–519.
- ICPR-v1-2002-UchidaRS #recognition
- Using Eigen-Deformations in Handwritten Character Recognition (SU, MAR, HS), pp. 572–575.
- ICPR-v1-2002-UnsalanB #development #image #statistics
- Classifying Land Development in High Resolution Satellite Images Using Straight Line Statistics (CÜ, KLB), pp. 127–130.
- ICPR-v1-2002-Verges-LlahiTS #estimation
- Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (JVL, AT, AS), pp. 381–384.
- ICPR-v1-2002-WangQ #complexity #recognition
- Face Recognition Using Optimal Non-Orthogonal Wavelet Basis Evaluated by Information Complexity (XW, HQ), pp. 164–167.
- ICPR-v1-2002-WechslerDLC #bound #predict
- Motion Prediction Using VC-Generalization Bounds (HW, ZD, FL, VC), pp. 151–154.
- ICPR-v1-2002-Worthington #consistency #detection
- Enhanced Canny Edge Detection Using Curvature Consistency (PLW), pp. 596–599.
- ICPR-v1-2002-YilmazSS #estimation
- Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (AY, KS, MS), pp. 377–380.
- ICPR-v1-2002-ZhangGSS #2d #image #sequence
- Recovering Elastic Property of Soft Tissues Using 2D Image Sequences With Limited Range Data (YZ, DBG, SS, MCS), pp. 755–758.
- ICPR-v2-2002-AlhichriK #image
- Image Registration Using Virtual Circles and Edge Direction (HSA, MK), pp. 969–972.
- ICPR-v2-2002-Amin #learning #prototype
- Prototyping Structural Description Using Decision Tree Learning Techniques (AA), pp. 76–79.
- ICPR-v2-2002-AuLD #segmentation #video
- Object Segmentation and Tracking Using Video Locales (JA, ZNL, MSD), pp. 544–547.
- ICPR-v2-2002-BarataP #classification #clustering #modelling #set
- Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 328–331.
- ICPR-v2-2002-BauerK #recognition #self
- Video-Based Sign Recognition Using Self-Organizing Subunits (BB, KFK), pp. 434–437.
- ICPR-v2-2002-BhagavathyNM #image #modelling
- Modeling Object Classes in Aerial Images Using Texture Motifs (SB, SN, BSM), pp. 981–984.
- ICPR-v2-2002-CarcassoniH #multi #scalability
- Point-Set Alignment Using Multidimensional Scaling (MC, ERH), pp. 402–405.
- ICPR-v2-2002-CesarBB #graph #optimisation #probability #recognition
- Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition (RMC, EB, IB), pp. 465–468.
- ICPR-v2-2002-ChangCH #recognition
- Hand Pose Recognition Using Curvature Scale Space (CCC, IYC, YSH), pp. 386–389.
- ICPR-v2-2002-ErcilB #classification #polynomial
- One Class Classification Using Implicit Polynomial Surface Fitting (AE, BB), pp. 152–155.
- ICPR-v2-2002-Fasel #analysis #network #robust
- Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
- ICPR-v2-2002-FookesBL #image
- Improved Stereo Image Matching Using Mutual Information and Hierarchical Prior Probabilities (CF, MB, AL), pp. 937–940.
- ICPR-v2-2002-FrantiX #classification
- Classification of Binary Vectors by Using ??SC-Distance (PF, MX), pp. 52–55.
- ICPR-v2-2002-GibsonCT #abstraction #modelling #visual notation
- Visual Abstraction of Wildlife Footage Using Gaussian Mixture Models and the Minimum Description Length Criterion (DPG, NWC, BTT), pp. 814–817.
- ICPR-v2-2002-GuillametV #matrix #metric
- Determining a Suitable Metric when Using Non-Negative Matrix Factorization (DG, JV), pp. 128–131.
- ICPR-v2-2002-Han #classification
- A Supervised Classification Scheme Using Positive Boolean Function (CCH), pp. 100–103.
- ICPR-v2-2002-HoneaSB
- Active Contours Using a Potential Field (DMH, WES, GLB), pp. 757–760.
- ICPR-v2-2002-HsiehT #adaptation #fuzzy #image
- Wavelet-based Image Coding Using Fuzzy Inference and Adaptive Quantization (MSH, DCT), pp. 265–268.
- ICPR-v2-2002-HuangSK #detection #network
- Face Detection Using a Modified Radial Basis Function Neural Network (LLH, AS, HK), pp. 342–345.
- ICPR-v2-2002-HungYL #classification #image
- Use of Characteristic Views in Image Classification (CCH, SY, CML), pp. 949–952.
- ICPR-v2-2002-Keren #identification #naive bayes
- Painter Identification Using Local Features and Naive Bayes (DK), pp. 474–477.
- ICPR-v2-2002-KimKB #recognition
- Face Recognition Using LDA Mixture Model (HCK, DK, SYB), pp. 486–489.
- ICPR-v2-2002-KimPJKB #classification
- Pattern Classification Using Support Vector Machine Ensemble (HCK, SP, HMJ, DK, SYB), pp. 160–163.
- ICPR-v2-2002-KoskelaLO #image #retrieval #self
- Using MPEG-7 Descriptors in Image Retrieval with Self-Organizing Maps (MK, JL, EO), pp. 1049–1052.
- ICPR-v2-2002-Lu #robust
- Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering (CSL), pp. 1001–1004.
- ICPR-v2-2002-LudtkeLHW #detection
- Corner Detection Using a Mixture Model of Edge Orientation (NL, BL, ERH, RCW), pp. 574–577.
- ICPR-v2-2002-MahmoudiD #3d #modelling #retrieval
- 3D Models Retrieval by Using Characteristic Views (SM, MD), pp. 457–460.
- ICPR-v2-2002-MarcelB #verification
- Improving Face Verification Using Skin Color Information (SM, SB), pp. 378–381.
- ICPR-v2-2002-MaWT #recognition #symmetry
- Iris Recognition Using Circular Symmetric Filters (LM, YW, TT), pp. 414–417.
- ICPR-v2-2002-Miyamori #behaviour #identification #retrieval #video
- Improving Accuracy in Behaviour Identification for Content-Based Retrieval by Using Audio and Video Information (HM), pp. 826–830.
- ICPR-v2-2002-MullerWHR #3d #markov #modelling #pseudo #recognition
- Facial Expression Recognition Using Pseudo 3-D Hidden Markov Models (SM, FW, FH, GR), pp. 32–35.
- ICPR-v2-2002-NadimiB #approach #detection
- Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
- ICPR-v2-2002-NelsonG #recognition
- Tracking Objects Using Recognition (RCN, IAG), pp. 1025–1030.
- ICPR-v2-2002-Paletta #classification #detection
- Detection of Traffic Signs Using Posterior Classifier Combination (LP), pp. 705–708.
- ICPR-v2-2002-PolatYS #multi
- Multiple Complex Object Tracking Using A Combined Technique (EP, MY, RS), pp. 717–720.
- ICPR-v2-2002-QunTHC #algorithm #automation #clustering #identification
- Automatic Fingerprint Identification Using Cluster Algorithm (QR, JT, YH, JC), pp. 398–401.
- ICPR-v2-2002-RiviereMMTPF #graph #learning #markov #random #relational
- Relational Graph Labelling Using Learning Techniques and Markov Random Fields (DR, JFM, JMM, FT, DPO, VF), pp. 172–175.
- ICPR-v2-2002-RonnebergerBS #3d #classification #invariant #recognition #set
- General-Purpose Object Recognition in 3D Volume Data Sets Using Gray-Scale Invariants --- Classification of Airborne Pollen-Grains Recorded with a Confocal Laser Scanning Microscope (OR, HB, ES), p. 290–?.
- ICPR-v2-2002-SerratosaSA #3d #graph #modelling #multi
- Modelling and Recognising 3D-Objects Described by Multiple Views Using Function-Described Graphs (FS, AS, RA), pp. 140–143.
- ICPR-v2-2002-SinghG #pattern matching #pattern recognition #recognition #slicing
- Pattern Recognition Using Information Slicing Method (pRISM) (SS, AG), pp. 144–147.
- ICPR-v2-2002-StevensSA #automation #detection
- Automatic Target Detection Using PMMW and LADAR Imagery (MRS, MS, SA), pp. 647–650.
- ICPR-v2-2002-SumengenMK #evolution #image #segmentation
- Image Segmentation Using Curve Evolution and Region Stability (BS, BSM, CSK), pp. 965–968.
- ICPR-v2-2002-SvenssonNAB #distance #image #representation
- Using Grey-Level and Distance Information for Medial Surface Representation of Volume Images (SS, IN, CA, GSdB), pp. 324–327.
- ICPR-v2-2002-TaxD #classification #multi
- Using Two-Class Classifiers for Multiclass Classification (DMJT, RPWD), pp. 124–127.
- ICPR-v2-2002-UdeA #detection #probability
- Probabilistic Detection and Tracking at High Frame Rates Using Affine Warping (AU, CGA), pp. 6–9.
- ICPR-v2-2002-UtsumiT #adaptation #statistics
- Texture Adaptation for Human Tracking Using Statistical Shape Model (AU, NT), pp. 973–976.
- ICPR-v2-2002-WechslerDL #learning #process
- Hierarchical Interpretation of Human Activities Using Competitive Learning (HW, ZD, FL), pp. 338–341.
- ICPR-v2-2002-XuMZY #recognition
- Motion Based Event Recognition Using HMM (GX, YFM, HZ, SY), pp. 831–834.
- ICPR-v2-2002-YangDWZ #estimation #mobile #realtime
- Real-Time Pose Estimation for Outdoor Mobile Robots Using Range Data (MY, BD, HW, BZ), pp. 593–596.
- ICPR-v2-2002-YeL #image #markov #modelling #segmentation
- Wavelet-Based Unsupervised SAR Image Segmentation Using Hidden Markov Tree Models (ZY, CCL), pp. 729–732.
- ICPR-v2-2002-YuB #image #segmentation
- Image Segmentation Using Gradient Vector Diffusion and Region Merging (ZY, CLB), pp. 941–944.
- ICPR-v2-2002-ZhangBS #2d #feature model #recognition
- Recognition of Similar Objects Using 2-D Wavelet-Fractal Feature Extraction (PZ, TDB, CYS), pp. 316–319.
- ICPR-v2-2002-ZhangGST #parametricity #physics
- Tracking Objects Using Recovered Physical Motion Parameters (YZ, DBG, SS, LVT), pp. 10–13.
- ICPR-v3-2002-Al-MaadeedHE #approach #markov #recognition #word
- Recognition of Off-Line Handwritten Arabic Words Using Hidden Markov Model Approach (SAM, CH, DE), pp. 481–484.
- ICPR-v3-2002-BadawyK #graph #representation
- Shape Representation Using Concavity Graphs (OEB, MK), pp. 461–464.
- ICPR-v3-2002-BaesensECV #classification #learning #markov #monte carlo #network
- Learning Bayesian Network Classifiers for Credit Scoring Using Markov Chain Monte Carlo Search (BB, MEP, RC, JV), pp. 49–52.
- ICPR-v3-2002-CampbellF #recognition
- Recognition of Free-Form Objects in Dense Range Data Using Local Features (RJC, PJF), pp. 607–610.
- ICPR-v3-2002-CaputoBN #markov #random #recognition #robust
- Robust Appearance-Based Object Recognition Using a Fully Connected Markov Random Field (BC, SB, HN), pp. 565–568.
- ICPR-v3-2002-ChenKK #approach
- Albedo Recovery Using a Photometric Stereo Approach (CYC, RK, RK), pp. 700–703.
- ICPR-v3-2002-DuricWY #adaptation #gesture #interface
- Adaptive and Smart Interface for VCR Remote Control Using Hand Gestures (ZD, HW, JY), pp. 1035–1038.
- ICPR-v3-2002-FengDW #markov #modelling #recognition
- Chinese Handwriting Recognition Using Hidden Markov Models (BF, XD, YW), pp. 212–215.
- ICPR-v3-2002-FolkersS #database #fourier #image #retrieval
- Content-Based Image Retrieval Using Fourier Descriptors on a Logo Database (AF, HS), pp. 521–524.
- ICPR-v3-2002-ForsterLR #realtime
- Real-Time Range Imaging for Dynamic Scenes Using Colour-Edge Based Structured Light (FF, MKL, BR), pp. 645–648.
- ICPR-v3-2002-HatanoASMOOK #algorithm #difference #verification
- A Fingerprint Verification Algorithm Using the Differential Matching Rate (TH, TA, SS, HM, SO, YO, HK), pp. 799–802.
- ICPR-v3-2002-JeongKSS02a #gesture #linear #recognition
- Two-Hand Gesture Recognition Using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 529–532.
- ICPR-v3-2002-KawaiT #3d #interface #visual notation
- A Support System for Visually Impaired Persons to Understand Three-dimensional Visual Information Using Acoustic Interface (YK, FT), pp. 974–977.
- ICPR-v3-2002-KimCK #automation #clustering
- Automatic Text Location Using Cluster-Based Template Matching (EYK, JSC, HJK), pp. 423–426.
- ICPR-v3-2002-KitasakaMHT #3d #automation #image #modelling
- A Method for Automated Extraction of Aorta and Pulmonary Artery in the Mediastinum Using Medial Line Models from 3D Chest X-ray CT Images without Contrast Materials (TK, KM, JiH, JiT), p. 273–?.
- ICPR-v3-2002-Kwon #classification #clustering
- Hangul Tree Classifier for Type Clustering Using Horizontal and Vertical Strokes (YBK), pp. 228–231.
- ICPR-v3-2002-LeeCK #algorithm #robust
- A Robust Fingerprint Matching Algorithm Using Local Alignment (DL, KC, JK), pp. 803–806.
- ICPR-v3-2002-LeungKCT #documentation #fuzzy #image #normalisation
- Normalization of Contrast in Document Images Using Generalized Fuzzy Operator with Least Square Method (CCL, PCKK, FHYC, WKT), pp. 115–118.
- ICPR-v3-2002-MaalmiEBVDG #detection #fault #locality
- Crack Defect Detection and Localization Using Genetic-Based Inverse Voting Hough Transform (KM, AEO, RB, LFCLYV, AD, PG), pp. 257–260.
- ICPR-v3-2002-MacriniSDSZ #3d #graph #recognition
- View-Based 3-D Object Recognition using Shock Graphs (DM, AS, SJD, KS, SWZ), p. 24–?.
- ICPR-v3-2002-ManabePJC #3d #metric
- Three Dimensional Measurement using Color Structured Patterns and Imaging Spectrograph (YM, JP, TJ, KC), pp. 649–652.
- ICPR-v3-2002-MekadaT #distance
- Anchor Point Thinning Using a Skeleton Based on the Euclidean Distance Transformation (YM, JiT), pp. 923–926.
- ICPR-v3-2002-MolinaMKV #image #modelling #multi
- A General Multichannel Image Restoration Method Using Compound Models (RM, JM, AKK, MV), pp. 835–838.
- ICPR-v3-2002-MordohaiM #multi
- Perceptual Grouping for Multiple View Stereo Using Tensor Voting (PM, GGM), pp. 639–644.
- ICPR-v3-2002-SatoKYT #3d #image #modelling #multi #sequence
- 3-D Modeling of an Outdoor Scene by Multi-Baseline Stereo Using a Long Sequence of Images (TS, MK, NY, HT), pp. 581–584.
- ICPR-v3-2002-SinKC #image
- Locating Characters in Scene Images Using Frequency Features (BKS, SKK, BJC), pp. 489–492.
- ICPR-v3-2002-StevensSP #identification
- Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
- ICPR-v3-2002-SunPKA #3d #mobile #re-engineering
- 3D Reconstruction of Indoor and Outdoor Scenes Using a Mobile Range Scanner (YS, JKP, AK, MAA), pp. 653–656.
- ICPR-v3-2002-TabboneW #2d #recognition
- Technical Symbols Recognition Using the Two-Dimensional Radon Transform (ST, LW), pp. 200–203.
- ICPR-v3-2002-VinciarelliB #markov #modelling #recognition #word
- Offline Cursive Word Recognition using Continuous Density Hidden Markov Models Trained with PCA or ICA Features (AV, SB), pp. 81–84.
- ICPR-v3-2002-WadaKS #approach #generative
- An Evolutionary Approach for the Generation of Diversiform Characters Using a Handwriting Model (YW, HK, KS), pp. 131–134.
- ICPR-v3-2002-WolfD #markov #quality #random
- Binarization of Low Quality Text Using a Markov Random Field Model (CW, DSD), pp. 160–163.
- ICPR-v3-2002-WongLC #multi #network #recognition
- Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions (KWW, CSL, SJC), pp. 106–109.
- ICPR-v3-2002-XuWFS #adaptation
- Stereo Computation Using Radial Adaptive Windows (YX, DW, TF, HS), pp. 595–598.
- ICPR-v3-2002-ZhouK #representation #set
- Representing and Recognizing Complete Set of Geons Using Extended Superquadrics (LZ, CK), pp. 713–718.
- ICPR-v3-2002-ZotkinDDMR #parametricity #visual notation
- Virtual Audio System Customization Using Visual Matching of Ear Parameters (DNZ, RD, LSD, AM, VCR), pp. 1003–1006.
- ICPR-v4-2002-BarataP02a #classification #clustering #modelling #set
- Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 90–93.
- ICPR-v4-2002-BenAbdelkaderCD #automation #estimation #identification
- Person Identification Using Automatic Height and Stride Estimation (CB, RC, LSD), pp. 377–380.
- ICPR-v4-2002-CinqueRLLT #image #query #retrieval
- Image Retrieval Using Resegmentation Driven by Query Rectangles (LC, FDR, FL, SL, SLT), pp. 142–145.
- ICPR-v4-2002-DassJL #detection #markov #modelling #random #synthesis
- Face Detection and Synthesis Using Markov Random Field Models (SCD, AKJ, XL), pp. 201–204.
- ICPR-v4-2002-DuricLSW #detection #image
- Using Normal Flow for Detection and Tracking of Limbs in Color Images (ZD, FL, YS, HW), p. 268–?.
- ICPR-v4-2002-FialaB #re-engineering
- Panoramic Stereo Reconstruction Using Non-SVP Optics (MF, AB), p. 27–?.
- ICPR-v4-2002-FrancoisMW #geometry #symmetry
- Reconstructing Mirror Symmetric Scenes From a Single View Using 2-View Stereo Geometry (ARJF, GGM, RW), pp. 12–16.
- ICPR-v4-2002-FredJ #clustering
- Data Clustering Using Evidence Accumulation (ALNF, AKJ), pp. 276–280.
- ICPR-v4-2002-HadidPM #detection
- Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering (AH, MP, BM), pp. 196–200.
- ICPR-v4-2002-HoogsCK #3d #classification #metaprogramming
- Classification of 3D Macro Texture Using Perceptual Observables (AH, RC, RK), pp. 113–117.
- ICPR-v4-2002-HuangT02a #array #multi #recognition #streaming #video
- Streaming Face Recognition Using Multicamera Video Arrays (KSH, MMT), pp. 213–216.
- ICPR-v4-2002-HuY #algorithm #estimation #robust #search-based
- Robust Estimation of Trifocal Tensor Using Messy Genetic Algorithm (MH, BY), pp. 347–350.
- ICPR-v4-2002-Ichimura #estimation #image #monte carlo #probability #sequence
- Stochastic Filtering for Motion Trajectory in Image Sequences Using a Monte Carlo Filter with Estimation of Hyper-Parameters (NI), pp. 68–73.
- ICPR-v4-2002-JainXHX #testing
- Uniformity Testing Using Minimal Spanning Tree (AKJ, XX, TKH, FX), pp. 281–284.
- ICPR-v4-2002-JhanwarCSZ #image #retrieval
- Content Based Image Retrieval Using Optimum Peano Scan (NJ, SC, GS, BZ), pp. 130–133.
- ICPR-v4-2002-KangCM #estimation #image #robust
- Robust Affine Motion Estimation in Joint Image Space Using Tensor Voting (EYEK, IC, GGM), pp. 256–259.
- ICPR-v4-2002-LamXS #difference
- Differentiation between Alphabetic and Numeric Data Using NN Ensembles (LL, QX, CYS), pp. 40–43.
- ICPR-v4-2002-MathisB #approach #classification
- Classification Using a Hierarchical Bayesian Approach (CM, TMB), p. 103–?.
- ICPR-v4-2002-MendelsVT #invariant #recognition #representation
- Rotation and Scale Invariant Shape Representation and Recognition Using Matching Pursuit (FM, PV, JPT), pp. 326–329.
- ICPR-v4-2002-MorencyD #constraints
- Stereo Tracking Using ICP and Normal Flow Constraint (LPM, TD), p. 367–?.
- ICPR-v4-2002-PalaciosVK #algorithm #distance #evaluation
- An Evaluation of the WPE Algorithm Using Tangent Distance (RPP, EV, DK), pp. 48–51.
- ICPR-v4-2002-SrinivasanB #estimation
- Head Pose Estimation Using View Based Eigenspaces (SS, KLB), pp. 302–305.
- ICPR-v4-2002-ToyamaFSM #algorithm #assembly #search-based
- Assembly of Puzzles Using a Genetic Algorithm (FT, YF, KS, JM), pp. 389–392.
- ICPR-v4-2002-TraverP #estimation #image #segmentation
- Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
- ICPR-v4-2002-XiL #detection #feature model
- Face Detection and Facial Feature Extraction Using Support Vector Machines (DX, SWL), pp. 209–212.
- KDD-2002-AyresFGY #mining #representation
- Sequential PAttern mining using a bitmap representation (JA, JF, JG, TY), pp. 429–435.
- KDD-2002-FangHL #identification
- Tumor cell identification using features rules (BF, WH, MLL), pp. 495–500.
- KDD-2002-GodboleSC #multi #scalability
- Scaling multi-class support vector machines using inter-class confusion (SG, SS, SC), pp. 513–518.
- KDD-2002-Joachims #optimisation
- Optimizing search engines using clickthrough data (TJ), pp. 133–142.
- KDD-2002-RaskuttiFK #classification #clustering
- Combining clustering and co-training to enhance text classification using unlabelled data (BR, HLF, AK), pp. 620–625.
- KDD-2002-SarawagiB #interactive #learning
- Interactive deduplication using active learning (SS, AB), pp. 269–278.
- KDD-2002-StolteTH #analysis #query #visualisation
- Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
- KDD-2002-UedaS #category theory #detection #modelling #multi #parametricity
- Single-shot detection of multiple categories of text using parametric mixture models (NU, KS), pp. 626–631.
- KDD-2002-WalterR #interactive #on the #visualisation
- On interactive visualization of high-dimensional data using the hyperbolic plane (JAW, HJR), pp. 123–132.
- KDD-2002-YuHC #classification #learning #named #web
- PEBL: positive example based learning for Web page classification using SVM (HY, JH, KCCC), pp. 239–248.
- SEKE-2002-BriandFL #algorithm #integration #metric #order #search-based
- Using genetic algorithms and coupling measures to devise optimal integration test orders (LCB, JF, YL), pp. 43–50.
- SEKE-2002-BryantBARO #assembly #component #generative #specification #two-level grammar
- Formal specification of generative component assembly using two-level grammar (BRB, CCB, MA, RRR, AMO), pp. 209–212.
- SEKE-2002-CostagliolaDFG #modelling #visual notation
- Using extended positional grammars to develop visual modeling languages (GC, VD, FF, CG), pp. 201–208.
- SEKE-2002-ErikssonBN #documentation #information management #java
- Using knowledge engineering support for a Java documentation viewer (HE, EB, PN), pp. 57–64.
- SEKE-2002-Lozano-TelloG #component #how #named #process
- BAREMO: how to choose the appropriate software component using the analytic hierarchy process (ALT, AGP), pp. 781–788.
- SEKE-2002-Morasca #classification
- A proposal for using continuous attributes in classification trees (SM), pp. 417–424.
- SEKE-2002-RaffoHV #framework #hybrid #metric #modelling #process #trade-off
- Software process decision support: making process tradeoffs using a hybrid metrics, modeling and utility framework (DR, WH, JV), pp. 803–809.
- SEKE-2002-XuVIY #behaviour #modelling #multi #verification
- Modeling and verifying multi-agent behaviors using predicate/transition nets (DX, RAV, TRI, JY), pp. 193–200.
- SIGIR-2002-AllanR #ambiguity #query
- Using part-of-speech patterns to reduce query ambiguity (JA, HR), pp. 307–314.
- SIGIR-2002-AminiG #learning #summary
- The use of unlabeled data to improve supervised learning for text summarization (MRA, PG), pp. 105–112.
- SIGIR-2002-BennettDH #classification #modelling #probability #reliability
- Probabilistic combination of text classifiers using reliability indicators: models and results (PNB, STD, EH), pp. 207–214.
- SIGIR-2002-Boyapati #classification
- Improving hierarchical text classification using unlabeled data (VB), pp. 363–364.
- SIGIR-2002-CarmelFPS #automation #information management #query #refinement
- Automatic query refinement using lexical affinities with maximal information gain (DC, EF, YP, AS), pp. 283–290.
- SIGIR-2002-FedericoB #information retrieval #query #statistics
- Statistical cross-language information retrieval using n-best query translations (MF, NB), pp. 167–174.
- SIGIR-2002-GaoZNHC #ambiguity #dependence #query
- Resolving query translation ambiguity using a decaying co-occurrence model and syntactic dependence relations (JG, MZ, JYN, HH, WC), pp. 183–190.
- SIGIR-2002-GravesL #network #retrieval #video
- Video retrieval using an MPEG-7 based inference network (AG, ML), pp. 339–346.
- SIGIR-2002-JinSHC #information retrieval
- Language model for IR using collection information (RJ, LS, AGH, JPC), pp. 419–420.
- SIGIR-2002-PengHSCR #information retrieval #segmentation #self #word
- Using self-supervised word segmentation in Chinese information retrieval (FP, XH, DS, NC, SER), pp. 349–350.
- SIGIR-2002-ShouS #data fusion
- Experiments on data fusion using headline information (XMS, MS), pp. 413–414.
- SIGIR-2002-SiC
- Using sampled data and regression to merge search engine results (LS, JPC), pp. 19–26.
- SIGIR-2002-SlonimFT #classification #documentation
- Unsupervised document classification using sequential information maximization (NS, NF, NT), pp. 129–136.
- SIGIR-2002-TakedaU #adaptation #string
- Selecting indexing strings using adaptation (YT, KU), pp. 427–428.
- SIGIR-2002-WhiteJR #documentation #feedback #ranking #web
- A system using implicit feedback and top ranking sentences to help users find relevant web documents (RW, JMJ, IR), p. 446.
- SIGIR-2002-WhiteRJ #documentation #evaluation #ranking
- Finding relevant documents using top ranking sentences: an evaluation of two alternative schemes (RW, IR, JMJ), pp. 57–64.
- SIGIR-2002-Zha #clustering #summary
- Generic summarization and keyphrase extraction using mutual reinforcement principle and sentence clustering (HZ), pp. 113–120.
- SPLC-2002-DeursenJK #product line
- Feature-Based Product Line Instantiation Using Source-Level Packages (AvD, MdJ, TK), pp. 217–234.
- SPLC-2002-KangDKLL #development #product line
- Using a Marketing and Product Plan as a Key Driver for Product Line Asset Development (KCK, PD, EK, JL, KL), pp. 366–382.
- SPLC-2002-Mannion #first-order #logic #product line #validation
- Using First-Order Logic for Product Line Model Validation (MM), pp. 176–187.
- SPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering
- Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
- UML-2002-FelfernigFJZ #information management #ocl #representation #uml
- Configuration Knowledge Representation Using UML/OCL (AF, GF, DJ, MZ), pp. 49–62.
- UML-2002-FrohlichHS #industrial #modelling #multi #uml
- Using UML for Information Modeling in Industrial Systems with Multiple Hierarchies (PF, ZH, MS), pp. 63–72.
- UML-2002-SchattkowskyL #agile #composition #development #uml #web
- Rapid Development of Modular Dynamic Web Sites Using UML (TS, ML), pp. 336–350.
- TOOLS-USA-2002-HallstromS #case study #development #framework #incremental #object-oriented
- Incremental Development Using Object Oriented Frameworks: A Case Study (JOH, NS), pp. 189–205.
- TOOLS-USA-2002-Nunes #contract #design
- Design by Contract Using Meta-Assertions (IN), pp. 37–56.
- Ada-2002-Thom #ada #exclamation #integration #modelling #programming language #standard #uml
- Conformity! A Practical Integration of Standards — A Case for using the Unified Modelling Language (UML) with the Ada Programming Language (FT), pp. 29–36.
- AdaEurope-2002-AlonsoLVP #case study #object-oriented
- Using Object Orientation in High Integrity Applications: A Case Study (AA, RL, TV, JAdlP), pp. 357–366.
- AdaEurope-2002-BinderL #embedded #execution #java #kernel #reliability
- Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications (WB, BL), pp. 125–135.
- AdaEurope-2002-OrtizMAIF #ada #development #uml
- Development of a Control System for Teleoperated Robots Using UML and Ada95 (FJO, ASM, BÁ, AI, JMF), pp. 113–124.
- AdaEurope-2002-ParkinsonG #composition #development
- High-Integrity Systems Development for Integrated Modular Avionics Using VxWorks and GNAT (PP, FG), pp. 163–178.
- ASIA-PEPM-2002-ParkP #data type
- Using indexed data structures for program specialization (JGP, MSP), pp. 61–69.
- ASIA-PEPM-2002-SheardL #analysis #search-based
- Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
- ASIA-PEPM-2002-Voigtlander #parametricity #source code
- Using circular programs to deforest in accumulating parameters (JV), pp. 126–137.
- LOPSTR-2002-AbdennadherR #constraints #logic programming #synthesis #theorem proving
- Constraint Solver Synthesis Using Tabled Resolution for Constraint Logic Programming (SA, CR), pp. 32–47.
- PADL-2002-Meadows #analysis #declarative
- Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
- PEPM-2002-LiuS #data type #optimisation #recursion
- Program optimization using indexed and recursive data structures (YAL, SDS), pp. 108–118.
- PLDI-2002-LeinoPZ
- Using Data Groups to Specify and Check Side Effects (KRML, APH, YZ), pp. 246–257.
- PPDP-2002-DrapeMS #dot-net #logic programming
- Transforming the .NET intermediate language using path logic programming (SD, OdM, GS), pp. 133–144.
- PPDP-2002-SomogyiS #stack
- Using the heap to eliminate stack accesses (ZS, PJS), pp. 121–132.
- SAS-2002-AdamsBDLRSW #analysis #data flow #pointer
- Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
- SAS-2002-BruynoogheCGV #analysis #logic programming #reuse #source code #termination
- Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
- RE-2002-AntonER #privacy #requirements #taxonomy
- Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
- RE-2002-Daneva #enterprise #maturity #process #requirements
- Using Maturity Assessments to Understand the ERP Requirements Engineering Process (MD), pp. 255–262.
- RE-2002-DulacVLS #on the #requirements #specification #visualisation
- On the Use of Visualization in Formal Requirements Specification (ND, TV, NGL, MADS), pp. 71–80.
- RE-2002-DuranCCT #requirements #verification
- Supporting Requirements Verification Using XSLT (AD, ARC, RC, MT), pp. 165–172.
- RE-2002-Garcia-DuquePB #requirements #specification
- An Analysis-Revision Cycle to Evolve Requirements Specifications by Using the SCTL-MUS Methodology (JGD, JJPA, ABBM), pp. 282–288.
- RE-2002-HallJLNR #architecture #problem #requirements
- Relating Software Requirements and Architectures Using Problem Frames (JGH, MJ, RCL, BN, LR), pp. 137–144.
- RE-2002-WooR #approach #automation #lightweight #relational #reuse #specification
- Reuse of Scenario Specifications Using an Automated Relational Learner: A Lightweight Approach (HGW, WNR), pp. 173–180.
- ASE-2002-Al-DallalS #framework #object-oriented #testing
- System Testing for Object-Oriented Frameworks Using Hook Technology (JAD, PGS), pp. 231–236.
- ASE-2002-BarberGH #architecture #evaluation #non-functional
- Enabling Iterative Software Architecture Derivation Using Early Non-Functional Property Evaluation (KSB, TJG, JH), pp. 172–182.
- ASE-2002-BaudryFJT #adaptation #automation #component #dot-net #optimisation #testing
- Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component (BB, FF, JMJ, YLT), pp. 253–256.
- ASE-2002-GrosserSV #predict #reasoning
- Predicting Software Stability Using Case-Based Reasoning (DG, HAS, PV), p. 295–?.
- ASE-2002-GrundyD #aspect-oriented #automation #component #validation
- Automatic Validation of Deployed J2EE Components Using Aspects (JCG, GD), p. 47–?.
- FSE-2002-XieE #fault
- Using redundancies to find errors (YX, DRE), pp. 51–60.
- ICSE-2002-HangalL #automation #debugging #detection
- Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
- ICSE-2002-LenceviciusMR #validation
- Software validation using power profiles (RL, EM, AR), p. 709.
- ICSE-2002-Michail #source code
- Browsing and searching source code of applications written using a GUIframework (AM), pp. 327–337.
- ICSE-2002-RobillardM #dependence #graph
- Concern graphs: finding and describing concerns using structural program dependencies (MPR, GCM), pp. 406–416.
- ICSE-2002-Wong
- Use of software inspection inputs in practice (YKW), pp. 725–726.
- SAC-2002-BillhardtBM #algorithm #retrieval #search-based
- Using genetic algorithms to find suboptimal retrieval expert combinations (HB, DB, VM), pp. 657–662.
- SAC-2002-BinderR #java #mobile #question
- Secure mobile agent systems using Java: where are we heading? (WB, VR), pp. 115–119.
- SAC-2002-ChanLMLHL #concept #documentation #mobile #multi #navigation #summary
- Multiple related document summary and navigation using concept hierarchies for mobile clients (DLC, RWPL, WKM, HVL, EKSH, QL), pp. 627–632.
- SAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #usability
- A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
- SAC-2002-DingDP #classification #data type
- Decision tree classification of spatial data streams using Peano Count Trees (QD, QD, WP), pp. 413–417.
- SAC-2002-GallardoMMR #abstraction #model checking #xml
- Using XML to implement abstraction for Model Checking (MdMG, JM, PM, ER), pp. 1021–1025.
- SAC-2002-GarigipatiN #profiling
- Evaluating the use of profiling by a region-based register allocator (KVG, CN), pp. 953–957.
- SAC-2002-Jurjens02a #development
- Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
- SAC-2002-KimL #adaptation #clustering #distance #documentation #effectiveness #metric
- An effective document clustering method using user-adaptable distance metrics (HjK, SgL), pp. 16–20.
- SAC-2002-MaciasVR #algorithm #mining
- Mining interesting regions using an evolutionary algorithm (JLÁM, JMV, JCRS), pp. 498–502.
- SAC-2002-NascimentoC #image #retrieval
- Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
- SAC-2002-NyakoeOT #algorithm #multi #search-based
- Acquisition of modulation pulses for a multi-robot system using genetic algorithm (GNN, MO, ST), pp. 568–573.
- SAC-2002-Pillay #algorithm #induction #programming #search-based
- Using genetic programming for the induction of novice procedural programming solution algorithms (NP), pp. 578–583.
- SAC-2002-SweeneyCT #delivery #mobile #summary
- Mobile delivery of news using hierarchical query-biased summaries (SOS, FC, AT), pp. 634–639.
- SAC-2002-WangHTN #ad hoc #network
- AODV compatible routing with extensive use of cache information in ad-hoc networks (WGW, TH, MT, SN), pp. 852–859.
- SAC-2002-YoungBGL #difference #object-oriented
- Using an object oriented model for resolving representational differences between heterogeneous systems (PY, VB, JG, L), pp. 976–983.
- GPCE-2002-BarbeauB #development #generative #programming #protocol #stack
- A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
- LDTA-2002-GondowK #c #slicing #towards #xml
- Towards ANSI C Program Slicing using XML (KG, HK), pp. 30–49.
- CC-2002-CilioC
- Global Variable Promotion: Using Registers to Reduce Cache Power Dissipation (AGMC, HC), pp. 247–260.
- CC-2002-GaravelLM #compilation
- Compiler Construction Using LOTOS NT (HG, FL, RM), pp. 9–13.
- DAC-2002-AbramoviciSE #embedded
- Using embedded FPGAs for SoC yield improvement (MA, CES, ME), pp. 713–724.
- DAC-2002-AnisMEA #automation #clustering #performance #power management #reduction
- Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique (MA, MM, MIE, SA), pp. 480–485.
- DAC-2002-AttarhaN #analysis #fault #modelling
- Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
- DAC-2002-BadarogluTDWMVG #optimisation #reduction
- Clock tree optimization in synchronous CMOS digital circuits for substrate noise reduction using folding of supply current transients (MB, KT, SD, PW, HDM, IV, GGEG), pp. 399–404.
- DAC-2002-BernardiS #design #library
- Model design using hierarchical web-based libraries (FB, JFS), pp. 14–17.
- DAC-2002-ChandraC #reduction #testing
- Reduction of SOC test data volume, scan power and testing time using alternating run-length codes (AC, KC), pp. 673–678.
- DAC-2002-JiangB #logic #simulation #specification #synthesis
- Software synthesis from synchronous specifications using logic simulation techniques (YJ, RKB), pp. 319–324.
- DAC-2002-KapurCS #estimation #novel #optimisation #reduction
- Power estimation in global interconnects and its reduction using a novel repeater optimization methodology (PK, GC, KS), pp. 461–466.
- DAC-2002-LiouWCDMKW #fault #multi #performance #testing
- Enhancing test efficiency for delay fault testing using multiple-clocked schemes (JJL, LCW, KTC, JD, MRM, RK, TWW), pp. 371–374.
- DAC-2002-MadesG #graph #modelling
- Regularization of hierarchical VHDL-AMS models using bipartite graphs (JM, MG), pp. 548–551.
- DAC-2002-PeymandoustMS #algebra #embedded #library
- Complex library mapping for embedded software using symbolic algebra (AP, GDM, TS), pp. 325–330.
- DAC-2002-ShengTH #effectiveness #safety
- Effective safety property checking using simulation-based sequential ATPG (SS, KT, MSH), pp. 813–818.
- DAC-2002-Sotiriou #implementation
- Implementing asynchronous circuits using a conventional EDA tool-flow (CPS), pp. 415–418.
- DAC-2002-WirthlinM #delivery
- IP delivery for FPGAs using Applets and JHDL (MJW, BM), pp. 2–7.
- DAC-2002-YangP #component #multi #simulation
- Time-domain steady-state simulation of frequency-dependent components using multi-interval Chebyshev method (BY, JRP), pp. 504–509.
- DAC-2002-ZengAA #identification
- False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
- DATE-2002-AloulMS #satisfiability #search-based
- Search-Based SAT Using Zero-Suppressed BDDs (FAA, MNM, KAS), p. 1082.
- DATE-2002-AzevedoICGDVN #scheduling
- Profile-Based Dynamic Voltage Scheduling Using Program Checkpoints (AA, II, RC, RG, NDD, AVV, AN), pp. 168–175.
- DATE-2002-BecerZBPH #analysis
- Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
- DATE-2002-BeroulleBLN #on the
- On the Use of an Oscillation-Based Test Methodology for CMOS Micro-Electro-Mechanical Systems (VB, YB, LL, PN), p. 1120.
- DATE-2002-BhuniaR #analysis #detection #fault
- Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
- DATE-2002-BrachtendorfLLMF #continuation
- Steady State Calculation of Oscillators Using Continuation Methods (HGB, SL, RL, RCM, PF), p. 1139.
- DATE-2002-CaiGKO #design #top-down
- Top-Down System Level Design Methodology Using SpecC, VCC and SystemC (LC, DG, PK, MO), p. 1137.
- DATE-2002-ChenBKR #reduction
- Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods (YC, VB, CKK, KR), pp. 931–935.
- DATE-2002-CoelhoSP #algorithm #approximate
- Passive Constrained Rational Approximation Algorithm Using Nevanlinna-Pick Interpolation (CPC, LMS, JRP), pp. 923–930.
- DATE-2002-DingM02a #modelling
- Accurate Estimating Simultaneous Switching Noises by Using Application Specific Device Modeling (LD, PM), pp. 1038–1043.
- DATE-2002-EdwardsG #embedded #modelling
- The Modelling of Embedded Systems Using HASoC (MDE, PNG), pp. 752–759.
- DATE-2002-FerrandiRS #constraints #functional #theorem proving #verification
- Functional Verification for SystemC Descriptions Using Constraint Solving (FF, MR, DS), pp. 744–751.
- DATE-2002-FerrettiB #encoding #pipes and filters
- Single-Track Asynchronous Pipeline Templates Using 1-of-N Encoding (MF, PAB), pp. 1008–1015.
- DATE-2002-GoffioulWVD #analysis #approach #architecture
- Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
- DATE-2002-GoldbergPB #algorithm #problem #satisfiability #symmetry
- Using Problem Symmetry in Search Based Satisfiability Algorithms (EIG, MRP, RKB), pp. 134–141.
- DATE-2002-HalambiSBDN #compilation #performance #reduction
- An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
- DATE-2002-Kania #approach #multi
- Improved Technology Mapping for PAL-Based Devices Using a New Approach to Multi-Output Boolean Functions (DK), p. 1087.
- DATE-2002-KhomenkoKY #detection #integer #programming
- Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
- DATE-2002-KimKM #algorithm #analysis #realtime #scalability
- A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
- DATE-2002-LinCC
- Arbitrary Convex and Concave Rectilinear Module Packing Using TCG (JML, HLC, YWC), pp. 69–75.
- DATE-2002-NitschK #embedded #runtime
- The Use of Runtime Configuration Capabilities for Networked Embedded Systems (CN, UK), p. 1093.
- DATE-2002-PeymandoustSM #algebra #embedded #optimisation #power management
- Low Power Embedded Software Optimization Using Symbolic Algebra (AP, TS, GDM), pp. 1052–1058.
- DATE-2002-PomeranzR #fault #multi #set
- Test Enrichment for Path Delay Faults Using Multiple Sets of Target Faults (IP, SMR), pp. 722–729.
- DATE-2002-PomeranzZ #fault #testing
- Fault Isolation Using Tests for Non-Isolated Blocks (IP, YZ), p. 1123.
- DATE-2002-SchwenckerSPG #adaptation #parametricity #set #worst-case
- Analog Circuit Sizing Using Adaptive Worst-Case Parameter Sets (RS, FS, MP, HEG), pp. 581–585.
- DATE-2002-SkliarovaF #configuration management #hardware #satisfiability
- A SAT Solver Using Software and Reconfigurable Hardware (IS, AdBF), p. 1094.
- DATE-2002-StohrSG #named #reuse #verification
- FlexBench: Reuse of Verification IP to Increase Productivity (BS, MS, JG), p. 1131.
- DATE-2002-VanasscheGS #behaviour #matrix #modelling
- Constructing Symbolic Models for the Input/Output Behavior of Periodically Time-Varying Systems Using Harmonic Transfer Matrices (PV, GGEG, WMCS), pp. 279–284.
- DATE-2002-Velev #similarity #verification
- Using Rewriting Rules and Positive Equality to Formally Verify Wide-Issue Out-of-Order Microprocessors with a Reorder Buffer (MNV), pp. 28–35.
- DATE-2002-WilsonRZBK #behaviour #fault #modelling
- Behavioural Modelling of Operational Amplifier Faults Using VHDL-AMS (PRW, JNR, MZ, ADB, YK), p. 1133.
- DATE-2002-ZhaoMB #compilation #design #modelling #set
- Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models (QZ, BM, TB), pp. 1021–1026.
- HPCA-2002-BrownP #pipes and filters
- Using Internal Redundant Representations and Limited Bypass to Support Pipelined Adders and Register Files (MDB, YNP), pp. 289–298.
- HPCA-2002-GurumurthiSIVKLJ #approach #estimation #simulation
- Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach (SG, AS, MJI, NV, MTK, TL, LKJ), pp. 141–150.
- HPCA-2002-KampeSD #analysis #branch #fourier #predict
- The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
- HPCA-2002-SemeraroMBADS #design #energy #multi #scalability
- Energy-Efficient Processor Design Using Multiple Clock Domains with Dynamic Voltage and Frequency Scaling (GS, GM, RB, DHA, SD, MLS), pp. 29–42.
- HPDC-2002-AllenWP #adaptation #network
- Adaptive Timeout Discovery Using the Network Weather Service (MSA, RW, JSP), pp. 35–41.
- HPDC-2002-HumphreyAW #grid
- Location-Transparent Naming in Grid Computing Using Legion-G (MH, SA, GSW), p. 418.
- HPDC-2002-Schulz #clustering #parallel #performance #semantics
- Using Semantic Information to Guide Efficient Parallel I/O on Clusters (MS), pp. 135–142.
- HPDC-2002-SubramaniKSS #distributed #multi #scheduling
- Distributed Job Scheduling on Computational Grids Using Multiple Simultaneous Requests (VS, RK, SS, PS), p. 359–?.
- HPDC-2002-TaylorWGS #kernel #parallel #performance #predict
- Using Kernel Couplings to Predict Parallel Application Performance (VET, XW, JG, RLS), pp. 125–134.
- ISMM-2002-JohanssonSW #architecture #concurrent #message passing
- Heap architectures for concurrent languages using message passing (EJ, KFS, JW), pp. 195–206.
- ISMM-2002-VardhanA #algorithm #garbage collection
- Using passive object garbage collection algorithms for garbage collection of active objects (AV, GA), pp. 213–220.
- LCTES-SCOPES-2002-HunlethC #aspect-oriented #programming
- Footprint and feature management using aspect-oriented programming techniques (FH, RC), pp. 38–45.
- LCTES-SCOPES-2002-MohantyPND #agile #design #embedded #multi #simulation
- Rapid design space exploration of heterogeneous embedded systems using symbolic search and multi-granular simulation (SM, VKP, SN, JRD), pp. 18–27.
- OSDI-2002-ElsonGE #fine-grained #network
- Fine-Grained Network Time Synchronization Using Reference Broadcasts (JE, LG, DE), pp. 147–163.
- OSDI-2002-KumarL #debugging #model checking
- Using Model Checking to Debug Device Firmware (SK, KL), pp. 61–74.
- OSDI-2002-QiePP #programming #tool support
- Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
- PDP-2002-CanoM #clustering #energy #protocol
- Reducing Energy Consumption in a Clustered MANET using the Intra Cluster Data-Dissemination Protocol (Icdp) (JCC, PM), pp. 411–418.
- PDP-2002-Volbert #ad hoc #network #simulation
- A Simulation Environment for Ad Hoc Networks Using Sector Subdivision (KV), p. 419–?.
- FASE-2002-BradfieldFS #calculus #ocl #μ-calculus
- Enriching OCL Using Observational μ-Calculus (JCB, JKF, PS), pp. 203–217.
- FASE-2002-NonnengartRS #modelling #requirements
- Formal Requirements Engineering Using Observer Models (AN, GR, WS), pp. 264–278.
- FoSSaCS-2002-SchoppS #process #verification
- Verifying Temporal Properties Using Explicit Approximants: Completeness for Context-free Processes (US, AKS), pp. 372–386.
- STOC-2002-HellersteinR #learning
- Exact learning of DNF formulas using DNF hypotheses (LH, VR), pp. 465–473.
- TACAS-2002-AbdeddaimM #automaton #scheduling
- Preemptive Job-Shop Scheduling Using Stopwatch Automata (YA, OM), pp. 113–126.
- TACAS-2002-BrabermanGO #verification
- Improving the Verification of Timed Systems Using Influence Information (VAB, DG, AO), pp. 21–36.
- TACAS-2002-GodefroidK #algorithm #scalability #search-based
- Exploring Very Large State Spaces Using Genetic Algorithms (PG, SK), pp. 266–280.
- TACAS-2002-KimSC #functional #requirements #specification #verification
- Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS (TK, DWJSC, SDC), pp. 205–220.
- TACAS-2002-Lang #composition #verification
- Compositional Verification Using SVL Scripts (FL), pp. 465–469.
- WRLA-2002-DenkerM #communication #modelling #multi #protocol #term rewriting
- Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
- CADE-2002-Ahrendt #data type #deduction #fault #generative #specification
- Deductive Search for Errors in Free Data Type Specifications Using Model Generation (WA), pp. 211–225.
- CAV-2002-BryantLS #logic #modelling #verification
- Modeling and Verifying Systems Using a Logic of Counter Arithmetic with λ Expressions and Uninterpreted Functions (REB, SKL, SAS), pp. 78–92.
- CAV-2002-ClarkeGKS #abstraction #machine learning #satisfiability
- SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques (EMC, AG, JHK, OS), pp. 265–279.
- CAV-2002-GodefroidJ #abstraction #automation #model checking
- Automatic Abstraction Using Generalized Model Checking (PG, RJ), pp. 137–150.
- CAV-2002-RybinaV #canonical #infinity #model checking
- Using Canonical Representations of Solutions to Speed Up Infinite-State Model Checking (TR, AV), pp. 386–400.
- CAV-2002-YounesS #probability #verification
- Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling (HLSY, RGS), pp. 223–235.
- ICLP-2002-BockmayrC #biology #concurrent #constraints #hybrid #programming
- Using Hybrid Concurrent Constraint Programming to Model Dynamic Biological Systems (AB, AC), pp. 85–99.
- ICLP-2002-Christensen #detection #logic programming #pervasive #process
- Using Logic Programming to Detect Activities in Pervasive Healthcare (HBC), pp. 421–436.
- ICLP-2002-PemmasaniRR #constraints #logic programming #model checking #performance #realtime
- Efficient Real-Time Model Checking Using Tabled Logic Programming and Constraints (GP, CRR, IVR), pp. 100–114.
- ICLP-2002-VaucheretGM #fuzzy #implementation #prolog
- Fuzzy Prolog: A Simple General Implementation Using CLP(R) (CV, SG, SMH), p. 469.
- ISSTA-2002-BriandLS #analysis #contract #fault #object-oriented
- Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
- ISSTA-2002-GroceV #heuristic #java #model checking #source code
- Model checking Java programs using structural heuristics (AG, WV), pp. 12–21.
- ISSTA-2002-LiangPH #analysis #precise #profiling
- Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
- SAT-2002-Kullmann #adaptation #branch #database #encryption #normalisation #random #satisfiability #standard #towards
- Towards an adaptive density based branching rule for SAT solvers, using a database for mixed random conjunctive normal forms built upon the Advanced Encryption Standard (AES) (OK), p. 8.
- TestCom-2002-SchulzV #implementation
- Implementation of TTCN-3 Test Systems using the TRI (SS, TVG), pp. 425–442.
- VMCAI-2002-Huth #model checking
- Model Checking Modal Transition Systems Using Kripke Structures (MH), pp. 302–316.
- CBSE-2001-Wile #architecture
- Ensuring General-Purpose and Domain-Specific Properties Using Architectural Styles (DSW), p. 6.
- DocEng-2001-NaF #analysis #authoring #documentation #hypermedia #petri net
- Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
- DocEng-2001-VarlamisV #database #documentation #generative #relational #xml
- Bridging XML-schema and relational databases: a system for generating and manipulating relational databases using valid XML documents (IV, MV), pp. 105–114.
- ECDL-2001-BauerS #documentation #library
- Enhancing Digital Library Documents by A Posteriori Cross Linking Using XSLT (MGB, GS), pp. 95–102.
- ECDL-2001-HunterL #distributed #multi
- Building and Indexing a Distributed Multimedia Presentation Archive Using SMIL (JH, SL), pp. 415–428.
- ECDL-2001-MeyyappanAF
- Digital Work Environment (DWE): Using Tasks to Organize Digital Resources (NM, SAH, SF), pp. 239–250.
- ECDL-2001-Mutschke #data flow #information retrieval #network
- Enhancing Information Retrieval in Federated Bibliographic Data Sources Using Author Network Based Stratagems (PM), pp. 287–299.
- ECDL-2001-ZaslavskyBM #algorithm #comparison #detection #multi
- Using Copy-Detection and Text Comparison Algorithms for Cross-Referencing Multiple Editions of Literary Works (ABZ, AB, KM), pp. 103–114.
- HT-2001-AguiarB #information management #retrieval #web
- Improvement of Web retrieval by the use of contextual information of pages (FA, MB), pp. 247–248.
- HT-2001-CrowderSWG #hypermedia #overview
- A review of the benefits of using hypermedia manuals (RC, YWS, GW, RG), pp. 245–246.
- HT-2001-MooreBS #education
- Personally tailored teaching in WHURLE using conditional transclusion (AM, TJB, CDS), pp. 163–164.
- HT-2001-RubartHTW #component #enterprise #hypermedia
- Organizing shared enterprise workspaces using component-based cooperative hypermedia (JR, JMH, DAT, WW), pp. 73–82.
- HT-2001-WealMMR
- Building narrative structures using context based linking (MJW, DEM, DTM, DDR), pp. 37–38.
- ICDAR-2001-BagdanovW #classification #documentation #fine-grained #first-order #graph #random
- Fine-Grained Document Genre Classification Using First Order Random Graphs (ADB, MW), pp. 79–85.
- ICDAR-2001-BloombergPM #documentation #heuristic #image
- Document Image Decoding Using Iterated Complete Path Search with Subsampled Heuristic Scoring (DSB, KP, TPM), pp. 344–349.
- ICDAR-2001-BourgeoisEB #comprehension #documentation #probability
- Document Understanding Using Probabilistic Relaxation: Application on Tables of Contents of Periodicals (FL, HE, SSB), pp. 508–512.
- ICDAR-2001-Breuel #algorithm #programming #segmentation #string
- Segmentation of Handprinted Letter Strings Using a Dynamic Programming Algorithm (TMB), pp. 821–826.
- ICDAR-2001-ChoisyB #normalisation #recognition
- Handwriting Recognition Using Local Methods for Normalization and Global Methods for Recognition (CC, AB), pp. 23–27.
- ICDAR-2001-DawoudK #documentation #image
- Binarization of Document Images Using Image Dependent Model (AD, MK), pp. 49–53.
- ICDAR-2001-EtoS #network #recognition
- Mathematical Formula Recognition Using Virtual Link Network (YE, MS), pp. 762–767.
- ICDAR-2001-FanCW #documentation #identification
- Form Document Identification Using Line Structure Based Features (KCF, MLC, YKW), pp. 704–708.
- ICDAR-2001-FanFT #documentation #image
- Binarizing Document Image Using Coplanar Prefilter (LF, LF, CLT), pp. 34–38.
- ICDAR-2001-GarainC #analysis #fuzzy #multi #segmentation
- Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
- ICDAR-2001-GuoM #markov #modelling
- Separating Handwritten Material from Machine Printed Text Using Hidden Markov Models (JKG, MYM), pp. 439–443.
- ICDAR-2001-HadjarHI #approach #composition
- Newspaper Page Decomposition Using a Split and Merge Approach (KH, OH, RI), pp. 1186–1189.
- ICDAR-2001-HouleBS
- Handwriting Stroke Extraction Using a New XYTC Transform (GFH, KB, MS), pp. 91–95.
- ICDAR-2001-Hurst #layout
- Layout and Language: Exploring Text Block Discovery in Tables Using Linguistic Resources (MH), pp. 523–527.
- ICDAR-2001-IwataYYKIM #identification #library
- Book Cover Identification by Using Four Directional Features Filed for a Small-Scale Library System (KI, KY, MY, KK, MI, KM), pp. 582–586.
- ICDAR-2001-JinT #composition #locality
- Text Area Localization under Complex-Background Using Wavelet Decomposition (NJ, YYT), pp. 1126–1130.
- ICDAR-2001-JustinoBS #random #verification
- Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
- ICDAR-2001-KimCKS #generative #recognition #string
- Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator (KKK, YC, JHK, CYS), pp. 14–17.
- ICDAR-2001-KimSL #modelling #probability
- Character Spotting Using Image-Based Stochastic Models (SKK, BKS, SWL), pp. 60–63.
- ICDAR-2001-KobayashiNMSA #flexibility #learning #recognition #statistics
- Handwritten Numeral Recognition Using Flexible Matching Based on Learning of Stroke Statistics (TK, KN, HM, TS, KA), pp. 612–616.
- ICDAR-2001-KoshinakaNY #dependence #probability #recognition #word
- A Stochastic Model for Handwritten Word Recognition Using Context Dependency Between Character Patterns (TK, DN, KY), pp. 154–158.
- ICDAR-2001-LeedhamTY #identification #markov
- Handwritten Country Name Identification Using Vector Quantisation and Hidden Markov Model (GL, WKT, WLY), pp. 685–688.
- ICDAR-2001-LejtmanG #network #online #verification
- On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
- ICDAR-2001-Likforman-Sulem #image #visual notation
- Name Block Location in Facsimile Images Using Spatial/Visual Cues (LLS), pp. 680–684.
- ICDAR-2001-MartiMB #identification
- Writer Identification Using Text Line Based Features (UVM, RM, HB), pp. 101–105.
- ICDAR-2001-NajmanGB #recognition
- Indexing Technical Drawings Using Title Block Structure Recognition (LN, OG, SB), pp. 587–591.
- ICDAR-2001-NatarajanESM #markov #modelling
- Videotext OCR Using Hidden Markov Models (PN, BE, RMS, JM), pp. 947–951.
- ICDAR-2001-NatteeN #classification #comprehension #documentation #geometry #machine learning #online
- Geometric Method for Document Understanding and Classification Using On-line Machine Learning (CN, MN), pp. 602–606.
- ICDAR-2001-NishimuraTMMN #feature model #recognition
- Off-line Hand-written Character Recognition Using Integrated 1D HMMs Based on Feature Extraction Filters (HN, MT, MM, HM, YN), pp. 417–423.
- ICDAR-2001-ParizeauLG #recognition
- Character Recognition Experiments Using Unipen Data (MP, AL, CG), pp. 481–485.
- ICDAR-2001-RheeCK #feature model #online #segmentation #verification
- On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
- ICDAR-2001-RoneeUS #2d #linear #recognition
- Handwritten Character Recognition Using Piecewise Linear Two-Dimensional Warping (MAR, SU, HS), pp. 39–43.
- ICDAR-2001-SerraduraSV #classification #markov #modelling #web
- Web Sites Thematic Classification Using Hidden Markov Models (LS, MS, NV), pp. 1094–1099.
- ICDAR-2001-Smith #estimation #parametricity
- Scanner Parameter Estimation Using Bilevel Scans of Star Charts (EHBS), pp. 1164–1168.
- ICDAR-2001-Souafi-BensafiPLE #logic #network
- Logical Labeling Using Bayesien Networks (SSB, MP, FL, HE), pp. 832–836.
- ICDAR-2001-SrihariCL #pattern matching #pattern recognition #recognition
- Establishing Handwriting Individuality Using Pattern Recognition Techniques (SNS, SHC, SL), p. 1195–?.
- ICDAR-2001-SuralD01a #fuzzy #multi #recognition
- Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features (SS, PKD), pp. 1120–1125.
- ICDAR-2001-TaoT
- Discrimination of Oriental and Euramerican Scripts Using Fractal Feature (YT, YYT), pp. 1115–1119.
- ICDAR-2001-UchidaTS #programming
- Nonuniform Slant Correction Using Dynamic Programming (SU, ET, HS), pp. 434–438.
- ICDAR-2001-ValvenyM #learning
- Learning of Structural Descriptions of Graphic Symbols Using Deformable Template Matching (EV, EM), pp. 455–459.
- ICDAR-2001-WakaharaKS #adaptation #normalisation #recognition
- Handwritten Japanese Character Recognition Using Adaptive Normalization by Global Affine Transformation (TW, YK, MS), pp. 424–428.
- ICDAR-2001-WakedSB #documentation #image
- Segmenting Document Images Using Diagonal White Runs and Vertical Edges (BW, CYS, SB), pp. 194–199.
- ICDAR-2001-WongSA01a #analysis #layout
- Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
- ICDAR-2001-YeCS #classification #reduction
- Reduction of the Classification Cost Using Hierarchical Classifiers based on the k-NN Rule (XY, MC, CYS), pp. 716–720.
- ICDAR-2001-YuanT #documentation #image
- Text Extraction from Gray Scale Document Images Using Edge Information (QY, CLT), pp. 302–306.
- ICDAR-2001-ZhaoCSW #approach #segmentation
- Handwritten Chinese Character Segmentation Using a Two-Stage Approach (SZ, ZC, PS, QW), pp. 179–183.
- JCDL-2001-BlandfordSB #case study #library #multi
- Use of multiple digital libraries: a case study (AB, HS, NBK), pp. 179–188.
- JCDL-2001-KlavansW #online #taxonomy
- Extracting taxonomic relationships from on-line definitional sources using LEXING (JK, BW), pp. 257–258.
- JCDL-2001-Larson #distributed #resource management
- Distributed resource discovery: using z39.50 to build cross-domain information servers (RRL), pp. 52–53.
- JCDL-2001-PettigrewD #community #design #information management
- Public use of digital community information systems: findings from a recent study with implications for system design (KEP, JCD), pp. 136–143.
- JCDL-2001-Suleman01a #protocol #repository
- Using the repository explorer to achieve OAI protocol compliance (HS), p. 459.
- JCDL-2001-WangD #clustering #image #retrieval #scalability #statistics
- Scalable integrated region-based image retrieval using IRM and statistical clustering (JZW, YD), pp. 268–277.
- PODS-2001-RajaramanU #query
- Querying Websites Using Compact Skeletons (AR, JDU).
- VLDB-2001-AndreiV #communication
- User-Optimizer Communication using Abstract Plans in Sybase ASE (MA, PV), pp. 29–38.
- VLDB-2001-ChaudhuriS #database #relational #retrieval #xml
- Storage and Retrieval of XML Data Using Relational Databases (SC, KS).
- VLDB-2001-MaedaT #adaptation #named
- ACTIVIEW: Adaptive data presentation using SuperSQL (YM, MT), pp. 695–696.
- VLDB-2001-SakuraiYKU #adaptation #query #similarity
- Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation (YS, MY, RK, SU), pp. 231–240.
- VLDB-2001-SundaraHCAS #documentation #framework #xml
- Developing an Indexing Scheme for XML Document Collection using the Oracle8i Extensibility Framework (SS, YH, TC, NA, JS), pp. 701–702.
- CSEET-2001-PortB #delivery #framework #product line #re-engineering
- Using a Model Framework in Developing and Delivering a Family of Software Engineering Project Courses (DP, BWB), pp. 44–55.
- ITiCSE-2001-BerqueJJ #education
- Teaching theory of computation using pen-based computers and an electronic whiteboard (DAB, DKJ, LJ), pp. 169–172.
- ITiCSE-2001-ChoiC #design #education #interactive #learning #multi #object-oriented
- Using interactive multimedia for teaching and learning object oriented software design (SHC, SC), p. 176.
- ITiCSE-2001-CiesielskiM #algorithm #animation #learning #student
- Using animation of state space algorithms to overcome student learning difficulties (VC, PM), pp. 97–100.
- ITiCSE-2001-DannCP #education #recursion #visualisation
- Using visualization to teach novices recursion (WD, SC, RP), pp. 109–112.
- ITiCSE-2001-Fone #concept #network #spreadsheet
- Using a familiar package to demonstrate a difficult concept: using an excel spreadsheet model to explain the concepts of neural networks to undergraduates (WF), pp. 165–168.
- ITiCSE-2001-Fowler #prolog
- Web-based CALL using prolog (AF), p. 181.
- ITiCSE-2001-Guzdial #collaboration #multi
- Use of collaborative multimedia in computer science classes (MG), pp. 17–20.
- ITiCSE-2001-KoldehofeT #animation #distributed #interactive
- Using actors in an interactive animation in a graduate course on distributed system (BK, PT), pp. 149–152.
- ITiCSE-2001-Lawhead #programming
- Events robots and programming using legos in CS1 (PBL), p. 183.
- ITiCSE-2001-Medley #education #research
- Using qualitative research software for CS education research (MDM), pp. 141–144.
- ITiCSE-2001-Rutherfoord #re-engineering
- Using personality inventories to help form teams for software engineering class projects (RHR), pp. 73–76.
- ITiCSE-2001-ThomasL #distance #fault #learning #student
- Observational studies of student errors in a distance learning environment using a remote recording and replay tool (PT, KL), pp. 117–120.
- CSMR-2001-PodnarM #analysis #maintenance #process #simulation
- Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
- ICSM-2001-CaivanoLV #comprehension #estimation #process
- Software Renewal Process Comprehension using Dynamic Effort Estimation (DC, FL, GV), pp. 209–218.
- ICSM-2001-ChenCWYZZM #cvs #named #source code
- CVSSearch: Searching through Source Code Using CVS Comments (AC, EC, JW, AYY, QZ, SZ, AM), p. 364–?.
- ICSM-2001-DeanCSM #design #legacy
- Using Design Recovery Techniques to Transform Legacy Systems (TRD, JRC, KAS, AJM), pp. 622–631.
- ICSM-2001-EveraarsAK #concurrent #coordination #source code
- Using Coordination to Restructure Sequential Source Code into a Concurrent Program (CTHE, FA, BK), p. 342–?.
- ICSM-2001-KataokaEGN #automation #invariant #refactoring
- Automated Support for Program Refactoring Using Invariants (YK, MDE, WGG, DN), pp. 736–743.
- ICSM-2001-Lemos #architecture #evolution
- Describing Evolving Dependable Systems Using Co-Operative Software Architectures (RdL), p. 320–?.
- ICSM-2001-MitchellM #algorithm #clustering #metric #similarity
- Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements (BSM, SM), pp. 744–753.
- ICSM-2001-OrsoHRRSD #component #testing
- Using Component Metacontent to Support the Regression Testing of Component-Based Software (AO, MJH, DSR, GR, MLS, HD), pp. 716–725.
- ICSM-2001-PoloPR #case study #legacy #maintenance #metric #predict #source code
- Using Code Metrics to Predict Maintenance of Legacy Programs: A Case Study (MP, MP, FR), pp. 202–208.
- ICSM-2001-TewksburyMM #corba #replication
- Live Upgrades of CORBA Applications Using Object Replication (LAT, LEM, PMMS), p. 488–?.
- IWPC-2001-EisenbarthKS #comprehension #concept analysis #execution
- Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
- IWPC-2001-GannodC #formal method #reverse engineering #tool support
- A Suite of Tools for Facilitating Reverse Engineering Using Formal Methods (GCG, BHCC), pp. 221–232.
- IWPC-2001-Sartipi01a #component #evaluation
- A Software Evaluation Model Using Component Association Views (KS), pp. 259–268.
- SCAM-2001-BurdR #analysis #automation #evolution #source code
- Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
- SCAM-2001-MaggiS #analysis #bytecode #data flow #java
- Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
- SCAM-2001-SharmaC #maintenance
- Application Maintenance Using Software Agents (AS, MAMC), pp. 57–66.
- SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security
- A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
- WCRE-2001-El-RamlyISSM #interactive #modelling
- Modeling the System-User Dialog Using Interaction Traces (MER, PI, ES, PGS, BM), p. 208–?.
- WCRE-2001-MiecznikowskiH #encapsulation #java #staged
- Decompiling Java Using Staged Encapsulation (JM, LJH), pp. 368–374.
- WCRE-2001-Moonen #generative #robust #semiparsing
- Generating Robust Parsers Using Island Grammars (LM), p. 13–?.
- CIAA-2001-AlegriaAEEU #finite #natural language
- Using Finite State Technology in Natural Language Processing of Basque (IA, MJA, NE, AE, RU), pp. 1–12.
- CIAA-2001-HolzerK #encoding #image #order
- Improving Raster Image Run-Length Encoding Using Data Order (MH, MK), pp. 161–176.
- CIAA-2001-KatritzkeMT #automaton #clustering #finite #image
- Enhancements of Partitioning Techniques for Image Compression Using Weighted Finite Automata (FK, WM, MT), pp. 177–189.
- ICALP-2001-BrodalFPO #complexity
- The Complexity of Constructing Evolutionary Trees Using Experiments (GSB, RF, CNSP, AÖ), pp. 140–151.
- ICALP-2001-CohenHK #aspect-oriented #consistency #distributed #performance
- Performance Aspects of Distributed Caches Using TTL-Based Consistency (EC, EH, HK), pp. 744–756.
- FME-2001-LaurentMW #simulation #verification
- Using Formal Verification Techniques to Reduce Simulation and Test Effort (OL, PM, VW), pp. 465–477.
- RTA-2001-KorovinV #order #verification
- Verifying Orientability of Rewrite Rules Using the Knuth-Bendix Order (KK, AV), pp. 137–153.
- RTA-2001-VestergaardB #confluence #first-order #proving #λ-calculus
- A Formalised First-Order Confluence Proof for the λ-Calculus Using One-Sorted Variable Names (RV, JB), pp. 306–321.
- TLCA-2001-Hofmann #behaviour #bound #complexity #memory management #type system
- From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
- TLCA-2001-Pinto #geometry #implementation #interactive #modelling #parallel #λ-calculus
- Parallel Implementation Models for the λ-Calculus Using the Geometry of Interaction (JSP), pp. 385–399.
- FLOPS-2001-KamareddineLN #parametricity
- Refining the Barendregt Cube Using Parameters (FK, TL, RN), pp. 375–390.
- ICFP-2001-FluetW
- Contification Using Dominators (MF, SW), pp. 2–13.
- GT-VMT-2001-CorradiniDR #graph transformation #mobile #specification
- A Graph Transformation View on the Specification of Applications using Mobile Code (AC, FLD, LR0), pp. 238–246.
- CHI-2001-BhavnaniRJ #education #identification
- Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
- CHI-2001-ChiPCP #web
- Using information scent to model user information needs and actions and the Web (EHhC, PP, KC, JEP), pp. 490–497.
- CHI-2001-GarauSBS #communication
- The impact of eye gaze on communication using humanoid avatars (MG, MS, SB, MAS), pp. 309–316.
- CHI-2001-Salvucci #architecture #interface #predict
- Predicting the effects of in-car interfaces on driver bahavior using a cognitive architecture (DDS), pp. 120–127.
- CHI-2001-WoodruffFRMP #web
- Using thumbnails to search the Web (AW, AF, RR, JM, PP), pp. 198–205.
- SVIS-2001-Francik #algorithm #animation #data flow
- Algorithm Animation Using Data Flow Tracing (JF), pp. 73–87.
- SVIS-2001-OechsleS #automation #debugging #diagrams #interface #java #named #sequence chart #visualisation
- JAVAVIS: Automatic Program Visualization with Object and Sequence Diagrams Using the Java Debug Interface (JDI) (RO, TS), pp. 176–190.
- CAiSE-2001-GeneroOPR #information management #maintenance #metric #object-oriented #predict
- Using Metrics to Predict OO Information Systems Maintainability (MG, JAO, MP, FPR), pp. 388–401.
- CAiSE-2001-RoantreeKB #information management #integration #metadata
- Using a Metadata Software Layer in Information Systems Integration (MR, JBK, PJB), pp. 299–314.
- CAiSE-2001-SunyePHGJ #action semantics #execution #modelling #semantics #uml
- Using UML Action Semantics for Executable Modeling and Beyond (GS, FP, WMH, ALG, JMJ), pp. 433–447.
- EDOC-2001-ArreguiPW #middleware #scalability
- Addressing Scalability Issues Using the CLF Middleware (DA, FP, JW), pp. 93–104.
- EDOC-2001-LeffR #design pattern #development #mvc
- Web-Application Development Using the Model/View/Controller Design Pattern (AL, JTR), pp. 118–127.
- EDOC-2001-NealL #development #tool support
- Tool Support for Development Using Patterns (SWN, PFL), p. 237–?.
- EDOC-2001-WegmannN #concept #modelling #ontology
- Conceptual Modeling of Complex Systems Using an RM-ODP Based Ontology (AW, AN), pp. 200–211.
- ICEIS-v1-2001-AllouiO #architecture #component #distributed #process
- Supporting Decentralised Software-Intensive Processes Using ZETA Component-Based Architecture Description Language (IA, FO), pp. 207–215.
- ICEIS-v1-2001-BailinT #ontology
- Ontology Negotiation Using JESS (SCB, WT), pp. 559–570.
- ICEIS-v1-2001-CarvalhoRMNK #fuzzy #logic #quantifier
- Quantification of the Emotional Quotient of the Intelligence using the Classic and Fuzzy Logic (LFdC, RR, RRdM, SMN, CK), pp. 361–365.
- ICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation
- Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
- ICEIS-v1-2001-DiazTO #machine learning
- A Knowledge-Acquisition Methodology for a Blast Furnace Expert System Using Machine Learning Techniques (ED, JT, FO), pp. 336–339.
- ICEIS-v1-2001-MohanY01a #implementation #object-oriented
- Implementing Business Rules in an Object-Oriented System Using JESS (PM, SY), pp. 553–558.
- ICEIS-v1-2001-SoonthornphisajK #algorithm #categorisation #problem #set #web
- The Effects of Differnet Feature Sets on the Web Page Categorization Problem Using the Iterative Cross-Training Algorithm (NS, BK), pp. 404–410.
- ICEIS-v1-2001-ThorntonR #artificial reality #data mining #mining #network
- Using Virtual Reality Data Mining for Network Management (KEBT, CR), pp. 340–344.
- ICEIS-v2-2001-FerreiraTS #internet #named
- Webmaster — An Internet Information Support System for Academic Services Using ASP Technology (CF, LT, RS), pp. 967–973.
- ICEIS-v2-2001-JohnsonD #category theory #enterprise #information management #modelling #specification
- Enterprise Information Systems: Specifying the Links among Project Data Models Using Category Theory (MJ, CNGD), pp. 619–626.
- ICEIS-v2-2001-OliveiraFL #framework #information management #xml
- Using XML and Frameworks to Develop Information Systems (TCdO, IMF, CJPdL), pp. 571–577.
- ICEIS-v2-2001-TehZ #web
- The Web Server Using Dynamic Histograms (YWT, ABZ), pp. 962–966.
- CIKM-2001-ChoHLP #integer
- Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
- CIKM-2001-HansenS #information retrieval #navigation #web
- Using navigation Data to Improve IR functions in the Context of Web Search (MH, ES), pp. 135–142.
- CIKM-2001-Shen #image
- Finding Similar Images Quickly Using Object Shapes (HTS), pp. 498–505.
- CIKM-2001-ZelikovitzH #classification
- Using LSI for Text Classification in the Presence of Background Text (SZ, HH), pp. 113–118.
- ICML-2001-BlumC #graph #learning
- Learning from Labeled and Unlabeled Data using Graph Mincuts (AB, SC), pp. 19–26.
- ICML-2001-DruckerSG #feedback
- Relevance Feedback using Support Vector Machines (HD, BS, DCG), pp. 122–129.
- ICML-2001-GhaniSY #categorisation #hypermedia
- Hypertext Categorization using Hyperlink Patterns and Meta Data (RG, SS, YY), pp. 178–185.
- ICML-2001-LiuECBT #3d #mobile #modelling
- Using EM to Learn 3D Models of Indoor Environments with Mobile Robots (YL, RE, DC, WB, ST), pp. 329–336.
- ICML-2001-McGovernB #automation #learning
- Automatic Discovery of Subgoals in Reinforcement Learning using Diverse Density (AM, AGB), pp. 361–368.
- ICML-2001-PapagelisK
- Breeding Decision Trees Using Evolutionary Techniques (AP, DK), pp. 393–400.
- ICML-2001-RozsypalK #algorithm #classification #nearest neighbour #search-based
- Using the Genetic Algorithm to Reduce the Size of a Nearest-Neighbor Classifier and to Select Relevant Attributes (AR, MK), pp. 449–456.
- ICML-2001-SandM #estimation #modelling
- Repairing Faulty Mixture Models using Density Estimation (PS, AWM), pp. 457–464.
- ICML-2001-StrensM #policy #statistics #testing
- Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
- ICML-2001-Wiering #learning
- Reinforcement Learning in Dynamic Environments using Instantiated Information (MW), pp. 585–592.
- ICML-2001-Wyatt #learning
- Exploration Control in Reinforcement Learning using Optimistic Model Selection (JLW), pp. 593–600.
- KDD-2001-BasuMPG
- Evaluating the novelty of text-mined rules using lexical knowledge (SB, RJM, KVP, JG), pp. 233–238.
- KDD-2001-CarageaCH #classification
- Gaining insights into support vector machine pattern classifiers using projection-based tour methods (DC, DC, VH), pp. 251–256.
- KDD-2001-Dhillon #clustering #documentation #graph #word
- Co-clustering documents and words using bipartite spectral graph partitioning (ISD), pp. 269–274.
- KDD-2001-GarckeG #data mining #mining
- Data mining with sparse grids using simplicial basis functions (JG, MG), pp. 87–96.
- KDD-2001-HarelK #clustering #random
- Clustering spatial data using random walks (DH, YK), pp. 281–286.
- KDD-2001-Kandogan #clustering #coordination #multi #roadmap #visualisation
- Visualizing multi-dimensional clusters, trends, and outliers using star coordinates (EK), pp. 107–116.
- KDD-2001-SpanglerK #analysis #knowledge base #maintenance
- Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
- LSO-2001-BrandtN #experience #project management #reuse
- Computer-Supported Reuse of Project Management Experience with an Experience Base (MB, MN), pp. 178–191.
- LSO-2001-Differding #metric #modelling #process #quality #reuse
- Reuse of Measurement Plans Based on Process and Quality Models (CMD), pp. 207–221.
- MLDM-2001-FischerB #automation #identification
- Automatic Identification of Diatoms Using Decision Forests (SF, HB), pp. 173–183.
- MLDM-2001-Krawiec #comparison #learning #on the #visual notation
- On the Use of Pairwise Comparison of Hypotheses in Evolutionary Learning Applied to Learning from Visual Examples (KK), pp. 307–321.
- MLDM-2001-Krzyzak #classification #learning #network
- Nonlinear Function Learning and Classification Using Optimal Radial Basis Function Networks (AK), pp. 217–225.
- SEKE-2001-BarberGH #architecture #correctness #model checking #simulation
- Evaluating Dynamic Correctness Properties of Domain Reference Architectures Using a Combination of Simulation and Model Checking (KSB, TJG, JH), pp. 19–28.
- SEKE-2001-BrisaboaPPR #database #ontology #web
- Using ontologies for federation of Web accessible databases (NRB, MRP, ÁSP, FJR), pp. 87–94.
- SEKE-2001-BuenoJ #algorithm #automation #generative #search-based #testing
- Automatic Test Data Generation for Program Paths Using Genetic Algorithms (PMSB, MJ), pp. 2–9.
- SEKE-2001-LemosP #information management #interactive #modelling #petri net
- Methodology for Modeling Interactions in Cooperative Information Systems Using Colored Petri Nets (AJPL, AP), pp. 299–306.
- SEKE-2001-RamosSC #modelling #petri net #reuse
- Reuse of Colored Petri Nets Software Models (FR, JFS, FCS), pp. 145–152.
- SIGIR-2001-Broch
- Cite Me, Cite My References? (Scholarly Use of the ACM SIGIR Proceedings Based on Two Citation Indexes) (EB), pp. 446–447.
- SIGIR-2001-ChakrabartiJT #topic
- Enhanced Topic Distillation Using Text, Markup Tags, and Hyperlinks (SC, MJ, VT), pp. 208–216.
- SIGIR-2001-CraswellHR #effectiveness
- Effective Site Finding Using Link Anchor Information (NC, DH, SER), pp. 250–257.
- SIGIR-2001-Crestani #documentation #retrieval #towards
- Towards the use of Prosodic Information for Spoken Document Retrieval (FC), pp. 420–421.
- SIGIR-2001-DrewL #classification
- Construction of a Hierarchical Classifier Schema Using a Combination of Text-Based and Image-Based Approaches (MSD, CL), pp. 438–439.
- SIGIR-2001-GaoXZHNZ #information retrieval #modelling #query #statistics
- Improving Query Translation for Cross-Language Information Retrieval Using Statistical Models (JG, EX, MZ, CH, JYN, JZ), pp. 96–104.
- SIGIR-2001-GongL #analysis #semantics #summary
- Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
- SIGIR-2001-LeeS #clustering #image #learning #retrieval
- Intelligent Object-based Image Retrieval Using Cluster-driven Personal Preference Learning (KML, WNS), pp. 436–437.
- SIGIR-2001-MillerRS #algorithm #matrix
- Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
- SIGIR-2001-RuthvenRL #abduction #empirical #query
- Empirical Investigations on Query Modification Using Abductive Explanations (IR, CJvR, ML), pp. 181–189.
- SIGIR-2001-SakaiR #feedback #flexibility #optimisation #pseudo
- Flexible Pseudo-Relevance Feedback Using Optimization Tables (TS, SER), pp. 396–397.
- SIGIR-2001-SongB #concept #data flow #information management
- Discovering Information Flow Using a High Dimensional Conceptual Space (DS, PB), pp. 327–333.
- SIGIR-2001-StentL #segmentation
- Using Event Segmentation to Improve Indexing of Consumer Photographs (AS, ACL), pp. 59–65.
- SIGIR-2001-WenZN #clustering #feedback #query #word
- Query Clustering Using Content Words and User Feedback (JRW, HZ, JYN), pp. 442–443.
- UML-2001-BottoniKPT #ocl #visualisation
- A Visualization of OCL Using Collaborations (PB, MK, FPP, GT), pp. 257–271.
- UML-2001-SendallS #behaviour #concurrent #constraints #ocl #specification #uml
- Specifying Concurrent System Behavior and Timing Constraints Using OCL and UML (SS, AS), pp. 391–405.
- ECOOP-2001-MeijerPY #dot-net
- Scripting .NET Using Mondrian (EM, NP, AvY), pp. 150–164.
- OOPSLA-2001-RountevMR #analysis #constraints #java #points-to
- Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
- OOPSLA-2001-Whaley #compilation
- Partial Method Compilation using Dynamic Profile Information (JW), pp. 166–179.
- TOOLS-EUROPE-2001-Hoare
- Growing Use of Assertions (CARH), p. 3.
- TOOLS-EUROPE-2001-MollerJ #xml
- Enhancing Jini’s Lookup Service Using XML-Based Service Templates (MBM, BNJ), pp. 19–31.
- TOOLS-EUROPE-2001-Ramos-HernandezFBHBB #integration #object-oriented #process
- Process Control Systems Integration Using Object Oriented Technology (DNRH, PJF, SB, SH, JMB, MJB), pp. 148–160.
- TOOLS-USA-2001-Behravanfar #architecture #generative #internet
- Separation of Data and Presentation for the Next Generation Internet Using the Four-Tier Architecture (RB), pp. 83–88.
- TOOLS-USA-2001-Breuel #code generation #implementation #java
- Implementing Dynamic Language Features in Java Using Dynamic Code Generation (TMB), pp. 143–152.
- TOOLS-USA-2001-GueheneucA #constraints #design pattern #detection #fault
- Using Design Patterns and Constraints to Automate the Detection and Correction of Inter-Class Design Defects (YGG, HAA), pp. 296–306.
- TOOLS-USA-2001-Schultz
- Using Mobility as a Competitive Weapon (ES), p. 9.
- TOOLS-USA-2001-Wu #enterprise #java #web
- Building Web Applications Using Java 2 Enterprise Edition (CTW), pp. 355–356.
- TOOLS-USA-2001-WydaegheV #component #composition #visual notation
- Visual Component Composition Using Composition Patterns (BW, WV), pp. 120–129.
- AdaEurope-2001-FoulgerK #fault #runtime #safety #tool support
- Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
- AdaEurope-2001-HeraudL #ada #interactive
- Using Ada in Interactive Digital Television Systems (PH, TL), pp. 21–34.
- GCSE-2001-WashizakiF #component #distance
- Retrieving Software Components Using Directed Replaceability Distance (HW, YF), pp. 153–162.
- LOPSTR-2001-FioravantiPP #infinity #process #program transformation #set #verification
- Verification of Sets of Infinite State Processes Using Program Transformation (FF, AP, MP), pp. 111–128.
- LOPSTR-2001-LeuschelG #deduction #model checking
- Abstract Conjunctive Partial Deduction Using Regular Types and Its Application to Model Checking (ML, SG), pp. 91–110.
- PADL-2001-BaldoniBCP #logic #programming #web
- Programming Goal-Driven Web Sites Using an Agent Logic Language (MB, CB, AC, VP), pp. 60–75.
- PADL-2001-Cirstea #authentication #protocol #specification
- Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
- PADL-2001-Ramakrishnan #calculus #logic programming #model checking #μ-calculus
- A Model Checker for Value-Passing μ-Calculus Using Logic Programming (CRR), pp. 1–13.
- PLDI-2001-HeintzeT01a #alias #analysis #c
- Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
- PLDI-2001-KrintzC #optimisation
- Using Annotation to Reduce Dynamic Optimization Time (CK, BC), pp. 156–167.
- POPL-2001-Yahav #concurrent #java #logic #safety #source code #verification
- Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
- PPDP-2001-AbdennadherR #confluence #constraints #rule-based #theorem proving
- Using Confluence to Generate Rule-Based Constraint Solvers (SA, CR), pp. 127–135.
- SAS-2001-KomondoorH #identification #slicing #source code
- Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
- SIGAda-2001-ChenBY #adaptation #algorithm #detection
- Detecting concurrently executed pairs of statements using an adapted MHP algorithm (ZC, BX, HY), pp. 107–114.
- SIGAda-2001-FaginME #ada #education
- Teaching computer science with robotics using Ada/Mindstorms 2.0 (BSF, LDM, TWE), pp. 73–78.
- SIGAda-2001-Fassbender #ada #information management #re-engineering #uml
- Reengineering an Ada95-programmed command and control information system by using UML (HF), pp. 53–60.
- SIGAda-2001-Taft #ada #compilation
- Using Ada 95 in a compiler course (STT), pp. 79–80.
- RE-2001-AllenbyK #requirements #safety
- Deriving Safety Requirements Using Scenarios (KA, TK), pp. 228–235.
- RE-2001-Feather #detection #fault #reduction
- Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
- RE-2001-MooreS #elicitation #requirements #visual notation
- Requirements Elicitation Using Visual and Textual Information (JMM, FMSI), pp. 308–309.
- ASE-2001-GannodG #automation #petri net
- An Automated Tool for Analyzing Petri Nets Using SPIN (GCG, SG), pp. 404–407.
- ASE-2001-GrosuLSSY #automation #concurrent #re-engineering
- Automated Software Engineering Using Concurrent Class Machines (RG, YAL, SAS, SDS, JY), p. 297–?.
- ASE-2001-HavelundR #monitoring #source code
- Monitoring Programs Using Rewriting (KH, GR), pp. 135–143.
- ASE-2001-InverardiMP #architecture #automation #consistency #modelling
- Automated Check of Architectural Models Consistency Using SPIN (PI, HM, PP), pp. 346–349.
- ASE-2001-McLarenW #framework #generative #xml
- Developing Generative Frameworks Using XML (IM, TW), pp. 368–372.
- ESEC-FSE-2001-CoadyKFS #composition #operating system
- Using aspectC to improve the modularity of path-specific customization in operating system code (YC, GK, MJF, GS), pp. 88–98.
- ESEC-FSE-2001-Coen-PorisiniDGP #execution #safety #symbolic computation #verification
- Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
- ICSE-2001-Baxter #maintenance #re-engineering
- Using Transformation Systems for Software Maintenance and Reengineering (IDB), pp. 739–740.
- ICSE-2001-CampaillaCCJV #performance
- Efficient Filtering in Publish-Subscribe Systems Using Binary Decision (AC, SC, EMC, SJ, HV), pp. 443–452.
- ICSE-2001-DillonS #analysis #graph #specification
- Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
- ICSE-2001-Gray #component #framework #generative
- Using Software Component Generators to Contstruct a Meta-Weaver Framework (JG), pp. 789–790.
- ICSE-2001-HakalaHKPVV #architecture #programming
- Architecture-Oriented Programming Using FRED (MH, JH, KK, JP, AV, JV), pp. 823–824.
- ICSE-2001-HarmanJ #algorithm #metaheuristic #named #re-engineering
- SEMINAL: Software Engineering Using Metaheuristic INnovative Algorithms (MH, BFJ), pp. 762–763.
- ICSE-2001-HobatrM #c++ #debugging
- Using OCL-Queries for Debugging C++ (CH, BAM), pp. 839–840.
- ICSE-2001-HuntR #documentation #implementation #version control #web
- Using the Web for Document Versioning: An Implementation Report for Delta V (JJH, JR), pp. 507–513.
- ICSE-2001-MaleticM #comprehension #semantics
- Supporting Program Comprehension Using Semantic and Structural Information (JIM, AM), pp. 103–112.
- ICSE-2001-Mehta #evolution #legacy #re-engineering
- Evolving Legacy Systems Using Feature Engineering and CBSE (AM), pp. 797–798.
- ICSE-2001-OvermyerLR #analysis #concept #modelling
- Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
- ICSE-2001-RedondoA #incremental #process #reuse #specification
- Reuse of Verificatino Efforts and Incomplete Specifications in a Formalized, Iterative and Incremental Software Process (RPDR, JJPA), pp. 801–802.
- ICSE-2001-ShullRB
- Improving Software Inspections by Using Reading Techniques (FS, IR, VRB), pp. 726–727.
- SAC-2001-Ben-MiledSBNLAOGKNCMS #object-oriented #transaction
- Global change master directory: object-oriented active asynchronous transaction management in a federated environment using data agents (ZBM, SS, OAB, KN, EL, MA, LO, CG, DK, TN, RC, GM, JS), pp. 207–214.
- SAC-2001-Chainbi01a #paradigm
- Using the object paradigm to deal with the agent paradigm: capabilities and limits (WC), pp. 585–589.
- SAC-2001-CiSN #network #performance
- Improving performance of MAC layer by using congestion control/avoidance methods in wireless network (SC, HS, GN), pp. 420–424.
- SAC-2001-CuestaFB #architecture #coordination
- Dynamic coordination architecture through the use of reflection (CECQ, PdlF, MBS), pp. 134–140.
- SAC-2001-FernandesTMR #algorithm #problem #search-based
- Using assortative mating in genetic algorithms for vector quantization problems (CMF, RT, CM, ACR), pp. 361–365.
- SAC-2001-KallesK #design #game studies #learning #on the #verification
- On verifying game designs and playing strategies using reinforcement learning (DK, PK), pp. 6–11.
- SAC-2001-LawrenceB #database #relational #standard #taxonomy
- Integrating relational database schemas using a standardized dictionary (RL, KB), pp. 225–230.
- SAC-2001-Pressel
- Fundamental limitations on the use of prefetching and stream buffers for scientific applications (DMP), pp. 554–559.
- SAC-2001-SabharwalS #database #fourier #image
- Indexing image databases using wavelet and discrete fourier transform (CLS, SRS), pp. 434–439.
- SAC-2001-VuongSD #distributed #policy #security #xml
- Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
- SAC-2001-ZhouCH #correlation #identification #optimisation #problem #set
- Identifying the most significant pairwise correlations of residues in different positions of helices: the subset selection problem using least squares optimization (XZ, GC, MTH), pp. 51–55.
- LDTA-2001-GayoDLR #composition #monad #named #prototype #semantics
- LPS: A Language Prototyping System Using Modular Monadic Semantics (JELG, MCLD, JMCL, ACdR), pp. 110–131.
- CC-2001-PominvilleQVHV #framework #java #optimisation
- A Framework for Optimizing Java Using Attributes (PP, FQ, RVR, LJH, CV), pp. 334–354.
- DAC-2001-BanerjeeM #analysis #distributed #novel #optimisation #performance
- Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
- DAC-2001-BhanjaR #dependence #modelling #network #probability #process
- Dependency Preserving Probabilistic Modeling of Switching Activity using Bayesian Networks (SB, NR), pp. 209–214.
- DAC-2001-Bondalapati #architecture #configuration management
- Parallelizing DSP Nested Loops on Reconfigurable Architectures using Data Context Switching (KB), pp. 273–276.
- DAC-2001-ChangWM #logic
- Layout-Driven Hot-Carrier Degradation Minimization Using Logic Restructuring Techniques (CWJC, KW, MMS), pp. 97–102.
- DAC-2001-ChenBD #embedded #fault #testing
- Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores (LC, XB, SD), pp. 317–320.
- DAC-2001-Ciriani #logic
- Logic Minimization using Exclusive OR Gates (VC), pp. 115–120.
- DAC-2001-DanielSW #analysis #performance
- Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
- DAC-2001-GolumbicMR #recognition
- Factoring and Recognition of Read-Once Functions using Cographs and Normality (MCG, AM, UR), pp. 109–114.
- DAC-2001-HalpinCS #constraints #physics
- Timing Driven Placement using Physical Net Constraints (BH, CYRC, NS), pp. 780–783.
- DAC-2001-KimJSLK #optimisation
- Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
- DAC-2001-MajumdarW #combinator #satisfiability
- Watermarking of SAT using Combinatorial Isolation Lemmas (RM, JLW), pp. 480–485.
- DAC-2001-MathurS #analysis #precise
- Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
- DAC-2001-McDonaldB #analysis #simulation
- Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
- DAC-2001-PeymandoustM #algebra #algorithm #synthesis
- Using Symbolic Algebra in Algorithmic Level DSP Synthesis (AP, GDM), pp. 277–282.
- DAC-2001-ShinKL #analysis #energy #scheduling
- Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
- DAC-2001-SolomonH #layout
- Using Texture Mapping with Mipmapping to Render a VLSI Layout (JS, MH), pp. 500–505.
- DAC-2001-VelevB #effectiveness #satisfiability #verification
- Effective Use of Boolean Satisfiability Procedures in the Formal Verification of Superscalar and VLIW Microprocessors (MNV, REB), pp. 226–231.
- DAC-2001-YalcinPMBSH #dependence
- An Advanced Timing Characterization Method Using Mode Dependency (HY, RP, MM, CB, KAS, JPH), pp. 657–660.
- DAC-2001-YuYW #representation #synthesis
- Signal Representation Guided Synthesis Using Carry-Save Adders For Synchronous Data-path Circuits (ZY, MLY, ANWJ), pp. 456–461.
- DATE-2001-Burdiek #generative #programming
- Generation of optimum test stimuli for nonlinear analog circuits using nonlinear — programming and time-domain sensitivities (BB), pp. 603–609.
- DATE-2001-ChandraC #performance #testing
- Efficient test data compression and decompression for system-on-a-chip using internal scan chains and Golomb coding (AC, KC), pp. 145–149.
- DATE-2001-ChangHM #functional #optimisation #symmetry
- In-place delay constrained power optimization using functional symmetries (CWJC, BH, MMS), pp. 377–382.
- DATE-2001-CheungWC #clustering #logic
- Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
- DATE-2001-DorschW #embedded #logic #testing
- Using mission logic for embedded testing (RD, HJW), p. 805.
- DATE-2001-GoldbergPB #equivalence #satisfiability
- Using SAT for combinational equivalence checking (EIG, MRP, RKB), pp. 114–121.
- DATE-2001-HajjarCMAB #behaviour #quality #statistics #verification
- High quality behavioral verification using statistical stopping criteria (AH, TC, IM, AAA, MB), pp. 411–419.
- DATE-2001-HoffmannNPBM #development #generative #quality #tool support
- Generating production quality software development tools using a machine description language (AH, AN, SP, GB, HM), pp. 674–678.
- DATE-2001-HuangM #configuration management #design #network
- Managing dynamic reconfiguration overhead in systems-on-a-chip design using reconfigurable datapaths and optimized interconnection networks (ZH, SM), p. 735.
- DATE-2001-NeauMR #complexity
- Low complexity FIR filters using factorization of perturbed coefficients (CN, KM, KR), pp. 268–272.
- DATE-2001-RedaS #diagrams #equivalence #satisfiability
- Combinational equivalence checking using Boolean satisfiability and binary decision diagrams (SR, AS), pp. 122–126.
- DATE-2001-RonaK #modelling
- Modelling SoC devices for virtual test using VHDL (MR, GK), pp. 770–771.
- DATE-2001-TeicaRV #automation #design #on the #verification
- On the verification of synthesized designs using automatically generated transformational witnesses (ET, RR, RV), p. 798.
- DATE-2001-ThorntonD #diagrams #graph transformation
- Spectral decision diagrams using graph transformations (MAT, RD), pp. 713–719.
- DATE-2001-VanasscheGS #exponential #performance #simulation
- Efficient time-domain simulation of telecom frontends using a complex damped exponential signal model (PV, GGEG, WMCS), pp. 169–175.
- DATE-2001-XuM #difference #modelling #performance
- Efficient and passive modeling of transmission lines by using differential quadrature method (QX, PM), pp. 437–444.
- HPCA-2001-DelaluzKVSI #energy #hardware
- DRAM Energy Management Using Software and Hardware Directed Power Mode Control (VD, MTK, NV, AS, MJI), pp. 159–169.
- HPDC-2001-KuntrarukP #data mining #distributed #feature model #mining #parallel
- Massively Parallel Distributed Feature Extraction in Textual Data Mining Using HDDI(tm) (JK, WMP), pp. 363–370.
- HPDC-2001-NatrajanFHGWCB #case study #experience #grid
- Studying Protein Folding on the Grid: Experiences Using CHARMM on NPACI Resources under Legion (AN, ADF, MAH, ASG, NWD, MC, CLBI), pp. 14–21.
- HPDC-2001-SkicewiczDS #behaviour #multi #query
- Multi-Resolution Resource Behaviour Queries Using Wavelets (JAS, PAD, JMS), pp. 395–394.
- LCTES-OM-2001-LarusP #performance #scheduling
- Using Cohort Scheduling to Enhance Server Performance (JRL, MP), pp. 182–187.
- PDP-2001-MedeirosC #parallel
- Using Groups to Support the Interconnection of Parallel Applications (PDM, JCC), pp. 89–96.
- PDP-2001-SanchoRD #behaviour #distributed #on the
- On the Relative Behavior of Source and Distributed Routing in NOWs Using Up/Down Routing Schemes (JCS, AR, JD), pp. 11–18.
- PDP-2001-SchmidtR #embedded #information retrieval #memory management
- Content-Based Information Retrieval Using an Embedded Neural Associative Memory (MS, UR), pp. 443–450.
- PPoPP-2001-LimLL #array #clustering
- Blocking and array contraction across arbitrarily nested loops using affine partitioning (AWL, SWL, MSL), pp. 103–112.
- SOSP-2001-RodriguesCL #abstraction #fault tolerance #named
- BASE: Using Abstraction to Improve Fault Tolerance (RR, MC, BL), pp. 15–28.
- SOSP-2001-SnoerenCG #xml
- Mesh Based Content Routing using XML (ACS, KC, DKG), pp. 160–173.
- SOSP-2001-SpalinkKPG #network #robust
- Building a Robust Software-Based Router Using Network Processors (TS, SK, LLP, YG), pp. 216–229.
- ESOP-2001-KomondoorH #dependence #tool support
- Tool Demonstration: Finding Duplicated Code Using Program Dependences (RK, SH), pp. 383–386.
- ESOP-2001-Thiemann #safety
- Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
- FASE-2001-Jurjens #development #towards
- Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
- STOC-2001-BolligW #bound #branch #integer #multi
- A read-once branching program lower bound of Ω(2n/4) for integer multiplication using universal (BB, PW), pp. 419–424.
- TACAS-2001-Khurshid #algorithm #search-based #testing
- Testing an Intentional Naming Scheme Using Genetic Algorithms (SK), pp. 358–372.
- TACAS-2001-MycroftS #co-evolution #design #functional #hardware
- Hardware/Software Co-Design Using Functional Languages (AM, RS), pp. 236–251.
- TACAS-2001-RuysLKLM #algebra #analysis #partial order #probability #process
- First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
- TACAS-2001-WilliamsAH #diagrams #satisfiability
- Satisfiability Checking Using Boolean Expression Diagrams (PFW, HRA, HH), pp. 39–51.
- CAV-2001-AbdeddaimM #automaton #scheduling
- Job-Shop Scheduling Using Timed Automata (YA, OM), pp. 478–492.
- CAV-2001-Arons #consistency #verification
- Using Timestamping and History Variables to Verify Sequential Consistency (TA), pp. 423–435.
- CAV-2001-BjesseLM #debugging #satisfiability
- Finding Bugs in an α Microprocessor Using Satisfiability Solvers (PB, TL, AM), pp. 454–464.
- CAV-2001-KuehlmannB #verification
- Transformation-Based Verification Using Generalized Retiming (AK, JB), pp. 104–117.
- CAV-2001-KwiatkowskaNS #automation #distributed #protocol #random #verification
- Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
- ICLP-2001-BasuMRRV #bisimulation #constraints #logic programming
- Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming (SB, MM, CRR, IVR, RMV), pp. 166–180.
- IJCAR-2001-BoigelotJW #automaton #integer #linear #on the
- On the Use of Weak Automata for Deciding Linear Arithmetic with Integer and Real Variables (BB, SJ, PW), pp. 611–625.
- IJCAR-2001-Middeldorp #approximate #automaton #dependence #graph
- Approximating Dependency Graphs Using Tree Automata Techniques (AM), pp. 593–610.
- IJCAR-2001-Peltier #automation #deduction
- A General Method for Using Schematizations in Automated Deduction (NP), pp. 578–592.
- LICS-2001-CookK #higher-order #reasoning #theorem
- A Second-Order System for Polytime Reasoning Using Graedel’s Theorem (SAC, AK), pp. 177–186.
- SAT-2001-AmirM #composition #problem #satisfiability
- Solving Satisfiability using Decomposition and the Most Constrained Subproblem (EA, SM), pp. 329–343.
- SAT-2001-JurkowiakLU
- Parallelizing Satz Using Dynamic Workload Balancing (BJ, CML, GU), pp. 174–189.
- SAT-2001-Kullmann #on the #satisfiability
- On the use of autarkies for satisfiability decision (OK), pp. 231–253.
- CBSE-2000-BurgHHMPSW
- Exploring a Comprehensive CBD Method: Use of CBD/e in Practice (WDB, JSH, DPH, KM, ASP, SS, RW), p. 9.
- ADL-2000-Chidlovskii #automaton #xml
- Using Regular Tree Automata as XML Schemas (BC), pp. 89–98.
- ADL-2000-KhanM #ontology #personalisation #retrieval
- Audio Structuring and Personalized Retrieval Using Ontologies (LK, DM), pp. 116–126.
- DL-2000-MooneyR #categorisation #learning #recommendation
- Content-based book recommending using learning for text categorization (RJM, LR), pp. 195–204.
- DL-2000-YaoKEN #analysis #architecture
- Asynchronous information space analysis architecture using content and structure-based service brokering (KTY, IYK, RE, RN), pp. 133–142.
- ECDL-2000-GalavottiSS #automation #categorisation #feature model
- Experiments on the Use of Feature Selection and Negative Evidence in Automated Text Categorization (LG, FS, MS), pp. 59–68.
- ECDL-2000-Khalil #library #question
- Are End-Users Satisfied by Using Digital Libraries? (MAK), pp. 360–363.
- ECDL-2000-StavrakasGM #multi #representation #xml
- Representing Context-Dependent Information Using Multidimensional XML (YS, MG, TM), pp. 368–371.
- ECDL-2000-WeberBS #image #parallel #scalability #similarity
- Interactive-Time Similarity Search for Large Image Collections Using Parallel VA-Files (RW, KB, HJS), pp. 83–92.
- ECDL-2000-ZibreiraP #image #retrieval
- Image Description and Retrieval Using MPEG-7 Shape Descriptors (CZ, FP), pp. 332–335.
- HT-2000-Miyasato #image #interactive #reuse
- Creation of interactive media content by the reuse of images (TM), pp. 246–247.
- HT-2000-SmithSK #generative #orthogonal #taxonomy #video
- An orthogonal taxonomy for hyperlink anchor generation in video streams using OvalTine (JMS, PDS, SUK), pp. 11–18.
- PODS-2000-GeertsK #approximate #database #linear #logic #transitive
- Linear Approximation of Planar Spatial Databases Using Transitive-Closure Logic (FG, BK), pp. 126–135.
- SIGMOD-2000-FaloutsosSTT
- Spatial Join Selectivity Using Power Laws (CF, BS, AJMT, CTJ), pp. 177–188.
- SIGMOD-2000-LitwinS #data type #distributed #scalability
- LH*RS: A High-Availability Scalable Distributed Data Structure using Reed Solomon Codes (WL, TJES), pp. 237–248.
- SIGMOD-2000-Lomet #logic #online
- High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
- SIGMOD-2000-OrdonezC #algorithm #clustering #named #performance #sql
- SQLEM: Fast Clustering in SQL using the EM Algorithm (CO, PC), pp. 559–570.
- SIGMOD-2000-ZaharioudakisCLPU #automation #query #sql #summary
- Answering Complex SQL Queries Using Automatic Summary Tables (MZ, RC, GL, HP, MU), pp. 105–116.
- VLDB-2000-ChakrabartiGRS #approximate #query
- Approximate Query Processing Using Wavelets (KC, MNG, RR, KS), pp. 111–122.
- VLDB-2000-DiligentiCLGG #crawling #graph
- Focused Crawling Using Context Graphs (MD, FC, SL, CLG, MG), pp. 527–534.
- VLDB-2000-KoudasIM #identification #roadmap #set #sketching
- Identifying Representative Trends in Massive Time Series Data Sets Using Sketches (PI, NK, SM), pp. 363–372.
- VLDB-2000-PedersenJD #reuse
- The TreeScape System: Reuse of Pre-Computed Aggregates over Irregular OLAP Hierarchies (TBP, CSJ, CED), pp. 595–598.
- VLDB-2000-PottingerL #algorithm #query #scalability
- A Scalable Algorithm for Answering Queries Using Views (RP, AYL), pp. 484–495.
- VLDB-2000-SakuraiYUK #approximate
- The A-tree: An Index Structure for High-Dimensional Spaces Using Relative Approximation (YS, MY, SU, HK), pp. 516–526.
- VLDB-2000-WangHH #constraints #mining
- Mining Frequent Itemsets Using Support Constraints (KW, YH, JH), pp. 43–52.
- VLDB-2000-WangZ #relational #sql
- Using SQL to Build New Aggregates and Extenders for Object- Relational Systems (HW, CZ), pp. 166–175.
- VLDB-2000-YagoubFIV00a #data-driven #web
- Building and Customizing Data-Intensive Web Sites Using Weave (KY, DF, VI, PV), pp. 607–610.
- CSEET-2000-CybulskiL #analysis #design #education #multi
- Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
- ITiCSE-2000-Chalk #learning #re-engineering
- Apprenticeship learning of software engineering using Webworlds (PC), pp. 112–115.
- ITiCSE-2000-Fagin #ada #education
- Using Ada-based robotics to teach computer science (BSF), pp. 148–151.
- ITiCSE-2000-NelsonN #education #network #open source
- Teaching computer networking using open source software (DN, YMN), pp. 13–16.
- ITiCSE-2000-OdekirkJJ #case study #experience #java
- Three semesters of CSO using Java: assignments and experiences (EO, DJ, PJ), pp. 144–147.
- WCRE-J-1997-JerdingR00 #architecture #locality #visualisation
- Using visualization for architectural localization and extraction (DFJ, SR), pp. 267–284.
- CSMR-2000-BrilFGKW #algebra #multi
- Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
- CSMR-2000-SartipiKM #architecture #data mining #design #mining
- Architectural Design Recovery using Data Mining Techniques (KS, KK, FM), pp. 129–140.
- ICSM-2000-HuMDL #analysis #c #c++ #compilation #execution #symbolic computation
- C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
- ICSM-2000-MockusV #database #identification
- Identifying Reasons for Software Changes using Historic Databases (AM, LGV), pp. 120–130.
- IWPC-2000-ChenR #case study #dependence #feature model #graph
- Case Study of Feature Location Using Dependence Graph (KC, VR), pp. 241–247.
- WCRE-2000-CagninPBM #design pattern #re-engineering
- Reengineering Using Design Patterns (MIC, RP, RTVB, PCM), pp. 118–127.
- WCRE-2000-CzeranskiEKKS #tool support
- Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
- WCRE-2000-DeursenM #legacy
- Exploring Legacy Systems using Types (AvD, LM), pp. 32–41.
- WCRE-2000-MamasK #source code #towards #xml
- Towards Portable Source Code Representations using XML (EM, KK), p. 172–?.
- WCRE-2000-MartinWWM
- Analyzing xfig Using the Rigi Tool Suite (JM, KW, BW, HAM), pp. 207–209.
- WCRE-2000-MuthannaKPS #design #industrial #maintenance #metric
- A Maintainability Model for Industrial Software Systems using Design Level Metrics (SM, KK, KP, BS), p. 248–?.
- ICALP-2000-GhicaM #algol #reasoning #regular expression
- Reasoning about Idealized ALGOL Using Regular Languages (DRG, GM), pp. 103–115.
- IFM-2000-MeyerS #approach #behaviour #consistency #uml #verification
- Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
- CHI-2000-JanckeGG #design
- Presenting to local and remote audiences: design and use of the TELEP system (GJ, JG, AG), pp. 384–391.
- CHI-2000-MyersLY
- Two-handed input using a PDA and a mouse (BAM, KPL, BCY), pp. 41–48.
- CHI-2000-PatrickCSRVC #artificial reality #scalability
- Using a large projection screen as an alternative to head-mounted displays for virtual environments (EP, DC, AS, JAR, TV, GC), pp. 478–485.
- CHI-2000-TaylorR #communication #consistency #semantics
- Gaze communication using semantically consistent spaces (MJT, SMR), pp. 400–407.
- CHI-2000-WatsonFM #predict #quality
- Using naming time to evaluate quality predictors for model simplification (BW, AF, AM), pp. 113–120.
- CSCW-2000-CadizGG #collaboration #documentation #web
- Using Web annotations for asynchronous collaboration around documents (JJC, AG, JG), pp. 309–318.
- CSCW-2000-LitiuP #adaptation #component #framework #mobile
- Developing adaptive groupware applications using a mobile component framework (RL, AP), pp. 107–116.
- CSCW-2000-YanoNIM #interface
- Shared walk environment using locomotion interfaces (HY, HN, HI, TM), pp. 163–170.
- CAiSE-2000-TombrosG #framework #workflow
- Building Extensible Workflow Systems Using an Event-Based Infrastructure (DT, AG), pp. 325–339.
- ICEIS-2000-Barn #component #enterprise #java #modelling #web
- Modelling and Building Component Based Web Applications Using Enterprise Java Beans (BB), p. XXXI-XXXII.
- ICEIS-2000-DawsonS #lazy evaluation #requirements #specification
- Requirements Specification for Electronic Services Delivery Applications Using “Lazy Dog” Templates (LD, AS), pp. 261–266.
- CIKM-2000-AslamPR #clustering
- Using Star Clusters for Filtering (JAA, KP, DR), pp. 306–313.
- CIKM-2000-BoughanemT #algorithm #optimisation #query #search-based
- Query Optimization Using An Improved Genetic Algorithm (MB, LT), pp. 368–373.
- CIKM-2000-Elworthy #database #image #natural language #retrieval
- Retrieval from Captioned Image Databases Using Natural Language Processing (DE), pp. 430–437.
- CIKM-2000-MakawitaTL #database
- Sampling from Databases Using B+-Trees (DPM, KLT, HL), pp. 158–164.
- CIKM-2000-WuAA #approximate #composition #query
- Using Wavelet Decomposition to Support Progressive and Approximate Range-Sum Queries over Data Cubes (YLW, DA, AEA), pp. 414–421.
- ICML-2000-CravenPSBG #coordination #learning #multi
- Using Multiple Levels of Learning and Diverse Evidence to Uncover Coordinately Controlled Genes (MC, DP, JWS, JB, JDG), pp. 199–206.
- ICML-2000-Eskin #detection #probability #semistructured data
- Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
- ICML-2000-Ghani #classification
- Using Error-Correcting Codes for Text Classification (RG), pp. 303–310.
- ICML-2000-KatayamaKK #learning
- A Universal Generalization for Temporal-Difference Learning Using Haar Basis Functions (SK, HK, SK), pp. 447–454.
- ICML-2000-LagoudakisL #algorithm #learning
- Algorithm Selection using Reinforcement Learning (MGL, MLL), pp. 511–518.
- ICML-2000-LiB #approach #clustering #markov #modelling
- A Bayesian Approach to Temporal Data Clustering using Hidden Markov Models (CL, GB), pp. 543–550.
- ICML-2000-MorimotoD #behaviour #learning
- Acquisition of Stand-up Behavior by a Real Robot using Hierarchical Reinforcement Learning (JM, KD), pp. 623–630.
- ICML-2000-Rosenberg #image #statistics
- Image Color Constancy Using EM and Cached Statistics (CRR), pp. 799–806.
- ICML-2000-ShultzR #comparison #knowledge-based #learning #multi
- Using Knowledge to Speed Learning: A Comparison of Knowledge-based Cascade-correlation and Multi-task Learning (TRS, FR), pp. 871–878.
- ICML-2000-SohT #image #learning
- Using Learning by Discovery to Segment Remotely Sensed Images (LKS, CT), pp. 919–926.
- ICML-2000-ThollardDH #automaton #probability
- Probabilistic DFA Inference using Kullback-Leibler Divergence and Minimality (FT, PD, CdlH), pp. 975–982.
- ICML-2000-WalkerWL #comprehension #fault #identification #natural language
- Using Natural Language Processing and discourse Features to Identify Understanding Errors (MAW, JHW, IL), pp. 1111–1118.
- ICML-2000-WesterdijkW #classification #modelling #multi
- Classification with Multiple Latent Variable Models using Maximum Entropy Discrimination (MW, WW), pp. 1143–1150.
- ICML-2000-Zaanen #learning #recursion #syntax
- Bootstrapping Syntax and Recursion using Alginment-Based Learning (MvZ), pp. 1063–1070.
- ICML-2000-ZelikovitzH #classification #problem
- Improving Short-Text Classification using Unlabeled Data for Classification Problems (SZ, HH), pp. 1191–1198.
- ICPR-v1-2000-AleixosBMN #assessment #quality #realtime
- Assessment of Citrus Fruit Quality Using a Real-Time Machine Vision System (NA, JB, EM, FN), pp. 1482–1485.
- ICPR-v1-2000-AnsiaLPM #3d #automation #re-engineering #segmentation
- Automatic 3D Shape Reconstruction of Bones Using Active Nets Based Segmentation (FMA, JL, MGP, AMG), pp. 1486–1489.
- ICPR-v1-2000-ArlandisPL #distance #recognition
- Handwritten Character Recognition using the Continuous Distance Transformation (JA, JCPC, RL), pp. 1940–1943.
- ICPR-v1-2000-AyersC #network #recognition #video
- Scenario Recognition from Video Using a Hierarchy of Dynamic Belief Networks (DA, RC), pp. 1835–1838.
- ICPR-v1-2000-BaldwinB #3d #estimation
- 3D Estimation using Panoramic Stereo (JB, AB), pp. 1097–1100.
- ICPR-v1-2000-Bayro-Corrochano #algebra #invariant
- Computing Depth, Shape and Motion Using Invariants and Incidence Algebra (EBC), pp. 1881–1884.
- ICPR-v1-2000-BesshoIY #detection
- Detecting Human Face and Recognizing Facial Expressions Using Potential Net (HB, YI, MY), pp. 5076–5079.
- ICPR-v1-2000-BorsHW #image #modelling
- Terrain Modeling in Synthetic Aperture Radar Images Using Shape-from-Shading (AGB, ERH, RCW), pp. 1798–1801.
- ICPR-v1-2000-Boufama #synthesis
- The Use of Homographies for View Synthesis (BB), pp. 1563–1566.
- ICPR-v1-2000-Bourgeois #image #retrieval
- Content Based Image Retrieval Using Gradient Color Fields (FLB), pp. 5027–5030.
- ICPR-v1-2000-DuffyCL #detection
- Object Detection Using Color (ND, JLC, GL), pp. 1700–1703.
- ICPR-v1-2000-Farneback #estimation #modelling #parametricity #performance
- Fast and Accurate Motion Estimation Using Orientation Tensors and Parametric Motion Models (GF), pp. 1135–1139.
- ICPR-v1-2000-Fernandez #similarity
- Implicit Model-Oriented Optimal Thresholding Using the Komolgorov-Smirnov Similarity Measure (XF), pp. 1466–1469.
- ICPR-v1-2000-GagaudakisRC #database #image #network #visualisation
- Using CBIR and Pathfinder Networks for Image Database Visualization (GG, PLR, CC), pp. 5052–5055.
- ICPR-v1-2000-HeikkilaSS #estimation #segmentation
- Camera Motion Estimation from Non-Stationary Scenes Using EM-Based Motion Segmentation (JH, PS, OS), pp. 1370–1374.
- ICPR-v1-2000-HsiehF #image #retrieval
- Color Image Retrieval Using Shape and Spatial Properties (ISH, KCF), pp. 5023–5026.
- ICPR-v1-2000-HuangH
- Road Sign Interpretation Using Matching Pursuit Method (CLH, SHH), pp. 1329–1334.
- ICPR-v1-2000-KampkeES #estimation #image #network
- Estimation of Superresolution Images Using Causal Networks: The One-Dimensional Case (TK, AE, CS), pp. 1584–1587.
- ICPR-v1-2000-KimH00a #self #video
- Soccer Video Mosaicing Using Self-Calibration and Line Tracking (HK, KSH), pp. 1592–1595.
- ICPR-v1-2000-KrugerHS #network #realtime
- Affine Real-Time Face Tracking using Gabor Wavelet Networks (VK, AH, GS), pp. 1127–1130.
- ICPR-v1-2000-KumarSR #detection #realtime #recognition
- Real Time Detection and Recognition of Human Profiles Using Inexpensive Desktop Cameras (PK, KS, SR), pp. 5096–5099.
- ICPR-v1-2000-LhuillierQ #constraints #geometry #robust
- Robust Dense Matching Using Local and Global Geometric Constraints (ML, LQ), pp. 1968–1972.
- ICPR-v1-2000-LiuB
- Uncalibrated Stereo Matching Using DWT (HL, PB), pp. 1114–1118.
- ICPR-v1-2000-LiuRC #geometry
- Using Geometric Properties of Correspondence Vectors for the Registration of Free-Form Shapes (YL, MAR, DC), pp. 5011–5014.
- ICPR-v1-2000-Louchet #analysis #evolution
- Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
- ICPR-v1-2000-LourakisTAO #3d #constraints #geometry
- Using Geometric Constraints for Matching Disparate Stereo Views of 3D Scenes Containing Planes (MIAL, SVT, AAA, SCO), pp. 1419–1422.
- ICPR-v1-2000-Mitchell #analysis #documentation #layout #segmentation
- Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
- ICPR-v1-2000-MossH #markov #monte carlo
- Alignment and Correspondence Using Markov Chain Monte Carlo (SM, ERH), pp. 1928–1931.
- ICPR-v1-2000-NandyB #3d #recognition
- Recovery of 3-D Face Structure Using Recognition (DN, JBA), pp. 5104–5108.
- ICPR-v1-2000-NielsenP #adaptation #problem #representation #segmentation
- A Solution to the Problem of Segmentation near Edges Using Adaptable Class-Specific Representation (CFN, PJP), pp. 1436–1440.
- ICPR-v1-2000-OkutomiS #image
- Shape Recovery of Rotating Object Using Weighted Voting of Spatio-Temporal Image (MO, SS), pp. 1790–1793.
- ICPR-v1-2000-PalettaPP #analysis #learning #recognition
- Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
- ICPR-v1-2000-PaquisLK #classification
- Road Surface Classification by Thresholding Using Morphological Pyramid (SP, VL, HK), pp. 1334–1337.
- ICPR-v1-2000-ParkA #image #interactive #multi #recognition
- Recognition of Human Interaction Using Multiple Features in Grayscale Images (SP, JKA), pp. 1051–1054.
- ICPR-v1-2000-ParkLL #3d #modelling #re-engineering #recognition
- Recognition and Reconstruction of 3-D Objects Using Model-Based Perceptual Grouping (IKP, SUL, KML), pp. 1720–1724.
- ICPR-v1-2000-RavyseSCR #composition #detection #process #recognition
- Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition (IR, HS, JC, MJTR), pp. 5080–5083.
- ICPR-v1-2000-SkocajL #image
- Range Image Acquisition of Objects with Non-Uniform Albedo Using Structured Light Range Sensor (DS, AL), pp. 1778–1781.
- ICPR-v1-2000-SomeyaKHI #3d #locality #segmentation
- Localization of Objects in Electric Distribution Systems by Using Segmentation and 3D Template Matching with M-Estimators (YS, KK, KH, KI), pp. 1725–1729.
- ICPR-v1-2000-SteinbachGEB #3d #multi #re-engineering
- 3-D Object Reconstruction Using Spatially Extended Voxels and Multi-Hypothesis Voxel Coloring (EGS, BG, PE, AB), pp. 1774–1777.
- ICPR-v1-2000-Weik
- A Passive Full Body Scanner Using Shape from Silhouettes (SW), pp. 1750–1753.
- ICPR-v1-2000-WeissR
- Recognizing Articulated Objects Using Invariance (IW, MR), pp. 1055–1058.
- ICPR-v1-2000-WorthingtonH #recognition
- Structural Object Recognition Using Shape-from-Shading (PLW, ERH), pp. 1738–1741.
- ICPR-v1-2000-XueLT #invariant #performance
- Efficient Object Matching Using Affine-Invariant Deformable Contour (ZX, SZL, EKT), pp. 1672–1675.
- ICPR-v1-2000-ZhouH #image #representation #retrieval
- Image Representation and Retrieval Using Structural Features (XSZ, TSH), pp. 5039–5042.
- ICPR-v2-2000-AlexandreCK #classification #independence
- Combining Independent and Unbiased Classifiers Using Weighted Average (LAA, ACC, MSK), pp. 2495–2498.
- ICPR-v2-2000-AokiK #image
- An Image Storage System Using Complex-Valued Associative Memories (HA, YK), pp. 2626–2629.
- ICPR-v2-2000-BaggenstossN #classification #probability
- A Theoretically Optimal Probabilistic Classifier Using Class-Specific Features (PMB, HN), pp. 2763–2768.
- ICPR-v2-2000-BajaS #3d #distance #editing #image
- Editing 3D Binary Images Using Distance Transforms (GSdB, SS), pp. 6030–6033.
- ICPR-v2-2000-BartoliPSZ #graph #morphism
- Attributed Tree Homomorphism Using Association Graphs (MB, MP, KS, SWZ), pp. 2133–2136.
- ICPR-v2-2000-BauerHK #recognition #statistics
- Video-Based Continuous Sign Language Recognition Using Statistical Methods (BB, HH, KFK), pp. 2463–2466.
- ICPR-v2-2000-Bax #validation
- Using Validation by Inference to Select a Hypothesis Function (EB), pp. 2700–2703.
- ICPR-v2-2000-Berthilsson #recognition
- Character Recognition Using Shape for Curves (RB), pp. 2227–2230.
- ICPR-v2-2000-BhattacharyaDPCLR #adaptation #image
- Shape Extraction of Volumetric Images of Filamentous Bacteria Using Topology Adaptive Self Organization (UB, AD, SKP, BBC, VL, KR), pp. 2291–2294.
- ICPR-v2-2000-BovisS #detection
- Detection of Masses in Mammograms Using Texture Features (KB, SS), pp. 2267–2270.
- ICPR-v2-2000-BradleyRF #clustering #database #modelling #scalability
- Clustering Very Large Databases Using EM Mixture Models (PSB, CR, UMF), pp. 2076–2080.
- ICPR-v2-2000-ChazalR #classification #comparison
- A Comparison of the Use of Different Wavelet Coefficients for the Classification of the Electrocardiogram (PdC, RBR), pp. 2255–2258.
- ICPR-v2-2000-ChenSWS #estimation
- Head Pose Estimation Using both Color and Feature Information (QC, TS, HW, TS), pp. 2842–2841.
- ICPR-v2-2000-ChenW #analysis #segmentation #string
- Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
- ICPR-v2-2000-CorreiaC #optimisation #recognition
- Optimizing the Recognition Rates of Unconstrained Handwritten Numerals Using Biorthogonal Spline Wavelets (SENC, JMdC), pp. 2251–2254.
- ICPR-v2-2000-DahmenKGN #image #invariant #recognition
- Invariant Image Object Recognition Using Mixture Densities (JD, DK, MOG, HN), pp. 2614–2617.
- ICPR-v2-2000-DehghanFAS #fuzzy #markov #modelling #recognition #word
- Off-Line Unconstrained Farsi Handwritten Word Recognition Using Fuzzy Vector Quantization and Hidden Markov Word Models (MD, KF, MA, MS), pp. 2351–2354.
- ICPR-v2-2000-Fursov #pattern matching #pattern recognition #recognition
- Training in Pattern Recognition from a Small Number of Observations Using Projections onto Null-Space (VAF), pp. 2785–2788.
- ICPR-v2-2000-GuillaudBRBT #detection #multi
- Continuity Perception Using a Multiagent System: An Application to Growth Ring Detection on Fish Otoliths (AG, AB, VR, JLB, HT), pp. 2519–2522.
- ICPR-v2-2000-GuoDR #detection
- Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
- ICPR-v2-2000-HolzL #set #validation
- Validation of Relative Feature Importance Using a Natural Data Set (HJH, MHL), pp. 2414–2417.
- ICPR-v2-2000-HuangY #verification
- Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
- ICPR-v2-2000-JainJV #experience #network
- Short-Term Water Demand Forecasting Using Artificial Neural Networks: IIT Kanpur Experience (AJ, UCJ, AKV), pp. 2459–2462.
- ICPR-v2-2000-JuanV #classification #edit distance #normalisation #on the #performance #string
- On the Use of Normalized Edit Distances and an Efficient k-NN Search Technique (k-AESA) for Fast and Accurate String Classification (AJ, EV), pp. 2676–2679.
- ICPR-v2-2000-KanekoGF #3d #recognition
- Abdominal Organ Recognition Using 3D Mathematical Morphology (TK, LG, HF), pp. 2263–2266.
- ICPR-v2-2000-KatoOA #modelling #precise #recognition
- Precise Hand-printed Character Recognition Using Elastic Models via Nonlinear Transformation (TK, SO, HA), pp. 2364–2367.
- ICPR-v2-2000-KavallieratouSFK #learning #segmentation
- Handwritten Character Segmentation Using Transformation-Based Learning (EK, ES, NF, GKK), pp. 2634–2637.
- ICPR-v2-2000-LaiCF #canonical #correlation
- Power Load Forecasting Using Neural Canonical Correlates (PLL, SJC, CF), pp. 2455–2458.
- ICPR-v2-2000-LaoKST #3d #invariant #recognition
- 3D Template Matching for Pose Invariant Face Recognition Using 3D Facial Model Built with Isoluminance Line Based Stereo Vision (SL, MK, YS, FT), pp. 2911–2916.
- ICPR-v2-2000-LinF #detection #geometry
- Human Face Detection Using Geometric Triangle Relationship (CL, KCF), pp. 2941–2944.
- ICPR-v2-2000-LuoH #algorithm #composition #graph
- Symbolic Graph Matching Using the EM Algorithm and Singular Value Decomposition (BL, ERH), pp. 2141–2144.
- ICPR-v2-2000-MacLeanT #image #pattern matching #pattern recognition #performance #recognition
- Fast Pattern Recognition Using Gradient-Descent Search in an Image Pyramid (WJM, JKT), pp. 2873–2877.
- ICPR-v2-2000-Martinez-HinarejosJC #classification #string
- Use of Median String for Classification (CDMH, AJ, FC), pp. 2903–2906.
- ICPR-v2-2000-MenardDC #ambiguity #analysis #distance #modelling
- Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
- ICPR-v2-2000-MitaniH #classification #design #nearest neighbour
- Classifier Design Based on the Use of Nearest Neighbor Samples (YM, YH), pp. 2769–2772.
- ICPR-v2-2000-MiyamotoHM #classification #design #polynomial
- Use of Bootstrap Samples in Quadratic Classifier Design (TM, YH, YM), pp. 2789–2792.
- ICPR-v2-2000-NgB #classification #segmentation
- Supervised Texture Segmentation using DWT and a Modified K-NN Classifier (BWN, AB), pp. 2545–2548.
- ICPR-v2-2000-PavlovMD #algorithm
- Scaling-Up Support Vector Machines Using Boosting Algorithm (DP, JM, BD), pp. 2219–2222.
- ICPR-v2-2000-PerantonisPV #analysis #classification #component #paradigm
- Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
- ICPR-v2-2000-Ruiz-PinalesL #network #recognition
- Cursive Handwriting Recognition Using the Hough Transform and a Neural Network (JRP, EL), pp. 2231–2234.
- ICPR-v2-2000-Scheunders #image #multi
- Multispectral Image Fusion Using Local Mapping Techniques (PS), pp. 2311–2314.
- ICPR-v2-2000-TanY #convergence #distance #recognition
- Object Recognition Using Fractal Neighbor Distance: Eventual Convergence and Recognition Rates (TT, HY), pp. 2781–2784.
- ICPR-v2-2000-ValvenyM #documentation #framework #recognition
- Hand-Drawn Symbol Recognition in Graphic Documents Using Deformable Template Matching and a Bayesian Framework (EV, EM), pp. 2239–2242.
- ICPR-v2-2000-VillelaA #network #recognition
- Object Recognition by Indexing Using Neural Networks (PRV, JHSA), pp. 6001–6004.
- ICPR-v3-2000-AcharyyaK #segmentation
- Two Texture Segmentation Using M-Band Wavelet Transform (MA, MKK), pp. 3405–3408.
- ICPR-v3-2000-BadenasSP #integration #monitoring #sequence
- Using Temporal Integration for Tracking Regions in Traffic Monitoring Sequences (JB, JMS, FP), pp. 7137–7140.
- ICPR-v3-2000-BaumelaARB #difference #equation #estimation
- Motion Estimation Using the Differential Epipolar Equation (LB, LdA, IDR, PB), pp. 3848–3851.
- ICPR-v3-2000-CarreiraMTH
- Grouping of Directional Features Using an Extended Hough Transform (MJC, MM, BTT, JFH), pp. 7002–7005.
- ICPR-v3-2000-ChantlerM #classification #invariant #on the
- On the Use of Gradient Space Eigenvalues for Rotation Invariant Texture Classification (MJC, GM), pp. 3943–3946.
- ICPR-v3-2000-ChenHD #composition
- Circle Location from Intensity and Range Data Using the Singular Value Decomposition (NsC, GH, SD), pp. 3782–3785.
- ICPR-v3-2000-ChoKN #image #interface #performance
- An Efficient Walkthrough from Two Images Using View Morphing and Spidery Mesh Interface (HSC, CHK, SN), pp. 3143–3146.
- ICPR-v3-2000-ChoPP #image #segmentation
- Segmentation of Color Image Using Deterministic Annealing EM (WHC, SYP, JP), pp. 3646–3649.
- ICPR-v3-2000-DeMenthonDS #distance #image #markov #modelling
- Image Distance Using Hidden Markov Models (DD, DSD, MVS), pp. 3147–3150.
- ICPR-v3-2000-DemireklerKC
- Fusing Length and Voicing Information, and HMM Decision Using a Bayesian Causal Tree against Insufficient Training Data (MD, FK, TÇ), pp. 3106–3109.
- ICPR-v3-2000-FaruquieMRS #modelling #recognition #scalability #speech
- Large Vocabulary Audio-Visual Speech Recognition Using Active Shape Models (TAF, AM, NR, LVS), pp. 3110–3113.
- ICPR-v3-2000-FrankeKN #fuzzy #image
- Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms (KF, MK, BN), pp. 3518–3521.
- ICPR-v3-2000-FukuiIIW #analysis #component
- Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
- ICPR-v3-2000-GalambosKM #probability
- Using Gradient Information to Enhance the Progressive Probabilistic Hough Transform (CG, JK, JM), pp. 3564–3567.
- ICPR-v3-2000-GalleaniC
- Dynamics Using the Wigner Distribution (LG, LC), pp. 3254–3257.
- ICPR-v3-2000-GatosM #algorithm #novel #recursion
- A Novel Recursive Algorithm for Area Location Using Isothetic Polygons (BG, SLM), pp. 3496–3499.
- ICPR-v3-2000-GreenbergAKD #image
- Fingerprint Image Enhancement Using Filtering Techniques (SG, MA, DK, ID), pp. 3326–3329.
- ICPR-v3-2000-GrigorescuPK #case study #comparative #distance
- A Comparative Study of Filter Based Texture Operators Using Mahalanobis Distance (SEG, NP, PK), pp. 3897–3900.
- ICPR-v3-2000-HangaiYH #verification
- Writer Verification Using Altitude and Direction of Pen Movement (SH, SY, TH), pp. 3483–3486.
- ICPR-v3-2000-HarukiH
- Data Fitting by Spline Functions Using the Biorthonormal Basis of the B-spline Basis (RH, TH), pp. 3274–3277.
- ICPR-v3-2000-Ichimura #feature model #segmentation
- Motion Segmentation Using Feature Selection and Subspace Method Based on Shape Space (NI), pp. 3858–3864.
- ICPR-v3-2000-Jehan-BessonBA #detection #set
- Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
- ICPR-v3-2000-JeonY #adaptation #image
- Image Restoration Using Dual Adaptive Regularization Operators (WJ, TY), pp. 3049–3052.
- ICPR-v3-2000-JohanssonKG #detection #normalisation #symmetry
- Detecting Rotational Symmetries Using Normalized Convolution (BJ, HK, GHG), pp. 3500–3504.
- ICPR-v3-2000-KeglK #linear
- Piecewise Linear Skeletonization Using Principal Curves (BK, AK), pp. 3135–3138.
- ICPR-v3-2000-Kiema #automation #classification #data fusion
- Wavelet Compression and Data Fusion: An Investigation into the Automatic Classification of Urban Environments using Color Photography and Laser Scanning Data (JBKK), pp. 3089–3093.
- ICPR-v3-2000-KimC #image #network #segmentation #sequence
- Segmentation of Image Sequences Using SOFM Networks (JK, TC), pp. 3877–3880.
- ICPR-v3-2000-KimCL #detection #feature model #performance
- Fast Scene Change Detection Using Direct Feature Extraction from MPEG Compressed Videos (YMK, SWC, SWL), pp. 3178–3181.
- ICPR-v3-2000-KobayakwaHO #correlation #image #retrieval #robust
- Robust Texture Image Retrieval Using Hierarchical Correlations of Wavelet Coefficients (MK, MH, TO), pp. 3395–3400.
- ICPR-v3-2000-KwanCG #approach #automation #bound
- Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
- ICPR-v3-2000-LiapisST #algorithm #performance #segmentation
- Color and/or Texture Segmentation Using Deterministic Relaxation and Fast Marching Algorithms (SL, ES, GT), pp. 3621–3624.
- ICPR-v3-2000-LiuL #clustering #image
- Wavelet Image Coding Using Cluster Growing Embedding (YL, YDL), pp. 3250–3253.
- ICPR-v3-2000-LloretSLSV #image
- Retinal Image Registration Using Creases as Anatomical Landmarks (DL, JS, AML, AS, JJV), pp. 3207–3210.
- ICPR-v3-2000-LuceySC #linear #performance
- Initialized Eigenlip Estimator for Fast Lip Tracking Using Linear Regression (SL, SS, VC), pp. 3182–3185.
- ICPR-v3-2000-LuoT #approach #multi
- Multi-Level Thresholding: Maximum Entropy Approach Using ICM (XL, JT), pp. 3786–3789.
- ICPR-v3-2000-MaedaINTS #algorithm #fuzzy #image #segmentation
- Rough and Accurate Segmentation of Natural Color Images Using Fuzzy Region-Growing Algorithm (JM, CI, SN, NT, YS), pp. 3642–3645.
- ICPR-v3-2000-MiyagawaFA #modelling
- Texture Modeling by Optimal Gray Scale Structuring Elements Using Morphological Pattern Spectrum (MM, MF, AA), pp. 3479–3482.
- ICPR-v3-2000-MullerH #image #invariant #on the
- On the Use of SDF-Type Filters for Distortion Invariant Image Location (NM, BMH), pp. 3530–3533.
- ICPR-v3-2000-Nakano
- Classifying the Motions of Human Body by Using Gabor Wavelets (HN), pp. 3691–3694.
- ICPR-v3-2000-NaphadeH #framework #probability #semantics #video
- Semantic Video Indexing Using a Probabilistic Framework (MRN, TSH), pp. 3083–3088.
- ICPR-v3-2000-NikolovBCHW #2d #image #multi
- Fusion of 2-D Images Using Their Multiscale Edges (SGN, DRB, CNC, MH, PNTW), pp. 3045–3048.
- ICPR-v3-2000-NodaK #adaptation #identification #probability
- Adaptive Speaker Identification Using Sequential Probability Ratio Test (HN, EK), pp. 3266–3269.
- ICPR-v3-2000-OkataniD00a #estimation
- Estimation of Illumination Distribution Using a Specular Sphere (TO, KD), pp. 3596–3599.
- ICPR-v3-2000-OrriolsTBRVV #approach #detection #modelling #probability
- Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
- ICPR-v3-2000-OrWLL #modelling #segmentation #video
- Panoramic Video Segmentation Using Color Mixture Models (SHO, KhW, KsL, TkL), pp. 3391–3394.
- ICPR-v3-2000-Papamarkos #network #reduction
- Using Local Features in a Neural Network Based Gray-Level Reduction Technique (NP), pp. 7037–7040.
- ICPR-v3-2000-PorterMT #correlation #detection #video
- Video Cut Detection using Frequency Domain Correlation (SVP, MM, BTT), pp. 3413–3416.
- ICPR-v3-2000-RubertoDKJ #image #segmentation
- Segmentation of Blood Images Using Morphological Operators (CDR, AGD, SK, BJ), pp. 3401–3404.
- ICPR-v3-2000-RubertoDKJ00a #automation #image
- Automatic Thresholding of Infected Blood Images Using Granulometry and Regional Extrema (CDR, AGD, SK, BJ), pp. 3445–3448.
- ICPR-v3-2000-SanchisVJ #performance #recognition #speech #verification #word
- Efficient Use of the Grammar Scale Factor to Classify Incorrect Words in Speech Recognition Verification (AS, EV, VMJ), pp. 3278–3281.
- ICPR-v3-2000-SekimotoNTO #query #retrieval #video
- Continuous Retrieval of Video Using Segmentation-Free Query (NS, TN, HT, RO), pp. 3375–3378.
- ICPR-v3-2000-ShojiMT #2d #estimation
- Pose Estimation of a 2-D Articulated Object from Its Silhouette Using a GA (KS, AM, FT), pp. 3717–3721.
- ICPR-v3-2000-VincentCF #3d #segmentation #tool support
- Spatio-Temporal Segmentation Using 3D Morphological Tools (VA, CR, FH), pp. 3885–3892.
- ICPR-v3-2000-WilkinsonRDB #analysis
- Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
- ICPR-v3-2000-WinkNV #heuristic
- Minimum Cost Path Determination Using a Simple Heuristic Function (OW, WJN, MAV), pp. 7010–7013.
- ICPR-v3-2000-YamanaSA #detection #image #reliability
- Edge Plane Detection in Spatio-Temporal Images by Using Edge Vector and Edge Reliability (FY, TS, KA), pp. 3664–3667.
- ICPR-v3-2000-YamazawaYY #3d #re-engineering
- 3D Line Segment Reconstruction by Using HyperOmni Vision and Omnidirectional Hough Transforming (KY, YY, MY), pp. 3487–3490.
- ICPR-v3-2000-ZhaMH #data type #multi
- Dynamic Control of Mesh LODs (Levels of Detail) by Using a Multiresolution Mesh Data Structure (HZ, YM, TH), pp. 3505–3509.
- ICPR-v3-2000-ZhangGST #adaptation #analysis #modelling
- Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
- ICPR-v3-2000-ZhangWZ
- Simultaneously Recovering Affine Motion and Defocus Blur Using Moments (YZ, CW, YZ), pp. 3881–3884.
- ICPR-v4-2000-AdamRS #locality #modelling #navigation
- Using Model-Based Localization with Active Navigation (AA, ER, IS), pp. 4676–4680.
- ICPR-v4-2000-AlbiolNM #people #realtime #tool support
- Real-Time High Density People Counter Using Morphological Tools (AA, VN, IM), pp. 4652–4655.
- ICPR-v4-2000-BareaBMLB #network
- E.O.G. Guidance of a Wheelchair Using Neural Networks (RB, LB, MM, ELG, LMB), pp. 4668–4671.
- ICPR-v4-2000-BodnarovaBL #detection
- Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
- ICPR-v4-2000-Egmont-PetersenFNHBVR #image #multi #network #segmentation
- Segmentation of Bone Tumor in MR Perfusion Images Using Neural Networks and Multiscale Pharmacokinetic Features (MEP, AFF, WJN, PCWH, JLB, MAV, JHCR), pp. 4080–4083.
- ICPR-v4-2000-FabletB #statistics
- Statistical Motion-Based Object Indexing Using Optic Flow Field (RF, PB), pp. 4287–4290.
- ICPR-v4-2000-FolkersSS #multi #query
- Processing Pictorial Queries with Multiple Instances Using Isomorphic Subgraphs (AF, HS, AS), pp. 4051–4054.
- ICPR-v4-2000-Ishii #3d #metric
- 3-D Shape Measurement Using a Focused-Section Method (AI), pp. 4828–4832.
- ICPR-v4-2000-JabriDWR #adaptation #detection #image #people #video
- Detection and Location of People in Video Images Using Adaptive Fusion of Color and Edge Information (SJ, ZD, HW, AR), pp. 4627–4631.
- ICPR-v4-2000-JoganL #locality #recognition #robust
- Robust Localization Using Panoramic View-Based Recognition (MJ, AL), pp. 4136–4139.
- ICPR-v4-2000-KhorsheedC #multi #recognition #word
- Multi-Font Arabic Word Recognition Using Spectral Features (MSK, WFC), pp. 4543–4546.
- ICPR-v4-2000-KimYL
- A Control Model for Vergence Movement on a Stereo Robotic Head Using Disparity Flux (HJK, MHY, SWL), pp. 4491–4494.
- ICPR-v4-2000-KoLB #feature model #image #performance #retrieval
- Region-Based Image Retrieval System Using Efficient Feature Description (BK, HSL, HB), pp. 4283–4286.
- ICPR-v4-2000-Leavers #analysis
- Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
- ICPR-v4-2000-MadabhushiA #process
- Using Head Movement to Recognize Activity (AM, JKA), pp. 4698–4701.
- ICPR-v4-2000-MaderlechnerSS #documentation #image #metric #visual notation
- Extraction of Relevant Information from Document Images Using Measures of Visual Attention (GM, AS, PS), pp. 4385–4388.
- ICPR-v4-2000-MaeUAI #modelling #recognition
- Object Recognition using Appearance Models Accumulated into Environment (YM, TU, TA, KI), pp. 4845–4848.
- ICPR-v4-2000-MamicB #automation #detection
- Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
- ICPR-v4-2000-MataNS #detection #multi
- Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
- ICPR-v4-2000-OhishiKM #online #verification
- On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
- ICPR-v4-2000-OmachiIA #image #multi
- Structure Extraction from Various Kinds of Decorated Characters Using Multi-Scale Images (SO, MI, HA), pp. 4455–4458.
- ICPR-v4-2000-OnishiIF00a #image #segmentation #video
- Blackboard Segmentation Using Video Image of Lecture and Its Applications (MO, MI, KF), pp. 4615–4618.
- ICPR-v4-2000-RohKL #modelling #multi #people
- Multiple People Tracking Using an Appearance Model Based on Temporal Color (HKR, SK, SWL), pp. 4643–4646.
- ICPR-v4-2000-SanchezM00a #behaviour #programming #visual notation
- Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
- ICPR-v4-2000-ShimamuraTYY #image #modelling
- Construction and Presentation of a Virtual Environment Using Panoramic Stereo Images of a Real Scene and Computer Graphics Models (JS, HT, NY, KY), pp. 4463–4467.
- ICPR-v4-2000-ShiranitaHOT #image #metric #sketching
- Shape Measurement and Sketching Systems for Porcelain Using Image Technology (KS, KH, AO, RT), pp. 4795–4798.
- ICPR-v4-2000-StofflerBF #realtime
- Real-Time Obstacle Avoidance Using an MPEG-Processor-Based Optic Flow Sensor (NOS, TB, GF), pp. 4161–4166.
- ICPR-v4-2000-SziranyiC #optimisation #parallel #segmentation
- Spatio-Temporal Segmentation with Edge Relaxation and Optimization Using Fully Parallel Methods (TS, LC), pp. 4820–4823.
- ICPR-v4-2000-TakahashiKIS #image
- Expanding Possible View Points of Virtual Environment Using Panoramic Images (TT, HK, KI, MS), pp. 4468–4472.
- ICPR-v4-2000-TakahashiSO #3d #estimation #image #realtime
- Remarks on a Real-Time 3D Human Body Posture Estimation Method Using Trinocular Images (KT, TS, JO), pp. 4693–4697.
- ICPR-v4-2000-UtsumiYO #adaptation #multi
- Adaptive Human Motion Tracking Using Non-Synchronous Multiple Viewpoint Observations (AU, HY, JO), pp. 4607–4610.
- ICPR-v4-2000-VinczeAZ #integration #performance
- Fast Tracking of Ellipses Using Edge-Projected Integration of Cues (MV, MA, MZ), pp. 4072–4075.
- ICPR-v4-2000-WakaharaK #correlation #invariant #recognition
- Affine-Invariant Gray-Scale Character Recognition Using GAT Correlation (TW, YK), pp. 4417–4421.
- ICPR-v4-2000-WolfKBJ #image #retrieval
- Content Based Image Retrieval Using Interest Points and Texture Features (CW, WGK, HB, JMJ), pp. 4234–4237.
- ICPR-v4-2000-YamaguchiTYY #generative #image #realtime #sequence
- Real-Time Generation and Presentation of View-Dependent Binocular Stereo Images Using a Sequence of Omnidirectional Images (KY, HT, KY, NY), pp. 4589–4593.
- ICPR-v4-2000-YamanyF #3d #recognition
- 3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
- KDD-2000-BarbaraC #clustering #dataset
- Using the fractal dimension to cluster datasets (DB, PC), pp. 260–264.
- KDD-2000-Buchanan #information management #source code
- Informed knowledge discovery: using prior knowledge in discovery programs (BGB), p. 3.
- KDD-2000-CadezHMSW #clustering #modelling #navigation #visualisation #web
- Visualization of navigation patterns on a Web site using model-based clustering (IVC, DH, CM, PS, SW), pp. 280–284.
- KDD-2000-IyengarAZ #adaptation #learning
- Active learning using adaptive resampling (VSI, CA, TZ), pp. 91–98.
- KDD-2000-KingKCD #data mining #functional #mining #predict #sequence
- Genome scale prediction of protein functional class from sequence using data mining (RDK, AK, AC, LD), pp. 384–389.
- KDD-2000-MaLWYL #data mining #mining #student
- Targeting the right students using data mining (YM, BL, CKW, PSY, SML), pp. 457–464.
- KDD-2000-PavlovCS #scalability #towards
- Towards scalable support vector machines using squashing (DP, DC, PS), pp. 295–299.
- KDD-2000-RaghavanBS #detection #predict #process
- Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
- KDD-2000-YamanishiTWM #algorithm #detection #finite #learning #online
- On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms (KY, JiT, GJW, PM), pp. 320–324.
- KR-2000-BaaderKM #concept
- Rewriting Concepts Using Terminologies (FB, RK, RM), pp. 297–308.
- KR-2000-BaralMS #problem
- Formulating diagnostic problem solving using an action language with narratives and sensing (CB, SAM, TCS), pp. 311–322.
- KR-2000-MartinG #concept #learning #policy
- Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
- KR-2000-VerberneHT #approximate #constraints #reasoning
- Anytime Diagnostic Reasoning using Approximate Boolean Constraint Propagation (AV, FvH, AtT), pp. 323–332.
- KR-2000-Voronkov
- Deciding K using inverse-K (AV), pp. 198–209.
- SIGIR-2000-HoashiMIH #documentation
- Document filtering method using non-relevant information profile (KH, KM, NI, KH), pp. 176–183.
- SIGIR-2000-HoenkamG #proximity
- Finding relevant passages using noun-noun compounds: coherence vs. proximity (EH, RdG), pp. 385–387.
- SIGIR-2000-ManevitzY #classification #documentation #network
- Document classification on neural networks using only positive examples (LMM, MY), pp. 304–306.
- SIGIR-2000-NaritaO #information retrieval #query
- The use of phrases from query texts in information retrieval (MN, YO), pp. 318–320.
- SIGIR-2000-OhML #categorisation #hypermedia #incremental
- A practical hypertext categorization method using links and incrementally available class information (HJO, SHM, MHL), pp. 264–271.
- SIGIR-2000-Ounis #image #ranking
- Ranking digital images using combination if evidences (IO), pp. 348–350.
- SIGIR-2000-SlonimT #clustering #documentation #word
- Document clustering using word clusters via the information bottleneck method (NS, NT), pp. 208–215.
- UML-2000-AbdurazikO #collaboration #diagrams #generative #static analysis #testing #uml
- Using UML Collaboration Diagrams for Static Checking and Test Generation (AA, AJO), pp. 383–395.
- ECOOP-2000-Cochinwala #communication #generative
- Using Objects for Next Generation Communication Services (MC), pp. 388–393.
- OOPSLA-2000-MaessenAS #java #memory management
- Improving the Java memory model using CRF (JWM, A, XS), pp. 1–12.
- TOOLS-ASIA-2000-LiCC00a #component #e-commerce
- Developing an E-Commerce Application by Using Content Component Model (QL, PC, JC), pp. 275–284.
- TOOLS-ASIA-2000-LinaLX #java
- An Agent-Based Load Balancing Mechanism: PLRM Using Java (LL, LL, YX), pp. 176–181.
- TOOLS-ASIA-2000-NewmarchSM #enterprise #web
- Using the Web and Jini to link Vending Machines and Enterprise Systems (JN, KS, CM), pp. 260–264.
- TOOLS-ASIA-2000-Wang #automation #flexibility #object-oriented
- Using Object-Orientation in Developing a Flexible Automatic Test System (LW), pp. 65–72.
- TOOLS-ASIA-2000-ZhangW #design pattern #implementation #object-oriented #undo
- Implementing Undo/Redo in PDF Studio Using Object-Oriented Design Pattern (MZ, KW), pp. 58–64.
- TOOLS-ASIA-2000-ZhouC #design #multi #repository
- Design Consideration Using the Multimedia Object Repository (BZ, GC), pp. 81–87.
- TOOLS-EUROPE-2000-DammHTT #case study #component #experience #integration #tool support #xmi
- Tool Integration: Experiences and Issues in Using XMI and Component Technology (CHD, KMH, MT, MT), pp. 94–107.
- TOOLS-EUROPE-2000-DuvalP #design pattern #interactive #kernel #object-oriented
- Using the PAC-Amodeus Model and Design Patterns to Make Interactive an Existing Object-Oriented Kernel (TD, FP), pp. 407–418.
- TOOLS-PACIFIC-2000-BornHK #design #development #distributed #uml
- A Method for the Design and Development of Distributed Applications Using UML (MB, EH, OK), pp. 253–265.
- TOOLS-USA-2000-BirngruberH #set #specification
- Using Plans for Specifying Preconfigured Bean Sets (DB, MH), pp. 217–226.
- TOOLS-USA-2000-Langer00a #c++ #implementation
- Using C++ Templates for Implementation of Patterns (AL), pp. 485–486.
- TOOLS-USA-2000-McDavid #framework #semantics
- A Framework for Discovering, Organizing, and Using Business Semantics (DM), pp. 549–554.
- TOOLS-USA-2000-PulvermullerSR #aspect-oriented #design #implementation #programming
- Implementing Collaboration-Based Designs Using Aspect-Oriented Programming (EP, AS, AR), pp. 95–104.
- AdaEurope-2000-CloshenH #ada #implementation #programming
- An Ada95 Programming Style Checker Using the GNAT ASIS Implementation (PC, HJH), pp. 149–160.
- AdaEurope-2000-FlintD #ada #api #compilation #java
- Using JavaTM APIs with Native Ada Compilers (SF, BD), pp. 41–55.
- AdaEurope-2000-HovaterMB #design #documentation #generative #interface
- Generation of Interface Design Description Documents Using ASIS (SVH, WM, AB), pp. 138–148.
- AdaEurope-2000-MauriS #analysis #embedded #reliability #safety
- Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
- AdaEurope-2000-SoundarajanF #exception #object-oriented #reasoning
- Exceptions in OO Languages: Using Them and Reasoning about Them (NS, SF), pp. 238–251.
- PADL-2000-MarinoM #functional #logic programming #source code #static analysis
- Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), pp. 63–80.
- PEPM-2000-GallagherP #approximate
- Using Regular Approximations for Generalisation During Partial Evalution (JPG, JCP), pp. 44–51.
- PLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer
- Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
- PLDI-2000-FahndrichRD #analysis #constraints #scalability
- Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
- PLDI-2000-HeydonLY #dependence #precise
- Caching function calls using precise dependencies (AH, RL, YY), pp. 311–320.
- PLDI-2000-WilkenLH #integer #programming #scheduling
- Optimal instruction scheduling using integer programming (KDW, JL, MH), pp. 121–133.
- PPDP-2000-KollerM #abstract interpretation #component #morphism #performance
- Efficient abstract interpretation using component-wise homomorphisms (JK, MM), pp. 226–234.
- PPDP-2000-RoychoudhuryRR #proving
- Justifying proofs using memo tables (AR, CRR, IVR), pp. 178–189.
- ICRE-2000-BaumBGM #component #design #requirements #reuse
- Mapping Requirements to Reusable Components Using Design Spaces (LB, MB, LG, GM), pp. 159–167.
- ICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process
- Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
- ASE-2000-FahmyH #architecture #graph grammar
- Using Graph Rewriting to Specify Software Architectural Transformations (HF, RCH), pp. 187–196.
- ASE-2000-LiuR #automation #security
- Automated Security Checking and Patching Using TestTalk (CL, DJR), pp. 261–264.
- ASE-2000-Monroy #abduction #recursion
- The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures (RM), pp. 91–100.
- ASE-2000-WiseCLMOS #coordination #re-engineering
- Using Little-JIL to Coordinate Agents in Software Engineering (AEW, AGC, BSL, EKM, LJO, SMSJ), pp. 155–164.
- FSE-2000-HollingsworthBW #case study #experience
- Experience report: using RESOLVE/C++ for commercial software (JEH, LB, BWW), pp. 11–19.
- ICSE-2000-BasiliLSR
- Improving software inspections by using reading techniques (VRB, OL, FS, IR), p. 836.
- ICSE-2000-KautzHT #enterprise #process
- Applying and adjusting a software process improvement model in practice: the use of the IDEAL model in a small software enterprise (KK, HWH, KT), pp. 626–633.
- ICSE-2000-KazmanK #architecture #design
- Designing and analyzing software architectures using ABASs (RK, MK), p. 820.
- ICSE-2000-LippertL #aspect-oriented #case study #detection #exception #programming
- A study on exception detecton and handling using aspect-oriented programming (ML, CVL), pp. 418–427.
- ICSE-2000-LopesK #aspectj #composition #design #source code
- Improving design and source code modularity using AspectJ (CVL, GK), p. 825.
- ICSE-2000-Michail #data mining #library #mining #reuse
- Data mining library reuse patterns using generalized association rules (AM), pp. 167–176.
- ICSE-2000-Moore #education #lessons learnt #re-engineering #tool support
- Lessons learned from teaching reflective software engineering using the Leap toolkit (CAM), pp. 672–675.
- ICSE-2000-NordPS #architecture
- Planning realistic schedules using software architecture (RLN, DJP, DS), p. 824.
- ICSE-2000-Pisan #specification
- Extending requirement specifications using analogy (YP), pp. 70–76.
- ICSE-2000-Rausch #component #contract #evolution #requirements
- Software evolution in componentware using requirements/assurances contracts (AR), pp. 147–156.
- ICSE-2000-TakahashiEFG #development
- System development using application services over the Net (KT, WE, AF, SG), p. 830.
- SAC-2000-AlhamedL #analysis #approach #clustering #multi
- A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
- SAC-2000-BonfigliCS #adaptation #hypermedia #xml
- Adaptive Intelligent Hypermedia using XML (MEB, GC, PS), pp. 922–926.
- SAC-2000-BougeMNP #architecture #case study #distributed #parallel #runtime #thread
- Using the VI Architecture to Build Distributed, Multithreaded Runtime Systems: A Case Study (LB, JFM, RN, LP), pp. 704–709.
- SAC-2000-BoujarwahSA #analysis #data flow #java #source code #testing
- Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
- SAC-2000-ByunL #classification
- Form Classification Using DP Matching (YB, YL), pp. 1–4.
- SAC-2000-FeekinC #detection #sorting
- Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
- SAC-2000-HaratyF #distributed #optimisation #query
- Distributed Query Optimization Using PERF Joins (RAH, RCF), pp. 284–288.
- SAC-2000-JurisicaG #image #reasoning
- Extending Case-Based Reasoning by Discovering and Using Image Features in IVF (IJ, JIG), pp. 52–59.
- SAC-2000-Khalili #assembly
- Using Pads Instead of Fiducial Marks in Vision Assisted Assembly of PCB’s (KK), pp. 5–9.
- SAC-2000-KirnerM #artificial reality #development #visualisation
- Development of an Information Visualization Tool Using Virtual Reality (TGK, VFMS), pp. 604–606.
- SAC-2000-KoLB #flexibility #image #retrieval
- Image Retrieval Using Flexible Image Subblocks (BK, HSL, HB), pp. 574–578.
- SAC-2000-LeeKHL #dependence #graph #scheduling
- Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization (HL, JK, SJH, SL), pp. 641–648.
- SAC-2000-OchKO #data flow #semistructured data
- Integrating Heterogeneous Data Sources Using the COIL Mediator Definition Language (CO, RK, RO), pp. 991–1000.
- SAC-2000-Reich #algorithm #difference #equation #simulation
- Simulation of Imprecise Ordinary Differential Equations Using Evolutionary Algorithms (CR), pp. 428–432.
- SAC-2000-RudraG #adaptation #clustering #problem
- Adaptive Use of a Cluster of PCs for Data Warehousing Applications: Some Problems and Issues (AR, RPG), pp. 698–703.
- SAC-2000-SchreckC #implementation
- R-Tree Implementation Using Branch-Grafting Method (TS, ZC), pp. 328–332.
- SAC-2000-Tellioglu #architecture #web
- Cooperative Planning: Using the Web for Cooperation in Architectural Planning (HT), pp. 1001–1005.
- SAC-2000-TryfonaJ #abstraction #concept #modelling
- Using Abstractions for Spatio-Temporal Conceptual Modeling (NT, CSJ), pp. 313–322.
- SAC-2000-ZhangP #distributed #network #query
- Distributed Query Processing Using Active Networks (ZZ, WP), pp. 374–380.
- ASPLOS-2000-ChouCEH #compilation #protocol
- Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
- CC-2000-RyderSKGS #exception #java
- A Static Study of Java Exceptions Using JESP (BGR, DS, UK, MG, NS), pp. 67–81.
- CC-2000-Vallee-RaiGHLPS #bytecode #framework #java #optimisation #question
- Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? (RVR, EG, LJH, PL, PP, VS), pp. 18–34.
- DAC-2000-AttarhaNL #fault #fuzzy #logic #modelling #simulation
- Modeling and simulation of real defects using fuzzy logic (AA, MN, CL), pp. 631–636.
- DAC-2000-BergamaschiL #design
- Designing systems-on-chip using cores (RAB, WRL), pp. 420–425.
- DAC-2000-ChangCSM #detection #functional #performance #symmetry
- Fast post-placement rewiring using easily detectable functional symmetries (CWJC, CKC, PS, MMS), pp. 286–289.
- DAC-2000-ChiouJRD #embedded #memory management
- Application-specific memory management for embedded systems using software-controlled caches (DC, PJ, LR, SD), pp. 416–419.
- DAC-2000-DwarakanathB #fault #simulation #tuple
- Universal fault simulation using fault tuples (KND, RDB), pp. 786–789.
- DAC-2000-GhoshF #automation #diagrams #functional #generative
- Automatic test pattern generation for functional RTL circuits using assignment decision diagrams (IG, MF), pp. 43–48.
- DAC-2000-Hassoun #analysis #bound
- Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
- DAC-2000-HutchingsN #design #programming language
- Using general-purpose programming languages for FPGA design (BLH, BEN), pp. 561–566.
- DAC-2000-LuJCF #performance
- Efficient variable ordering using aBDD based sampling (YL, JJ, EMC, MF), pp. 687–692.
- DAC-2000-McDonaldB #clustering #scheduling #simulation
- Symbolic timing simulation using cluster scheduling (CBM, REB), pp. 254–259.
- DAC-2000-QiuWP #petri net #power management #probability
- Dynamic power management of complex systems using generalized stochastic Petri nets (QQ, QW, MP), pp. 352–356.
- DAC-2000-QuP #constraints
- Fingerprinting intellectual property using constraint-addition (GQ, MP), pp. 587–592.
- DAC-2000-RaoN #power management
- Power minimization using control generated clocks (MSR, SKN), pp. 794–799.
- DAC-2000-VancorenlandRSG #algorithm #design
- Optimal RF design using smart evolutionary algorithms (PJV, CDR, MS, GGEG), pp. 7–10.
- DAC-2000-WilsonD #reliability #simulation #verification
- Reliable verification using symbolic simulation with scalar values (CW, DLD), pp. 124–129.
- DAC-2000-YeVKI #design #energy #estimation
- The design and use of simplepower: a cycle-accurate energy estimation tool (WY, NV, MTK, MJI), pp. 340–345.
- DAC-2000-YuKW #representation
- The use of carry-save representation in joint module selection and retiming (ZY, KYK, ANWJ), pp. 768–773.
- DATE-2000-BergfeldNR #embedded #testing
- Diagnostic Testing of Embedded Memories Using BIST (TJB, DN, EMR), pp. 305–309.
- DATE-2000-CarlettaPN #analysis #detection #fault
- Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
- DATE-2000-CiricYS #implementation #logic
- Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic (JC, GY, CS), pp. 277–282.
- DATE-2000-CotaRABCL #reuse
- Reuse of Existing Resources for Analog BIST of a Switch Capacitor Filte (ÉFC, MR, FA, YB, LC, ML), pp. 226–230.
- DATE-2000-GaoW
- Wire-Sizing for Delay Minimization and Ringing Control Using Transmission Line Model (YG, DFW), pp. 512–516.
- DATE-2000-JacobsB #statistics
- Gate Sizing Using a Statistical Delay Model (ETAFJ, MRCMB), pp. 283–290.
- DATE-2000-KacNMZ
- Alternative Test Methods Using IEEE 1149.4 (UK, FN, SM, MSZ), pp. 463–467.
- DATE-2000-KallaZCH #framework #paradigm #recursion #satisfiability
- A BDD-Based Satisfiability Infrastructure Using the Unate Recursive Paradigm (PK, ZZ, MJC, CH), pp. 232–236.
- DATE-2000-KravetsS #symmetry #synthesis
- Constructive Library-Aware Synthesis Using Symmetries (VNK, KAS), pp. 208–213.
- DATE-2000-ManquinhoS #algorithm #on the #satisfiability
- On Using Satisfiability-Based Pruning Techniques in Covering Algorithms (VMM, JPMS), pp. 356–363.
- DATE-2000-Maurer #logic #network #simulation #state machine
- Logic Simulation Using Networks of State Machines (PMM), pp. 674–678.
- DATE-2000-MorawiecUR #algorithm #diagrams #simulation
- Cycle-Based Simulation Algorithms for Digital Systems Using High-Level Decision Diagrams (AM, RU, JR), p. 743.
- DATE-2000-PeesHM
- Retargeting of Compiled Simulators for Digital Signal Processors Using a Machine Description Language (SP, AH, HM), pp. 669–673.
- DATE-2000-SilvaDM #configuration management #correlation #hardware
- Mixed-Signal BIST Using Correlation and Reconfigurable Hardware (JMdS, JSD, JSM), p. 744.
- DATE-2000-SousaA #clustering #complexity #fault #modelling
- Reducing the Complexity of Defect Level Modeling Using the Clustering Effect (JTdS, VDA), pp. 640–644.
- DATE-2000-VerkestKS #c++ #design
- System Level Design Using C++ (DV, JK, FS), pp. 74–81.
- DATE-2000-WeilerMHH #detection
- Detection of Defective Sensor Elements Using Sigma-Delta-Modulation and a Matched Filter (DW, OM, DH, BJH), pp. 599–603.
- HPCA-2000-BoschSSRH #analysis #case study #parallel #performance #visualisation
- Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
- HPCA-2000-MowryR #memory management #multi #thread
- Software-Controlled Multithreading Using Informing Memory Operations (TCM, SRR), pp. 121–132.
- HPDC-2000-GouacheP #corba #industrial #simulation
- Coupling of Industrial Simulation Codes using CORBA (SG, TP), pp. 312–314.
- HPDC-2000-PlaleS #data flow #embedded #named #query #scalability
- dQUOB: Managing Large Data Flows using Dynamic Embedded Queries (BP, KS), pp. 263–270.
- HPDC-2000-SumimotoTHHTI #clustering #communication #network #performance
- High Performance Communication using a Commodity Network for Cluster Systems (SS, HT, AH, HH, TT, YI), pp. 139–146.
- HPDC-2000-TurgeonSC #performance
- Application Placement using Performance Surfaces (AT, QS, MJC), pp. 229–236.
- HPDC-2000-WangOCF #predict
- Using Idle Workstations to Implement Predictive Prefetching (JYQW, JSO, YC, MJF), pp. 87–94.
- ISMM-2000-PlakalF #concurrent #garbage collection #parallel #slicing #thread
- Concurrent Garbage Collection Using Program Slices on Multithreaded Processors (MP, CNF), pp. 94–100.
- LCTES-2000-CintraA #array
- Array Reference Allocation Using SSA-Form and Live Range Growth (MSC, GA), pp. 48–62.
- LCTES-2000-JeongKL #concurrent #multi #realtime
- Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version (BSJ, DK, SL), pp. 33–47.
- OSDI-2000-BrownM #memory management #physics
- Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently (ADB, TCM), pp. 31–44.
- OSDI-2000-EnglerCCH #compilation
- Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions (DRE, BC, AC, SH), pp. 1–16.
- PDP-2000-Rowstron #distributed #fault tolerance #memory management
- Using agent wills to provide fault-tolerance in distributed shared memory systems (AITR), pp. 317–324.
- PDP-2000-ZavanellaM #predict #source code
- Predictability of bulk synchronous programs using MPI (AZ, AM), pp. 118–123.
- FASE-2000-AnlauffKPS #component #composition #domain-specific language
- Using Domain-Specific Languages for the Realization of Component Composition (MA, PWK, AP, AS), pp. 112–126.
- FASE-2000-ClavelDELMMQ #maude
- Using Maude (MC, FD, SE, PL, NMO, JM, JFQ), pp. 371–374.
- FASE-2000-GruerHK #design #network #problem #specification #verification
- Verification of Object-Z Specifications by Using Transition Systems: Application to the Radiomobile Network Design Problem (PG, VH, AK), pp. 222–236.
- FASE-2000-HuizingK #invariant #object-oriented #source code #verification
- Verification of Object Oriented Programs Using Class Invariants (KH, RK), pp. 208–221.
- FASE-2000-HuneS #automaton #case study #synthesis
- A Case Study on Using Automata in Control Synthesis (TH, AS), pp. 349–362.
- FASE-2000-LanoAC #design
- Structuring and Design of Reactive Systems Using RSDS and B (KL, KA, DC), pp. 97–111.
- FASE-2000-Parisi-PresicceW #configuration management #graph transformation #policy
- Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
- FASE-2000-Wehrheim #automation #case study #formal method #specification
- Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods (HW), pp. 334–348.
- STOC-2000-AdlerL #multi #performance
- Compression using efficient multicasting (MA, FTL), pp. 153–162.
- STOC-2000-Boneh #integer
- Finding smooth integers in short intervals using CRT decoding (DB), pp. 265–272.
- STOC-2000-HallgrenRT #quantum #re-engineering
- Normal subgroup reconstruction and quantum computation using group representations (SH, AR, ATS), pp. 627–635.
- TACAS-2000-AlfaroKNPS #model checking #probability #process #representation
- Symbolic Model Checking of Probabilistic Processes Using MTBDDs and the Kronecker Representation (LdA, MZK, GN, DP, RS), pp. 395–410.
- TACAS-2000-BenerecettiG #logic #model checking #protocol #security
- Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
- TACAS-2000-BozgaFG #automation #generative #static analysis #testing
- Using Static Analysis to Improve Automatic Test Generation (MB, JCF, LG), pp. 235–250.
- TACAS-2000-RoychoudhuryKRRS #logic programming #program transformation #verification
- Verification of Parameterized Systems Using Logic Program Transformations (AR, KNK, CRR, IVR, SAS), pp. 172–187.
- CADE-2000-AndrewsB #education #higher-order #logic #named #proving #theorem proving #tutorial
- Tutorial: Using TPS for Higher-Order Theorem Proving and ETPS for Teaching Logic (PBA, CEB), pp. 511–512.
- CADE-2000-BezemHN #automation #proving #type system
- Automated Proof Construction in Type Theory Using Resolution (MB, DH, HdN), pp. 148–163.
- CADE-2000-Harrison #proving #theorem proving #verification
- High-Level Verification Using Theorem Proving and Formalized Mathematics (JH), pp. 1–6.
- CADE-2000-HasegawaFK #branch #generative #performance
- Efficient Minimal Model Generation Using Branching Lemmas (RH, HF, MK), pp. 184–199.
- CAV-2000-StollerUL #detection #distributed #partial order #performance
- Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
- CL-2000-AllainY #database #specification
- Specification of an Active Database System Application Using Dynamic Relation Nets (LA, PY), pp. 1197–1209.
- CL-2000-BastidePTSL #mining
- Mining Minimal Non-redundant Association Rules Using Frequent Closed Itemsets (YB, NP, RT, GS, LL), pp. 972–986.
- CL-2000-HolldoblerS #calculus #diagrams #problem
- Solving the Entailment Problem in the Fluent Calculus Using Binary Decision Diagrams (SH, HPS), pp. 747–761.
- CL-2000-KozenP #algebra #certification #compilation #optimisation #testing
- Certification of Compiler Optimizations Using Kleene Algebra with Tests (DK, MCP), pp. 568–582.
- CL-2000-PearceGV #equilibrium #modelling
- Computing Equilibrium Models Using Signed Formulas (DP, IPdG, AV), pp. 688–702.
- CL-2000-YangK #implementation #logic #named #performance
- FLORA: Implementing an Efficient DOOD System Using a Tabling Logic Engine (GY, MK), pp. 1078–1093.
- ISSTA-2000-SchroederK #analysis #black box #reduction
- Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
- TestCom-2000-HorvathM #functional #testing
- Functional Testing GPRS Support Nodes Using TTCN (EH, AM), pp. 229–238.
- TestCom-2000-MednonogovKMM #consistency #corba #testing
- Conformance Testing of CORBA Services Using TTCN (AM, HK, OM, JM), p. 193–?.
- TestCom-2000-RyuKKS #design #generative #testing
- Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques (JR, MK, SK, SS), pp. 127–142.
- WICSA-1999-RiegelKS #architecture #modelling
- Modeling Software Architecture Using Domain-Specific Patterns (JPR, CK, MS), pp. 273–292.
- WICSA-1999-SaridakisI #architecture
- Developing Dependable Systems Using Software Architecture (TS, VI), pp. 83–104.
- DL-1999-DushayFL #distributed #library #query
- Using Query Mediators for Distributed Searching in Federated Digital Libraries (ND, JCF, CL), pp. 171–178.
- DL-1999-JonesP #library #topic
- Topic-Based Browsing Within a Digital Library Using Keyphrases (SJ, GWP), pp. 114–121.
- DL-1999-MelucciO #information retrieval
- Musical Information Retrieval Using Melodic Surface (MM, NO), pp. 152–160.
- ECDL-1999-HansenYG #hypermedia #library
- Dynamic Use of Digital Library Material — Supporting Users with Typed Links in Open Hypermedia (KMH, CY, KG), pp. 254–273.
- ECDL-1999-LopezRH #information management #summary
- Using and Evaluating User Directed Summaries to Improve Information Access (MJML, MdBR, JMGH), pp. 198–214.
- ECDL-1999-VelegrakisCC #declarative #logic #specification
- Declarative Specification of Z39.50 Wrappers Using Description Logics (YV, VC, PC), pp. 383–402.
- HT-1999-AuffretCCDRB #authoring #documentation #hypermedia #performance
- Audiovisual-Based Hypermedia Authoring: Using Structured Representations for Efficient Access to AV Documents (GA, JC, OC, TD, RR, BB), pp. 169–178.
- ICDAR-1999-AntonacopoulosC #analysis #comparative #representation
- Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
- ICDAR-1999-BippusM #2d #recognition #reduction
- Script Recognition using Inhomogeneous P2DHMM and Hierarchical Search Space Reduction (RDB, VM), pp. 773–776.
- ICDAR-1999-BrakensiekKWWR #evaluation #hybrid #modelling #online #performance #recognition
- Performance Evaluation of a New Hybrid Modeling Technique for Handwriting Recognition using On-Line and Off-Line Data (AB, AK, DW, WW, GR), pp. 446–449.
- ICDAR-1999-BunkeSYS #online #video
- Online Handwriting Data Acquisition using a Video Camera (HB, TvS, TY, MS), pp. 573–576.
- ICDAR-1999-ChangLTH #analysis #documentation #image #multi
- Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
- ICDAR-1999-ChoiO #network #recognition
- A Segmentation-free Recognition of Two Touching Numerals using Neural Network (SMC, ISO), pp. 253–256.
- ICDAR-1999-FujisawaSWK #image #recognition
- Handwritten Numeral Recognition using Gradient and Curvature of Gray Scale Image (YF, MS, TW, FK), pp. 277–280.
- ICDAR-1999-HebertPG #detection #incremental #learning
- Cursive Character Detection using Incremental Learning (JFH, MP, NG), pp. 808–811.
- ICDAR-1999-Hirayama #framework
- A Framework for Forms Processing using Enhanced-Line-Shared-Adjacent Format (YH), pp. 103–106.
- ICDAR-1999-JeeKL #fault
- Error Correction of Korean Courtesy Amounts in Bank Slips using Rule Information and cross-referencing (TCJ, EJK, YL), pp. 95–98.
- ICDAR-1999-JobbinsE #documentation #multi
- Segmenting Documents using Multiple Lexical Features (ACJ, LJE), pp. 721–724.
- ICDAR-1999-JungSS #classification #multi
- Multifont Classification using Typographical Attributes (MCJ, YCS, SNS), pp. 353–356.
- ICDAR-1999-KameshiroHOY #documentation #fault #image #multi #recognition #retrieval #segmentation
- A Document Image Retrieval Method Tolerating Recognition and Segmentation Errors of OCR using Shape-Feature and Multiple Candidates (TK, TH, YO, FY), pp. 681–684.
- ICDAR-1999-Kawatani #classification #recognition
- Handwritten Kanji Recognition using Combined Complementary Classifiers in a Cascade Arrangement (TK), pp. 503–506.
- ICDAR-1999-KhanH #recognition
- Recognition of Real-Life Character Samples using a Structural Variation and Degradation Model (NAK, HH), pp. 225–228.
- ICDAR-1999-KiseMYM #automation #documentation #generative #hypermedia #keyword #on the
- On the Use of Density Distribution of Keywords for Automated Generation of Hypertext Links from Arbitrary Parts of Documents (KK, HM, MY, KM), pp. 301–304.
- ICDAR-1999-KosmalaRLP #graph grammar #markov #modelling #online #recognition
- On-Line Handwritten Formula Recognition using Hidden Markov Models and Context Dependent Graph Grammars (AK, GR, SL, LP), pp. 107–110.
- ICDAR-1999-LebourgeoisBE #learning
- Structure Relation between Classes for Supervised Learning using Pretopology (FL, MB, HE), pp. 33–36.
- ICDAR-1999-LebourgeoisE #analysis #documentation
- Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
- ICDAR-1999-LiuN #network #recognition
- Handwritten Numeral Recognition using Neural Networks: Improving the Accuracy by Discriminative Training (CLL, MN), pp. 257–260.
- ICDAR-1999-MizukamiMYY #verification
- An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
- ICDAR-1999-MullerER #database #multi #retrieval #sketching
- Multimedia Database Retrieval using Hand-Drawn Sketches (SM, SE, GR), pp. 289–292.
- ICDAR-1999-NagasakiYN #automation #difference #pattern matching #recognition
- Relaxation-based Pattern Matching using Automatic Differentiation for Off-line Character Recognition (TN, TY, MN), pp. 229–232.
- ICDAR-1999-NishimuraKMN #algorithm #feature model #multi #recognition
- Off-line Character Recognition using HMM by Multiple Directional Feature Extraction and Voting with Bagging Algorithm (HN, MK, MM, YN), pp. 49–52.
- ICDAR-1999-OkamotoY #online #recognition
- On-line Handwritten Character Recognition Method using Directional Features and Clockwise/Counterwise Direction-Change Features (MO, KY), pp. 491–494.
- ICDAR-1999-PalmeroD #documentation
- Structured Document Labeling and Rule Extraction using a New Recurrent Fuzzy-neural System (GISP, YAD), pp. 181–184.
- ICDAR-1999-RemakiC #documentation #image #kernel #product line #visual notation
- Visual Data Extraction from Bi-level Document Images using a Generalized Kernel Family with Compact Support, in Scale-Space (LR, MC), pp. 609–612.
- ICDAR-1999-SaidYS #recognition
- Recognition of English and Arabic Numerals using a Dynamic Number of Hidden Neurons (FNS, RAY, CYS), pp. 237–240.
- ICDAR-1999-SawakiMH #image #recognition
- Character Recognition in Bookshelf Images using Context-based Image Templates (MS, HM, NH), pp. 79–82.
- ICDAR-1999-StuckelbergD #on the #probability #reasoning #recognition
- On Musical Score Recognition using Probabilistic Reasoning (MVS, DSD), pp. 115–118.
- ICDAR-1999-TanYHWZ
- Text/Graphics Separation using Agent-based Pyramid Operations (CLT, BY, WH, QW, ZZ), pp. 169–172.
- ICDAR-1999-UchidaS #2d #recognition
- Handwritten Character Recognition using Monotonic and Continuous Two-dimensional Warping (SU, HS), pp. 499–502.
- ICDAR-1999-ViswanathanBDT #documentation #retrieval
- Retrieval from Spoken Documents using Content and Speaker Information (MV, HSMB, SD, AT), pp. 567–572.
- ICDAR-1999-WakaharaK #correlation #invariant
- Affine-Invariant Correlation of Gray-Scale Characters using GAT Iteration (TW, YK), pp. 613–616.
- ICDAR-1999-WorringT #clustering #documentation #segmentation
- Segmentation of Color Documents by Line Oriented Clustering using Spatial Information (MW, LT), pp. 67–70.
- ICDAR-1999-WuS #classification #distance #multi #network #recognition
- Unconstrained Handwritten Numeral Recognition using Hausdorff Distance and Multi-Layer Neural Network Classifier (XW, PS), pp. 249–252.
- ICDAR-1999-YamaokaIBK #approach #documentation #image #interactive #logic
- Interactive Approach to the Extraction of Logical Structures from Unformatted Document Images Using a Sub-structure Model (MY, OI, NB, TK), pp. 185–188.
- PODS-1999-CluetKS
- Using LDAP Directory Caches (SC, OK, DS), pp. 273–284.
- PODS-1999-CohenNS #query
- Rewriting Aggregate Queries Using Views (SC, WN, AS), pp. 155–166.
- PODS-1999-PapadiasMT #multi #optimisation
- Processing and Optimization of Multiway Spatial Joins Using R-Trees (DP, NM, YT), pp. 44–55.
- SIGMOD-1999-JarkeQBLMS #quality
- Improving OLTP Data Quality Using Data Warehouse Mechanisms (MJ, CQ, GB, DL, GM, SS), pp. 536–537.
- SIGMOD-1999-LeeKC #estimation #multi
- Multi-dimensional Selectivity Estimation Using Compressed Histogram Information (JHL, DHK, CWC), pp. 205–214.
- SIGMOD-1999-VitterW #approximate #multi
- Approximate Computation of Multidimensional Aggregates of Sparse Data Using Wavelets (JSV, MW), pp. 193–204.
- SIGMOD-1999-Wu #optimisation #query
- Query Optimization for Selections Using Bitmaps (MCW), pp. 227–238.
- VLDB-1999-AcharyaGP #approximate #named #performance #query
- Aqua: A Fast Decision Support Systems Using Approximate Query Answers (SA, PBG, VP), pp. 754–757.
- VLDB-1999-SahuguetA #legacy #web
- Building Light-Weight Wrappers for Legacy Web Data-Sources Using W4F (AS, FA), pp. 738–741.
- VLDB-1999-WangZL #classification #proximity
- Building Hierarchical Classifiers Using Class Proximity (KW, SZ, SCL), pp. 363–374.
- ITiCSE-1999-ArnowB #education #online #programming #web
- On-line programming examinations using Web to teach (DA, OB), pp. 21–24.
- ITiCSE-1999-KoffmanW #java
- CS1 using Java language features gently (EBK, UW), pp. 40–43.
- ITiCSE-1999-Levin #education
- Use of a soundcard in teaching audio frequency and analog modem communications (MHL), pp. 79–83.
- ITiCSE-1999-Polak #case study #communication #education
- Teaching computer communication skills using case study method (PP), p. 190.
- ITiCSE-1999-PutSZ #network #student
- The system of checking students’ knowledge with the use of wide area networks (DP, JS, MZ), p. 192.
- ITiCSE-1999-PutSZ99a #education #internet #process
- The use of the Internet in the teaching process (DP, JS, MZ), p. 193.
- ITiCSE-1999-SeffahBD #object-oriented
- Assessing object-oriented technology skills using an Internet-based system (AS, MB, MD), pp. 71–74.
- ITiCSE-1999-YangB #education #interface #java #programming
- Using Java and the socket interface in teaching client/server programming (AY, YB), p. 206.
- CSMR-1999-LamLS #metric #requirements
- Managing Requirements Change Using Metrics and Action Planning (WL, ML, VS), pp. 122–129.
- ICSM-1999-BriandWL #impact analysis #metric #object-oriented
- Using Coupling Measurement for Impact Analysis in Object-Oriented Systems (LCB, JW, HL), pp. 475–482.
- ICSM-1999-BurdM #c #cobol
- Evaluating the Use of Dominance Trees for C and COBOL (EB, MM), pp. 401–410.
- ICSM-1999-GallJR #visualisation
- Visualizing Software Release Histories: The Use of Color and Third Dimension (HG, MJ, CR), pp. 99–108.
- ICSM-1999-LapierreMSAFT #automation #execution #generative #linear #programming #testing
- Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees (SL, EM, GS, GA, RF, PT), pp. 189–198.
- ICSM-1999-Ward #assembly #c #migration
- Assembler to C Migration Using the FermaT Transformation System (MPW), pp. 67–76.
- ICSM-1999-ZhouB #ada #source code
- Extracting Objects of Ada Programs Using Module Features (YZ, BX), p. 23–?.
- IWPC-1999-CainM #c++ #lens #visualisation
- Program Visualisation using C++ Lenses (JWC, RJM), pp. 20–26.
- IWPC-1999-DeursenM #cobol #comprehension
- Understanding COBOL Systems using Inferred Types (AvD, LM), pp. 74–81.
- PASTE-1999-Agrawal #graph #performance #testing
- Efficient Coverage Testing Using Global Dominator Graphs (HA), pp. 11–20.
- PASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #verification
- Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
- WCRE-1999-Jermaine
- Computing Program Modularizations Using the k-Cut Method (CJ), pp. 224–234.
- ICALP-1999-CrochemoreMRS
- Text Compression Using Antidictionaries (MC, FM, AR, SS), pp. 261–270.
- ICALP-1999-Galpin #algebra #comparison #process
- Comparison of Process Algebra Equivalences Using Formats (VG), pp. 341–350.
- FM-v1-1999-Bousquet #case study #detection #experience #feature model #interactive #model checking #testing
- Feature Interaction Detection Using Testing and Model-Checking Experience Report (LdB), pp. 622–641.
- FM-v1-1999-SabatierL #design #formal method #smarttech #transaction #validation
- The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications (DS, PL), pp. 348–368.
- FM-v1-1999-TabourierCI #empirical #protocol #testing
- A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
- FM-v2-1999-Droschl #data access #requirements
- Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
- FM-v2-1999-Feijs #modelling #π-calculus
- Modelling Microsoft COM Using π-Calculus (LMGF), pp. 1343–1363.
- FM-v2-1999-HorsteS #formal method #modelling #petri net #simulation
- Formal Modelling and Simulation of Train Control Systems Using Petri Nets (MMzH, ES), p. 1867.
- FM-v2-1999-Jonkers #communication #interactive
- Communication and Synchronisation Using Interaction Objects (HBMJ), pp. 1321–1342.
- FM-v2-1999-KnightFH #tool support
- Tool Support for Production Use of Formal Techniques (JCK, PTF, BRH), p. 1854.
- FM-v2-1999-MarchandS #design #incremental #synthesis
- Incremental Design of a Power Transformer Station Controller Using a Controller Synthesis Methodology (HM, MS), pp. 1605–1624.
- FM-v2-1999-Nakajima #algebra #development #framework #object-oriented #specification
- Using Algebraic Specification Techniques in Development of Object-Oriented Frameworks (SN), pp. 1664–1683.
- FM-v2-1999-PolackS #development
- Systems Development Using Z Generics (FP, SS), pp. 1048–1067.
- IFM-1999-DerrickB #component #specification
- Specifying Component and Context Specification Using Promotion (JD, EAB), pp. 293–312.
- IFM-1999-Paige #communication #concurrent #refinement #specification
- Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication (RFP), pp. 353–372.
- IFM-1999-TreharneS #algebra #process
- Using a Process Algebra to Control B Operations (HT, SS), pp. 437–456.
- FLOPS-1999-BeierleM #approximate #prolog #source code #type checking
- Using Types as Approximations for Type Checking Prolog Programs (CB, GM), pp. 251–266.
- FLOPS-1999-VerbaetenS #analysis #logic programming #source code #termination
- Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
- ICFP-1999-Huch #abstract interpretation #erlang #source code #verification
- Verification of Erlang Programs using Abstract Interpretation and Model Mhecking (FH), pp. 261–272.
- IFL-1999-WieringAP #framework #game studies #platform
- Using Clean for Platform Games (MW, PA, MJP), pp. 1–17.
- AGTIVE-1999-NiereZ #development
- Using FUJABA for the Development of Production Control Systems (JN, AZ), pp. 181–191.
- AGTIVE-1999-NiereZ99a #simulation #testing
- Testing and Simulating Production Control Systems Using the Fujaba Environment (JN, AZ), pp. 449–456.
- AGTIVE-1999-RibeiroC #composition #graph grammar #modelling #simulation
- Compositional Construction of Simulation Models Using Graph Grammars (LR, BC), pp. 87–94.
- AGTIVE-1999-Schleicher #formal method #graph transformation #modelling #process #uml
- Formalizing UML-Based Process Models Using Graph Transformations (AS), pp. 341–357.
- AGTIVE-1999-ZamperoniE #aspect-oriented #exclamation #experience #graph grammar #integration #re-engineering #term rewriting
- Formal Integration of Software Engineering Aspects Using Graph Rewrite Systems — A Typical Experience?! (AZ, GE), pp. 359–367.
- CHI-1999-BhavnaniJF #empirical
- The Strategic Use of CAD: An Empirically Inspired, Theory-Based Course (SKB, BEJ, UF), pp. 183–190.
- CHI-1999-FaradayS #authoring #web
- Authoring Animated Web Pages Using “Contact Points” (PF, AGS), pp. 458–465.
- CHI-1999-JohnsonWBKB #interface
- Sympathetic Interfaces: Using a Plush Toy to Direct Synthetic Characters (MPJ, ADW, BB, CK, AFB), pp. 152–158.
- HCI-CCAD-1999-Chiu #algorithm #approach #learning #search-based
- Learning path planning using genetic algorithm approach (CC), pp. 71–75.
- HCI-CCAD-1999-DuLL #development #memory management #metric
- Using the memory load measurement to improve software development (TCD, CJL, CGL), pp. 53–57.
- HCI-CCAD-1999-FujishigeJK #automaton #finite #recognition #word
- Recognition of Japanese sign language words using finite automata (EF, KJ, TK), pp. 167–171.
- HCI-CCAD-1999-GermannBO #artificial reality
- Assisting individuals with disabilities through the use of virtual reality technologies (CG, JKB, POJ), pp. 952–956.
- HCI-CCAD-1999-HickeyKA #distributed #mobile
- Mobile virtual participation in a distributed meeting using an omni-directional camera system (SH, KK, SA), pp. 533–537.
- HCI-CCAD-1999-InmanL #education
- Teaching orientation and mobility skills to blind children using simulated acoustical environments (DPI, KL), pp. 1090–1094.
- HCI-CCAD-1999-JohnsonO #learning #multi #problem
- Innovative mathematical learning environments — Using multimedia to solve real world problems (LFJ, POJ), pp. 677–681.
- HCI-CCAD-1999-Jones #community #development #user interface
- Using the paper user interface to support community involvement in urban development (RMJ), pp. 427–431.
- HCI-CCAD-1999-Kameneva #communication #education
- Educational use of communication and information technologies in Ukraine (TK), pp. 701–706.
- HCI-CCAD-1999-Kita
- Intelligent plant inspection by using foveated active vision sensor (NK), pp. 1177–1181.
- HCI-CCAD-1999-Machate #concept #interactive #multimodal #smarttech
- Being natural — on the use of multimodal interaction concepts in smart homes (JM), pp. 937–941.
- HCI-CCAD-1999-MaidaNM
- Effects on training using illumination in virtual environments (JM, JN, KM), pp. 1124–1128.
- HCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
- Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
- HCI-CCAD-1999-Morishima #communication #multi
- Multiple points face-to-face communication in cyberspace using multi-modal agent (SM), pp. 177–181.
- HCI-CCAD-1999-PapaioannouN #user interface
- An optimum UI for using a high comfort and enhanced manoeuvrability wheelchair for transportation tasks (GP, AN), pp. 932–936.
- HCI-CCAD-1999-RamalhoBCCLMMV #experience #internet
- Cyber Rally: An experience of democratic use of the internet (GR, FAB, SC, AC, ML, SRdLM, HPM, AV), pp. 402–406.
- HCI-CCAD-1999-Seki #visual notation
- Systematic auditory training of obstacle sense for the visually impaired by using acoustical VR system (YS), pp. 999–1003.
- HCI-CCAD-1999-ShimizuIN #locality #representation
- Pattern representation system using movement sense of localized sound (MS, KI, TN), pp. 990–994.
- HCI-CCAD-1999-TornbergV #concurrent #process
- Concurrent engineering activities using videophone communications (VT, SV), pp. 256–260.
- HCI-CCAD-1999-TrousseJK #approach #behaviour #recommendation #similarity
- Using user behaviour similarity for recommendation computation: the broadway approach (BT, MJ, RK), pp. 85–89.
- HCI-CCAD-1999-WeberLZ
- Symbolic tele-communication using the WWW (HW, FL, KJZ), pp. 802–806.
- HCI-CCAD-1999-YuCK #approximate #multi
- Dynamic event filtering technique using multi-level path approximation in a shared virtual environment (SJY, YCC, KK), pp. 583–587.
- HCI-EI-1999-Baudisch #scalability
- Using a Painting Metaphor to Rate Large Numbers of Objects (PB), pp. 266–270.
- HCI-EI-1999-BondarovskaiaS #social
- Psychological, Ethic, and Social Peculiarities of Using New Information Technologies (VMB, AAS), pp. 129–132.
- HCI-EI-1999-BuckleHWH
- Investigation of the Use of Non-Keyboard Input Devices (NKID) (PB, RAH, VW, SH), pp. 102–105.
- HCI-EI-1999-CarbonellD #empirical #gesture #human-computer #multimodal #speech
- Empirical data on the use of speech and gestures in a multimodal human-computer environment (NC, PD), pp. 446–450.
- HCI-EI-1999-Chuan #case study #web
- Small Group CSCW Using Web Recources: A Case Study (TKC), pp. 788–792.
- HCI-EI-1999-Furtado #approach #design #usability #user interface
- An Approach to Improve Design and Usability of User Interfaces for Supervision Systems by Using Human Factors (EF), pp. 993–997.
- HCI-EI-1999-HertzumJ
- The Evaluator Effect during First-Time Use of the Cognitive Walkthrough Technique (MH, NEJ), pp. 1063–1067.
- HCI-EI-1999-KohzukiNTUHT #eye tracking #interactive
- Man-Machine Interaction Using Eye Movement (KK, TN, AT, MU, SH, KT), pp. 407–411.
- HCI-EI-1999-MachiiMAKYKNK #3d #interface #internet
- An Easy Internet Browsing System with Sophisticated Human Interface Using 3-D Graphics (KM, SM, YA, SK, MY, KK, YN, KK), pp. 228–232.
- HCI-EI-1999-OHaraB #guidelines
- Software Tool for the Use of Human Factors Engineering Guidelines to Conduct Control Room Evaluations (JMO, WSB), pp. 973–977.
- HCI-EI-1999-SchmittO
- Calculation of Totally Optimized Button Configurations Using Fitts’ Law (AS, PO), pp. 392–396.
- HCI-EI-1999-SegenK #animation #gesture #interactive #interface
- Dextrous Interaction with Computer Animations using Vision-Based Gesture Interface (JS, SK), pp. 281–285.
- HCI-EI-1999-ShibuyaT #image #interface #video
- Interface Using Video Captured Images (YS, HT), pp. 247–250.
- HCI-EI-1999-TakahashiK #3d #interface
- 3-D Input Device Using a Ball Rotation Interface (TT, MK), pp. 397–401.
- HCI-EI-1999-Takeda #approach #communication #diagrams
- Evolutionary Approach to Revolutionary Use of Software Diagrams in Client-Designer Communication (KT), pp. 866–870.
- HCI-EI-1999-TeiwesBEMST #eye tracking #human-computer #interactive #research #testing #usability
- The Use of Eye Tracking for Human-Computer Interaction Research and Usability Testing (WT, MB, GWE, SM, ES, WT), pp. 1119–1122.
- HCI-EI-1999-Urokohara #analysis #design #usability #user interface
- Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
- HCI-EI-1999-VienneJJ #adaptation #fuzzy #interface #logic
- Use of Fuzzy Logic in an Adaptive Interface meant for Teleoperation (FV, AMJD, DJ), pp. 306–310.
- CAiSE-1999-Oh #architecture #design #transaction
- The Design of Cooperative Transaction Model by Using Client-Server Architecture (AsO), p. 269.
- CAiSE-1999-ScheerH #information management #process
- From Business Process Model to Application System — Developing an Information System with the House of Business Engineering (HOBE) (AWS, MH), pp. 2–9.
- EDOC-1999-BlancGD #concept #enterprise #uml
- Using the UML language to express the ODP enterprise concepts (XB, MPG, RLD), pp. 50–59.
- EDOC-1999-Linington #community #enterprise #policy #uml
- Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
- ICEIS-1999-BarjisD #analysis #modelling #network #process
- Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
- ICEIS-1999-Chattopadhyay #bibliography #enterprise
- Overview of Enterprise Management Using SAP R/3 (SPC), p. VIII.
- ICEIS-1999-CostaHA #process
- Facilitating Organisational Activities Using Plans and Audits (CJC, TH, PA), pp. 404–411.
- ICEIS-1999-Falsarella #corba #execution #framework #implementation #multi #platform
- Multi Language and Multi Platform Suport for Agent Execution Using CORBA Platform-An Implementation (OMF), p. 772.
- ICEIS-1999-FrantiDSS #automaton #data access
- Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
- ICEIS-1999-Garcia-FanjulMRT #internet #named #online
- TIBLEUS: A Model to Build Internet Online Support Services Using ASP (JGF, CM, CdlR, JT), pp. 619–625.
- ICEIS-1999-MisraSKML #enterprise #information management #integration #scalability
- Integration of Information Systems in Large-Scale Enterprises Using Model-Integrated Computing (AM, JS, GK, MM, ÁL), pp. 485–492.
- ICEIS-1999-NicolleCY
- Using Transformation Paths to Translate and Migrate Data (CN, NC, KY), pp. 125–131.
- ICEIS-1999-Whymark #requirements
- Using Criticality as a Basis for Determining Information Requirements for an EIS (GKW), pp. 542–549.
- CIKM-1999-GeffnerAAS #classification #library #scalability
- Browsing Large Digital Library Collections Using Classification Hierarchies (SG, DA, AEA, TRS), pp. 195–201.
- CIKM-1999-LabrouF #category theory #documentation #exclamation #ontology
- Yahoo! As an Ontology: Using Yahoo! Categories to Describe Documents (YL, TWF), pp. 180–187.
- CIKM-1999-LiY #classification #probability
- Text Classification Using ESC-based Stochastic Decision Lists (HL, KY), pp. 122–130.
- CIKM-1999-WangXL #clustering #scalability #transaction
- Clustering Transactions Using Large Items (KW, CX, BL), pp. 483–490.
- CIKM-1999-YoonHPM #information management
- Using Domain Knowledge in Knowledge Discovery (SCY, LJH, EKP, SAMM), pp. 243–250.
- ICML-1999-AbeL #concept #learning #linear #probability
- Associative Reinforcement Learning using Linear Probabilistic Concepts (NA, PML), pp. 3–11.
- ICML-1999-BrodieD #induction #learning
- Learning to Ride a Bicycle using Iterated Phantom Induction (MB, GD), pp. 57–66.
- ICML-1999-BurgardFJMT #mobile #scalability
- Sonar-Based Mapping of Large-Scale Mobile Robot Environments using EM (WB, DF, HJ, CM, ST), pp. 67–76.
- ICML-1999-FiroiuC #markov #modelling
- Abstracting from Robot Sensor Data using Hidden Markov Models (LF, PRC), pp. 106–114.
- ICML-1999-FrankW
- Making Better Use of Global Discretization (EF, IHW), pp. 115–123.
- ICML-1999-Joachims #classification
- Transductive Inference for Text Classification using Support Vector Machines (TJ), pp. 200–209.
- ICML-1999-RennieM #learning #web
- Using Reinforcement Learning to Spider the Web Efficiently (JR, AM), pp. 335–343.
- ICML-1999-SakakibaraK #context-free grammar #learning
- GA-based Learning of Context-Free Grammars using Tabular Representations (YS, MK), pp. 354–360.
- KDD-1999-BarbaraW #approximate #data analysis
- Using Approximations to Scale Exploratory Data Analysis in Datacubes (DB, XW), pp. 382–386.
- KDD-1999-BrijsSVW #case study
- Using Association Rules for Product Assortment Decisions: A Case Study (TB, GS, KV, GW), pp. 254–260.
- KDD-1999-GantiGR #category theory #clustering #named #summary
- CACTUS — Clustering Categorical Data Using Summaries (VG, JG, RR), pp. 73–83.
- KDD-1999-LarsenA #clustering #documentation #effectiveness #linear #mining #performance
- Fast and Effective Text Mining Using Linear-Time Document Clustering (BL, CA), pp. 16–22.
- KDD-1999-LiuHMC #mining
- Mining Interesting Knowledge Using DM-II (BL, WH, YM, SC), pp. 430–434.
- KDD-1999-MannilaPS #predict
- Prediction with Local Patterns using Cross-Entropy (HM, DP, PS), pp. 357–361.
- KDD-1999-MeretakisW #classification #naive bayes
- Extending Naïve Bayes Classifiers Using Long Itemsets (DM, BW), pp. 165–174.
- KDD-1999-NagDD #interactive
- Using a Knowledge Cache for Interactive Discovery of Association Rules (BN, PD, DJD), pp. 244–253.
- KDD-1999-ZhangRL #database #estimation #kernel #performance #scalability
- Fast Density Estimation Using CF-Kernel for Very Large Databases (TZ, RR, ML), pp. 312–316.
- MLDM-1999-PalenichkaV #image #multi
- Extraction of Local Structural Features in Images by Using a Multi-scale Relevance Function (RMP, MAV), pp. 87–102.
- SIGIR-1999-JonesS #documentation #interactive #named #retrieval
- Phrasier: A System for Interactive Document Retrieval Using Keyphrases (SJ, MSS), pp. 160–167.
- SIGIR-1999-LosadaB #documentation #modelling #ranking
- Using a Belief Revision Operator for Document Ranking in Extended Boolean Models (DEL, AB), pp. 66–73.
- SIGIR-1999-PapadiasMKMA #heuristic #retrieval
- Content-Based Retrieval Using Heuristic Search (DP, MM, PK, NM, IA), pp. 168–175.
- UML-1999-BalustG #modelling #process #uml
- Using UML for Software Process Modelling (JMRB, XF), pp. 292–307.
- UML-1999-DemuthH #constraints #database #design #ocl #relational #uml
- Using UML/OCL Constraints for Relational Database Design (BD, HH), pp. 598–613.
- UML-1999-Hilliard #architecture #uml
- Using the UML for Architectural Description (RH), pp. 32–48.
- UML-1999-KimC #diagrams #formal method #uml
- Formalizing the UML Class Diagram Using Object-Z (SKK, DAC), pp. 83–98.
- ECOOP-1999-PangHLS #multi
- Multi-method Dispatch Using Multiple Row Displacement (CP, WH, YL, DS), pp. 304–328.
- OOPSLA-1999-KerstenM #aspect-oriented #case study #learning #named #programming
- Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming (MK, GCM), pp. 340–352.
- OOPSLA-1999-KrintzCH #java
- Reducing Transfer Delay Using Java Class File Splitting and Prefetching (CK, BC, UH), pp. 276–291.
- OOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality
- Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
- TOOLS-ASIA-1999-BajgoricADU #automation #development #paradigm
- Using Paradigm Plus CASE Tool in a Fusion-Based Application Development Project (NB, IKA, MD, AÜ), pp. 424–427.
- TOOLS-ASIA-1999-KatribFP #java #thread
- Synchronizing Java Threads Using Assertions (MK, DF, EP), pp. 51–60.
- TOOLS-ASIA-1999-LuDD #approach #evolution #object-oriented
- A Equivalent Object-Oriented Schema Evolution Approach Using the Path-Independence Language (JL, CD, WD), pp. 212–217.
- TOOLS-ASIA-1999-ShenLSZ #algorithm #architecture #graph #object-oriented
- An Algorithm for Describing Object-Oriented Software Architecture Using Graph (HHS, CL, MMS, WMZ), pp. 225–231.
- TOOLS-ASIA-1999-TanLTP #architecture #evolution #multi #orthogonal #research #reuse
- Research in Evolution and Reuse of Multi-Leveled Orthogonal Software System Architecture (KT, ZyL, SqT, DcP), pp. 204–211.
- TOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented
- Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
- TOOLS-EUROPE-1999-Bosch #architecture #design #industrial
- Design and Use of Industrial Software Architectures (JB), p. 404.
- TOOLS-EUROPE-1999-Edwards #java #programming #visual notation
- Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java (SE), p. 413.
- TOOLS-EUROPE-1999-Korson #architecture #component #framework
- Using Components, Patterns and Frameworks to Realize Architecture (TDK), p. 415.
- TOOLS-EUROPE-1999-KoscielnyS #distributed #reuse
- Dynamic Reuse of Services in Distributed Systems (GK, SS), pp. 305–318.
- TOOLS-EUROPE-1999-MensWD #architecture #classification
- Declaratively Codifying Software Architectures Using Virtual Software Classifications (KM, RW, TD), pp. 33–45.
- TOOLS-PACIFIC-1999-CookKWMRW #product line #uml
- Defining UML Family Members Using Prefaces (SC, AK, JW, RM, BR, ACW), pp. 102–114.
- TOOLS-PACIFIC-1999-HildebrandtH #corba #image #java
- Dynamic Geospatial Image Mosaics Using JAVA, JAI, RMI and CORBA (JH, RH), pp. 254–264.
- TOOLS-PACIFIC-1999-Hussey #design pattern #specification
- Using Design Patterns to Derive PAC Architectures from Object-Z Specifications (AH), pp. 40–51.
- TOOLS-USA-1999-Arsanjani #analysis #design #distributed #framework #implementation #java
- Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
- TOOLS-USA-1999-ConcepcionLS #development #multi #recursion #thread
- Managing the Software Development by Using the Recursive Multi- Threaded (RMT) Tool (AIC, SL, SJS), pp. 344–353.
- TOOLS-USA-1999-EgeRLL #database #java
- Using Java to Add “Stored Procedures” to Databases (RKE, NR, JL, VL), pp. 322–331.
- TOOLS-USA-1999-Lilly #case study #problem
- Use Case Pitfalls: Top 10 Problems from Real Projects Using Use Cases (SL), pp. 174–183.
- TOOLS-USA-1999-Mikhajlova #framework #java #source code #specification
- Specifying Java Frameworks Using Abstract Programs (AM), p. 136–?.
- AdaEurope-1999-ChapmanD #safety
- Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
- AdaEurope-1999-FranchPV #component #library #non-functional
- Browsing a Component Library Using Non-functional Information (XF, JP, JV), pp. 332–343.
- AdaEurope-1999-Hagenauer #distributed #on the #simulation
- On the Use of Controlled Types for Fossil Collection in a Distributed Simulation Systems (HH), pp. 238–249.
- AdaEurope-1999-LopezVV #ada #design #embedded #hardware
- Hardware/Software Embedded System Specifiaction and Design Using Ada and VHDL (AL, MV, EV), pp. 356–370.
- AdaEurope-1999-MillanLM #ada #adaptation #java #persistent
- An Adaptation of our Ada95/O2 Binding to Provide Persistence to the Java Language: Sharing and Handling of Data between Heterogenous Applications using Persistence (TM, ML, FM), pp. 320–331.
- AdaEurope-1999-VardanegaCP #case study #embedded #realtime #reuse
- A Case Study in the Reuse of On-board Embedded Real-Time Software (TV, GC, JSP), pp. 425–436.
- GCSE-1999-DHondtMW #logic programming
- Using Reflective Logic Programming to Describe Domain Knowledge as an Aspect (MD, WDM, RW), pp. 16–23.
- LOPSTR-1999-HoweK #source code
- Specialising Fininte Domain Programs Using Polyhedra (JMH, AK), pp. 118–135.
- LOPSTR-1999-PeraltaG #approach #imperative
- Imperative Program Specialisation: An Approach Using CLP (JCP, JPG), pp. 102–117.
- PADL-1999-GoltzM #constraints #logic programming
- University Timetabling Using Constraint Logic Programming (HJG, DM), pp. 320–334.
- PADL-1999-Lai #constraints #debugging #proving
- Using Constraints in Local Proofs for CLP Debugging (CL), pp. 350–359.
- PLDI-1999-Vegdahl #graph
- Using Node Merging to Enhance Graph Coloring (SRV), pp. 150–154.
- SAS-1999-TakimotoH #graph
- Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
- SIGAda-1999-BallbastreTVC #ada #case study #distributed #experience #realtime
- Experiences using Ada in a real-time and distributed laboratory (PB, ST, JViC, AC), pp. 145–155.
- SIGAda-1999-Colket #analysis #realtime
- Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
- SIGAda-1999-NeedhamDP #ada #distributed #object-oriented #towards
- Towards a distributed object-oriented propagation model using Ada95 (DMN, SAD, TJP), pp. 203–210.
- RE-1999-GreerBS #risk management
- Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
- RE-1999-WielsE #formal method #modelling
- Formal Modeling of Space Shuttle Software Change Requests using SCR (VW, SME), pp. 114–122.
- ASE-1999-Bose #architecture #automation #modelling #simulation #uml #verification
- Automated Translation of UML Models of Architectures for Verification and Simulation Using SPIN (PKB), pp. 102–109.
- ASE-1999-Krustev #generative #refinement #testing
- Software Test Generation Using Refinement Types (DNK), pp. 279–282.
- ASE-1999-MartinsD #approach #elicitation #process #requirements
- An Approach to Software Requirements Elicitation Using the Precepts from Activity Theory (LEGM, BMD), pp. 15–23.
- ASE-1999-WatersRA #architecture #concept analysis
- Architectural Element Matching Using Concept Analysis (RW, SR, GDA), pp. 291–294.
- ASE-1999-WeltyF #architecture #documentation #ontology
- A Formal Ontology for Re-Use of Software Architecture Documents (CAW, DAF), pp. 259–262.
- ESEC-FSE-1999-Bokowski #constraints #java #named
- CoffeeStrainer: Statically-Checked Constraints on the Definition and Use of Types in Java (BB), pp. 355–374.
- ESEC-FSE-1999-GargantiniH #model checking #requirements #specification #testing
- Using Model Checking to Generate Tests from Requirements Specifications (AG, CLH), pp. 146–162.
- ESEC-FSE-1999-JagerSW #modelling #process #uml
- Using UML for Software Process Modeling (DJ, AS, BW), pp. 91–108.
- ICSE-1999-AtkinsBGM #tool support #version control
- Using Version Control Data to Evaluate the Impact of Software Tools (DLA, TB, TLG, AM), pp. 324–333.
- ICSE-1999-DangK #mobile #model checking
- Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
- ICSE-1999-DashofyMT #architecture #distributed #middleware #off the shelf
- Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures (EMD, NM, RNT), pp. 3–12.
- ICSE-1999-DeursenK #clustering #concept analysis #identification
- Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
- ICSE-1999-HallHW #approach #deployment
- A Cooperative Approach to Support Software Deployment Using the Software Dock (RSH, DH, ALW), pp. 174–183.
- ICSE-1999-Leinbach #agile #delivery #internet
- Successfully Deliver Internet Applications Using Rapid Software Techniques (CL), pp. 624–625.
- ICSE-1999-Magee #analysis #architecture #behaviour
- Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
- ICSE-1999-MaruyamaS #automation #dependence #graph #refactoring
- Automatic Method Refactoring Using Weighted Dependence Graphs (KM, KS), pp. 236–245.
- ICSE-1999-MemonPS #approach #testing #user interface
- Using a Goal-Driven Approach to Generate Test Cases for GUIs (AMM, MEP, MLS), pp. 257–266.
- ICSE-1999-OssherT #development #evolution #object-oriented #problem #programming
- Using Subject-Oriented Programming to Overcome Common Problems in Object-Oriented Software Development/Evolution (HO, PLT), pp. 687–688.
- ICSE-1999-YehL #metric #normalisation #precise #towards
- Toward Precise Measurements Using Software Normalization (PLY, JCL), pp. 736–737.
- SAC-1999-Al-OmariM #fault tolerance
- Fault-Tolerant Routing in Hypercubes Using Masked Interval Routing Scheme (MAO, MM), pp. 481–485.
- SAC-1999-Binkley #dependence #graph #slicing
- Computing Amorphous Program Slices Using Dependence Graphs (DB), pp. 519–525.
- SAC-1999-CraneWS #algorithm #multi #pipes and filters #scheduling #search-based
- Scheduling of Multi-Product Fungible Liquid Pipelines Using Genetic Algorithms (DSC, RLW, DAS), pp. 280–285.
- SAC-1999-FenwickD #automaton #estimation
- Electrical Substation Service-Area Estimation Using Cellular Automata: An Initial Report (JWF, LJD), pp. 560–565.
- SAC-1999-JonesK #algorithm #network #search-based
- The Use of Genetic Algorithms and Neural Networks to Investigate the Baldwin Effect (MJ, AHK), pp. 275–279.
- SAC-1999-KatayamaN #algorithm #problem #search-based
- A New Iterated Local Search Algorithm Using Genetic Crossover for the Traveling Salesman Problem (KK, HN), pp. 302–306.
- SAC-1999-MocellinM #aspect-oriented #behaviour #modelling #multi
- Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS (FM, HM), pp. 450–454.
- SAC-1999-Monfroy #constraints
- Using “Weaker” Functions for Constraint Propagation Over Real Numbers (EM), pp. 553–559.
- SAC-1999-OgataIF #optimisation #term rewriting
- Optimizing Term Rewriting Using Discrimination Nets With Specialization (KO, SI, KF), pp. 511–518.
- SAC-1999-SegarraA #file system #mobile #named
- MFS: A Mobile File System Using Generic System Services (MTS, FA), pp. 419–420.
- SAC-1999-Taylor #finite #induction #pattern matching
- Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique (PAT), pp. 41–45.
- DAC-1999-AbramoviciSS #configuration management #hardware #satisfiability
- A Massively-Parallel Easily-Scalable Satisfiability Solver Using Reconfigurable Hardware (MA, JTdS, DGS), pp. 684–690.
- DAC-1999-AbtsR #multi #scalability #verification
- Verifying Large-Scale Multiprocessors Using an Abstract Verification Environment (DA, MR), pp. 163–168.
- DAC-1999-BalasaL #layout #representation
- Module Placement for Analog Layout Using the Sequence-Pair Representation (FB, KL), pp. 274–279.
- DAC-1999-BiereCCFZ #model checking #satisfiability
- Symbolic Model Checking Using SAT Procedures instead of BDDs (AB, AC, EMC, MF, YZ), pp. 317–320.
- DAC-1999-ChangLPK #verification
- Verification of a Microprocessor Using Real World Applications (YSC, SL, ICP, CMK), pp. 181–184.
- DAC-1999-ChenM
- Noise-Aware Repeater Insertion and Wire-Sizing for On-Chip Interconnect Using Hierarchical Moment-Matching (CPC, NM), pp. 502–506.
- DAC-1999-ConnEMOSVW #optimisation
- Gradient-Based Optimization of Custom Circuits Using a Static-Timing Formulation (ARC, IME, WWM, PRO, PNS, CV, CBW), pp. 452–459.
- DAC-1999-DoboliNDGV #behaviour #design #synthesis
- Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
- DAC-1999-DrechslerG #bound
- Using Lower Bounds During Dynamic BDD Minimization (RD, WG), pp. 29–32.
- DAC-1999-ErcegovacKP #behaviour #multi #optimisation #power management #precise #synthesis
- Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic (MDE, DK, MP), pp. 568–573.
- DAC-1999-GovindarajuDB #approximate #reachability
- Improved Approximate Reachability Using Auxiliary State Variables (SGG, DLD, JPB), pp. 312–316.
- DAC-1999-GunupudiN
- Model-Reduction of Nonlinear Circuits Using Krylov-Space Techniques (PKG, MSN), pp. 13–16.
- DAC-1999-GuoRP #generative #named
- Proptest: A Property Based Test Pattern Generator for Sequential Circuits Using Test Compaction (RG, SMR, IP), pp. 653–659.
- DAC-1999-HemaniMKPONOEL #design #power management
- Lowering Power Consumption in Clock by Using Globally Asynchronous Locally Synchronous Design Style (AH, TM, SK, AP, TO, PN, JÖ, PE, DL), pp. 873–878.
- DAC-1999-JiangV #energy
- IC Test Using the Energy Consumption Ratio (WJ, BV), pp. 976–981.
- DAC-1999-JohnsonSR #performance
- Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS (MCJ, DS, KR), pp. 442–445.
- DAC-1999-KapadiaH #automation #clustering #convergence #design #standard
- Using Partitioning to Help Convergence in the Standard-Cell Design Automation Methodology (HK, MH), pp. 592–597.
- DAC-1999-SalekLP #generative #independence #named
- MERLIN: Semi-Order-Independent Hierarchical Buffered Routing Tree Generation Using Local Neighborhood Search (AHS, JL, MP), pp. 472–478.
- DAC-1999-SaxenaL
- Crosstalk Minimization Using Wire Perturbations (PS, CLL), pp. 100–103.
- DAC-1999-SgroiL #embedded #petri net #synthesis
- Synthesis of Embedded Software Using Free-Choice Petri Nets (MS, LL), pp. 805–810.
- DAC-1999-Sheehan #equation #named #order #performance #reduction
- ENOR: Model Order Reduction of RLC Circuits Using Nodal Equations for Efficient Factorization (BNS), pp. 17–21.
- DAC-1999-StepnerRH #design #embedded #realtime
- Embedded Application Design Using a Real-Time OS (DS, NR, DH), pp. 151–156.
- DAC-1999-SundararajanP #power management #synthesis
- Synthesis of Low Power CMOS VLSI Circuits Using Dual Supply Voltages (VS, KKP), pp. 72–75.
- DAC-1999-TsaiCB #quality
- Improving the Test Quality for Scan-Based BIST Using a General Test Application Scheme (HCT, KTC, SB), pp. 748–753.
- DAC-1999-TupuriKA #automation #constraints #functional #generative #testing
- Test Generation for Gigahertz Processors Using an Automatic Functional Constraint Extractor (RST, AK, JAA), pp. 647–652.
- DAC-1999-VandecappelleMBCV #design #feedback #memory management #multi
- Global Multimedia System Design Exploration Using Accurate Memory Organization Feedback (AV, MM, EB, FC, DV), pp. 327–332.
- DAC-1999-YehKSW #design #layout
- Layout Techniques Supporting the Use of Dual Supply Voltages for Cell-based Designs (CWY, YSK, SJS, JSW), pp. 62–67.
- DATE-1999-BreuerMBFLK #reasoning #semantics
- Reasoning about VHDL and VHDL-AMS using Denotational Semantics (PTB, NMM, JPB, RBF, MMLP, CDK), pp. 346–352.
- DATE-1999-BuhlerPKB #approach #performance #process #simulation
- Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
- DATE-1999-ChangP #co-evolution #communication #design #named #programming
- Codex-dp: Co-design of Communicating Systems Using Dynamic Programming (JMC, MP), p. 568–?.
- DATE-1999-CherubalC #fault #functional #parametricity
- Parametric Fault Diagnosis for Analog Systems Using Functional Mapping (SC, AC), p. 195–?.
- DATE-1999-CotaCL #adaptation #fault #linear
- A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester (ÉFC, LC, ML), pp. 184–188.
- DATE-1999-DhanwadaNV #constraints #synthesis
- Hierarchical Constraint Transformation Using Directed Interval Search for Analog System Synthesis (NRD, ANA, RV), p. 328–?.
- DATE-1999-FournierAL #functional #product line #verification
- Functional Verification Methodology for Microprocessors Using the Genesys Test-Program Generator-Application to the x86 Microprocessors Family (LF, YA, ML), pp. 434–441.
- DATE-1999-GomesC #testing
- Minimal Length Diagnostic Tests for Analog Circuits using Test History (AVG, AC), pp. 189–194.
- DATE-1999-HongB #analysis #finite #reachability #scalability #state machine
- Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
- DATE-1999-Hsiao #estimation #optimisation #scalability #search-based
- Peak Power Estimation Using Genetic Spot Optimization for Large VLSI Circuits (MSH), p. 175–?.
- DATE-1999-Kuchcinski #constraints #finite #graph #scheduling
- Integrated Resource Assignment and Scheduling of Task Graphs Using Finite Domain Constraints (KK), pp. 772–773.
- DATE-1999-Marques-SilvaG #equivalence #learning #recursion #satisfiability
- Combinational Equivalence Checking Using Satisfiability and Recursive Learning (JPMS, TG), pp. 145–149.
- DATE-1999-MartinezAQH #algorithm #encoding
- An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length (MM, MJA, JMQ, JLH), pp. 521–525.
- DATE-1999-Montiel-NelsonNASN #design #logic
- High Speed GaAs Subsystem Design using Feed Through Logic (JAMN, SN, VdA, RS, AN), p. 509–?.
- DATE-1999-RaikU #diagrams #generative #modelling #testing
- Sequential Circuit Test Generation Using Decision Diagram Models (JR, RU), pp. 736–740.
- DATE-1999-RanjanSSB #verification
- Using Combinational Verification for Sequential Circuits (RKR, VS, FS, RKB), pp. 138–144.
- DATE-1999-SantosoMRA #generative #named #testing
- FreezeFrame: Compact Test Generation Using a Frozen Clock Strategy (YS, MCM, EMR, MA), p. 747–?.
- DATE-1999-SantosT #fault #simulation
- Defect-Oriented Mixed-Level Fault Simulation of Digital Systems-on-a-Chip Using HDL (MBS, JPT), p. 549–?.
- DATE-1999-Seepold #component #reuse
- Reuse of IP and virtual components (RS).
- DATE-1999-Sheehan #reduction
- Projective Convolution: RLC Model-Order Reduction Using the Impulse Response (BNS), p. 669–?.
- DATE-1999-TabbaraSSFL #modelling #performance
- Fast Hardware-Software Co-simulation Using VHDL Models (BT, MS, ALSV, EF, LL), p. 309–?.
- DATE-1999-TanS #diagrams #scalability
- Interpretable Symbolic Small-Signal Characterization of Large Analog Circuits using Determinant Decision Diagrams (XDT, CJRS), pp. 448–453.
- DATE-1999-ThorntonWDD #diagrams #order
- Variable Reordering for Shared Binary Decision Diagrams Using Output Probabilities (MAT, JPW, RD, ND), pp. 758–759.
- DATE-1999-WeissSR #embedded #operating system #performance #realtime
- Emulation of a Fast Reactive Embedded System using a Real Time Operating System (KW, TS, WR), pp. 764–765.
- HPCA-1999-CondonHPS #memory management #modelling
- Using Lamport Clocks to Reason about Relaxed Memory Models (AC, MDH, MP, DJS), pp. 270–278.
- HPCA-1999-KaxirasG #performance #predict
- Improving CC-NUMA Performance Using Instruction-Based Prediction (SK, JRG), pp. 161–170.
- HPDC-1999-AkarsuFHKKSY #performance
- Using Gateway System to Provide a Desktop Access to High Performance Computational Resources (EA, GF, TH, AK, KSK, PS, CHY), pp. 294–298.
- HPDC-1999-AllenGMS #distributed #tool support
- The Cactus Computational Toolkit and using Distributed Computing to Collide Neutron Stars (GA, TG, JM, ES), pp. 57–61.
- HPDC-1999-CoadyOF #clustering #embedded #memory management #network
- Using Embedded Network Processors to Implement Global Memory Management in a Workstation Cluster (YC, JSO, MJF), pp. 319–328.
- HPDC-1999-ReneP #corba #encapsulation #parallel
- MPI Code Encapsulating using Parallel CORBA Object (CR, TP), pp. 3–10.
- LCTES-1999-CooperSS #algorithm #optimisation #search-based
- Optimizing for Reduced Code Space using Genetic Algorithms (KDC, PJS, DS), pp. 1–9.
- PDP-1999-HollingworthST #design #detection #parallel
- Design of highly parallel edge detection nodes using evolutionary techniques (GH, SLS, AMT), pp. 35–42.
- PDP-1999-PriceHLT #adaptation #architecture #array #parallel
- Adaptive microphone array beamforming for teleconferencing using VHDL and parallel architectures (TPWP, DMH, AVL, AMT), pp. 13–18.
- PDP-1999-RosatoPC #framework #parallel #platform #simulation
- Simulation of X-ray diffraction patterns using a massively parallel SIMD platform (VR, NP, FC), pp. 315–320.
- PPoPP-1999-BagrodiaDDP #parallel #performance #predict #scalability #simulation
- Performance Prediction of Large Parallel Applications using Parallel Simulations (RB, ED, SD, TP), pp. 151–162.
- PPoPP-1999-SchererLGZ #adaptation #parallel
- Transparent Adaptive Parallelism on NOWs using OpenMP (AS, HL, TRG, WZ), pp. 96–106.
- PPoPP-1999-Sundaram-StukelV #analysis #predict
- Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
- SOSP-1999-GovilTHR #clustering #multi #resource management
- Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors (KG, DT, YH, MR), pp. 154–169.
- FASE-1999-LopesF
- Using Explicit State to Describe Architechtures (AL, JLF), pp. 144–160.
- FoSSaCS-1999-Sangiorgi #concurrent #reasoning
- Reasoning About Concurrent Systems Using Types (DS), pp. 31–40.
- STOC-1999-Trevisan #generative #pseudo
- Construction of Extractors Using Pseudo-Random Generators (LT), pp. 141–148.
- TACAS-1999-BehrmannLAHL #composition #reuse #usability #verification
- Verification of Hierarchical State/Event Systems Using Reusability and Compositionality (GB, KGL, HRA, HH, JLN), pp. 163–177.
- TACAS-1999-Heljanko #concurrent #logic programming #petri net #problem #reachability #semantics #source code
- Using Logic Programs with Stable Model Semantics to Solve Deadlock and Reachability Problems for 1-Safe Petri Nets (KH), pp. 240–254.
- TACAS-1999-Hirschkoff #bisimulation #on the #verification
- On the Benefits of Using the Up-To Techniques for Bisimulation Verification (DH), pp. 285–299.
- TACAS-1999-KahloucheVZ #communication #consistency #hardware #protocol #testing
- Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
- CADE-1999-FeltyHR #abstraction #syntax
- Formal Metatheory using Implicit Syntax, and an Application to Data Abstraction for Asynchronous Systems (APF, DJH, AR), pp. 237–251.
- CADE-1999-GribomontS #validation #verification
- System Description: Using OBDD’s for the validation of Skolem verification conditions (EPG, NS), pp. 222–226.
- CAV-1999-BehrmannLPWY #analysis #diagrams #difference #performance #reachability
- Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
- CAV-1999-BiereCRZ #model checking #safety
- Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs (AB, EMC, RR, YZ), pp. 60–71.
- CAV-1999-RameshB #case study #design #pipes and filters #tool support #validation
- Validation of Pipelined Processor Designs Using Esterel Tools: A Case Study (SR, PB), pp. 84–95.
- CSL-1999-AltenkirchR #induction #monad
- Monadic Presentations of λ Terms Using Generalized Inductive Types (TA, BR), pp. 453–468.
- CSL-1999-Bonelli
- Using Fields and Explicit Substitutions to Implement Objects and Functions in a de Bruijn Setting (EB), pp. 204–219.
- CSL-1999-Howe #interactive #proving #theorem proving #type system
- Interactive Theorem Proving Using Type Theory (DJH), p. 578.
- ICLP-1999-CarroH #concurrent #database #prolog #thread
- Concurrency in Prolog Using Threads and a Shared Database (MC, MVH), pp. 320–334.
- ICLP-1999-HermenegildoBPL #debugging #optimisation #preprocessor #program analysis
- Program Analysis, Debugging, and Optimization Using the Ciao System Preprocessor (MVH, FB, GP, PLG), pp. 52–66.
- ICLP-1999-MarinoM #functional #logic programming #source code #static analysis
- Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), p. 614.
- IWTCS-1999-ProbertW #functional #generative #performance #testing
- Fast Functional Test Generation Using an SDL Model (RLP, AWW), pp. 299–316.
- ADL-1998-ChaeMM #multi #robust
- A Robust Data Hiding Technique Using Multidimensional Lattices (JJC, DM, BSM), pp. 319–326.
- ADL-1998-NelsonMSZ #clustering #multi #protocol
- NCSTRL+: Adding Multi-Discipline and Multi-Genre Support to the Dienst Protocol Using Clusters and Buckets (MLN, KM, SNTS, MZ), pp. 128–136.
- DL-1998-ChungPS #automation #network
- Automatic Subject Indexing Using an Associative Neural Network (YMC, WMP, BRS), pp. 59–68.
- DL-1998-GloverB #documentation #order
- Using Decision Theory to Order Documents (EJG, WPB), pp. 285–286.
- ECDL-1998-MahdiCF #segmentation
- Improving the Spatial-Temporal Clue Based Segmentation by the Use of Rhythm (WM, LC, DF), pp. 169–181.
- ECDL-1998-PaulPHC #component #distributed #execution #named #workflow
- RainMaker: Workflow Execution Using Distributed, Interoperable Components (SP, EP, DH, JKC), pp. 801–818.
- ECDL-1998-YeminiDF #information management #named
- MarketNet: Using Virtual Currency to Protect Information Systems (YY, AD, DF), pp. 891–902.
- HT-1998-ShipmanFBCH #adaptation #case study #experience
- Using Paths in the Classroom: Experiences and Adaptations (FMSI, RF, DB, CCC, HwH), pp. 267–270.
- HT-1998-WiilO #hypermedia #taxonomy
- Using the Flag Taxonomy to Study Hypermedia System Interoperabilty (UKW, KØ), pp. 188–197.
- PODS-1998-AbiteboulD #complexity #query
- Complexity of Answering Queries Using Materialized Views (SA, OMD), pp. 254–263.
- SIGMOD-1998-ChakrabartiDI #categorisation #hypermedia
- Enhanced Hypertext Categorization Using Hyperlinks (SC, BD, PI), pp. 307–318.
- SIGMOD-1998-Cohen #database #integration #query #semistructured data #similarity
- Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity (WWC), pp. 201–212.
- SIGMOD-1998-Cohen98a #query #similarity #web
- Providing Database-like Access to the Web Using Queries Based on Textual Similarity (WWC), pp. 558–560.
- SIGMOD-1998-DeshpandeRSN #multi #query
- Caching Multidimensional Queries Using Chunks (PD, KR, AS, JFN), pp. 259–270.
- SIGMOD-1998-Miller
- Using Schematically Heterogeneous Structures (RJM), pp. 189–200.
- SIGMOD-1998-PapadopoulosM #array #query #similarity
- Similarity Query Processing Using Disk Arrays (AP, YM), pp. 225–236.
- SIGMOD-1998-SubramanianV #cost analysis #optimisation #query
- Cost-Based Optimization of Decision Support Queries Using Transient Views (SNS, SV), pp. 319–330.
- VLDB-1998-AnkerstBKS #adaptation #approximate #query #similarity
- Improving Adaptable Similarity Query Processing by Using Approximations (MA, BB, HPK, TS), pp. 206–217.
- VLDB-1998-ChakrabartiSD #mining
- Mining Surprising Patterns Using Temporal Description Length (SC, SS, BD), pp. 606–617.
- VLDB-1998-DarEGP #database
- DTL’s DataSpot: Database Exploration Using Plain Language (SD, GE, SG, EP), pp. 645–649.
- VLDB-1998-MiloZ #semistructured data
- Using Schema Matching to Simplify Heterogeneous Data Translation (TM, SZ), pp. 122–133.
- ITiCSE-1998-BouletJB #education #modelling #process #student
- Teaching process modelling to undergraduate computer students: effects of using Lotus Notes and television programmes (MMB, FBJ, SB), pp. 32–36.
- ITiCSE-1998-Ellis #development #internet #learning #multi #problem
- Group 1 (working group): development and use of multimedia and Internet resources for a problem based learning environment (AE), p. 269.
- ITiCSE-1998-FincherP #experience #towards
- Beyond anecdote towards real transfer: using other institutions’ experience of project work (SF, MP), pp. 86–89.
- ITiCSE-1998-Grove #motivation #process #programming
- Using the personal software process to motivate good programming practices (RFG), pp. 98–101.
- ITiCSE-1998-JohnsonLHSFDM #collaboration
- Virtual office hours using TechTalk, a Web-based mathematical collaboration tool (JRJ, YNL, TTH, TS, TF, SD, PM), pp. 130–133.
- ITiCSE-1998-Marshall #education #internet
- Using the Internet to teach the Internet (DM), pp. 171–174.
- ITiCSE-1998-RoantreeK #automation #web
- Automated collection of coursework using the Web (MR, TEK), pp. 206–208.
- ITiCSE-1998-Roberts #education
- Strategies for using technology in the teaching of ethics (ER), pp. 209–212.
- ITiCSE-1998-Scoy #programming language
- Using the BURKS 2 CD-ROM in a principles of programming languages course (FLVS), pp. 239–242.
- ITiCSE-1998-TiwariH #collaboration #learning #student
- Learning groupware through using groupware-computer supported collaborative learning with face to face students (AT, CH), pp. 236–238.
- CSMR-1998-KirnerG #re-engineering #specification
- System Specification Reengineering Using the SpecView Tool (TGK, RCG), pp. 135–141.
- CSMR-1998-Kleuker #distributed #formal method #re-engineering
- Reengineering of Distributed Systems Using Formal Methods (SK), pp. 189–192.
- ICSM-1998-BaxterYMSB #abstract syntax tree #clone detection #detection #syntax
- Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
- ICSM-1998-BurdM #approach #clustering #component #evolution #maintenance #re-engineering
- Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering (EB, MM), pp. 199–207.
- ICSM-1998-HarmanSD #analysis #memory management #slicing
- Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
- ICSM-1998-LiangH #dependence #graph #slicing
- Slicing Objects Using System Dependence Graphs (DL, MJH), pp. 358–367.
- ICSM-1998-OcaC #data mining #identification #mining
- Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
- ICSM-1998-Pearse #evolution #metric
- Using Software Metrics to Control Firmware Evolution (TTP), pp. 72–73.
- ICSM-1998-Tonella #diagrams #encapsulation #memory management
- Using the O-A Diagram to Encapsulate Dynamic Memory Access (PT), pp. 326–335.
- IWPC-1998-MancoridisMRCG #automation #clustering #source code
- Using Automatic Clustering to Produce High-Level System Organizations of Source Code (SM, BSM, CR, YFC, ERG), pp. 45–52.
- WCRE-1998-Holt #algebra #architecture #relational
- Structural Manipulations of Software Architecture using Tarski Relational Algebra (RCH), pp. 210–219.
- WCRE-1998-PenteadoMP #legacy #object-oriented #paradigm #re-engineering
- Reengineering of Legacy Systems Based on Transformation Using the Object-Oriented Paradigm (RP, PCM, AFdP), pp. 144–153.
- WIA-1998-LHerPM #automaton #proving #source code
- Proving Sequential Function Chart Programs Using Automata (DL, PLP, LM), pp. 149–163.
- WIA-1998-Nykanen #transducer
- Using Acceptors as Transducers (MN), pp. 133–148.
- FM-1998-Borger #analysis #design #state machine
- High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
- FM-1998-KoobUW #formal method #modelling #policy #process #security #topic
- The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
- RTA-1998-ArtsG #composition #dependence #termination
- Modularity of Termination Using Dependency pairs (TA, JG), pp. 226–240.
- AFP-1998-Sheard98 #ml #programming language #staged
- Using MetaML: A Staged Programming Language (TS), pp. 207–239.
- TAGT-1998-Faulstich #graph transformation
- Using Graph Transformation Techniques for Integrating Information from the WWW (LF), pp. 426–441.
- TAGT-1998-Hrischuk #automation #graph grammar #process
- A Model Making Automation Process (MMAP) Using a Graph Grammar Formalism (CEH), pp. 442–454.
- CHI-1998-AltyR #communication #music #visual notation
- Communicating Graphical Information to Blind Users Using Music: The Role of Context (JLA, DIR), pp. 574–581.
- CHI-1998-OHaraSNS #documentation #library #student
- Student Readers’ Use of Library Documents: Implications for Library Technologies (KO, FS, WMN, AS), pp. 233–240.
- CHI-1998-Pirolli #design #information management #trade-off
- Exploring Browser Design Trade-Offs Using a Dynamical Model of Optimal Information Foraging (PP), pp. 33–40.
- CHI-1998-PlanteTI #interactive
- Evaluating the Location of Hot Spots in Interactive Scenes Using the 3R Toolbox (AP, ST, SI), pp. 117–123.
- CHI-1998-PlesniakP #artificial reality #video
- Coincident Display Using Haptics and Holographic Video (WP, RP), pp. 304–311.
- CSCW-1998-KobayashiSSTDW #collaboration #web
- Collaborative Customer Services Using Synchronous Web Browser Sharing (MK, MS, TS, MT, SD, CGW), pp. 99–109.
- CSCW-1998-MyersSG #collaboration #multi
- Collaboration Using Multiple PDAs Connected to a PC (BAM, HS, RG), pp. 285–294.
- CSCW-1998-SarwarKBHMR #collaboration #predict #quality #research
- Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System (BMS, JAK, AB, JLH, BNM, JR), pp. 345–354.
- CAiSE-1998-Dahchour #approach #formal method
- Formalizing Materialization Using a Metaclass Approach (MD), pp. 401–421.
- CAiSE-1998-HarrisonL #automation #information management #legacy #reverse engineering
- Automated Reverse Engineering of Legacy 4GL Information System Applications Using the ITOC Workbench (JVH, WML), pp. 41–57.
- EDOC-1998-Iyengar #architecture #repository #uml
- A universal repository architecture using the OMG UML and MOF (SSI), pp. 35–44.
- EDOC-1998-Kobryn #architecture #enterprise #modelling #uml
- Modeling enterprise software architectures using UML (CK), pp. 25–34.
- ACIR-1998-OunisP #concept #effectiveness #graph #performance #query #relational
- Effective and Efficient Relational Query Processing Using Conceptual Graphs (IO, MP).
- ACIR-1998-TheophylactouL #documentation #retrieval
- A Dempster-Shafer Model for Document Retrieval using Noun Phrases (MT, ML).
- CIKM-1998-DanielsR
- Locating Passages Using a Case-Based of Excerpts (JJD, ELR), pp. 38–44.
- CIKM-1998-PapkaA #classification #documentation #multi
- Document Classification Using Multiword Features (RP, JA), pp. 124–131.
- CIKM-1998-Tang #incremental #performance
- Using Incremental Pruning to Increase the Efficiency of Dynamic Itemset Counting for Association Rules (JT), pp. 273–280.
- CIKM-1998-TungTL #mining #named #online #optimisation
- BROOM: Buffer Replacement using Online Optimization by Mining (AKHT, YCT, HL), pp. 185–192.
- ICML-1998-AbeM #learning #query
- Query Learning Strategies Using Boosting and Bagging (NA, HM), pp. 1–9.
- ICML-1998-FrankW98a #mutation testing #permutation
- Using a Permutation Test for Attribute Selection in Decision Trees (EF, IHW), pp. 152–160.
- ICML-1998-KimuraK #algorithm #analysis #learning
- An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
- ICML-1998-KollerF #approximate #learning #probability #process
- Using Learning for Approximation in Stochastic Processes (DK, RF), pp. 287–295.
- ICML-1998-LochS #markov #policy #process
- Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
- ICML-1998-McCluskeyW #case study #requirements #validation
- A Case Study in the Use of Theory Revision in Requirements Validation (TLM, MMW), pp. 368–376.
- ICML-1998-NakamuraA #algorithm #collaboration #predict
- Collaborative Filtering Using Weighted Majority Prediction Algorithms (AN, NA), pp. 395–403.
- ICML-1998-PrecupU #approximate #classification
- Classification Using Phi-Machines and Constructive Function Approximation (DP, PEU), pp. 439–444.
- ICML-1998-RandlovA #learning
- Learning to Drive a Bicycle Using Reinforcement Learning and Shaping (JR, PA), pp. 463–471.
- ICPR-1998-AdigaC #image #segmentation
- Segmentation of volumetric histo-pathological images by surface following using constrained snakes (PSUA, BBC), pp. 1674–1676.
- ICPR-1998-AeberhardV #image #multi #recognition
- Face recognition using multiple image view line segments (SA, OYdV), pp. 1198–1200.
- ICPR-1998-AhrnsN #realtime #similarity
- Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
- ICPR-1998-AiharaIYT #image #self
- Memory-based self-localization using omnidirectional images (NA, HI, NY, HT), pp. 1799–1803.
- ICPR-1998-ArakiMTY #image #multi #realtime #robust #sequence #statistics
- Real-time tracking of multiple moving objects in moving camera image sequences using robust statistics (SA, TM, HT, NY), pp. 1433–1435.
- ICPR-1998-ArikiS #classification #multi
- Classification of TV sports news by DCT features using multiple subspace method (YA, YS), pp. 1488–1491.
- ICPR-1998-Aviles-Cruz #algorithm #data fusion #probability #segmentation
- Unsupervised texture segmentation using stochastic version of the EM algorithm and data fusion (CAC), pp. 1005–1009.
- ICPR-1998-BoccignoneCP #detection
- Small target detection using wavelets (GB, AC, AP), pp. 1776–1778.
- ICPR-1998-ChenL #algorithm #documentation
- Field-data grouping for form document processing using a gravitation-based algorithm (JLC, HJL), pp. 1095–1097.
- ICPR-1998-CheungI #detection #symmetry
- Symmetry detection using complex moments (KKTC, HHSI), pp. 1473–1475.
- ICPR-1998-CinqueLLT #image #retrieval
- Retrieval of images using rich region descriptions (LC, FL, SL, SLT), pp. 899–901.
- ICPR-1998-CracknellD #comprehension #documentation #image
- Document image understanding of handwritten forms using rule-trees (CC, ACD), pp. 936–938.
- ICPR-1998-DanielssonLY #3d #segmentation
- Segmentation of 3D volumes using second derivatives (PED, QL, QZY), pp. 248–251.
- ICPR-1998-EglinBE #complexity #visual notation
- Printed text featuring using the visual criteria of legibility and complexity (VE, SB, HE), pp. 942–944.
- ICPR-1998-FanC #documentation #identification
- Form document identification using line structure based features (KCF, MLC), pp. 1098–1100.
- ICPR-1998-FerriMAS #algorithm #estimation
- Variable-size block matching algorithm for motion estimation using a perceptual-based splitting criterion (FJF, JM, JVA, JS), pp. 286–288.
- ICPR-1998-FlorebySS #bound #fourier #image #order
- Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
- ICPR-1998-FrydendalJ #graph #image #segmentation
- Segmentation of sugar beets using image and graph processing (IF, RJ), pp. 1697–1699.
- ICPR-1998-Garcia-SevillaP #analysis #image
- The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
- ICPR-1998-Gavrila #distance #multi
- Multi-feature hierarchical template matching using distance transforms (DMG), pp. 439–444.
- ICPR-1998-GiacconeGJ #estimation
- Creating virtual scenes using active contours and global motion estimation (PRG, DG, GAJ), pp. 1505–1507.
- ICPR-1998-GoktepeAYY #image #markov #modelling #random #segmentation
- Unsupervised texture based image segmentation by simulated annealing using Markov random field and Potts models (MG, VA, NY, CY), pp. 820–822.
- ICPR-1998-Govindu0C #geometry #image
- Using geometric properties for correspondence-less image alignment (VG, CS, RC), pp. 37–41.
- ICPR-1998-GroweT #3d #evaluation #image
- Use of explicit knowledge and GIS data for the 3D evaluation of remote sensing images (SG, RT), pp. 1413–1415.
- ICPR-1998-GuKTH #image #robust
- Robust extraction of characters from color scene image using mathematical morphology (LG, TK, NT, RMH), pp. 1002–1004.
- ICPR-1998-HaritaogluHD #named
- Ghost: a human body part labeling system using silhouettes (IH, DH, LSD), pp. 77–82.
- ICPR-1998-HattoriMS #image #symmetry
- Estimating pose of human face based on symmetry plane using range and intensity images (KH, SM, YS), pp. 1183–1187.
- ICPR-1998-HeisterkampB #recognition
- Object and motion recognition using the plane plus parallax displacement of conics (DRH, PB), pp. 751–753.
- ICPR-1998-Henry #modelling
- Use of an evolutive base of models in a system for reading printed texts (JLH), pp. 802–804.
- ICPR-1998-HeydenK #constraints #re-engineering
- Reconstruction from affine cameras using closure constraints (AH, FK), pp. 47–50.
- ICPR-1998-HjaltasonRSW #modelling #ranking #recognition #sorting
- Using spatial sorting and ranking in model-based object recognition (GRH, MR, HS, IW), pp. 1347–1349.
- ICPR-1998-HofmanJ #analysis #approach #clustering #performance #robust
- Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
- ICPR-1998-HuangSW
- Face pose discrimination using support vector machines (SVM) (JH, XS, HW), pp. 154–156.
- ICPR-1998-HungYCHF #pointer
- Free-hand pointer by use of an active stereo vision system (YPH, YSY, YSC, IBH, CSF), pp. 1244–1246.
- ICPR-1998-HwangYTY #3d #linear
- A factorization method using 3D linear combination for shape and motion recovery (KCH, NY, HT, KY), pp. 959–963.
- ICPR-1998-IshiiMT #detection #image #realtime #video
- Detection of foreign substances mixed in a plastic bottle of medicinal solution using real-time video image processing (AI, TM, ST), pp. 1646–1650.
- ICPR-1998-JainHK #identification #named
- F2ID: a personal identification system using faces and fingerprints (AKJ, LH, YK), pp. 1373–1375.
- ICPR-1998-KamataNB #image
- Color image compression using a Hilbert scan (SiK, TNN, YB), pp. 1575–1578.
- ICPR-1998-KamathKDD #image #markov #modelling #segmentation
- Joint segmentation and image interpretation using hidden Markov models (NK, KSK, UBD, RD), pp. 1840–1842.
- ICPR-1998-KanekoH #detection #video
- Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
- ICPR-1998-KangOC #3d #graph
- Character grouping technique using 3D neighborhood graphs in raster map (YBK, SYO, HGC), pp. 1092–1094.
- ICPR-1998-KaufmannB #fault #locality
- Amount translation and error localization in check processing using syntax-directed translation (GK, HB), pp. 1530–1534.
- ICPR-1998-KawaguchiN #algorithm #detection #search-based
- Ellipse detection using a genetic algorithm (TK, RiN), pp. 141–145.
- ICPR-1998-KawaiUIST
- Stereo correspondence using segment connectivity (YK, TU, YI, YS, FT), pp. 648–651.
- ICPR-1998-KawanishiYITY #generative #image
- Generation of high-resolution stereo panoramic images by omnidirectional imaging sensor using hexagonal pyramidal mirrors (TK, KY, HI, HT, NY), pp. 485–489.
- ICPR-1998-KawasueSI
- Range finder using circular dynamic stereo (KK, OS, TI), pp. 774–776.
- ICPR-1998-KawataNOKMEKM #analysis #image
- Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
- ICPR-1998-KeeniNS #automation #classification #estimation #generative #network
- Automatic generation of initial weights and estimation of hidden units for pattern classification using neural networks (KK, KN, HS), pp. 1568–1571.
- ICPR-1998-KimuraIWTM #network #recognition
- Handwritten numeral recognition using autoassociative neural networks (FK, SI, TW, ST, YM), pp. 166–171.
- ICPR-1998-KogaKSF #analysis #segmentation
- Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
- ICPR-1998-KosmalaR #online #recognition #statistics
- On-line handwritten formula recognition using statistical methods (AK, GR), pp. 1306–1308.
- ICPR-1998-KosmalaR98a #clustering #online #recognition #scalability #self
- Tree-based state clustering using self-organizing principles for large vocabulary on-line handwriting recognition (AK, GR), pp. 1313–1315.
- ICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #video
- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
- ICPR-1998-LengagneFM #3d #constraints #difference
- Using differential constraints to generate a 3D face model from stereo (RL, PF, OM), pp. 637–639.
- ICPR-1998-LiML #estimation #multi #recognition
- Human posture recognition using multi-scale morphological method and Kalman motion estimation (YL, SM, HL), pp. 175–177.
- ICPR-1998-LiQ #image #retrieval
- Matching spatial relations using DB-tree for image retrieval (XL, XQ), pp. 1230–1234.
- ICPR-1998-LiuH #recognition
- Using centroid covariance in target recognition (GL, RMH), pp. 1343–1346.
- ICPR-1998-LuoCH #detection
- Corner detection using vector potential (BL, ADJC, ERH), pp. 1018–1021.
- ICPR-1998-MaedaKIZ #analysis #multi
- Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
- ICPR-1998-MaedaNMSS #fuzzy #image #segmentation
- Fuzzy region-growing segmentation of natural images using local fractal dimension (JM, SN, AM, SS, YS), pp. 991–993.
- ICPR-1998-MagareyD #image #multi
- Multiresolution stereo image matching using complex wavelets (JM, ARD), pp. 4–7.
- ICPR-1998-MasakiYKK #interactive #video
- Interactive manipulation through augmented virtuality using processed video contents (TM, TY, YK, FK), pp. 1219–1222.
- ICPR-1998-MatsuoKI #energy #multi
- Multi-scale and hierarchical description using energy controlled active balloon model (HM, MK, AI), pp. 205–209.
- ICPR-1998-MelzerKZ #approach #detection #modelling #parametricity
- Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
- ICPR-1998-MinMK #recognition
- Recognition using labelled objects (SLM, JM, JK), pp. 1336–1338.
- ICPR-1998-MokhtariB #constant #multi
- Multiscale compression of planar curves using constant curvature segments (MM, RB), pp. 744–746.
- ICPR-1998-MoriKTS #graph #visualisation
- Visualization of the structure of classes using a graph (YM, MK, JT, MS), pp. 1724–1727.
- ICPR-1998-MullerH #recognition
- The use of eigenpictures for optical character recognition (NM, BMH), pp. 1124–1126.
- ICPR-1998-Nakajima #image #visual notation
- Extraction of salient apexes from an image by using the function at the primary visual cortex (CN), pp. 720–724.
- ICPR-1998-NakamuraEIH #algorithm
- Skeleton revision algorithm using maximal circles (TN, HE, HI, LH), pp. 1607–1609.
- ICPR-1998-NakamuraSO #estimation
- Object arrangement estimation using color edge profile (YN, NS, YO), pp. 754–758.
- ICPR-1998-NakazawaKI #distributed
- Human tracking using distributed vision systems (AN, HK, SI), pp. 593–596.
- ICPR-1998-NieuwoudtB #classification #performance
- Relative performance of correlation-based and feature-based classifiers of aircraft using radar range profiles (CN, ECB), pp. 1828–1832.
- ICPR-1998-NishikawaOM #3d
- Selective acquisition of 3-D information enough for finding passable free spaces using an active stereo vision system (AN, AO, FM), pp. 857–861.
- ICPR-1998-OhLS #analysis
- Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
- ICPR-1998-OhtaSN #feature model #modelling #recognition
- Recognition of facial expressions using muscle-based feature models (HO, HS, HN), pp. 1379–1381.
- ICPR-1998-OkataniD #identification #invariant #on the #problem
- On identification of singular points using photometric invariants for global shape from shading problem (TO, KD), pp. 1787–1790.
- ICPR-1998-OkumaKTY #artificial reality #realtime
- An augmented reality system using a real-time vision based registration (TO, KK, HT, NY), pp. 1226–1229.
- ICPR-1998-OkutomiN #image
- Extraction of road region using stereo images (MO, SN), pp. 853–856.
- ICPR-1998-OngM #robust #segmentation
- Robust color segmentation using the dichromatic reflection model (CKO, TM), pp. 780–784.
- ICPR-1998-OnoeYYT #monitoring #video #visual notation
- Visual surveillance and monitoring system using an omnidirectional video camera (YO, NY, KY, HT), pp. 588–592.
- ICPR-1998-PalubinskasDK #clustering
- An unsupervised clustering method using the entropy minimization (GP, XD, FK), pp. 1816–1818.
- ICPR-1998-ProcterIE #markov #modelling #recognition #string
- The recognition of handwritten digit strings of unknown length using hidden Markov models (SP, JI, AJE), pp. 1515–1517.
- ICPR-1998-SablatnigKZ #classification #modelling
- Hierarchical classification of paintings using face- and brush stroke models (RS, PK, EZ), pp. 172–174.
- ICPR-1998-SardoK #complexity #estimation #validation
- Model complexity validation for PDF estimation using Gaussian mixtures (LS, JK), pp. 195–197.
- ICPR-1998-SatoY #classification #learning
- A formulation of learning vector quantization using a new misclassification measure (AS, KY), pp. 322–325.
- ICPR-1998-SattarT #approach #documentation #fuzzy #image #logic #multi #on the
- On the multiresolution enhancement of document images using fuzzy logic approach (FS, DBHT), pp. 939–941.
- ICPR-1998-SchaufAH #modelling #recognition #recursion
- Model-based shape recognition using recursive mathematical morphology (MLS, SA, RMH), pp. 202–204.
- ICPR-1998-SeemannT #image #segmentation
- Structure preserving noise filtering of images using explicit local segmentation (TS, PET), pp. 1610–1612.
- ICPR-1998-Shevlin #analysis #problem
- Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
- ICPR-1998-ShikuKN #string
- A method for character string extraction using local and global segment crowdedness (OS, KK, AN), pp. 1077–1080.
- ICPR-1998-Sluzek #multi #segmentation
- Multi-level contour segmentation using multiple segmentation primitives (AS), pp. 741–743.
- ICPR-1998-SmithL #segmentation
- Texture segmentation using zero crossings information (GS, DL), pp. 262–264.
- ICPR-1998-SofferS #similarity
- Using negative shape features for logo similarity matching (AS, HS), pp. 571–573.
- ICPR-1998-SoilleT #image
- Image structure orientation using mathematical morphology (PS, HT), pp. 1467–1469.
- ICPR-1998-StoddartB #multi #re-engineering
- Surface reconstruction and compression using multiresolution arbitrary topology G1 continuous splines (AJS, MSB), pp. 788–791.
- ICPR-1998-SukanyaTS #classification #image #multi
- Image classification using the surface-shape operator and multiscale features (PS, RT, MS), pp. 334–337.
- ICPR-1998-SuzukiKM #fuzzy #memory management #set
- Associative memory system using fuzzy sets (YS, NK, JM), pp. 331–333.
- ICPR-1998-SvalbeE #image #locality #metric #rank
- Localisation of image features using measures of rank distribution (IDS, CJE), pp. 189–191.
- ICPR-1998-TakacsW #image #library #metric #performance
- Fast searching of digital face libraries using binary image metrics (BT, HW), pp. 1235–1237.
- ICPR-1998-TerrillonDA #detection #image #invariant
- Detection of human faces in complex scene images by use of a skin color model and of invariant Fourier-Mellin moments (JCT, MD, SA), pp. 1350–1355.
- ICPR-1998-TissainayagamS #algorithm #visual notation
- Visual tracking and motion determination using the IMM algorithm (PT, DS), pp. 289–291.
- ICPR-1998-TominagaKMK #detection #performance
- Realization of an efficient line detection by askant glance camera vision system using extended Hough transform (MT, KK, KM, HK), pp. 225–228.
- ICPR-1998-ToyamaSM #algorithm #estimation #modelling #search-based
- Model-based pose estimation using genetic algorithm (FT, KS, JM), pp. 198–201.
- ICPR-1998-VelA #image #recognition
- View-based object recognition using image lines (OYdV, SA), pp. 805–807.
- ICPR-1998-WangLL #classification #composition #markov #modelling #random
- Texture classification using wavelet decomposition with Markov random field models (LW, JL, SZL), pp. 1613–1615.
- ICPR-1998-WatanabeMM #detection #image
- Detecting changes of buildings from aerial images using shadow and shading model (SW, KM, NM), pp. 1408–1412.
- ICPR-1998-WatanabeY #gesture #image #multi #realtime #recognition #sequence
- Real time recognition of gesture and gesture degree information using multi input image sequences (TW, MY), pp. 1855–1858.
- ICPR-1998-WorthingtonHH #recognition
- Appearance-based object recognition using shape-from-shading (PLW, BH, ERH), pp. 412–416.
- ICPR-1998-WouwerSD #invariant
- Rotation-invariant texture characterization using isotropic wavelet frames (GVdW, PS, DVD), pp. 814–816.
- ICPR-1998-XuS #detection #realtime
- Rits Eye: a software-based system for real-time face detection and tracking using pan-tilt-zoom controllable camera (GX, TS), pp. 1194–1197.
- ICPR-1998-Yamada #pattern matching #query #retrieval
- Handwritten text retrieval using two-stage pattern matching with handwritten query (KY), pp. 621–625.
- ICPR-1998-YamaguchiKI #graph #parametricity #relational
- Stereo matching for stone statues using SRI parameters and relational graph (AY, KK, SI), pp. 785–787.
- ICPR-1998-YonemotoTT #3d #multi #sequence
- Tracking of 3D multi-part objects using multiple viewpoint time-varying sequences (SY, NT, RiT), pp. 490–494.
- ICPR-1998-YoungKM #evolution #modelling
- Hypothesis selection for scene interpretation using grammatical models of scene evolution (RCDY, JK, JM), pp. 1718–1720.
- ICPR-1998-ZhaHH #3d #algorithm #modelling #recursion
- A recursive fitting-and-splitting algorithm for 3-D object modeling using superquadrics (HZ, TH, TH), pp. 658–662.
- KDD-1998-Bhattacharyya #algorithm #modelling #search-based
- Direct Marketing Response Models Using Genetic Algorithms (SB), pp. 144–148.
- KDD-1998-CohenH #classification
- Joins that Generalize: Text Classification Using WHIRL (WWC, HH), pp. 169–173.
- KDD-1998-ThomasS #mining #query #sql
- Mining Generalized Association Rules and Sequential Patterns Using SQL Queries (ST, SS), pp. 344–348.
- KR-1998-Horrocks #logic #question
- Using an Expressive Description Logic: FaCT or Fiction? (IH), pp. 636–649.
- KR-1998-Kamps #automation #formal method #reasoning #tool support
- Formal Theory Building Using Automated Reasoning Tools (JK), pp. 478–487.
- KR-1998-Kusters #automaton #finite #semantics
- Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata (RK), pp. 499–511.
- SIGIR-1998-CarbonellG #documentation #order #ranking #summary
- The Use of MMR, Diversity-Based Reranking for Reordering Documents and Producing Summaries (JGC, JG), pp. 335–336.
- SIGIR-1998-HascoetS #library #user interface
- Using Maps as a User Interface to a Digital Library (MH, XS), pp. 339–340.
- SIGIR-1998-JonesSKS #retrieval
- Experiments in Japanese Text Retrieval and Routing Using the NEAT System (GJFJ, TS, MK, KS), pp. 197–205.
- SIGIR-1998-LaiT #image #retrieval
- Using Global Colour Features for General Photographic Image Indexing and Retrieval (TSL, JT), pp. 349–350.
- SIGIR-1998-LamH #automation #categorisation #set
- Using a Generalized Instance Set for Automatic Text Categorization (WL, CYH), pp. 81–89.
- SIGIR-1998-Larkey #automation #categorisation
- Automatic Essay Grading Using Text Categorization Techniques (LSL), pp. 90–95.
- SIGIR-1998-MechkourHM #clustering #web
- The WebCluster Project: Using Clustering for Mediating Access to the World Wide Web (MM, DJH, GM), pp. 357–358.
- SIGIR-1998-NgZ #fault #retrieval #speech
- Speech Retrieval Using Phonemes with Error Correction (CN, JZ), pp. 365–366.
- SIGIR-1998-Picard #documentation #modelling #probability
- Modeling and Combining Evidence Provided by Document Relationships Using Probabilistic Argumentation Systems (JP), pp. 182–189.
- SIGIR-1998-SuzukiFS #keyword
- Keyword Extraction of Radio News Using Term Weighting with an Encyclopedia and Newspaper Articles (YS, FF, YS), pp. 373–374.
- SIGIR-1998-YamanaTKKHNAKSM #distributed
- Experiments of Collecting WWW Information Using Distributed WWW Robots (HY, KT, HK, SK, MH, HN, IA, HK, YS, YM), pp. 379–380.
- UML-1998-Ou #constraints #database #design #diagrams #object-oriented #on the #specification #uml
- On Using UML Class Diagrams for Object-Oriented Database Design. Specification of Integrity Constraints (YO), pp. 173–188.
- ECOOP-1998-CordsenS #case study #experience #memory management #paradigm
- Experiences Developing a Virtual Shared Memory System Using High-Level Object Paradigms (JC, JN, WSP), pp. 285–306.
- TOOLS-ASIA-1998-CoddingtonHKMWWIGJT #corba #implementation #java #library
- Implementation of a Geospatial Imagery Digital Library Using Java and CORBA (PDC, KAH, KEK, JAM, AJS, DLW, PJW, CGI, MWG, RJ, KT), pp. 280–289.
- TOOLS-ASIA-1998-PeriorellisBS #dependence #enterprise #modelling #network #object-oriented #paradigm
- Modeling Enterprise Dependency Networks Using an Object Oriented Paradigm (PP, AB, PS), p. 148–?.
- TOOLS-PACIFIC-1998-SonYK #component #development #java
- A Component-Based Client/Server Application Development Environment using Java (SS, IY, CK), pp. 168–179.
- TOOLS-USA-1998-McKim #design #education #multi #object-oriented #programming
- Using a Multi-Term Project to Teach Object Oriented Programming and Design (JCM), p. 468–?.
- TOOLS-USA-1998-Watkins #contract #interface #programming
- Using Interface Definition Languages to Support Path Expressions and Programming by Contract (DW), p. 308–?.
- TOOLS-USA-1998-WydaegheVMDAJ #case study #design pattern #experience
- Building an OMT-Editor Using Design Patterns: An Experience Report (BW, KV, BM, BVD, EA, VJ), pp. 20–32.
- AdaEurope-1998-HarbourRGG #ada #execution #implementation #realtime
- Implementing and Using Execution Time Clocks in Ada Hard Real-Time Applications (MGH, MAR, JJGG, JCPG), pp. 90–101.
- AdaEurope-1998-Saaltink #ada
- Guidance on the Use of Ada95 in High Integrity Systems (SM, MS), pp. 276–287.
- ALP-PLILP-1998-ClearyL
- Constructive Negation Using Typed Existence Properties (JGC, LL), pp. 411–426.
- ALP-PLILP-1998-ConselM #architecture #development
- Architecture Software Using: A Methodology for Language Development (CC, RM), pp. 170–194.
- ALP-PLILP-1998-HatcliffDL #analysis #staging
- Staging Static Analyses Using Abstraction-Based Program Specialization (JH, MBD, SL), pp. 134–151.
- LOPSTR-1998-BaalenR #deduction #synthesis
- Using Decision Procedures to Accelerate Domain-Specific Deductive Synthesis Systems (JVB, SR), pp. 61–70.
- LOPSTR-1998-BrogiCT #source code
- The Use of Renaming in Composing General Programs (AB, SC, FT), pp. 124–142.
- LOPSTR-1998-Rosenblueth #source code
- An Exhaustive-Search Method Using Layered Streams Obtained Through a Meta-Interpreter for Chain Programs (DAR), pp. 322–324.
- LOPSTR-1998-SmausHK #fault #logic programming #multi #source code
- Preventing Instantiation Errors and Loops for Logic Programs with Multiple Modes Using block Declarations (JGS, PMH, AK), pp. 289–307.
- PLDI-1998-AdveM #integer #optimisation #program analysis #set
- Using Integer Sets for Data-Parallel Program Analysis and Optimization (VSA, JMMC), pp. 186–198.
- PLDI-1998-HastiH #analysis #pointer
- Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
- SAS-1998-HandjievaT #analysis #clustering #control flow
- Refining Static Analyses by Trace-Based Partitioning Using Control Flow (MH, ST), pp. 200–214.
- SIGAda-1998-BarkatakiHD #design pattern #legacy #object-oriented #re-engineering
- Reengineering a Legacy System Using Design Patterns and Ada-95 Object-Oriented Features (SB, SH, TD), pp. 148–152.
- SIGAda-1998-ChamillardLY #ada
- Using Ada in Non-CS Majors (ATC, RJL, RRY), pp. 61–67.
- SIGAda-1998-DousetteDJ #web
- Command and Control Using World Wide Web Technology (PJD, AD, MJ), pp. 212–214.
- SIGAda-1998-Flint #ada #api #compilation #java
- Using Java APIs with Native Ada Compilers (SF), pp. 193–203.
- SIGAda-1998-HopperBHH #ada #simulation
- Use of Ada in Digital Radar Landmass Simulation (DRLMS) (JH, JDB, HH, TH), pp. 137–139.
- SIGAda-1998-James #ada #data flow #distributed #evolution
- The Evolution of a Distributed dataflow Processing Model Using Ada (SJ), pp. 39–44.
- SIGAda-1998-TardieuP #distributed #fault tolerance #multi
- Building Fault Tolerant Distributed Systems Using IP Multicast (ST, LP), pp. 45–51.
- SIGAda-1998-WoodruffA #ada #distributed #research #scalability
- A Large Distributed Control System Using Ada in Fusion Research (JPW, PJVA), pp. 121–131.
- ICRE-1998-KaindlKK #case study #functional #requirements
- A Case Study of Decomposing Functional Requirements Using Scenarios (HK, SK, RK), pp. 156–163.
- ICRE-1998-MillardLT #elicitation #game studies #requirements
- Child’s Play: Using Techniques Developed to Elicit Requirements from Children with Adults (NM, PL, KT), pp. 66–73.
- ICRE-1998-SchneiderECH #fault tolerance #model checking #requirements #validation
- Validating Requirements for Fault Tolerant Systems using Model Checking (FS, SME, JRC, GJH), pp. 4–13.
- ICRE-1998-Smith #framework #quality #requirements
- Using a Quality Model Framework to Strengthen the Requirements (RCS), p. 118–?.
- ASE-1998-Andrews #analysis #testing #tool support
- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
- ASE-1998-HazelST #animation #requirements #specification #verification
- Requirements Engineering and Verification using Specification Animation (DH, PAS, OT), pp. 302–305.
- ASE-1998-MaoSL #case study #machine learning #reuse #usability #verification
- Reusability Hypothesis Verification using Machine Learning Techniques: A Case Study (YM, HAS, HL), pp. 84–93.
- ASE-1998-WielsE #category theory #evolution #specification
- Management of Evolving Specifications using Category Theory (VW, SME), pp. 12–21.
- FSE-1998-GuptaMS #automation #generative #testing
- Automated Test Data Generation Using an Iterative Relaxation Method (NG, APM, MLS), pp. 231–244.
- FSE-1998-KontioGL #case study #concept #experience #process #risk management
- Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
- FSE-1998-SneltingT #concept analysis #re-engineering
- Reengineering Class Hierarchies Using Concept Analysis (GS, FT), pp. 99–110.
- ICSE-1998-AlmeidaLM #modelling
- An Investigation on the Use of Machine Learned Models for Estimating Correction Costs (MAdA, HL, WLM), pp. 473–476.
- ICSE-1998-AntonP #evolution #requirements
- The Use of Goals to Surface Requirements for Evolving Systems (AIA, CP), pp. 157–166.
- ICSE-1998-BriandELF #benchmark #development #metric #performance #simulation
- Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects (LCB, KEE, OL, TF), pp. 340–349.
- SAC-1998-AhmedDR #fuzzy #graph #memory management #performance #reuse
- Fast recall of reusable fuzzy plans using acyclic directed graph memory (MA, ED, DCR), pp. 272–276.
- SAC-1998-ArbabM #constraints #coordination #theorem proving
- Using coordination for cooperative constraint solving (FA, EM), pp. 139–148.
- SAC-1998-KangH #algorithm #graph transformation #problem #search-based
- Solving the rural postman problem using a genetic algorithm with a graph transformation (MJK, CGH), pp. 356–360.
- SAC-1998-KarakasK #adaptation #fuzzy #logic
- Adaptive control of Bolu highway tunnel ventilation system using fuzzy logic (EK, HK), pp. 282–286.
- SAC-1998-Konstam #algorithm #classification #programming #search-based
- Group classification using a mix of genetic programming and genetic algorithms (AHK), pp. 308–312.
- SAC-1998-LazanoM #query
- Querying virtual videos using path and temporal expressions (RL, HM), pp. 248–252.
- SAC-1998-McGuireS #algorithm #linear #search-based
- Using a genetic algorithm to find good linear error-correcting codes (KMM, RES), pp. 332–337.
- SAC-1998-PapadopoulosA #coordination #information management #modelling #process
- Modelling activities in information systems using the coordination language MANIFOLD (GAP, FA), pp. 185–193.
- SAC-1998-RobbinsR #animation #information management #visualisation
- Web-based dynamic information visualization using exact-time animation (KAR, SR), pp. 744–751.
- SAC-1998-WaldenBH #approximate #clustering #fuzzy #multi
- Evaluating multi-valued inverse functions using clustering and fuzzy approximations (MAW, MB, AH), pp. 74–79.
- ASPLOS-1998-KrintzCLZ #execution #mobile #source code #strict
- Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs (CK, BC, HBL, BGZ), pp. 159–169.
- ASPLOS-1998-SchnarrL #performance #simulation
- Fast Out-Of-Order Processor Simulation Using Memoization (ES, JRL), pp. 283–294.
- DAC-1998-AmonBL
- Making Complex Timing Relationships Readable: Presburger Formula Simplicication Using Don’t Cares (TA, GB, JL), pp. 586–590.
- DAC-1998-AzizKS #hybrid #simulation #verification
- Hybrid Verification Using Saturated Simulation (AA, JHK, TRS), pp. 615–618.
- DAC-1998-FallahDK #functional #generative #linear #modelling #programming #satisfiability
- Functional Vector Generation for HDL Models Using Linear Programming and 3-Satisfiability (FF, SD, KK), pp. 528–533.
- DAC-1998-FangW #clustering #functional #multi #replication
- Performance-Driven Multi-FPGA Partitioning Using Functional Clustering and Replication (WJF, ACHW), pp. 283–286.
- DAC-1998-GovindarajuDHH #approximate #reachability
- Approximate Reachability with BDDs Using Overlapping Projections (SGG, DLD, AJH, MH), pp. 451–456.
- DAC-1998-HoltmannB #compilation #design #protocol
- Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
- DAC-1998-HwangCH #approach #design #power management #re-engineering
- A Re-engineering Approach to Low Power FPGA Design Using SPFD (JMH, FYC, TH), pp. 722–725.
- DAC-1998-KimJT #optimisation
- Arithmetic Optimization Using Carry-Save-Adders (TK, WJ, SWKT), pp. 433–438.
- DAC-1998-MurgaiFO
- Using Complementation and Resequencing to Minimize Transitions (RM, MF, ALO), pp. 694–697.
- DAC-1998-PardoH #incremental #model checking
- Incremental CTL Model Checking Using BDD Subsetting (AP, GDH), pp. 457–462.
- DAC-1998-QiuWP #estimation #order #statistics
- Maximum Power Estimation Using the Limiting Distributions of Extreme Order Statistics (QQ, QW, MP), pp. 684–689.
- DAC-1998-SuttonSR #multi
- A Multiprocessor DSP System Using PADDI-2 (RAS, VPS, JMR), pp. 62–65.
- DAC-1998-TarafdarL #data transfer #synthesis
- The DT-Model: High-Level Synthesis Using Data Transfers (ST, ML), pp. 114–117.
- DAC-1998-WangAK #array #automation #evaluation #generative #verification
- Automatic Generation of Assertions for Formal Verification of PowerPC Microprocessor Arrays Using Symbolic Trajectory Evaluation (LCW, MSA, NK), pp. 534–537.
- DAC-1998-YoungMSTHN #design #embedded #java #refinement #specification
- Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement (JSY, JM, MS, AT, PNH, ARN), pp. 70–75.
- DAC-1998-ZhongAMM #case study #configuration management #problem #satisfiability
- Using Reconfigurable Computing Techniques to Accelerate Problems in the CAD Domain: A Case Study with Boolean Satisfiability (PZ, PA, SM, MM), pp. 194–199.
- DATE-1998-FreundF #approximate #linear #modelling #multi #scalability
- Reduced-Order Modeling of Large Linear Passive Multi-Terminal Circuits Using Matrix-Pade Approximation (RWF, PF), pp. 530–537.
- DATE-1998-HansenKR #comparison #interface #simulation #synthesis #verification
- Verification by Simulation Comparison using Interface Synthesis (CH, AK, WR), pp. 436–443.
- DATE-1998-PomeranzR98a
- Design-for-Testability for Synchronous Sequential Circuits using Locally Available Lines (IP, SMR), pp. 983–984.
- DATE-1998-RingeLB #satisfiability #verification
- Path Verification Using Boolean Satisfiability (MR, TL, EB), pp. 965–966.
- DATE-1998-RudnickVECPR #generative #performance #testing
- Fast Sequential Circuit Test Generation Using High-Level and Gate-Level Techniques (EMR, RV, AE, FC, PP, MSR), pp. 570–576.
- DATE-1998-ShaoC #approximate #design
- MCM Interconnect Design Using Two-Pole Approximation (JS, RMMC), pp. 544–548.
- DATE-1998-UrrizaAGBN #architecture #image
- VLSI Architecture for Lossless Compression of Medical Images Using the Discrete Wavelet Transform (IU, JIA, JIGN, LAB, DN), pp. 196–201.
- DATE-1998-Velasco-MedinaCN #detection #fault #injection #linear
- Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
- DATE-1998-VercauterenVJL #analysis #partial order #performance #verification
- Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
- HPCA-1998-SpeightB #communication #multi #thread
- Using Multicast and Multithreading to Reduce Communication in Software DSM Systems (ES, JKB), pp. 312–322.
- HPCA-1998-SteffanM #automation #concurrent #parallel #thread
- The Potential for Using Thread-Level Data Speculation to Facilitate Automatic Parallelization (JGS, TCM), pp. 2–13.
- HPDC-1998-BeckmanFHM #parallel #performance
- Efficient Coupling of Parallel Applications Using PAWS (PHB, PKF, WFH, SMM), pp. 215–222.
- HPDC-1998-ChenWCK #algorithm #automation #optimisation #parallel #performance #search-based
- Automatic Parallel I/O Performance Optimization Using Genetic Algorithms (YC, MW, YC, SWK), pp. 155–162.
- HPDC-1998-Nguyen-TuongCG
- Extending Metasystem Functionality Using Reflection (ANT, SJC, ASG), pp. 346–347.
- HPDC-1998-ZhangSL #message passing #source code
- Dynamically Instrumenting Message-Passing Programs Using Virtual Clocks (KZ, CS, KCL), pp. 340–341.
- ISMM-1998-ChilimbiL #garbage collection
- Using Generational Garbage Collection To Implement Cache-Conscious Data Placement (TMC, JRL), pp. 37–48.
- LCTES-1998-LundqvistS #analysis #simulation
- Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
- LCTES-1998-Selic #modelling #realtime #uml
- Using UML for Modeling Complex Real-Time Systems (BS), pp. 250–260.
- LCTES-1998-YurkoskiRE #java
- Using InfernoTM to Execute JavaTM on Small Devices (CFY, LRR, BKE), pp. 108–118.
- PDP-1998-GilO #clustering #generative #parallel #testing
- Parallel test generation using circuit partitioning and spectral techniques (CG, JO), pp. 264–270.
- PDP-1998-HillJSV #architecture #independence #parallel #performance #profiling
- Portable and architecture independent parallel performance tuning using a call-graph profiling tool (JMDH, SAJ, CJS, VPV), pp. 286–294.
- PDP-1998-RodriguezAM #algorithm #network #parallel #performance #predict
- Prediction of parallel algorithms performance on bus-based networks using PVM (RJR, CA, DM), pp. 57–63.
- PDP-1998-SanchezDG #configuration management #network #pipes and filters
- Using channel pipelining in reconfigurable interconnection networks (JLS, JD, JMG), pp. 120–126.
- STOC-1998-LubyMSS #analysis #design #graph
- Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
- TACAS-1998-DawsT #abstraction #model checking #reachability #realtime
- Model Checking of Real-Time Reachability Properties Using Abstractions (CD, ST), pp. 313–329.
- TACAS-1998-Grahlmann #automaton #finite #parallel #petri net #source code
- Combining Finite Automata, Parallel Programs and SDL Using Petri Nets (BG), pp. 102–117.
- TACAS-1998-JensenL #abstraction #algorithm #proving
- A Proof of Burns N-Process Mutual Exclusion Algorithm Using Abstraction (HEJ, NAL), pp. 409–423.
- TACAS-1998-Lind-NielsenABHKL #analysis #composition #dependence #scalability #verification
- Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
- TACAS-1998-StevensS #game studies #model checking
- Practical Model-Checking Using Games (PS, CS), pp. 85–101.
- WRLA-1998-BorovanskyC #constraints #process #theorem proving
- Cooperation of constraint solvers: using the new process control facilities of ELAN (PB, CC), pp. 1–20.
- CADE-1998-FeveW #algebra #geometry #proving #theorem
- Proving Geometric Theorems Using Clifford Algebra and Rewrite Rules (SF, DW), pp. 17–31.
- CADE-1998-Letz
- Using Matings for Pruning Connection Tableaux (RL), pp. 381–396.
- CAV-1998-BelluominiM #verification
- Verification of Timed Systems Using POSETs (WB, CJM), pp. 403–415.
- CAV-1998-ColonU #abstraction #finite #generative
- Generating Finite-State Abstractions of Reactive Systems Using Decision Procedures (MC, TEU), pp. 293–304.
- CAV-1998-CourturierM #empirical #formal method
- An Experiment in Parallelizing an Application Using Formal Methods (RC, DM), pp. 345–356.
- CAV-1998-SkakkebaekJD #execution #incremental #verification
- Formal Verification of Out-of-Order Execution Using Incremental Flushing (JUS, RBJ, DLD), pp. 98–109.
- CAV-1998-SternD #in memory #memory management #verification
- Using Magnatic Disk Instead of Main Memory in the Murphi Verifier (US, DLD), pp. 172–183.
- CAV-1998-Wallner #ltl #model checking
- Model Checking LTL Using Net Unforldings (FW), pp. 207–218.
- CAV-1998-XuCSCM #first-order #graph #logic #model checking #multi
- Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs (YX, EC, XS, FC, OAM), pp. 219–231.
- ISSTA-1998-GodefroidHJ #analysis #model checking #monitoring
- Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
- ISSTA-1998-GotliebBR #automation #constraints #generative #testing #theorem proving
- Automatic Test Data Generation Using Constraint Solving Techniques (AG, BB, MR), pp. 53–62.
- ISSTA-1998-TraceyCM #automation
- Automated Program Flaw Finding Using Simulated Annealing (NT, JAC, KM), pp. 73–81.
- IWTCS-1998-FeijsMMW #consistency #multi #testing
- Conformance Testing of a Multimedia System Using PHACT (LMGF, FACM, JRM, JvW), pp. 193–210.
- IWTCS-1998-PetrenkoUC #concurrent #detection #fault
- Using Partial-Orders for Detecting Faults in Concurrent Systems (AP, AU, VC), pp. 175–190.
- ADL-1997-DAlessandroGCEC #education #library
- Continuing Medical Education to the Point of Care Using a Digital Library and Intimate Computers (MPD, JRG, JJC, WEE, LGC), pp. 95–101.
- ADL-1997-Marie-JulieE #database #image #multi #retrieval
- Digital Image Indexing and Retrieval by Content Using the Fractal Transform for Multimedia Databases (JMMJ, HE), pp. 2–12.
- DL-1997-ShinNK #hypermedia #semantics #similarity #statistics
- Hypertext Construction Using Statistical and Semantic Similarity (DS, SN, MK), pp. 57–63.
- DL-1997-WitbrockH #documentation #information retrieval #performance #string #word
- Using Words and Phonetic Strings for Efficient Information Retrieval from Imperfectly Transcribed Spoken Documents (MJW, AGH), pp. 30–35.
- ECDL-1997-HardingCW #n-gram #probability #retrieval
- Probabilistic Retrieval of OCR Degraded Text Using N-Grams (SMH, WBC, CW), pp. 345–359.
- ECDL-1997-Iannella #metadata #repository
- Metadata Repositories using PICS (RI), pp. 87–98.
- ECDL-1997-TochtermannRWSM #retrieval #semantics
- Using Semantic, Geographical, and Temporal Relationships to Enhance Search and Retrieval in Digital Catalogs (KT, WFR, GW, JS, BMJ), pp. 73–86.
- HT-1997-BalasubramanianBP #documentation #hypermedia #scalability #web
- A Large-Scale Hypermedia Application using Document Management and Web Technologies (VB, AB, DP), pp. 134–145.
- HT-1997-Chuat #hypermedia #what
- Using Hypertext for Textual Genetics, or, What is Suitable in a Hypertext System for an Information Gardening Application (CC), pp. 230–231.
- ICDAR-1997-AminM #network #recognition
- Recognition of Printed Arabic Text Using Neural Networks (AA, WM), pp. 612–615.
- ICDAR-1997-AnisimovichRST #classification #recognition
- Using Combination of Structural, Feature and Raster Classifiers for Recognition of Handprinted Characters (KA, VR, AS, VT), pp. 881–885.
- ICDAR-1997-BruggerZI #documentation #modelling #n-gram #recognition
- Modeling Documents for Structure Recognition Using Generalized N-Grams (RB, AWZ, RI), pp. 56–60.
- ICDAR-1997-CoteCLS #automation
- Automatic Reading of Cursive Scripts Using Human Knowledge (MC, MC, EL, CYS), pp. 107–111.
- ICDAR-1997-CullenHH #analysis #database #documentation #image #retrieval
- Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
- ICDAR-1997-DingLS #classification
- Classification of Oriental and European Scripts by Using Characteristic Features (JD, LL, CYS), pp. 1023–1027.
- ICDAR-1997-DuDLA #documentation #evaluation #lazy evaluation #recognition #semantics
- Generalized Contextual Recognition of Hand-Printed Documents Using Semantic Trees with Lazy Evaluation (LD, ACD, SML, BAB), pp. 238–242.
- ICDAR-1997-Favata #approximate #recognition #string #word
- General word recognition using approximate segment-string matching (JTF), pp. 92–96.
- ICDAR-1997-HennigSW #fuzzy #online
- Recognizing Letters in on-line Handwriting using Hierarchical Fuzzy Inference (AH, NS, RJW), pp. 936–940.
- ICDAR-1997-HiranoOY #recognition
- Structural Character Recognition Using Simulated Annealing (TH, YO, FY), pp. 507–510.
- ICDAR-1997-HoriuchiHYY #2d #normalisation #recognition
- Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
- ICDAR-1997-IshideraNY #recognition #word
- Unconstrained Japanese Address Recognition Using a Combination of Spatial Information and Word Knowledge (EI, DN, KY), p. 1016–?.
- ICDAR-1997-JainY #documentation #segmentation
- Page Segmentation Using Document Model (AKJ, BY), pp. 34–38.
- ICDAR-1997-KashiHNT #markov #online #verification
- On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
- ICDAR-1997-KawataniS #classification #component #design #difference
- Complementary Classifier Design Using Difference Principal Components (TK, HS), pp. 875–880.
- ICDAR-1997-KeeniSN #distributed #network #on the #representation
- On Distributed Representation of Output Layer for Recognizing Japanese Kana characters Using Neural Networks (KK, HS, KN), pp. 600–603.
- ICDAR-1997-KosmalaRR #markov #modelling #online #recognition
- Improved On-Line Handwriting Recognition Using Context Dependent Hidden Markov Models (AK, JR, GR), pp. 641–644.
- ICDAR-1997-LinDW #multi #recognition
- Handwritten Numeral Recognition Using MFNN Based Multiexpert Combination Strategy (XL, XD, YW), pp. 471–474.
- ICDAR-1997-LinNN #analysis #documentation #image #logic
- Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
- ICDAR-1997-MadhvanathK #scalability #word
- Pruning Large Lexicons Using Generalized Word Shape Descriptors (SM, VK), pp. 552–555.
- ICDAR-1997-NavoniCCGKR #memory management #recognition #word
- Words Recognition using Associative Memory (LN, RC, MC, GG, AK, PLR), pp. 97–101.
- ICDAR-1997-NobileBSK #documentation #identification #online #word
- Language identification of on-line documents using word shapes (NN, SB, CYS, SK), pp. 258–262.
- ICDAR-1997-Oguro #documentation #image #representation
- Faxed Document Image Restoration Using Gray Level Representation (MO), pp. 679–683.
- ICDAR-1997-PavlidisSP #online #recognition
- An On-Line Handwritten Note Recognition Method Using Shape Metamorphosis (IP, RS, NP), pp. 914–918.
- ICDAR-1997-RahmanF #case study #multi #recognition
- Introducing New Multiple Expert Decision Combination Topologies: A Case Study using Recognition of Handwritten Characters (AFRR, MCF), p. 886–?.
- ICDAR-1997-RazaHSW #database #documentation #recognition #robust
- Recognition of Facsimile Documents using a Database of Robust Features (GR, AH, NS, RJW), p. 444–?.
- ICDAR-1997-ShridharHK #recognition #word
- Handwritten Word Recognition Using Lexicon Free and Lexicon Directed Word (MS, GFH, FK), pp. 861–865.
- ICDAR-1997-SmeatonS #information retrieval
- Using Character Shape Coding for Information Retrieval (AFS, ALS), p. 974–?.
- ICDAR-1997-Soffer #categorisation #image
- Image Categorization Using Texture Features (AS), pp. 233–237.
- ICDAR-1997-StuckelbergPH #architecture #recognition
- An Architecture for Musical Score Recognition using High-Level Domain Knowledge (MVS, CP, MH), pp. 813–818.
- ICDAR-1997-SudaBKM #approach #word
- Logo and Word Matching Using a General Approach to Signal Registration (PS, CB, BK, GM), p. 61–?.
- ICDAR-1997-SunS #documentation #image
- Skew and Slant Correction for Document Images Using Gradient Direction (CS, DS), pp. 142–146.
- ICDAR-1997-TonouchiK #algorithm #online #recognition
- An on-line Japanese character recognition method using length-based stroke correspondence algorithm (YT, AK), pp. 633–636.
- ICDAR-1997-WaizumiKSN #classification #learning
- High speed rough classification for handwritten characters using hierarchical learning vector quantization (YW, NK, KS, YN), pp. 23–27.
- ICDAR-1997-WakaharaO #adaptation #normalisation
- Adaptive Normalization of Handwritten Characters Using Global/Local Affine Transformation (TW, KO), p. 28–?.
- PODS-1997-BeeriLR #logic #query
- Rewriting Queries Using Views in Description Logics (CB, AYL, MCR), pp. 99–108.
- PODS-1997-DuschkaG #query #recursion
- Answering Recursive Queries Using Views (OMD, MRG), pp. 109–116.
- PODS-1997-HoBA #query
- Partial-Sum Queries in Data Cubes Using Covering Codes (CTH, JB, RA), pp. 228–237.
- VLDB-1997-AshwinRSSS #database #garbage collection #object-oriented #transaction
- Garbage Collection in Object Oriented Databases Using Transactional Cyclic Reference Counting (SA, PR, SS, AS, SS), pp. 366–375.
- VLDB-1997-ChakrabartiDAR #database #navigation #taxonomy
- Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
- VLDB-1997-FlorescuKLP #integration #probability
- Using Probabilistic Information in Data Integration (DF, DK, AYL), pp. 216–225.
- VLDB-1997-HuangJR #optimisation #traversal
- Spatial Joins Using R-trees: Breadth-First Traversal with Global Optimizations (YWH, NJ, EAR), pp. 396–405.
- VLDB-1997-LlirbatST #transaction
- Using Versions in Update Transactions: Application to Integrity Checking (FL, ES, DT), pp. 96–105.
- VLDB-1997-VassalosP #query
- Describing and Using Query Capabilities of Heterogeneous Sources (VV, YP), pp. 256–265.
- VLDB-1997-WhiteheadSM #information retrieval
- GTE SuperPages: Using IR Techniques for Searching Complex Objects (SDW, HS, MM), pp. 553–557.
- CSEET-1997-Pierce #education #re-engineering
- Teaching software engineering principles using maintenance-based projects (KRP), pp. 53–60.
- ITiCSE-1997-DankelH #distance #learning
- The use of the WWW to support distance learning through NTU (DDDI, JH), pp. 8–10.
- ITiCSE-1997-DixonMK #education #network #simulation
- Using a network simulation package to teach the client-server model (MWD, TJM, JMK), pp. 71–73.
- ITiCSE-1997-Goldberg #student
- WebCT and first year: student reaction to and use of a Web-based resource in first year computer science (MWG), pp. 127–129.
- ITiCSE-1997-PalmeM #education
- Use of computer conferencing to teach a course on humans and computers (JP, SM), pp. 88–90.
- ITiCSE-1997-RoblesFPA #communication #distance #learning #multi
- Using multimedia communication technologies in distance learning (TR, DF, EP, SA), pp. 6–7.
- ITiCSE-1997-Taylor #communication #online #social
- Using online seminars to demonstrate the social psychological impacts of computer-mediated communication systems (JT), pp. 80–84.
- ITiCSE-WGR-1997-GrangerLABGJMY #education #information management #social
- Using information technology to integrate social and ethical issues into the computer science and information systems curriculum (report of the ITiCSE 1997 working group on social and ethical issue in computing curricula) (MJG, JCL, ESA, CB, DG, DDJ, CDM, FHY), pp. 38–50.
- ITiCSE-WGR-1997-NapsBJMPPT #interactive #visualisation
- Using the WWW as the delivery mechanism for interactive, visualization-based instructional modules (report of the ITiCSE 1997 working group on visualization) (TLN, JB, RJP, MFM, MPM, VKP, JT), pp. 13–26.
- CSMR-1997-Aebi #migration #multi #process #re-engineering
- A process model for re-engineering, migration and multi-use of business data (DA), pp. 106–113.
- CSMR-1997-Michael #constraints #evolution
- Using evolution constraints to assess the failure-proneness of evolving software (CCM), pp. 48–53.
- CSMR-1997-MullerG #case study #experience #standard #tool support
- Planning Year 2000 transformations using standard tools: an experience report (BM, RG), pp. 94–100.
- CSMR-1997-PidaparthiC #case study #design #migration #object-oriented
- Case Study in Migration to Object-Oriented System Structure Using Design Transformation Methods (SP, GC), pp. 128–135.
- ICSM-1997-Gupta #case study #comprehension #experience
- Program Understanding Using Program Slivers — An Experience Report (AG), pp. 66–71.
- WCRE-1997-JerdingR #architecture #locality #visualisation
- Using Visualization for Architectural Localization and Extraction (DFJ, SR), pp. 56–65.
- WCRE-1997-Kontogiannis #detection #evaluation #metric #programming
- Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics (KK), p. 44–?.
- WCRE-1997-Wiggerts #algorithm #clustering #legacy
- Using Clustering Algorithms in Legacy Systems Remodularization (TAW), pp. 33–43.
- WPC-1997-MooreR #information management #interactive #representation
- Using Knowledge Representation to Understand Interactive Systems (MMM, SR), pp. 60–67.
- WPC-1997-TilleyS #framework #on the #re-engineering #web
- On Using the Web as Infrastructure for Reengineering (SRT, DBS), pp. 170–173.
- ICSM-2000-Lynd #2d #maintenance
- Living with the 2-digit Year Year 2000 Maintenance Using a Procedural Solution (ECL), p. 206–?.
- ICSM-2000-MullerWS #framework #standard
- Wrapping coarse-grained objects using standard infrastructure technology (HAM, KW, MADS), p. 301.
- ICSM-2000-Schneidewind #maintenance #metric #process #reliability
- Measuring and evaluating maintenance process using reliability, risk, and test metrics (NFS), p. 232–?.
- DLT-1997-WatanabeT #attribute grammar
- An Attribute Evaluation of One-Pass Attribute Grammars Using Value Estimate (YW, TT), pp. 155–165.
- ICALP-1997-DiekertMM #equation #normalisation
- Solving Trace Equations Using Lexicographical Normal Forms (VD, YM, AM), pp. 336–346.
- WIA-1997-BertaultK #automaton #visualisation
- Visualization of Dynamic Automata Using Padnon (FB, GK), pp. 25–28.
- WIA-1997-SalomaaWY #implementation #performance #regular expression
- Efficient Implementation of Regular Languages Using R-AFA (KS, XW, SY), pp. 176–184.
- FME-1997-DevauchelleLV #named #specification
- PICGAL: Practical Use of Formal Specification to Develop a Complex Critical System (LD, PGL, HV), pp. 221–236.
- FME-1997-Gregoire #protocol #proving
- TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
- FME-1997-HemerL #design #pattern matching #reuse
- Reuse of Verified Design Templates Through Extended Pattern Matching (DH, PAL), pp. 495–514.
- FME-1997-Kellomaki #verification
- Verification of Reactive Systems Using DisCo and PVS (PK), pp. 589–604.
- FME-1997-Stringer-CalvertSW #case study #refinement
- Using PVS to Prove a Z Refinement: A Case Study (DWJSC, SS, IW), pp. 573–588.
- RTA-1997-Lynch #graph
- Goal-Directed Completion Using SOUR Graphs (CL), pp. 8–22.
- RTA-1997-TomasF #equation #geometry #linear
- Solving Linear Diophantine Equations Using the Geometric Structure of the Solution Space (APT, MF), pp. 269–283.
- ICFP-1997-RichardST #set
- Intensional Sets Using Explicit Substitutions (GR, FS, ATA), p. 318.
- IFL-1997-KarlsenW #concurrent #haskell #repository
- Using Concurrent Haskell to Develop Views over an Active Repository (EWK, SW), pp. 285–303.
- IFL-1997-Serrarens #multi #optimisation
- Using Multicasting for Optimising Data-Parallelism (PRS), pp. 270–284.
- HCI-CC-1997-Aoki #interface
- An Ergonomical Study on Computer Interface Using Input Devices (MA), pp. 587–590.
- HCI-CC-1997-AraiYIHU #interface
- An Input Interface System Using VEP for the Physically Challenged (YA, YY, KI, MH, YU), pp. 397–400.
- HCI-CC-1997-BadhamM #case study #implementation #tool support
- Tools for Implementing Socio-Technical Systems: An Australian Case Study and the Use of Handbooks (RB, IM), pp. 245–248.
- HCI-CC-1997-Fukuzumi
- Discrimination of Living Body Fingers by Using EMG and Finger Pulse Volume (SF), pp. 575–578.
- HCI-CC-1997-ItohSY #visual notation
- A Drawing Support System for the Visually Impaired Computer User Using a Virtual Sound Screen (KI, MS, YY), pp. 401–404.
- HCI-CC-1997-JasperEJNW #design #intranet #social
- Using Cooperative Design to Introduce ORDBMS-Driven Intranet Applications to Collaborating Social Service Agencies (JEJ, RDE, TBJ, RN, SW), pp. 97–100.
- HCI-CC-1997-MajchrzakB #design #lessons learnt
- Lessons Learned from Using a Computer-Based Tool to Support Sociotechnical Systems Design (AM, BB), pp. 221–224.
- HCI-CC-1997-PerusichM #fuzzy #problem
- Using Fuzzy Cognitive Maps to Define the Search Space in Problem Solving (KP, MDM), pp. 805–808.
- HCI-CC-1997-ShumayP #approach
- Healthy Computing: A Comprehensive Group Training Approach Using Biofeedback (DMS, EP), pp. 555–558.
- HCI-CC-1997-Vanderheiden97a #architecture #interface
- Use of a Common Table Architecture for Creating Hands Free, Eyes Free, Noisy Environment (Flex-Modal, Flex-Input) Interfaces (GCV), pp. 449–452.
- HCI-CC-1997-VendaL #assembly #evaluation
- Ergonomic Evaluation of Manual Assembly Operations Using Direct and Indirect Observation Workstations in Sitting and Standing Positions (VFV, SSL), pp. 855–858.
- HCI-CC-1997-WolberS #adaptation #aspect-oriented #design
- Using Psychological Aspects for the Design of Adaptive IT-Tools for Cooperative Engineering (MW, PS), pp. 781–784.
- HCI-SEC-1997-ChurchillSBD #3d #documentation
- Using VR-VIBE: Browsing and Searching for Documents in 3D-Space (EFC, DS, SB, PD), pp. 857–860.
- HCI-SEC-1997-GunjiKK
- Quick Address Search System with Handwriting Using Character Transition Information (KG, SK, KK), pp. 423–426.
- HCI-SEC-1997-KoikeC #3d #version control #visualisation
- Integrating Version Control and Module Management Using Three-Dimensional Visualization (HK, HCC), pp. 853–856.
- HCI-SEC-1997-KuzuokaN
- Assisting Remote Instruction Using Copied Reality (HK, TN), pp. 957–960.
- HCI-SEC-1997-LawsonRGGM #challenge #human-computer #interface
- The Human-Machine Interface Challenges of Using Virtual Environment (VE) Displays Aboard Centrifuge Devices (BDL, AHR, FEG, JDG, AMM), pp. 945–948.
- HCI-SEC-1997-MuraiKI #3d #communication #multi #video
- Display of Conversation Partners Using 3D-Facial Model in the Multiparty Video Communication System (TM, HK, SI), pp. 861–864.
- HCI-SEC-1997-NakajimaHNT #interface #realtime
- A System for Real-time Groupware Using a Pen Interface for Creative Thought Support (KN, EH, MN, NT), pp. 443–446.
- HCI-SEC-1997-Neal #distance #learning #multi
- Using Multiple Technologies for Distance Learning (LN), pp. 111–114.
- HCI-SEC-1997-OhashiYE #interface
- A Real World Oriented Interface Technique Using Computer Vision (TO, TY, TE), pp. 949–952.
- HCI-SEC-1997-PosnerBM
- Evaluating REAL Users, Using REAL Software, Performing REAL Tasks, in REAL Contexts (IP, RB, AM), pp. 597–600.
- HCI-SEC-1997-ShibuyaKT #education
- Teaching Information Literacy in Technical Courses Using WWW (YS, GK, HT), pp. 723–726.
- HCI-SEC-1997-ShinYY #authoring #documentation #multi #parsing
- Presentation Jockey: Multimedia Authoring System Using Structured Document Parsing (HSS, WJY, KJY), pp. 659–662.
- HCI-SEC-1997-SuLYFD #artificial reality #industrial
- Industrial Training Using Virtual Reality (CJS, FL, LY, CMF, VGD), pp. 989–992.
- CAiSE-1997-FilippidouL #approach #requirements #validation
- Using Scenarios to Validate Requirements in a Plausibility Centred Approach (DF, PL), pp. 47–60.
- EDOC-1997-FujisakiHK #distributed #fault tolerance #network #scalability
- A Scalable Fault-Tolerant Network Management System Built Using Distributed Object Technology (TF, MH, KK), pp. 140–148.
- ACIR-1997-Wilkinson
- Using Combination of Evidence for Term Expansion (RW).
- CIKM-1997-KoczkodajHO #knowledge-based
- Using Consistency-driven Pairwise Comparisons in Knowledge-based Systems (WWK, MWH, MO), pp. 91–96.
- CIKM-1997-LinR #navigation
- Using a Sequential Index in Terrain-Aided Navigation (LL, TR), pp. 177–184.
- CIKM-1997-ObermeyerM
- Evaluating Triggers Using Decision Trees (LO, DPM), pp. 144–150.
- CIKM-1997-SinghSC #concept #documentation #generative
- Generating Association Rules from Semi-Structured Documents Using an Extended Concept Hierarchy (LS, PS, BC), pp. 193–200.
- CIKM-1997-YoonSP #data mining #mining #query
- Intensional Query Processing Using Data Mining Approaches (SCY, IYS, EKP), pp. 201–208.
- ICML-1997-BalujaD #optimisation
- Using Optimal Dependency-Trees for Combinational Optimization (SB, SD), pp. 30–38.
- ICML-1997-CardieN #predict
- Improving Minority Class Prediction Using Case-Specific Feature Weights (CC, NN), pp. 57–65.
- ICML-1997-Drucker
- Improving Regressors using Boosting Techniques (HD), pp. 107–115.
- ICML-1997-KollerS #documentation #word
- Hierarchically Classifying Documents Using Very Few Words (DK, MS), pp. 170–178.
- ICML-1997-ReddyT #learning
- Learning Goal-Decomposition Rules using Exercises (CR, PT), pp. 278–286.
- ICML-1997-Schapire #learning #multi #problem
- Using output codes to boost multiclass learning problems (RES), pp. 313–321.
- KDD-1997-AliMS #classification
- Partial Classification Using Association Rules (KA, SM, RS), pp. 115–118.
- KDD-1997-ChienFMLG #data analysis #database #image #scalability
- Using Artificial Intelligence Planning to Automate Science Data Analysis for Large Image Databases (SAC, FF, HM, EL, RG), pp. 147–150.
- KDD-1997-KamberHC #mining #multi
- Metarule-Guided Mining of Multi-Dimensional Association Rules Using Data Cubes (MK, JH, JC), pp. 207–210.
- KDD-1997-LiuHC #classification
- Using General Impressions to Analyze Discovered Classification Rules (BL, WH, SC), pp. 31–36.
- KDD-1997-SmythGIRF #clustering #detection
- Detecting Atmospheric Regimes Using Cross-Validated Clustering (PS, MG, KI, JR, AF), pp. 61–66.
- SIGIR-1997-AslandoganTYZR #image #retrieval #semantics
- Using Semantic Contents and WordNet in Image Retrieval (YAA, CT, CTY, JZ, NR), pp. 286–295.
- SIGIR-1997-ChenHXGM #retrieval #taxonomy
- Chinese Text Retrieval Without Using a Dictionary (AC, JH, LX, FCG, JM), pp. 42–49.
- SIGIR-1997-FitzpatrickD #automation #feedback #query #question #social
- Automatic Feedback Using Past Queries: Social Searching? (LF, MD), pp. 306–313.
- SIGIR-1997-HearstK #interactive #interface #named #retrieval #scalability #specification
- Cat-a-Cone: An Interactive Interface for Specifying Searches and Viewing Retrieval Results using a Large Category Hierarchy (MAH, CK), pp. 246–255.
- SIGIR-1997-KlavansTJ #automation #effectiveness #multi #natural language #semiparsing #speech
- Effective Use of Natural Language Processing Techniques for Automatic Conflation of Multi-Word Terms: The Role of Derivational Morphology, Part of Speech Tagging, and Shallow Parsing (ET, JK, CJ), pp. 148–155.
- UML-1997-Korthaus #modelling #uml
- Using UML for Business Object Based Systems Modeling (AK), pp. 220–237.
- UML-1997-SchroffT #uml
- Conventions for the Practical Use of UML (AS, AT), pp. 262–270.
- UML-1997-WeberM #concept #diagrams #implementation #modelling #reuse #uml
- Reuse of Models and Diagrams of the UML and Implementation Concepts Regarding Dynamic Modeling (WW, PM), pp. 190–203.
- ECOOP-1997-MeuselCK #documentation #framework #hypermedia #object-oriented
- A Model for Structuring User Documentation of Object-Oriented Frameworks Using Patterns and Hypertext (MM, KC, WK), pp. 496–510.
- ECOOP-1997-OdenthalQ #design #documentation
- Using Patterns for Design and Documentation (GO, KQC), pp. 511–529.
- OOPSLA-1997-LitmanMP #modelling
- Modeling Dynamic Collections of Interdependent Objects Using Path-Based Rules (DJL, AM, PFPS), pp. 77–92.
- OOPSLA-1997-Lorenz #case study #design pattern #interpreter
- Tiling Design Patterns — A Case Study Using the Interpreter Pattern (DHL), pp. 206–217.
- OOPSLA-1997-Weihe #algorithm #challenge #object-oriented #programming #reuse
- Reuse of Algorithms: Still a Challenge to Object-Oriented Programming (KW), pp. 34–48.
- TOOLS-ASIA-1997-Coplien97a #c++ #programming
- Advanced C++ Programming Styles: Using C++ as a Higher-Level Language (JC), pp. 418–419.
- TOOLS-ASIA-1997-Exton #distributed #fault tolerance #interface #specification
- Distributed Fault Tolerance Specification through the use of Interface Definitions (CE), pp. 254–259.
- TOOLS-ASIA-1997-HungLC #experience #network
- An Experience of Using FDOOA Method to Develop a Telecommunications Network Management System (YSH, WCL, CGC), pp. 320–329.
- TOOLS-ASIA-1997-PeiYJS #framework #modelling #object-oriented #parallel
- A Method for Using Object-Oriented Frameworks to Support Various High-Level Parallel Computing Models (LP, DY, LJ, DLS), pp. 151–158.
- TOOLS-ASIA-1997-Schmidt97b #communication #design pattern #framework #object-oriented
- Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 422–423.
- TOOLS-ASIA-1997-SheardH #c++ #case study #concept #education #experience #object-oriented #programming #student
- Experiences with Teaching Object-Oriented Concepts to Introductory Programming Students Using C++ (JS, DH), pp. 310–319.
- TOOLS-ASIA-1997-StobartPT #case study #object-oriented #polymorphism #source code #testing
- Using Extended General Statecharts to Generate Test Cases for Overloaded/Polymorphic Object-Oriented Programs: A Case Study (SS, NP, BYT), pp. 96–103.
- TOOLS-ASIA-1997-WangMS #case study #design pattern #development #experience
- Experience Report: Using Design Patterns in the Development of JB System (YW, HM, WS), pp. 159–165.
- TOOLS-PACIFIC-1997-LakosL #java #specification
- Animating Formal Specifications Using Java Applets (CL, GL), pp. 196–209.
- TOOLS-PACIFIC-1997-Schmidt #communication #design pattern #framework #object-oriented
- Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 361–362.
- TOOLS-USA-1997-GilH #debugging #generative #source code #testing
- T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
- TOOLS-USA-1997-Jones #corba
- Using CORBA (GJ), p. 374.
- AdaEurope-1997-Thornley #case study #development #experience #static analysis
- Static Analysis and Diversity in the Software Development Process- Experiences with the Use of SPARK (JPT), pp. 266–277.
- ALP-1997-CodishT #analysis #constraints #logic programming #semantics #source code #termination
- A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
- PEPM-1997-BeshersF #compilation #generative #partial evaluation #performance #visualisation
- Generating Efficient Virtual Worlds for Visualization Using Partial Evaluation and Dynamic Compilation (CB, SF), pp. 107–115.
- PLDI-1997-BodikG #slicing
- Partial Dead Code Elimination using Slicing Transformations (RB, RG), pp. 159–170.
- PLDI-1997-HashemiKC #performance
- Efficient Procedure Mapping Using Cache Line Coloring (AHH, DRK, BC), pp. 171–182.
- PLDI-1997-JensenJKS #automation #higher-order #logic #monad #pointer #source code #verification
- Automatic Verification of Pointer Programs using Monadic Second-Order Logic (JLJ, MEJ, NK, MIS), pp. 226–236.
- PLDI-1997-Webber #program analysis
- Program Analysis Using Binary Relations (ABW), pp. 249–260.
- PLILP-1997-Patterson #lazy evaluation
- Transforming Lazy Functions Using Comportment Properties (RP), pp. 111–125.
- PLILP-1997-SparudR #functional #lazy evaluation
- Tracing Lazy Functional Computations Using Redex Trails (JS, CR), pp. 291–308.
- POPL-1997-Godefroid #model checking #programming language
- Model Checking for Programming Languages using Verisoft (PG), pp. 174–186.
- POPL-1997-Ruf #analysis #clustering #data flow
- Partitioning Dataflow Analyses Using Types (ER), pp. 15–26.
- POPL-1997-WandS #semantics
- Denotational Semantics Using an Operationally-Based Term Model (MW, GTS), pp. 386–399.
- SAS-1997-Braunburger #analysis #automation #order #polynomial #termination
- Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
- SAS-1997-FahndrichA #constraints #program analysis #set
- Program Analysis Using Mixed Term and Set Constraints (MF, AA), pp. 114–126.
- TRI-Ada-1997-SuchanS #ada #education #problem
- Using Ada 95 as a Tool to Teach Problem Solving to Non-CS Majors (WKS, TLS), pp. 31–36.
- TRI-Ada-1997-Yu #component #object-oriented #reuse
- Using Object-Oriented Techniques to Develop Reusable Components (HY), pp. 117–124.
- RE-1997-BoisDZ #on the #problem
- On the Use of a Formal R. E. Language — The Generalized Railroad Crossing Problem (PDB, ED, JMZ), p. 128–?.
- RE-1997-Hall #question #requirements #what
- What’s the Use of Requirements Engineering? (AH), p. 2–?.
- RE-1997-MassonetL #framework #requirements #reuse
- Analogical Reuse of Requirements Frameworks (PM, AvL), p. 26–?.
- ASE-1997-DevanbuS #automation #hardware #research #verification
- Research Directions for Automated Software Verification: Using Trusted Hardware (PTD, SGS), pp. 274–279.
- ASE-1997-FenselS #architecture #knowledge-based #verification
- Using KIV to Specify and Verify Architectures of Knowledge-Based Systems (DF, AS), p. 71–?.
- ASE-1997-Hall #automation #library #reasoning #validation
- Reactive System Validation using Automated Reasoning over a Fragment Library (RJH), pp. 299–300.
- ASE-1997-Pecheur #distributed #specification #verification
- Specification and Verification of the Co4 Distributed Knowledge System using LOTOS (CP), pp. 63–70.
- ASE-1997-Yamaguchi #modelling #ontology #process
- Modeling Software Processes by using Process and Object Ontologies (TY), pp. 319–320.
- ESEC-FSE-1997-BodikGS #data flow
- Refining Data Flow Information Using Infeasible Paths (RB, RG, MLS), pp. 361–377.
- ESEC-FSE-1997-CheungGK #analysis #composition #liveness #reachability #verification
- Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
- ESEC-FSE-1997-DwyerCH #abstraction #model checking #user interface #visual notation
- Model Checking Graphical User Interfaces Using Abstractions (MBD, VC, LH), pp. 244–261.
- ESEC-FSE-1997-LandSJ #design #detection #empirical #fault #performance #validation
- Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
- ESEC-FSE-1997-RepsBDL #maintenance #problem #profiling
- The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem (TWR, TB, MD, JRL), pp. 432–449.
- ICSE-1997-Gentleman #component #effectiveness #off the shelf
- Effective Use of COTS (Commercial-off-the-Shelf) Software Components in Long Lived Systems (WMG), pp. 635–636.
- ICSE-1997-JohnsonT #case study #overview
- Assessing Software Review Meetings: A Controlled Experimental Study Using CSRS (PMJ, DT), pp. 118–127.
- ICSE-1997-MedvidovicOT #architecture #component #off the shelf #reuse
- Reuse of Off-the-Shelf Components in C2-Style Architectures (NM, PO, RNT), pp. 692–700.
- ICSE-1997-PerpichPPVW #development #scalability #web
- Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development (JP, DEP, AAP, LGV, MWW), pp. 14–21.
- ICSE-1997-PezzeY #analysis #modelling #multi #semantics #tool support
- Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
- ICSE-1997-SullivanSM #architecture #formal method #standard
- Using Formal Methods to Reason about Architectural Standards (KJS, JS, MM), pp. 503–513.
- SAC-1997-ChengKK #assessment #concept #fuzzy #representation
- Knowledge assessment using fuzzy conceptual representation (PC, DK, GK), pp. 3–9.
- SAC-1997-ChungLLD #equation
- Effect of data distribution in data assimilation using Burgers’ equation (WC, JML, SL, SKD), pp. 521–526.
- SAC-1997-FontanaF #documentation #evaluation #fuzzy
- Using fuzzy grammars for the evaluation of SGML-based documents (FAF, FF), pp. 202–203.
- SAC-1997-KozaBAK #evolution #programming #search-based
- Evolution using genetic programming of a low-distortion, 96 decibel operational amplifier (JRK, FHBI, DA, MAK), pp. 207–216.
- SAC-1997-LeeLP #approach #empirical #information management #towards
- Towards Interoperable Heterogeneous Information Systems: An Experiment Using the DIOM Approach (YL, LL, CP), pp. 112–114.
- SAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry
- An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
- DAC-1997-AmonBHL #diagrams #verification
- Symbolic Timing Verification of Timing Diagrams using Presburger Formulas (TA, GB, TH, JL), pp. 226–231.
- DAC-1997-Gebotys #energy #memory management #network
- Low Energy Memory and Register Allocation Using Network Flow (CHG), pp. 435–440.
- DAC-1997-GrundmannDAR #design #performance
- Designing High Performance CMOS Microprocessors Using Full Custom Techniques (WJG, DD, RLA, NLR), pp. 722–727.
- DAC-1997-GuptaMA #formal method #simulation #towards #validation
- Toward Formalizing a Validation Methodology Using Simulation Coverage (AG, SM, PA), pp. 740–745.
- DAC-1997-HenkelE #hardware
- A Hardware/Software Partitioner Using a Dynamically Determined Granularity (JH, RE), pp. 691–696.
- DAC-1997-HongBBM
- Safe BDD Minimization Using Don’t Cares (YH, PAB, JRB, KLM), pp. 208–213.
- DAC-1997-KimC #synthesis
- Power-conscious High Level Synthesis Using Loop Folding (DK, KC), pp. 441–445.
- DAC-1997-KuehlmannK #equivalence
- Equivalence Checking Using Cuts and Heaps (AK, FK), pp. 263–268.
- DAC-1997-LiaoD #bound #problem
- Solving Covering Problems Using LPR-Based Lower Bounds (SYL, SD), pp. 117–120.
- DAC-1997-PandeyRBA #evaluation #verification
- Formal Verification of Content Addressable Memories Using Symbolic Trajectory Evaluation (MP, RR, REB, MSA), pp. 167–172.
- DAC-1997-PomeranzR #approach #fault #multi #simulation
- Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
- DAC-1997-SentovichTB #optimisation #performance #set
- Efficient Latch Optimization Using Exclusive Sets (ES, HT, GB), pp. 8–11.
- DAC-1997-XanthopoulosYC #architecture #case study #estimation
- Architectural Exploration Using Verilog-Based Power Estimation: A Case Study of the IDCT (TX, YY, AC), pp. 415–420.
- EDTC-1997-ArabiK #performance #testing
- Efficient and accurate testing of analog-to-digital converters using oscillation-test method (KA, BK), pp. 348–352.
- EDTC-1997-BeckmannH #constraints #in memory #logic programming #memory management #synthesis
- Using constraint logic programming in memory synthesis for general purpose computers (RB, JH), p. 619.
- EDTC-1997-GirodiasC #constraints #correlation #interface #logic programming #verification
- Interface timing verification with delay correlation using constraint logic programming (PG, EC), pp. 12–19.
- EDTC-1997-HsiaoRP #generative #testing #traversal
- Sequential circuit test generation using dynamic state traversal (MSH, EMR, JHP), pp. 22–28.
- EDTC-1997-KropfR #model checking
- Using MTBDDs for discrete timed symbolic model checking (TK, JR), pp. 182–187.
- EDTC-1997-LiuS #graph #heuristic #multi #performance
- Multi-layer chip-level global routing using an efficient graph-based Steiner tree heuristic (LCEL, CS), pp. 311–318.
- EDTC-1997-MignotteP #scheduling
- Scheduling using mixed arithmetic: an ILP formulation (AM, OP), p. 621.
- EDTC-1997-NouraniP #analysis #behaviour
- Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
- EDTC-1997-RomanowiczLLRABMP #hardware #modelling #simulation #transducer
- Modeling and simulation of electromechanical transducers in microsystems using an analog hardware description language (BR, ML, PL, PR, HPA, AB, VM, FP), pp. 119–123.
- EDTC-1997-SurtiCT #automaton #design #encoding #power management
- Low power FSM design using Huffman-style encoding (PS, LFC, AT), pp. 521–525.
- EDTC-1997-TsengS #multi #standard
- A gridless multi-layer router for standard cell circuits using CTM cells (HPT, CS), pp. 319–326.
- EDTC-1997-UrsuGZ #automaton #design #logic #specification #verification
- Design and verification of the sequential systems automata using temporal logic specifications (AU, GG, SZ), p. 623.
- EDTC-1997-WalrathVB #analysis #partial evaluation #performance #verification
- Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
- EDTC-1997-WunscheCSW #design
- Microsystem design using simulator coupling (SW, CC, PS, FW), pp. 113–118.
- HPDC-1997-SiuS #design pattern #network #parallel
- Design Patterns for Parallel Computing using a Network of Processors (SS, AS), pp. 293–304.
- HPDC-1997-Wolski #network #performance #scheduling
- Forecasting Network Performance to Support Dynamic Scheduling using the Network Weather Service (RW), pp. 316–325.
- PDP-1997-Errico #lightweight #mobile #named #parallel #process
- Swarm: Parallel computing using lightweight mobile processes (LdE), pp. 84–92.
- PDP-1997-RuhlB #communication #library
- A portable collective communication library using communication schedules (TR, HEB), pp. 297–306.
- PDP-1997-Sergent #algorithm #distributed #latency #petri net
- Evaluating latency of distributed algorithms using petri nets (NS), pp. 437–444.
- PPoPP-1997-Rinard #automation #effectiveness #source code
- Effective Fine-Grain Synchronization for Automatically Parallelized Programs Using Optimistic Synchronization Primitives (MCR), pp. 112–123.
- STOC-1997-BuhlerSS #fourier #integer #performance #precise
- Fast and Precise Computations of Discrete Fourier Transforms Using Cyclotomic Integers (JB, MAS, VS), pp. 40–47.
- STOC-1997-FreundSSW #predict
- Using and Combining Predictors That Specialize (YF, RES, YS, MKW), pp. 334–343.
- STOC-1997-Karger #graph #random
- Using Random Sampling to Find Maximum Flows in Uncapacitated Undirected Graphs (DRK), pp. 240–249.
- TACAS-1997-EngelsFM #generative #model checking #network #testing
- Test Generation for Intelligent Networks Using Model Checking (AE, LMGF, SM), pp. 384–398.
- TACAS-1997-ParashkevovY #analysis #performance #pseudo #reachability
- Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
- TAPSOFT-1997-AlessiBH
- Partializing Stone Spaces using SFP Domains (Extended Abstract) (FA, PB, FH), pp. 478–489.
- TAPSOFT-1997-GenetG #constraints #proving #termination
- Termination Proofs Using gpo Ordering Constraints (TG, IG), pp. 249–260.
- TAPSOFT-1997-HeiselL #architecture
- Using LOTOS Patterns to Characterize Architectural Styles (MH, NL), pp. 818–832.
- CADE-1997-DennisBG #bisimulation #induction #proving
- Using A Generalisation Critic to Find Bisimulations for Coinductive Proofs (LAD, AB, IG), pp. 276–290.
- CADE-1997-FeltyH #hybrid #interactive #proving #theorem proving
- Hybrid Interactive Theorem Proving Using Nuprl and HOL (APF, DJH), pp. 351–365.
- CADE-1997-Matthews #implementation #induction
- A Practical Implementation of Simple Consequence Relations Using Inductive Definitions (SM), pp. 306–320.
- CAV-1997-BultanGP #infinity #model checking
- Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic (TB, RG, WP), pp. 400–411.
- CAV-1997-Kaivola #composition #verification
- Using Compositional Preorders in the Verification of Sliding Window Protocal (RK), pp. 48–59.
- CAV-1997-MelzerR #concurrent
- Deadlock Checking Using Net Unfoldings (SM, SR), pp. 352–363.
- CAV-1997-RamakrishnanRRSSW #model checking #performance
- Efficient Model Checking Using Tabled Resolution (YSR, CRR, IVR, SAS, TS, DSW), pp. 143–154.
- CAV-1997-Sistla #automaton #invariant #linear #network #verification
- Parametrized Verification of Linear Networks Using Automata as Invariants (APS), pp. 412–423.
- ICLP-1997-BuenoCL #analysis #logic programming #set #source code
- Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
- ICLP-1997-KagedalD #approach #array #reuse
- A Practical Approach to Structure Reuse of Arrays in Single Assignment Languages (AK, SKD), pp. 18–32.
- ICLP-1997-TsuchidaAIY #constraints #logic programming
- Tree Drawing Using Constraint Logic Programming (KT, YA, TI, TY), p. 414.
- ILPS-1997-MonteliusM
- Using SimICS to Evaluate the Penny System (JM, PSM), pp. 133–147.
- ADL-1996-FranceschiniM
- Data Compression Using Encrypted Text (RF, AM), pp. 130–138.
- ADL-1996-LoweWPJVM #image #library
- The Image Engine HPCC Project: A Medical Digital Library System using Agent-Based Technology to Create an Integrated View of the Electronic Medical Record (HJL, WKW, SEP, FJ, JKV, ATM), pp. 45–56.
- DL-1996-ManmathaHRC #word
- Indexing Handwriting Using Word Matching (RM, CH, EMR, WBC), pp. 151–159.
- DL-1996-SchatzJCC #information retrieval #interactive #library
- Interactive Term Suggestion for Users of Digital Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval (BRS, EHJ, PAC, HC), pp. 126–133.
- HT-1996-GirgensohnLS #case study #collaboration #experience #web
- Experiences in Developing Collaborative Applications Using the World Wide Web “Shell” (AG, AL, KS), pp. 246–255.
- HT-1996-SaltonSBM #automation #composition
- Automatic Text Decomposition Using Text Segments and Text Themes (GS, AS, CB, MM), pp. 53–65.
- PODS-1996-LevyRU #query
- Answering Queries Using Limited External Processors (AYL, AR, JDU), pp. 227–237.
- SIGMOD-1996-BohmA #database #documentation #named #object-oriented
- HyperStorM — Administering Structured Documents Using Object-Oriented Database Technology (KB, KA), p. 547.
- SIGMOD-1996-FukudaMMT #2d #algorithm #data mining #mining #visualisation
- Data Mining Using Two-Dimensional Optimized Accociation Rules: Scheme, Algorithms, and Visualization (TF, YM, SM, TT), pp. 13–23.
- SIGMOD-1996-HullZ #framework #integration
- A Framework for Supporting Data Integration Using the Materialized and Virtual Approaches (RH, GZ), pp. 481–492.
- VLDB-1996-FaloutsosG #analysis
- Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
- VLDB-1996-FaloutsosMS #modelling #multi
- Modeling Skewed Distribution Using Multifractals and the “80-20” Law (CF, YM, AS), pp. 307–317.
- VLDB-1996-FukudaMMT #performance
- Constructing Efficient Decision Trees by Using Optimized Numeric Association Rules (TF, YM, SM, TT), pp. 146–155.
- VLDB-1996-Hammond #consistency #set
- Using Referential Integrity To Easily Define Consistent Subset Replicas (BH), p. 591.
- VLDB-1996-Kleewein #database
- Practical Issues with Commercial Use of Federated Databases (JK), p. 580.
- VLDB-1996-LevyRO #query
- Querying Heterogeneous Information Sources Using Source Descriptions (AYL, AR, JJO), pp. 251–262.
- VLDB-1996-Ogawa #documentation #effectiveness #performance #ranking #scalability
- Effective & Efficient Document Ranking without using a Large Lexicon (YO), pp. 192–202.
- VLDB-1996-Padmanabhan #parallel #scalability #set
- Extracting Large Data Sets using DB2 Parallel Edition (SP), p. 582.
- VLDB-1996-ShethKMWDLPLS #multi #workflow
- Supporting State-Wide Immunisation Tracking Using Multi-Paradigm Workflow Technology (APS, KK, JAM, DW, SD, CL, DP, JL, IS), pp. 263–273.
- VLDB-1996-SrivastavaDJL #query
- Answering Queries with Aggregation Using Views (DS, SD, HVJ, AYL), pp. 318–329.
- CSEE-1996-ShepardBS #automation #education #scalability #tool support
- Use of Large, Domain Specific CASE tools in Undergraduate Curricula (TS, BB, MS), pp. 144–148.
- CSEE-1996-TakvorianMZ #education #re-engineering #web
- Using the World Wide Web to Promote Software Engineering Education (AT, KM, DZ), p. 270–?.
- ITiCSE-1996-Castaneda #visual notation
- Windows-based applications in Visual Basic using project teams (SEC), p. 232.
- ITiCSE-1996-Hartley #education #hypermedia #network #operating system
- A hypermedia lab manual for operating systems: using the network to teach (SJH), pp. 8–10.
- ITiCSE-1996-HartleyGJMMPRS #education #interactive #internet #web
- Enhancing teaching using the Internet: report of the working group on the World Wide Web as an interactive teaching resource (SH, JGP, DJ, CM, MDM, BAP, MR, MKS), pp. 218–228.
- ITiCSE-1996-KnoxWJKKLMPR #education #guidelines
- Use of laboratories in computer science education: guidelines for good practice: report of the working group on computing laboratories (DK, UW, DTJ, EBK, JK, AL, JPM, VKP, KAR), pp. 167–181.
- ITiCSE-1996-Krone #algorithm #analysis #data type #education #symbolic computation
- Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
- ITiCSE-1996-McManusBCST #challenge #education
- Challenges of using groupware to teach groupware (MMM, CMB, JAC, JS, MBT), pp. 165–166.
- ITiCSE-1996-McNally #algorithm #data type #education #visualisation
- Using visualization in teaching data structures and algorithms (MFM), p. 231.
- ITiCSE-1996-MirandaP #internet
- Using Internet technology for course support (JEPM, JSP), pp. 96–100.
- ITiCSE-1996-MutchlerL #multi #programming #user interface
- Using multimedia and GUI programming in CS 1 (DM, CL), pp. 63–65.
- ITiCSE-1996-PilgrimL #internet
- Appropriate use of the Internet in computer science courses (CJP, YKL), pp. 81–86.
- ITiCSE-1996-VeraartW #student #web
- Using CD-ROMs and local Web pages to provide course materials for distance-students (VEV, SLW), pp. 90–92.
- ICSM-1996-GannodC #c #reverse engineering #source code
- Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 265–274.
- ICSM-1996-MancoridisH #clustering #graph
- Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering (SM, RCH), p. 23–?.
- ICSM-1996-MayrandLM #automation #detection #empirical #metric
- Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics (JM, CL, EM), p. 244–?.
- ICSM-1996-MortimerB #abstraction #maintenance
- Maintenance and abstraction of program data using formal transformations (REM, KHB), p. 301–?.
- ICSM-1996-OwensWG #classification #fault
- Software Error Classification using Purify (HDO, BFW, MJG), pp. 104–113.
- ICSM-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code
- Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
- WCRE-1996-GannodC #c #reverse engineering #source code
- Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 249–258.
- WCRE-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code
- Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
- WPC-1996-Bull #comprehension #domain-specific language #safety
- Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
- FME-1996-ArnoldBR #debugging #embedded #formal method
- An Example of Use of Formal Methods to Debug an Embedded Software (AA, DB, JPR), pp. 649–661.
- FME-1996-BoigelotG #analysis #model checking #protocol
- Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
- FME-1996-ComuzziH #slicing
- Program Slicing Using Weakest Preconditions (JJC, JMH), pp. 557–575.
- FME-1996-SeguinW #approach #category theory #fault tolerance #logic #validation
- Using a Logical and Categorical Approach for the Validation of Fault-Tolerant Systems (CS, VW), pp. 347–366.
- FME-1996-ZwiersHLRS #composition #development #reuse #top-down
- Modular Completeness: Integrating the Reuse of Specified Software in Top-down Program Development (JZ, UH, YL, WPdR, FAS), pp. 595–608.
- IFL-1996-Assmann #coordination #functional #petri net #process
- Coordinating Functional Processes Using Petri Nets (CA), pp. 162–183.
- CHI-1996-Erickson #analysis #design
- The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
- CHI-1996-KambaEHSS
- Using Small Screen Space More Efficiently (TK, SAE, TH, TS, PNS), pp. 383–390.
- CHI-1996-Miller #approach #development #multi
- Integrating Human Factors in Customer Support Systems Development Using a Multi-Level Organisational Approach (AM), pp. 368–375.
- CHI-1996-RiceFPG #web
- Using the Web Instead of a Window System (JR, AF, PP, TRG), pp. 103–110.
- CHI-1996-VirziSK #identification #problem #prototype #usability
- Usability Problem Identification Using Both Low- and High-Fidelity Prototypes (RAV, JLS, DK), pp. 236–243.
- CSCW-1996-HillT #social
- Using Frequency-of-Mention in Public Conversations for Social Filtering (WCH, LGT), pp. 106–112.
- CSCW-1996-KawaiBT #multi #named #video
- ARGUS: An Active Awareness System Using Computer-Controlled Multiple Cameras (Video Program) (TK, YB, HT), p. 7.
- CSCW-1996-LeeG #collaboration #web
- Developing Collaborative Applications Using the World Wide Web Shell (AL, AG), p. 4.
- CSCW-1996-Waldo #collaboration #java #programming
- Using the Java Programming Environment to Build Collaborative Applications (JW), p. 3.
- CAiSE-1996-KroneKHDE #case study #information management
- Developing an Information System Using TROLL: An Application Field Study (MK, MK, PH, GD, HDE), pp. 136–159.
- CAiSE-1996-LammariLJC #constraints #normalisation
- Deriving Normalized Is_a Hierarchies by Using Applicability Constraints (NL, RL, MJ, XC), pp. 562–580.
- AKDDM-1996-HsuK #induction #learning #optimisation #query #semantics
- Using Inductive Learning To Generate Rules for Semantic Query Optimization (CNH, CAK), pp. 425–445.
- CIKM-1996-LeePHC #composition #query
- Spatial Query Processing Using Object Decomposition Method (YJL, HHP, NHH, CWC), pp. 53–61.
- CIKM-1996-Pulido #graph #query #recursion #traversal
- Recursive Query Processing Using Graph Traversal Techniques (EP), pp. 37–44.
- ICML-1996-AbeL #learning #modelling #word
- Learning Word Association Norms Using Tree Cut Pair Models (NA, HL), pp. 3–11.
- ICML-1996-DonohoR #induction
- Constructive Induction Using Fragmentary Knowledge (SKD, LAR), pp. 113–121.
- ICML-1996-HelmboldSSW #multi #online
- On-Line Portfolio Selection Using Multiplicative Updates (DPH, RES, YS, MKW), pp. 243–251.
- ICML-1996-OliverBW #learning
- Unsupervised Learning Using MML (JJO, RAB, CSW), pp. 364–372.
- ICML-1996-Suzuki #algorithm #learning #network #performance
- Learning Bayesian Belief Networks Based on the Minimum Description Length Principle: An Efficient Algorithm Using the B & B Technique (JS), pp. 462–470.
- ICPR-1996-AraujoBPD
- Pursuit control in a binocular active vision system using optical flow (HA, JB, PP, JD), pp. 313–317.
- ICPR-1996-Ayoung-CheeDF #3d #hybrid #representation
- Enhanced 3D representation using a hybrid model (NAC, GD, FPF), pp. 575–579.
- ICPR-1996-AzarbayejaniP #3d #estimation #realtime #self
- Real-time self-calibrating stereo person tracking using 3-D shape estimation from blob features (AA, AP), pp. 627–632.
- ICPR-1996-BalaDHVW #architecture #detection #hybrid #search-based #visual notation
- Visual routine for eye detection using hybrid genetic architectures (JWB, KD, JH, HV, HW), pp. 606–610.
- ICPR-1996-Bayro-CorrochanoBS #algebra #geometry #network #self
- A new self-organizing neural network using geometric algebra (EBC, SB, GS), pp. 555–559.
- ICPR-1996-Bayro-CorrochanoLS #algebra #framework #geometry
- Geometric algebra: a framework for computing point and line correspondences and projective structure using n uncalibrated cameras (EBC, JL, GS), pp. 334–338.
- ICPR-1996-BelloK #analysis
- Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
- ICPR-1996-BimboP #effectiveness #image #retrieval
- Effective image retrieval using deformable templates (ADB, PP), pp. 120–124.
- ICPR-1996-BimboP96a #image #visual notation
- Image indexing using shape-based visual features (ADB, PP), pp. 351–355.
- ICPR-1996-BrucksteinRW #invariant
- Recognizing objects using scale space local invariants (AMB, ER, IW), pp. 760–764.
- ICPR-1996-CaiA #multi
- Tracking human motion using multiple cameras (QC, JKA), pp. 68–72.
- ICPR-1996-CallariF #ambiguity #nondeterminism #recognition
- Active recognition: using uncertainty to reduce ambiguity (FGC, FPF), pp. 925–929.
- ICPR-1996-CamusCHH #realtime
- Real-time single-workstation obstacle avoidance using only wide-field flow divergence (TC, DC, MH, THH), pp. 323–330.
- ICPR-1996-CesarC #energy #multi
- Shape characterization in natural scales by using the multiscale bending energy (RMCJ, LdFC), pp. 735–739.
- ICPR-1996-ChehadehCB #adaptation #algorithm #distance
- A skeletonization algorithm using chamfer distance transformation adapted to rectangular grids (YC, DC, PB), pp. 131–135.
- ICPR-1996-Chen #detection #parallel
- The use of hidden deletable pixel detection to obtain bias-reduced skeletons in parallel thinning (YSC), pp. 91–95.
- ICPR-1996-ChenHW #feature model #geometry #image #modelling #recognition
- Model-based object recognition using range images by combining morphological feature extraction and geometric hashing (CSC, YPH, JLW), pp. 565–569.
- ICPR-1996-ChenL96c #novel
- A novel form structure extraction method using strip projection (JLC, HJL), pp. 823–827.
- ICPR-1996-ChenLC #analysis #classification #sequence
- Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
- ICPR-1996-ChenY #symmetry #visual notation
- Thinning noisy binary patterns using human visual symmetry (YSC, YTY), pp. 146–150.
- ICPR-1996-ChetverikovLKH #classification
- Zone classification using texture features (DC, JL, JK, RMH), pp. 676–680.
- ICPR-1996-ChiaCY #re-engineering
- Curved surface reconstruction using a simple structured light method (TLC, ZC, CJY), pp. 844–848.
- ICPR-1996-ChungH #2d #3d #modelling #re-engineering
- Using 2D active contour models for 3D reconstruction from serial sections (RC, CkH), pp. 849–853.
- ICPR-1996-CordellaFSV #algorithm #graph #performance
- An efficient algorithm for the inexact matching of ARG graphs using a contextual transformational model (LPC, PF, CS, MV), pp. 180–184.
- ICPR-1996-CourtneyA #image #multi #segmentation
- Segmentation of volume images using a multiscale transform (TC, NA), pp. 432–436.
- ICPR-1996-DarrellP #gesture #markov #process #recognition
- Active gesture recognition using partially observable Markov decision processes (TD, AP), pp. 984–988.
- ICPR-1996-DayP #generative #network
- The generation of motion kinematics using a time-delay neural network (MJSD, JSP), pp. 545–549.
- ICPR-1996-DeguchiN #interactive #matrix #visual notation
- Visual servoing using eigenspace method and dynamic calculation of interaction matrices (KD, TN), pp. 302–306.
- ICPR-1996-DemsarS #image #machine learning
- Using machine learning for content-based image retrieving (JD, FS), pp. 138–142.
- ICPR-1996-DePieroT #adaptation #image #kernel #realtime #segmentation
- Real-time range image segmentation using adaptive kernels and Kalman filtering (FWD, MMT), pp. 573–577.
- ICPR-1996-DeruyverH #automation #image #multi #segmentation
- Automatic multi-thresholdable image segmentation by using separating bipoints (AD, YH), pp. 457–461.
- ICPR-1996-DiasBD #classification #identification
- Results of the use of Bayesian classifiers for identification of breast cancer cell nuclei (ÂVD, FB, MRD), pp. 508–512.
- ICPR-1996-DunkerHS #3d #estimation #prototype #recognition #set
- Single view recognition and pose estimation of 3D objects using sets of prototypical views and spatially tolerant contour representations (JD, GH, MS), pp. 14–18.
- ICPR-1996-GreenhillFJ #image
- Analysing interferometric images using the Hough transform (DG, PF, GAJ), pp. 844–848.
- ICPR-1996-GrobelH #realtime #recognition
- Video-based handshape recognition using a handshape structure model in real time (KG, HH), pp. 446–450.
- ICPR-1996-GunnN #bound #energy
- Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
- ICPR-1996-GuttaHTW #network #recognition
- Face recognition using ensembles of networks (SG, JH, BT, HW), pp. 50–54.
- ICPR-1996-Hachimura #retrieval
- Retrieval of paintings using principal color information (KH), pp. 130–134.
- ICPR-1996-HamamotoUWYT #recognition
- Recognition of handwritten numerals using Gabor features (YH, SU, MW, TY, ST), pp. 250–253.
- ICPR-1996-HansenS #estimation
- Active depth estimation with gaze and vergence control using Gabor filters (MH, GS), pp. 287–291.
- ICPR-1996-HarukiHYY #3d #automation #verification
- Automatic seal verification using three-dimensional reference seals (HH, TH, HY, KY), pp. 199–203.
- ICPR-1996-HataSKK #algorithm #search-based
- Shape extraction of transparent object using genetic algorithm (SH, YS, SK, KK), pp. 684–688.
- ICPR-1996-HeidemannR #3d #architecture #recognition
- A neural 3-D object recognition architecture using optimized Gabor filters (GH, HJR), pp. 70–74.
- ICPR-1996-HepplewhiteS #classification #pattern matching #pattern recognition #recognition
- Texture classification using n-tuple pattern recognition (LH, TJS), pp. 159–163.
- ICPR-1996-HeydenR #evaluation
- Evaluation of corner extraction schemes using invariance methods (AH, KR), pp. 895–899.
- ICPR-1996-Hirayama #image
- Analyzing form images by using line-shared-adjacent cell relations (YH), pp. 768–772.
- ICPR-1996-HolderTM #mobile #navigation
- Mobile robot navigation by wall following using a rotating ultrasonic scanner (MBH, MMT, SBM), pp. 298–302.
- ICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics
- Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
- ICPR-1996-HuangPC
- Shape from shading using Ritz method with tent basis (CKH, CP, WTC), pp. 398–402.
- ICPR-1996-HuijsmansL #image #performance #retrieval
- Efficient content-based image retrieval in digital picture collections using projections: (near)-copy location (DPH, MSL), pp. 104–108.
- ICPR-1996-HusseinNO #analysis
- Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
- ICPR-1996-HwangH #approach
- Performing temporal action with a hand-eye system using the SHOSLIF approach (WSH, SJH), pp. 35–39.
- ICPR-1996-IoannouD #detection #image
- Parallelogram detection in a digital image with the use of the Hough transform (DI, ETD), pp. 532–536.
- ICPR-1996-IwaiWYY #gesture #recognition
- Gesture recognition using colored gloves (YI, KW, YY, MY), pp. 662–666.
- ICPR-1996-Jaeger #optimisation #recognition
- Recovering writing traces in off-line handwriting recognition: using a global optimization technique (SJ0), pp. 150–154.
- ICPR-1996-JengLLC #approach #detection #geometry #performance
- An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
- ICPR-1996-JiangM #geometry
- Geometric primitive extraction using tabu search (TJ, SM), pp. 266–269.
- ICPR-1996-Johnson #automation #programming #search-based #visual notation
- Automated creation of visual routines using genetic programming (MPJ), pp. 951–956.
- ICPR-1996-KamataNK #image
- A gray image compression using a Hilbert scan (SiK, MN, EK), pp. 905–909.
- ICPR-1996-KindratenkoE #classification #fourier
- Classification of irregularly shaped micro-objects using complex Fourier descriptors (VVK, PJMVE), pp. 285–289.
- ICPR-1996-Kita
- Force-based registration method using attribute values (YK), pp. 34–39.
- ICPR-1996-KlemencicPK #diagrams #image #modelling #segmentation
- Segmentation of muscle fibre images using Voronoi diagrams and active contour models (AK, FP, SK), pp. 538–542.
- ICPR-1996-KnechtS #geometry #modelling
- Finding map correspondence using geometric models (JdK, KS), pp. 755–759.
- ICPR-1996-KoschanRS
- Color stereo vision using hierarchical block matching and active color illumination (AK, VR, KS), pp. 835–839.
- ICPR-1996-KudoS #classification
- Selection of classifiers based on the MDL principle using the VC dimension (MK, MS), pp. 886–890.
- ICPR-1996-LambertN #invariant
- Discrimination properties of invariants using the line moments of vectorized contours (GL, JN), pp. 735–739.
- ICPR-1996-LanserZ #constraints #on the #recognition
- On the use of topological constraints within object recognition tasks (SL, CZ), pp. 580–584.
- ICPR-1996-LasakulAK #analysis #formal method #image #linear #multi
- A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
- ICPR-1996-Lemaire #nondeterminism #recognition
- Use of a priori descriptions in a high-level language and management of the uncertainty in a scene recognition system (JL), pp. 560–564.
- ICPR-1996-LengagneFM #re-engineering
- Using crest lines to guide surface reconstruction from stereo (RL, PF, OM), pp. 9–13.
- ICPR-1996-LiaoA
- Curve and surface interpolation using rational radial basis functions (WHL, JKA), pp. 8–13.
- ICPR-1996-LinF #fourier #re-engineering #slicing #theorem
- Range data reconstruction using Fourier slice theorem (SSL, CSF), pp. 874–878.
- ICPR-1996-LingrandV #3d #modelling
- Dynamic foveal 3D sensing using affine models (DL, TV), pp. 810–814.
- ICPR-1996-LinL #detection
- Detection of specularity using stereo in color and polarization space (SL, SWL), pp. 263–267.
- ICPR-1996-LinLC #3d #modelling
- Recovery of 3-D closed surfaces using progressive shell models (RL, WCL, CTC), pp. 95–99.
- ICPR-1996-LiuCC #graph #online #order #recognition #relational
- Stroke order and stroke number free on-line Chinese character recognition using attributed relational graph matching (JL, WkC, MMYC), pp. 259–263.
- ICPR-1996-LiuL #approach #classification #effectiveness #performance
- An efficient and effective texture classification approach using a new notion in wavelet theory (JFL, JCML), pp. 820–824.
- ICPR-1996-LladosLM #comprehension #documentation #graph
- Hand drawn document understanding using the straight line Hough transform and graph matching (JL, JLK, EM), pp. 497–501.
- ICPR-1996-ManabeI #image #recognition
- Recognition of material types using spectral image (YM, SI), pp. 840–843.
- ICPR-1996-MatsuoFI #3d #adaptation #recognition
- 3-D object recognition using adaptive scale MEGI (HM, JF, AI), pp. 117–122.
- ICPR-1996-Mel #3d #approach #multi #named #recognition #visual notation
- SEEMORE: a view-based approach to 3-D object recognition using multiple visual cues (BWM), pp. 570–574.
- ICPR-1996-MichaelisSSM #adaptation #network
- Adaptive filtering of distorted displacement vector fields using artificial neural networks (BM, OS, US, RM), pp. 335–339.
- ICPR-1996-MizukamiK #algorithm #recognition
- A handwritten character recognition system using hierarchical displacement extraction algorithm (YM, KK), pp. 160–164.
- ICPR-1996-ModayurS #3d #statistics
- 3D matching using statistically significant groupings (BRM, LGS), pp. 238–242.
- ICPR-1996-MorimotoYD #gesture #markov #modelling #recognition
- Recognition of head gestures using hidden Markov models (CM, YY, LSD), pp. 461–465.
- ICPR-1996-Nagao #2d
- Direct methods for evaluating the planarity and rigidity of a surface using only 2D views (KN), pp. 417–422.
- ICPR-1996-NamuduriRR #algorithm #image #named #segmentation #slicing
- SVBS: a high-resolution medical image compression algorithm using slicing with variable block size segmentation (KRN, NR, HR), pp. 919–923.
- ICPR-1996-NgT #multi
- Multirobot convoying using neuro-fuzzy control (KCN, MMT), pp. 417–421.
- ICPR-1996-NishimuraK0HNNO #image #locality
- Effect of time-spatial size of motion image for localization by using the spotting method (TN, HK, YI, AH, SN, SN, RO), pp. 191–195.
- ICPR-1996-OgiharaNY #image
- Data embedding into pictorial images with less distortion using discrete cosine transform (TO, DN, NY), pp. 675–679.
- ICPR-1996-OhbaI #multi #recognition
- Recognition of the multi-specularity objects using the eigen-window (KO, KI), pp. 692–696.
- ICPR-1996-OhyaK #algorithm #detection #image #search-based
- Detecting facial expressions from face images using a genetic algorithm (JO, FK), pp. 649–653.
- ICPR-1996-OkamotoYSY #network #online #string
- On-line handwriting character string separation method using network expression (MO, HY, KS, KY), pp. 422–425.
- ICPR-1996-PaikCLL #multi
- Multiple recognizers system using two-stage combination (JP, SBC, KL, YL), pp. 581–585.
- ICPR-1996-ParagiosT #algorithm #detection
- Detection and location of moving objects using deterministic relaxation algorithms (NP, GT), pp. 201–205.
- ICPR-1996-PauwelsFG #adaptation #algorithm
- Autonomous grouping of contour-segments using an adaptive region-growing algorithm (EJP, PF, LJVG), pp. 586–590.
- ICPR-1996-PrantlGP #multi #network
- Active fusion using Bayesian networks applied to multi-temporal remote sensing imagery (MP, HG, AP), pp. 890–894.
- ICPR-1996-PulliS #modelling #probability #recognition
- Triplet-based object recognition using synthetic and real probability models (KP, LGS), pp. 75–79.
- ICPR-1996-RamaswamyNR #composition #image
- Lossless image compression using wavelet decomposition (VNR, KRN, NR), pp. 924–928.
- ICPR-1996-SaberT #cost analysis #detection #feature model #symmetry
- Face detection and facial feature extraction using color, shape and symmetry-based cost functions (ES, AMT), pp. 654–658.
- ICPR-1996-SainzS #context-sensitive grammar #learning #modelling
- Learning bidimensional context-dependent models using a context-sensitive language (MS, AS), pp. 565–569.
- ICPR-1996-SaitoM #algorithm #image #modelling #multi #search-based
- Object modeling from multiple images using genetic algorithms (HS, MM), pp. 669–673.
- ICPR-1996-SchieleC #multi #probability #recognition
- Probabilistic object recognition using multidimensional receptive field histograms (BS, JLC), pp. 50–54.
- ICPR-1996-SchwartzLMRZ #independence #recognition #speech
- Language-independent OCR using a continuous speech recognition system (RMS, CL, JM, CR, YZ), pp. 99–103.
- ICPR-1996-SeitzD #representation #towards
- Toward image-based scene representation using view morphing (SMS, CRD), pp. 84–89.
- ICPR-1996-SenguptaB #clustering
- Using spectral features for modelbase partitioning (KS, KLB), pp. 65–69.
- ICPR-1996-SerraS #image #network
- Perceptual grouping on texture images using non-cartesian networks (JRS, JBSV), pp. 462–466.
- ICPR-1996-Singh #detection #recognition
- Shape detection using gradient features for handwritten character recognition (SPS), pp. 145–149.
- ICPR-1996-Skubalska-RafajlowiczK #classification #metric #performance
- Fast k-NN classification rule using metric on space-filling curves (ESR, AK), pp. 121–125.
- ICPR-1996-SmitsD #adaptation #approach #image #markov #random #segmentation
- Information fusion in a Markov random field-based image segmentation approach using adaptive neighbourhoods (PCS, SGD), pp. 570–575.
- ICPR-1996-SobottkaP
- Extraction of facial regions and features using color and shape information (KS, IP), pp. 421–425.
- ICPR-1996-SoiferKKS #identification
- Fingerprint identification using the directions field (VAS, VVK, SNK, RVS), pp. 586–590.
- ICPR-1996-StefanoFTV #distance
- A distance measure for structural descriptions using circular arcs as primitives (CDS, PF, FT, MV), pp. 290–294.
- ICPR-1996-StoschekYH #2d #detection #invariant #multi #robust
- Rotation-invariant and robust multiple-2D-object detection using steerable pyramid denoising and optimized circular harmonic filters (AS, TPYY, RH), pp. 376–380.
- ICPR-1996-TakacsW #detection
- Attention and pattern detection using sensory and reactive control mechanisms (BT, HW), pp. 19–23.
- ICPR-1996-TakatooOK #detection #image
- Detection of objects including persons using image processing (MT, CO, YK), pp. 466–472.
- ICPR-1996-TanakaI96a #recognition
- Curvature-based face surface recognition using spherical correlation-principal directions for curved object recognition (HTT, MI), pp. 638–642.
- ICPR-1996-TatsunoSYIT #analysis #image #synthesis
- Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
- ICPR-1996-ThayerG #constraints #design
- Designing stereo heads using task domain constraints (SMT, CSG), pp. 820–824.
- ICPR-1996-TianT96a #3d #algorithm #image #search-based #sequence
- 3D shape recovery from two-color image sequences using a genetic algorithm (YlT, HTT), pp. 674–678.
- ICPR-1996-TingL #classification #string
- Business form classification using strings (AT, MKHL), pp. 690–694.
- ICPR-1996-TozakiKNOEM #3d #analysis #image
- Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
- ICPR-1996-TsurutaTA #constraints #image #re-engineering
- Image reconstruction using high-level constraints (NT, RiT, MA), pp. 401–405.
- ICPR-1996-UtsumiMKN #gesture #multi #recognition
- Hand gesture recognition system using multiple cameras (AU, TM, FK, RN), pp. 667–671.
- ICPR-1996-VarstaK #generative #modelling #self
- Surface modeling and robot path generation using self-organization (MV, PK), pp. 30–34.
- ICPR-1996-VinodM
- Object location using complementary color features: histogram and DCT (VVV, HM), pp. 554–559.
- ICPR-1996-VitulanoNVM #detection
- Edge detection using a new definition of entropy (SV, MN, DV, CM), pp. 141–145.
- ICPR-1996-WakaharaNMO #online #recognition
- On-line cursive Kanji character recognition using stroke-based affine transformation (TW, NN, SM, KO), pp. 204–209.
- ICPR-1996-Webb #feature model #multi #scalability
- Nonlinear feature extraction with radial basis functions using a weighted multidimensional scaling stress measure (ARW), pp. 635–639.
- ICPR-1996-WebbG #estimation
- Source position estimation using radial basis functions (ARW, PNG), pp. 3–7.
- ICPR-1996-WorringW #analysis
- Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
- ICPR-1996-WuL #3d #segmentation
- 3D part segmentation using simulated electrical charge distributions (KW, MDL), pp. 14–18.
- ICPR-1996-YagiNYY #estimation #image #mobile
- Rolling motion estimation for mobile robot by using omnidirectional image sensor HyperOmniVision (YY, WN, KY, MY), pp. 946–950.
- ICPR-1996-YimBA #segmentation
- Bayesian range segmentation using focus cues (CY, ACB, JKA), pp. 482–486.
- ICPR-1996-YipP #detection #representation
- Detection of moving objects using a spatiotemporal representation (HMY, TCP), pp. 483–487.
- ICPR-1996-ZhangB #automation #image #recognition
- Automatic model construction for object recognition using ISAR images (SZ, BB), pp. 169–173.
- ICPR-1996-ZhaNN #3d #algorithm #image #modelling #recognition
- 3-D object recognition from range images by using a model-based Hopfield-style matching algorithm (HZ, HN, TN), pp. 111–116.
- ICPR-1996-ZhengMFA #3d #modelling #re-engineering
- Reconstruction of 3D models from specular motion using circular lights (JYZ, AM, YF, NA), pp. 869–873.
- KDD-1996-CiesielskiP #database #hybrid #mining #overview
- Using a Hybrid Neural/Expert System for Data Base Mining in Market Survey Data (VC, GP), pp. 38–43.
- KDD-1996-Feelders #learning #modelling
- Learning from Biased Data Using Mixture Models (AJF), pp. 102–107.
- KDD-1996-HofackerHSS #information management #product line #scalability #sequence
- Knowledge Discovery in RNA Sequence Families of HIV Using Scalable Computers (ILH, MAH, PFS, PES), pp. 20–25.
- KDD-1996-IglesiaDR #database #heuristic
- Discovering Knowledge in Commercial Databases Using Modern Heuristic Techniques (BdlI, JCWD, VJRS), pp. 44–49.
- KDD-1996-LakshminarayanHGS #machine learning
- Imputation of Missing Data Using Machine Learning Techniques (KL, SAH, RPG, TS), pp. 140–145.
- KDD-1996-Lange #approach #empirical #predict #recursion
- An Empirical Test of the Weighted Effect Approach to Generalized Prediction Using Recursive Neural Nets (RL), pp. 183–188.
- KDD-1996-MannilaT
- Discovering Generalized Episodes Using Minimal Occurrences (HM, HT), pp. 146–151.
- KDD-1996-RyuE #programming #query #search-based
- Deriving Queries from Results Using Genetic Programming (TWR, CFE), pp. 303–306.
- KDD-1996-ShanZHC #classification #database #set
- Discovering Classification Knowledge in Databases Using Rough Sets (NS, WZ, HJH, NC), pp. 271–274.
- KDD-1996-Smyth #clustering #monte carlo
- Clustering Using Monte Carlo Cross-Validation (PS), pp. 126–133.
- KDD-1996-TeranoI #induction #information management #interactive #learning
- Interactive Knowledge Discovery from Marketing Questionnaire Using Simulated Breeding and Inductive Learning Methods (TT, YI), pp. 279–282.
- KDD-1996-WangW #representation
- Representing Discovered Patterns Using Attributed Hypergraph (YW, AKCW), pp. 283–286.
- KR-1996-Costello #modelling
- Modeling Belief Change using Counterfactuals (TC), pp. 432–443.
- KR-1996-Kelley #calculus #case study #modelling #problem
- Modeling Complex Systems in the Situation Calculus: A Case Study Using the Dagstuhl Steam Boiler Problem (TGK), pp. 26–37.
- KR-1996-TeijeH #approximate
- Computing Approximate Diagnoses By Using Approximate Entailment (AtT, FvH), pp. 256–265.
- SEKE-1996-ChangDC #approach #fuzzy #metric #usability
- Measurement of Usability of Software Using a Fuzzy Systems Approach (EC, TSD, DC), pp. 69–76.
- SEKE-1996-HwangCWS #3d #performance #visualisation
- A Fast 3-D Visualization Methodology Using Characteristic Views of Objects (SH, SYC, TW, PCYS), pp. 577–584.
- SEKE-1996-KangB #design #visualisation
- Using Design Cohesion to Visualize, Quantify, and Restructure Software (BKK, JMB), pp. 222–229.
- SIGIR-1996-LeeA #n-gram #retrieval
- Using n-Grams for Korean Text Retrieval (JHL, JSA), pp. 216–224.
- SIGIR-1996-RollekeF #logic #retrieval
- Retrieval of Complex Objects Using a Four-Valued Logic (TR, NF), pp. 206–214.
- SIGIR-1996-SheridanB #information retrieval #multi
- Experiments in Multilingual Information Retrieval Using the SPIDER System (PS, JPB), pp. 58–65.
- SIGIR-1996-SmeatonQ #image #retrieval #semantics #word
- Experiments on Using Semantic Distances Between Words in Image Caption Retrieval (AFS, IQ), pp. 174–180.
- SIGIR-1996-XuC #analysis #documentation #query
- Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
- ECOOP-1996-BullatS #clustering #database #effectiveness
- Dynamic Clustering in Object Databases Exploiting Effective Use of Relationships Between Objects (FB, MS), pp. 344–365.
- ECOOP-1996-KonoKM #distributed #implementation #memory management
- An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
- ECOOP-1996-SilvaC #concept #database #design #diagrams #multi #object-oriented
- Conceptual Design of Active Object-Oriented Database Applications Using Multi-level Diagrams (MJVS, CRC), pp. 366–397.
- OOPSLA-1996-BardouD
- Split Objects: a Disciplined Use of Delegation within Objects (DB, CD), pp. 122–137.
- OOPSLA-1996-VanHilstN #component #design
- Using Role Components to Implement Collaboration-Based Designs (MVH, DN), pp. 359–369.
- OOPSLA-1996-Yelland #case study #design pattern #framework
- Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
- AdaEurope-1996-FletcherS #framework #object-oriented #specification #testing
- A Framework for Testing Object-Oriented Software Using Formal Specifications (RF, ASMS), pp. 159–170.
- AdaEurope-1996-LundqvistW #ada #object-oriented
- Using Object-Oriented Methods in Ada 95 to Implement Linda (KL, GW), pp. 211–222.
- AdaEurope-1996-RealEC #ada #prototype #realtime
- Using Ada 95 for Prototyping Real-Time Systems (JR, AE, AC), pp. 262–274.
- AdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
- Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
- ALP-1996-Marchiori96a #abstract domain #first-order #logic
- Prime Factorizations of Abstract Domains Using First Order Logic (EM), pp. 209–223.
- PLDI-1996-DawsonRW #case study #logic programming #program analysis
- Practical Program Analysis Using General Purpose Logic Programming Systems — A Case Study (SD, CRR, DSW), pp. 117–126.
- PLDI-1996-SreedharGL #analysis #data flow #framework #graph #incremental
- A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
- PLILP-1996-Bagnara #implementation
- A Reactive Implementation of Pos Using ROBDDs (RB), pp. 107–121.
- PLILP-1996-BenaissaLR #modelling #recursion #reduction
- Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
- PLILP-1996-StuckeyT #constraints #logic programming #modelling #probability #theorem proving
- Models for Using Stochastic Constraint Solvers in Constraint Logic Programming (PJS, VT), pp. 423–437.
- POPL-1996-HughesPS #correctness #proving
- Proving the Correctness of Reactive Systems Using Sized Types (JH, LP, AS), pp. 410–423.
- POPL-1996-Jones #composition
- Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
- SAS-1996-Paterson #compilation #lazy evaluation
- Compiling Laziness Using Projections (RP), pp. 255–269.
- TRI-Ada-1996-NebeshF #ada #component #html #learning
- Learning to Use Ada 95 Components Using HTML Linking (BN, MBF), pp. 207–210.
- TRI-Ada-1996-Pettit #ada #design #distributed #realtime
- Using Ada 95 for the Design of Distributed Real-Time Systems (RGPI), pp. 49–55.
- ICRE-1996-NobeW #lessons learnt #modelling #requirements
- Lessons Learned from a Trial Application of Requirements Modeling Using Statecharts (CRN, WEW), pp. 86–93.
- ICRE-1996-RollandP #modelling #process
- Using Generic Method Chunks to Generate Process Models Fragments (CR, VP), pp. 173–181.
- FSE-1996-MedvidovicORT #architecture #design #object-oriented #type system
- Using Object-Oriented Typing to Support Architectural Design in the C2 Style (NM, PO, JER, RNT), pp. 24–32.
- FSE-1996-NaumovichCO #analysis #communication #data flow #protocol #verification
- Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
- FSE-1996-SeiterPL #behaviour #evolution
- Evolution of Object Behavior Using Context Relations (LMS, JP, KJL), pp. 46–57.
- ICSE-1996-KoskimiesM #diagrams #named #object-oriented #source code
- Scene: Using Scenario Diagrams and Active Text for Illustrating Object-Oriented Programs (KK, HM), pp. 366–375.
- ICSE-1996-Ledru #tool support
- Using KIDS as a Tool Support for VDM (YL), pp. 236–245.
- ICSE-1996-OgasawaraYK #case study #experience #lifecycle #metric #quality
- Experiences of Software Quality Management Using Metrics through the Life-Cycle (HO, AY, MK), pp. 179–188.
- ICSE-1996-ShepperdSK #estimation
- Effort Estimation Using Analogy (MJS, CS, BK), pp. 170–178.
- KBSE-1996-HarmerMB #cobol #knowledge-based #source code
- Using Knowledge-Based Transformations to Reverse-Engineer COBOL Programs (TJH, PJM, JMB), p. 17.
- KBSE-1996-LeeG #collaboration #web
- Developing Collaborative Applications Using the World Wide Web “Shell” (AL, AG), p. 3.
- SAC-1996-AbualiWS #algorithm #design #problem #search-based #set
- Solving the subset interconnection design problem using genetic algorithms (FNA, RLW, DAS), pp. 299–304.
- SAC-1996-Asgharzadeh #analysis #fuzzy #image #rule-based
- Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
- SAC-1996-Boulet #development #multi
- Using multimedia to emphasize the development of professional abilities (MMB), pp. 110–114.
- SAC-1996-ChungLLD #behaviour #comparison
- A comparison of variational data assimilation and nudging using a simple dynamical system with chaotic behavior (WC, JML, SL, SKD), pp. 454–462.
- SAC-1996-Cripps #performance #predict
- Using artificial neural nets to predict academic performance (AC), pp. 33–37.
- SAC-1996-Duben #statistics
- Conformational statistics of the nitrogen linkage in glycopeptides using umbrella sampling (AJD), pp. 38–43.
- SAC-1996-DurandAN #algorithm #automation #search-based
- Automatic aircraft conflict resolution using genetic algorithms (ND, JMA, JN), pp. 289–298.
- SAC-1996-HarangsriSN #classification #multi #optimisation #query
- Query optimisation in multidatabase systems using query classification (BH, JS, AHHN), pp. 173–177.
- SAC-1996-HashemiSHL #identification #testing
- Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
- SAC-1996-HoeltingSW #algorithm #network #search-based
- Finding investigator tours in telecommunication networks using genetic algorithms (CJH, DAS, RLW), pp. 82–87.
- SAC-1996-HoeltingSW96a #algorithm #precedence #problem #search-based
- A genetic algorithm for the minimum broadcast time problem using a global precedence vector (CJH, DAS, RLW), pp. 258–262.
- SAC-1996-Liu #data type #persistent #runtime
- A persistent runtime system using persistent data structures (ZL), pp. 429–436.
- ASPLOS-1996-JamrozikFVEKLV #latency #memory management #network
- Reducing Network Latency Using Subpages in a Global Memory Environment (HAJ, MJF, GMV, JEI, ARK, HML, MKV), pp. 258–267.
- CC-1996-LiK #performance #reuse
- Efficient Storage Reuse of Aggregates in Single Assignment Languages (ZL, CCK), pp. 238–252.
- CC-1996-Salomon #maintenance #partial evaluation #reuse #usability
- Using Partial Evaluation in Support of Portability, Reusability, and Maintainability (DJS), pp. 208–222.
- DAC-1996-AraujoML #architecture #code generation
- Using Register-Transfer Paths in Code Generation for Heterogeneous Memory-Register Architectures (GA, SM, MTCL), pp. 591–596.
- DAC-1996-BrownMVCGGGLZS #design #experience #multi #programmable #scalability #tool support
- Experience in Designing a Large-scale Multiprocessor using Field-Programmable Devices and Advanced CAD Tools (SDB, NM, ZGV, SC, AG, RG, MG, KL, ZZ, SS), pp. 427–432.
- DAC-1996-Dahlgren #logic #simulation
- Oscillation Control in Logic Simulation using Dynamic Dominance Grahps (PD), pp. 155–160.
- DAC-1996-DesaiY #cpu #design #simulation #verification
- A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
- DAC-1996-GenderenM #performance
- Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction (AJvG, NPvdM), pp. 758–763.
- DAC-1996-HansenS #diagrams #synthesis
- Synthesis by Spectral Translation Using Boolean Decision Diagrams (JPH, MS), pp. 248–253.
- DAC-1996-IpD #reduction
- State Reduction Using Reversible Rules (CNI, DLD), pp. 564–567.
- DAC-1996-LeeHCF #design #modelling #synthesis
- Domain-Specific High-Level Modeling and Synthesis for ATM Switch Design Using VHDL (MTCL, YCH, BC, MF), pp. 585–590.
- DAC-1996-LiG #optimisation
- HDL Optimization Using Timed Decision Tables (JL, RKG), pp. 51–54.
- DAC-1996-LiM #adaptation #linear #modelling #parametricity
- Computing Parametric Yield Adaptively Using Local Linear Models (ML, LSM), pp. 831–836.
- DAC-1996-MiliozziVCMS #design #modelling
- Use of Sensitivities and Generalized Substrate Models in Mixed-Signal IC Design (PM, IV, EC, EM, ALSV), pp. 227–232.
- DAC-1996-OhPP #bound #linear #programming
- Constructing Lower and Upper Bounded Delay Routing Trees Using Linear Programming (JO, IP, MP), pp. 401–404.
- DAC-1996-PandeyRBB #array #evaluation #verification
- Formal Verification of PowerPC Arrays Using Symbolic Trajectory Evaluation (MP, RR, DLB, REB), pp. 649–654.
- DAC-1996-SemenovY #petri net #verification
- Verification of asynchronous circuits using Time Petri Net unfolding (ALS, AY), pp. 59–62.
- DAC-1996-SunDH #equation #geometry #independence #parametricity #performance
- Fast Parameters Extraction of General Three-Dimension Interconnects Using Geometry Independent Measured Equation of Invariance (WS, WWMD, WHI), pp. 371–376.
- HPCA-1996-CvetanovicB #performance #specification
- Performance Characterization of the Alpha 21164 Microprocessor Using TP and SPEC Workloads (ZC, DB), pp. 270–280.
- HPCA-1996-IftodeDFL #automation #memory management
- Improving Release-Consistent Shared Virtual Memory Using Automatic Update (LI, CD, EWF, KL), pp. 14–25.
- HPCA-1996-KontothanassisS #distributed #interface #memory management #network #performance
- Using Memory-Mapped Network Interfaces to Improve the Performance of Distributed Shared Memory (LIK, MLS), pp. 166–177.
- HPDC-1996-ChandyRSMRTW #distributed #internet #java
- A World-Wide Distributed System Using Java and the Internet (KMC, AR, PAGS, JM, MR, WT, LW), pp. 11–18.
- HPDC-1996-Konchady #distributed
- Distributed Supercomputing Using ACTS (MK), pp. 172–181.
- PDP-1996-CauZCM #scalability #simulation #specification
- Using ITL and Tempura for Large-Scale Specification and Simulation (AC, HZ, NC, BCM), pp. 493–500.
- ESOP-1996-Bechet #encoding #partial evaluation
- Removing Value Encoding Using Alternative Values in Partial Evaluation of Strongly-Typed Languages (DB), pp. 77–91.
- RWLW-1996-Castro #csp
- Solving binary CSP using computational systems (CC), pp. 246–265.
- STOC-1996-CleggEI #algorithm #proving #satisfiability
- Using the Groebner Basis Algorithm to Find Proofs of Unsatisfiability (MC, JE, RI), pp. 174–183.
- STOC-1996-Milenkovic #linear #programming #strict
- Translational Polygon Containment and Minimal Enclosure using Linear Programming Based Restriction (VM), pp. 109–118.
- TACAS-1996-Lowe #protocol
- Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
- TACAS-1996-Rauzy #analysis #constraints #reduction #specification
- Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (AR), p. 417.
- CADE-1996-Fuchs #experience #heuristic #proving
- Experiments in the Heuristic Use of Past Proof Experience (MF), pp. 523–537.
- CAV-1996-Avrunin #algebra #geometry #model checking
- Symbolic Model Checking Using Algebraic Geometry (GSA), pp. 26–37.
- CAV-1996-BengtssonGKLLPY #protocol #verification
- Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
- CAV-1996-BoigelotG #communication #infinity #protocol #verification
- Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (BB, PG), pp. 1–12.
- CAV-1996-ClarkeGZ #algorithm #proving #theorem proving #verification
- Verifying the SRT Division Algorithm Using Theorem Proving Techniques (EMC, SMG, XZ), pp. 111–122.
- CAV-1996-FernandezJJV #generative #on the fly #testing #verification
- Using On-The-Fly Verification Techniques for the Generation of test Suites (JCF, CJ, TJ, CV), pp. 348–359.
- CAV-1996-GrafS #invariant #proving #theorem proving #verification
- Verifying Invariants Using theorem Proving (SG, HS), pp. 196–207.
- CSL-1996-Matzinger #modelling
- Computational Representations of Herbrand Models Using Grammars (RM), pp. 334–348.
- ISSTA-1996-BarjaktarovicCJ #functional #kernel #protocol #specification #verification
- Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
- ISSTA-1996-CrowleyLL #automation #formal method #testing
- Issues in the Full Scale Use of Formal Methods for Automated Testing (JLC, JFL, KAL), pp. 71–78.
- ISSTA-1996-GodefroidPS #concurrent #industrial #partial order #source code #validation
- Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs (PG, DP, MGS), pp. 261–269.
- ISSTA-1996-MorellM #analysis #testing
- Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
- ADL-1995-NicaR #approach #constraints #documentation
- Uniform Structured Document Handling using a Constraint-based Object Approach (AN, EAR), pp. 83–101.
- DL-1995-Lamb #online
- Using Online Information Resources: Reaching for the *.*’s (RL).
- ICDAR-v1-1995-AkindeleB #documentation #modelling
- Construction of generic models of document structures using inference of tree grammars (OTA, AB), pp. 206–209.
- ICDAR-v1-1995-ArikiM #recognition #segmentation
- Segmentation and recognition of handwritten characters using subspace method (YA, YM), pp. 120–123.
- ICDAR-v1-1995-BayerW #documentation
- Experiments on extracting structural information from paper documents using syntactic pattern (TAB, HW), pp. 476–479.
- ICDAR-v1-1995-BlandoKN #image #predict
- Prediction of OCR accuracy using simple image features (LRB, JK, TAN), pp. 319–322.
- ICDAR-v1-1995-BunkeL #classification #documentation #parsing
- Classification and postprocessing of documents using an error-correcting parser (HB, RL), pp. 222–226.
- ICDAR-v1-1995-ChiuTC #invariant #matrix #recognition
- Invariant handwritten Chinese character recognition using weighted ring-data matrix (HPC, DCT, JCC), pp. 116–119.
- ICDAR-v1-1995-FangH #algorithm #approach #recognition #testing #word
- A hypothesis testing approach to word recognition using an A* search algorithm (CF, JJH), pp. 360–363.
- ICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition
- Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
- ICDAR-v1-1995-Gentric #metric #recognition #word
- Experimental results on improved handwritten word recognition using the Levenshtein metric (PG), pp. 364–367.
- ICDAR-v1-1995-GrbavecB #graph grammar #recognition
- Mathematics recognition using graph rewriting (AG, DB), pp. 417–421.
- ICDAR-v1-1995-GuyonP #design #markov #memory management #modelling
- Design of a linguistic postprocessor using variable memory length Markov models (IG, FP), pp. 454–457.
- ICDAR-v1-1995-HochbergKKT #automation #clustering #identification #image
- Automatic script identification from images using cluster-based templates (JH, LK, PK, TT), pp. 378–381.
- ICDAR-v1-1995-KaneharaSH #flexibility #image #retrieval #visual notation
- A flexible image retrieval using explicit visual instruction (FK, SS, TH), pp. 175–178.
- ICDAR-v1-1995-Kawatani #performance #recognition
- Character recognition performance improvement using personal handwriting characteristics (TK), pp. 98–103.
- ICDAR-v1-1995-KimD #classification #distance #network #recognition
- Off-line Recognition of Korean Scripts Using Distance Matching and Neural Network Classifiers (SHK, JID), pp. 34–37.
- ICDAR-v1-1995-LeeK #multi #network #recognition #self
- Multi-lingual, multi-font and multi-size large-set character recognition using self-organizing neural network (SWL, JSK), pp. 28–33.
- ICDAR-v1-1995-LeTW #analysis #documentation #image
- Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
- ICDAR-v1-1995-LinLS #comprehension #documentation #heuristic #interactive
- Interactive acquisition of thematic information of Chinese verbs for judicial verdict document understanding using templates, syntactic clues, and heuristics (KHCL, RLL, VWS), pp. 297–300.
- ICDAR-v1-1995-OlivierPAL #modelling #probability #recognition #word
- Recognition of handwritten words using stochastic models (CO, TP, MA, YL), pp. 19–23.
- ICDAR-v1-1995-TanahashiSY #algorithm #image #search-based
- Recovering decorative patterns of ceramic objects from a monocular image using a genetic algorithm (HT, KS, KY), pp. 339–342.
- ICDAR-v2-1995-AntonacopoulosR #classification #representation
- Representation and classification of complex-shaped printed regions using white tiles (AA, RTR), pp. 1132–1135.
- ICDAR-v2-1995-CaesarGM95a #recognition #word
- Using lexical knowledge for the recognition of poorly written words (TC, JMG, EM), pp. 915–918.
- ICDAR-v2-1995-ChenHP #documentation #image #recursion #segmentation #word
- Simultaneous word segmentation from document images using recursive morphological closing transform (SSC, RMH, ITP), pp. 761–764.
- ICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #verification
- Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
- ICDAR-v2-1995-FutrelleN #analysis #constraints #diagrams #parsing #performance
- Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
- ICDAR-v2-1995-HaHP #bound #component #recursion
- Recursive X-Y cut using bounding boxes of connected components (JH, RMH, ITP), pp. 952–955.
- ICDAR-v2-1995-HamamotoUMT #recognition
- Recognition of handprinted Chinese characters using Gabor features (YH, SU, KM, ST), pp. 819–823.
- ICDAR-v2-1995-Hirayama #analysis
- A method for table structure analysis using DP matching (YH), pp. 583–586.
- ICDAR-v2-1995-JunKKKK #modelling #online #recognition
- On-line cursive Korean character recognition by using curvature models (BHJ, MYK, CSK, WSK, JK), pp. 1051–1054.
- ICDAR-v2-1995-KimuraMS #algorithm #recognition #word
- Handwritten ZIP code recognition using lexicon free word recognition algorithm (FK, YM, MS), pp. 906–910.
- ICDAR-v2-1995-LeeLK #online #recognition
- On-line cursive script recognition using an island-driven search technique (SHL, HL, JHK), pp. 886–889.
- ICDAR-v2-1995-LiangAS #approach #segmentation
- Segmentation of interference marks using morphological approach (SL, MA, MS), pp. 1042–1046.
- ICDAR-v2-1995-MiyaoN #approach #music #network
- Head and stem extraction from printed music scores using a neural network approach (HM, YN), pp. 1074–1079.
- ICDAR-v2-1995-NakamuraHN #image
- Drawing capturing system using image enhancement (NN, KH, MN), pp. 652–655.
- ICDAR-v2-1995-OhK #markov #modelling #recognition
- Off-line recognition of handwritten Korean and alphanumeric characters using hidden Markov models (CO, WSK), pp. 815–818.
- ICDAR-v2-1995-ParmentierB #architecture #bibliography #validation
- Bibliography references validation using emergent architecture (FP, AB), pp. 532–535.
- ICDAR-v2-1995-SafariNSA #documentation #geometry
- Document registration using projective geometry (RS, NN, MS, MA), pp. 1161–1164.
- ICDAR-v2-1995-SauvolaP #analysis #classification #feature model #performance #segmentation
- Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
- ICDAR-v2-1995-ShikuNATK
- Extraction of slant character candidates from maps using circular templates (OS, AN, MA, HT, HK), pp. 936–939.
- ICDAR-v2-1995-SivaramakrishnanPHSH #classification #documentation #generative
- Zone classification in a document using the method of feature vector generation (RS, ITP, JH, SS, RMH), pp. 541–544.
- ICDAR-v2-1995-TangMXCS #documentation
- Extraction of reference lines from documents with grey-level background using sub-images of wavelets (YYT, HM, DX, YC, CYS), pp. 571–574.
- ICDAR-v2-1995-Ueda
- Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
- ICDAR-v2-1995-YoonLK #image
- Faxed image restoration using Kalman filtering (MYY, SWL, JSK), pp. 677–680.
- ICDAR-v2-1995-ZiinoAS #machine learning #recognition
- Recognition of hand printed Latin characters using machine learning (DZ, AA, CS), pp. 1098–1102.
- PODS-1995-ChangH #database #generative
- Using Witness Generators to Support Bi-directional Update Between Object-Based Databases (TPC, RH), pp. 196–207.
- PODS-1995-LevyMSS #query
- Answering Queries Using Views (AYL, AOM, YS, DS), pp. 95–104.
- PODS-1995-RajaramanSU #query
- Answering Queries Using Templates with Binding Patterns (AR, YS, JDU), pp. 105–112.
- SIGMOD-1995-AdyaGLM #concurrent #performance
- Efficient Optimistic Concurrency Control Using Loosely Synchronized Clocks (AA, RG, BL, UM), pp. 23–34.
- SIGMOD-1995-Atkinson #architecture #component #relational
- Use of a Component Architecture in Integrating Relational and Non-relational Storage Systems (RGA), p. 454.
- SIGMOD-1995-DreyerDS
- Using the CALANDA Time Series Management System (WD, AKD, DS), p. 489.
- VLDB-1995-AmmannJR #formal method #semantics #transaction
- Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
- VLDB-1995-BelussiF #correlation #query
- Estimating the Selectivity of Spatial Queries Using the “Correlation” Fractal Dimension (AB, CF), pp. 299–310.
- VLDB-1995-SistlaYLL #retrieval #similarity
- Similarity based Retrieval of Pictures Using Indices on Spatial Relationships (APS, CTY, CL, KLL), pp. 619–629.
- CSEE-1995-Hefley #comprehension #design #education #web
- Understanding, Using and Designing for Educational Uses of the World-Wide Web (WEH), pp. 431–432.
- FPLE-1995-HilsdaleADF #compilation
- Compiler Construction Using Scheme (EH, JMA, RKD, DPF), pp. 251–267.
- FPLE-1995-KlugeRS #education #execution #functional #programming
- Using pi-RED as a Teaching Tool for Functional Programming and Program Execution (WEK, CR, SBS), pp. 231–249.
- ICSM-1995-AvrilionisC #maintenance #modelling #petri net #process
- Using views to maintain Petri-net-based process models (DA, PYC), pp. 318–326.
- ICSM-1995-CimitileLM #case study #identification #reuse #slicing #specification
- Identifying reusable functions using specification driven program slicing: a case study (AC, ADL, MM), pp. 124–133.
- ICSM-1995-DeBaudR #domain model #modelling #re-engineering
- A software re-engineering method using domain models (JMD, SR), pp. 204–213.
- ICSM-1995-StoreyM
- Manipulating and documenting software structures using SHriMP views (MADS, HAM), p. 275–?.
- ICSM-1995-Williams #analysis #case study #design #experience #object-oriented
- Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
- WCRE-1995-CimitileLM #execution #reuse #symbolic computation
- Qualifying Reusable Functions Using Symbolic Execution (AC, ADL, MM).
- WCRE-1995-EdwardsM #logic
- Deriving a Logical Data Model for a System Using the RECAST Method (HME, MM).
- RTA-1995-KirchnerM #constraints #prototype
- Prototyping Completion with Constraints Using Computational Systems (HK, PEM), pp. 438–443.
- TLCA-1995-BerardiB #optimisation #type system
- Using Subtyping in Program Optimization (SB, LB), pp. 63–77.
- FPCA-1995-SharpR #specification
- Using a Language of Functions and Relations for VLSI Specification (RS, OR), pp. 45–54.
- CHI-1995-JohnP #approach #case study #learning
- Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
- CHI-1995-KabbashB
- The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
- CHI-1995-KierasWM #architecture #modelling #predict
- Predictive Engineering Models Using the EPIC Architecture for a High-Performance Task (DEK, SDW, DEM), pp. 11–18.
- CHI-1995-MalinowskiN #collaboration #design #user interface
- Using Computational Critics to Facilitate Long-Term Collaboration in User Interface Design (UM, KN), pp. 385–392.
- CHI-1995-MitchellPB #learning
- Learning to Write Together Using Groupware (AM, IP, RB), pp. 288–295.
- CHI-1995-ShipmanMM
- Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information (FMSI, CCM, TPM), pp. 346–353.
- CAiSE-1995-DuffyMMM #analysis #automation #framework #reasoning #requirements
- A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
- CAiSE-1995-ShklarSKS #automation #metadata #named #retrieval
- InfoHarness: Use of Automatically Generated Metadata for Search and Retrieval of Heterogeneous Information (LAS, APS, VK, KS), pp. 217–230.
- CAiSE-1995-SiauWB #concept
- A Psychological Study on the Use of Relationship Concept — Some Preliminary Findings (KS, YW, IB), pp. 341–354.
- CIKM-1995-Bestavros
- Using Speculation to Reduce Server Load and Service Time on the WWW (AB), pp. 403–410.
- CIKM-1995-IkejiF #adaptation #query
- Computation of Partial Query Results Using An Adaptive Stratified Sampling Technique (ACI, FF), pp. 145–149.
- CIKM-1995-Paradis #topic
- Using Linguistic and Discourse Structures to Derive Topics (FP), pp. 44–49.
- CIKM-1995-ParkHC #automation #network
- Automatic Thesaurus Construction Using Bayesian Networks (YCP, YSH, KSC), pp. 212–217.
- CIKM-1995-ShrufiT #knowledge base #query
- Query Processing for Knowledge Bases Using Join Indices (AS, TT), pp. 158–166.
- CIKM-1995-Tammet
- Using Resolution for Extending KL-ONE-type Languages (TT), pp. 326–332.
- CIKM-1995-YoonSP #approach #database #deduction #object-oriented #query #semantics
- Semantic Query Processing in Object-Oriented Databases Using Deductive Approach (SCY, IYS, EKP), pp. 150–157.
- ICML-1995-AbeLN #2d #algorithm #learning #online
- On-line Learning of Binary Lexical Relations Using Two-dimensional Weighted Majority Algorithms (NA, HL, AN), pp. 3–11.
- ICML-1995-ClearyT #distance
- K*: An Instance-based Learner Using and Entropic Distance Measure (JGC, LET), pp. 108–114.
- ICML-1995-Lubinsky #classification #consistency #performance
- Increasing the Performance and Consistency of Classification Trees by Using the Accuracy Criterion at the Leaves (DJL), pp. 371–377.
- ICML-1995-PerezR #multi
- Using Multidimensional Projection to Find Relations (EP, LAR), pp. 447–455.
- ICML-1995-SalganicoffU #learning #multi
- Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
- ICML-1995-SmythGF #classification #estimation #kernel
- Retrofitting Decision Tree Classifiers Using Kernel Density Estimation (PS, AGG, UMF), pp. 506–514.
- KDD-1995-EzawaN #information management #modelling #network
- Knowledge Discovery in Telecommunication Services Data Using Bayesian Network Models (KJE, SWN), pp. 100–105.
- KDD-1995-KohaviS #set
- Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology (RK, DS), pp. 192–197.
- KDD-1995-ShanZHC #information management #set #tool support
- Using Rough Sets as Tools for Knowledge Discovery (NS, WZ, HJH, NC), pp. 263–268.
- KDD-1995-SimoudisLK
- Using Recon for Data Cleaning (ES, BL, RK), pp. 282–287.
- SEKE-1995-BrownseyZ #functional #programming #specification #user interface
- From Specification to Building a GUI using Functional Programming (KB, MZ), pp. 244–251.
- SEKE-1995-ConstantinidisZ #concept #database #design
- Engineering an Ingres Active Database using Conceptual Design Knowledge Elements (VC, ABZ), pp. 158–160.
- SEKE-1995-FarCK #design #reuse #specification
- Software Creation: Using Specification and Description Language (SDL) for Capturing and Reusing Human Experts’ Knowledge in Software Design (BHF, HC, ZK), pp. 189–196.
- SEKE-1995-GatesC #constraints #re-engineering
- The Use of Integrity Constraints in Software Engineering (AQG, DEC), pp. 383–390.
- SIGIR-1995-ChakravarthyH #internet #named #semantics
- Netserf: Using Semantic Knowledge to Find Internet Information Archives (ASC, KBH), pp. 4–11.
- SIGIR-1995-DeFazioDSSCC #information retrieval
- Integrating IR and RDBMS Using Cooperative Indexing (SD, AMD, LAS, JS, WBC, JPC), pp. 84–92.
- SIGIR-1995-EfraimidisGMST #parallel #performance #retrieval
- Parallel Text Retrieval on a High Performance Super Computer Using the Vector Space Model (PSE, CG, BM, PGS, BT), pp. 58–66.
- SIGIR-1995-OgawaI #documentation
- A New Character-based Indexing Organization using Frequency Data for Japanese Documents (YO, MI), pp. 121–129.
- SIGIR-1995-PfeiferF #approach #data type #performance #query
- Efficient Processing of Vague Queries using a Data Stream Approach (UP, NF), pp. 189–197.
- SIGIR-1995-RaghavanS #on the #query #reuse
- On the Reuse of Past Optimal Queries (VVR, HS), pp. 344–350.
- ECOOP-1995-DeanGC #analysis #object-oriented #optimisation #source code
- Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
- ECOOP-1995-LeaM #interface #protocol #specification
- Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
- ECOOP-1995-SchmidtS #communication #design pattern #experience #platform
- Experience Using Design Patterns to Evolve Communication Software Across Diverse OS Platforms (DCS, PS), pp. 399–423.
- ECOOP-1995-SeligmannG #algorithm #garbage collection #incremental #maturity
- Incremental Mature Garbage Collection Using the Train Algorithm (JS, SG), pp. 235–252.
- ECOOP-1995-StroudW #data type #protocol
- Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
- OOPSLA-1995-ItohYT #concurrent #low level #named #operating system #programming
- SCONE: Using Concurrent Objects for Low-level Operating System Programming (JiI, YY, MT), pp. 385–398.
- OOPSLA-1995-MasuharaMAY #compilation #concurrent #object-oriented #partial evaluation
- Compiling Away the Meta-Level in Object-Oriented Concurrent Reflective Languages Using Partial Evaluation (HM, SM, KA, AY), pp. 300–315.
- OOPSLA-1995-Smith #experience #prototype #user interface
- Using a Prototype-based Language for User Interface: The Newton Project’s Experience (WRS), pp. 61–72.
- AdaEurope-1995-DaviesR #ada
- The Use of Ada for the ENVISAT-1 Simulator (BD, DAR), pp. 170–177.
- AdaEurope-1995-Heitz #ada #automation #c++ #code generation #reliability #reuse
- Achieving Reusable and Reliable Client-Server Code using HOODTM Automated Code Generation for ADA95 and C++ Targets (MH), pp. 419–438.
- LOPSTR-1995-ArtsZ #logic programming #semantics #source code #termination #unification
- Termination of Logic Programs Using Semantic Unification (TA, HZ), pp. 219–233.
- LOPSTR-1995-VasconcelosF #approach #logic programming #optimisation #program analysis
- An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
- LOPSTR-1995-WaalT #deduction #problem #program analysis #program transformation
- Solving Deductive Planning Problems Using Program Analysis and Transformation (DAdW, MT), pp. 189–203.
- PEPM-1995-Cridlig #analysis #concurrent #model checking #semantics
- Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
- PEPM-1995-Monsuez #abstract interpretation #strict #type inference
- Using Abstract Interpretation to Define a Strictness Type Inference System (BM), pp. 122–133.
- PLDI-1995-BarrettZ #bound #garbage collection
- Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
- PLDI-1995-BurgerWD #lazy evaluation
- Register Allocation Using Lazy Saves, Eager Restores, and Greedy Shuffling (RGB, OW, RKD), pp. 130–138.
- PLDI-1995-ColemanM #layout
- Tile Size Selection Using Cache Organization and Data Layout (SC, KSM), pp. 279–290.
- PLILP-1995-SaglamG #approximate #constraints #logic programming #polymorphism #source code
- Approximating Constraint Logic Programs Using Polymorphic Types and Regular Descriptions (HS, JPG), pp. 461–462.
- POPL-1995-HarperM #analysis #compilation #morphism #polymorphism
- Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
- POPL-1995-Reynolds #category theory
- Using Functor Categories to Generate Intermediate Code (JCR), pp. 25–36.
- SAS-1995-Faxen #functional #lazy evaluation #optimisation #source code
- Optimizing Lazy Functional Programs Using Flow Inference (KFF), pp. 136–153.
- SAS-1995-Giesl #analysis #functional #order #source code #termination
- Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
- SAS-1995-Schmidt-SchausPS #calculus #reduction
- Abstract Reduction Using a Tableau Calculus (MSS, SEP, MS), pp. 348–365.
- TRI-Ada-1995-BalfourG #ada #paradigm
- Patterns and paradigms for using Ada 95 (BB, MG), pp. 243–310.
- TRI-Ada-1995-Ogren95a #case study #development #experience
- Experiences from Trial Use of MIL-STD-498 in Connection with the O4S (Objects for Systems) Development Method (IÖ), pp. 773–789.
- RE-1995-ChungNY #non-functional #requirements
- Using non-functional requirements to systematically support change (LC, BAN, ESKY), pp. 132–139.
- ESEC-1995-TuyaSC #model checking #modelling #safety #verification
- Using a Symbolic Model Checker for Verify Safety Properties in SA/RT Models (JT, LS, JAC), pp. 59–75.
- ESEC-1995-VottaZ #case study #design #process
- Design Process Improvement Case Study Using Process Waiver Data (LGV, MLZ), pp. 44–58.
- FSE-1995-GuptaS #approach #hybrid #information management #slicing
- Hybrid Slicing: An Approach for Refining Static Slices Using Dynamic Information (RG, MLS), pp. 29–40.
- FSE-1995-Weyuker #assessment #reliability #testing
- Using the Consequence of Failures for Testing and Reliability Assessment (EJW), pp. 81–91.
- ICSE-1995-BarghoutiK #constraints #monitoring #process
- Using Event Contexts and Matching Constraints to Monitor Software Processes (NSB, BK), pp. 83–92.
- ICSE-1995-BertolinoS #assessment #dependence #metric #testing
- Using Testability Measures for Dependability Assessment (AB, LS), pp. 61–70.
- ICSE-1995-Floch #automation #code generation #evolution #flexibility #maintenance
- Supporting Evolution and Maintenance by Using a Flexible Automatic Code Generator (JF), pp. 211–219.
- KBSE-1995-CliftonL #component #design
- Classifying Software Components Using Design Characteristics (CC, WSL), pp. 139–146.
- KBSE-1995-HoweMM #empirical #sequence #testing
- Test Sequences as Plans: An Experiment in Using an AI Planner to Generate System Tests (AEH, AvM, RTM), pp. 184–191.
- KBSE-1995-PenixBA #classification #component #retrieval #reuse #semantics
- Classification and Retrieval of Reusable Components Using Semantic Features (JP, PB, PA), pp. 131–138.
- SAC-1995-AbualiWS95a #algorithm #morphism #problem #search-based
- Solving the three-star tree isomorphism problem using genetic algorithms (FNA, RLW, DAS), pp. 337–344.
- SAC-1995-Arnow #email #network #programming
- :-) When you grade that: using e-mail and the network in programming courses (DMA), pp. 10–13.
- SAC-1995-BowmanD #distributed #modelling
- Modelling distributed systems using Z (HB, JD), pp. 147–151.
- SAC-1995-CrawfordVW #algorithm #detection #multi #search-based
- Detecting multiple outliers in regression data using genetic algorithms (KDC, DJV, RLW), pp. 351–356.
- SAC-1995-Duben #modelling #statistics
- Conformational statistics of models for serine- and threonine-linked glycopeptides using umbrella sampling (AJD), pp. 108–112.
- SAC-1995-FiedlerLDL
- Optimal initialization of mixed-layer model using the adjoint technique (RF, SL, SKD, JML), pp. 91–95.
- SAC-1995-GrimRP #3d #algorithm #re-engineering #search-based
- Use of genetic algorithms in three-dimensional reconstruction in carbon black aggregates (RJG, JRR, LDP), pp. 288–292.
- SAC-1995-GudaitisLT #parallel
- Multicriteria vehicle route-planning using parallel A* search (MSG, GBL, AJT), pp. 171–176.
- SAC-1995-KrishnaKumarS #algorithm #fuzzy #modelling #multi
- Discovering multiple fuzzy models using the EFMCN algorithm (KK, AS), pp. 537–541.
- SAC-1995-KumblaJB #algorithm #fuzzy #implementation #logic #network
- Implementation of fuzzy logic and neural networks control algorithm using a digital signal processing chip (KKK, MJ, JBR), pp. 524–528.
- SAC-1995-LiangL #algorithm #matrix #representation #scheduling #search-based
- A sparse matrix representation for production scheduling using genetic algorithms (SJTL, JML), pp. 313–317.
- SAC-1995-Sabin #generative #linear #parallel
- The use of parallelization in the generation of binary linear codes (RES), pp. 215–220.
- SAC-1995-SmitsBSD #approach #fuzzy #image
- An image processing approach using fuzzy topology (PCS, DdB, AS, SGD), pp. 557–561.
- SAC-1995-Spector #development #problem
- Using system dynamics to model courseware development: the project dynamics of complex problem-solving (JMS), pp. 32–35.
- SAC-1995-Stegmaier-StraccaT #classification #detection #fuzzy
- Cough detection using fuzzy classification (PASS, NNTG), pp. 440–444.
- SAC-1995-Tschichold-Gurman #classification #fuzzy #generative #incremental #learning
- Generation and improvement of fuzzy classifiers with incremental learning using fuzzy RuleNet (NNTG), pp. 466–470.
- ASF+SDF-1995-BrandEGMOP #asf+sdf #program transformation
- Program Transformations using ASF+SDF (MvdB, SME, DKAG, HM, MJFP, HRO), pp. 29–52.
- ASF+SDF-1995-Vigna #asf+sdf #case study #specification
- Specifying Imp(G) Using ASF+SDF: A Case Study (SV), pp. 65–88.
- DAC-1995-BiekerM #constraints #generative #logic programming #self
- Retargetable Self-Test Program Generation Using Constraint Logic Programming (UB, PM), pp. 605–611.
- DAC-1995-BredenfeldC #design #graph #integration #tool support
- Tool Integration and Construction Using Generated Graph-Based Design Representations (AB, RC), pp. 94–99.
- DAC-1995-ChouKW #3d #approach #simulation
- Transient Simulations of Three-Dimensional Integrated Circuit Interconnect Using a Mixed Surface-Volume Approach (MC, TK, JW), pp. 485–490.
- DAC-1995-DeCastelo-Vide-e-SouzaPP #algorithm #approach #architecture #optimisation #throughput
- Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming (YGDVeS, MP, ACP), pp. 113–118.
- DAC-1995-LiM #analysis #embedded #performance
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
- DAC-1995-LiuKCH #approach #clustering #graph #replication
- Performance-Driven Partitioning Using a Replication Graph Approach (LTL, MTK, CKC, TCH), pp. 206–210.
- DAC-1995-LyKMM #behaviour #scheduling
- Scheduling Using Behavioral Templates (TL, DK, RM, DM), pp. 101–106.
- DAC-1995-NarayanG #generative #interface #process #protocol
- Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
- DAC-1995-SilvaK #design #web
- The Case for Design Using the World Wide Web (MJS, RHK), pp. 579–585.
- DAC-1995-VenkataramanHFRCP #agile #fault #simulation
- Rapid Diagnostic Fault Simulation of Stuck-at Faults in Sequential Circuits Using Compact Lists (SV, IH, WKF, EMR, SC, JHP), pp. 133–138.
- DAC-1995-WempleY #analysis #megamodelling
- Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
- DAC-1995-ZepterGM #data flow #design #generative #graph
- Digital Receiver Design Using VHDL Generation from Data Flow Graphs (PZ, TG, HM), pp. 228–233.
- HPCA-1995-CitronR
- Creating a Wider Bus Using Caching Techniques (DC, LR), pp. 90–99.
- HPDC-1995-AbramsonSGH #distributed #named #simulation
- Nimrod: A Tool for Performing Parameterised Simulations Using Distributed Workstations (DA, RS, JG, BH), pp. 112–121.
- LCT-RTS-1995-LiM #analysis #embedded #performance
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
- PDP-1995-BeschP #flexibility #network #parallel
- Flexible data parallel training of neural networks using MIMD-Computers (MB, HWP), pp. 27–32.
- PDP-1995-CoscasFL #modelling #source code
- Modelling actor programs using Predicate/Transition nets (PC, GF, AL), pp. 199–200.
- PDP-1995-GaiRR #algorithm #parallel
- An improved data parallel algorithm for Boolean function manipulation using BDDs (SG, MR, MSR), pp. 33–41.
- PDP-1995-GianuzziM #distributed #simulation
- Using PVM to implement a distributed dependable simulation system (VG, FM), pp. 529–537.
- PDP-1995-GregorettiP #architecture #parallel #testing
- Using a massively parallel architecture for integrated circuits testing (FG, CP), pp. 332–338.
- PDP-1995-LatrousM #parallel
- Distributing code in a parallel fine grain machine using the actor model (YL, GM), pp. 122–129.
- SOSP-1995-FordHL #interface
- Using Annotated Interface Definitions to Optimize RPC (BF, MH, JL), p. 232.
- SOSP-1995-GhemawatKL #database #object-oriented #performance
- Using a Modified Object Buffer to Improve the Write Performance of an Object-Oriented Database (SG, MFK, BL), p. 235.
- TAPSOFT-1995-Kleuker #case study #specification
- A Gentle Introduction to Specification Engineering Using a Case Study in Telecommunications (SK), pp. 636–650.
- CAV-1995-AndersenV #behaviour #fixpoint #performance
- Efficient Checking of Behavioural Relations and Modal Assertions using Fixed-Point Inversion (HRA, BV), pp. 142–154.
- CAV-1995-BasinK #hardware #higher-order #logic #monad #verification
- Hardware Verification using Monadic Second-Order Logic (DAB, NK), pp. 31–41.
- CAV-1995-DingelF #abstraction #infinity #model checking #proving #reasoning #theorem proving
- Model Checking for Infinite State Systems Using Data Abstraction, Assumption-Commitment Style reasoning and Theorem Proving (JD, TF), pp. 54–69.
- CAV-1995-EirikssonM #analysis #case study #design #verification
- Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
- CAV-1995-McMillan #verification
- Trace Theoretic Verification of Asynchronous Circuits Using Unfoldings (KLM), pp. 180–195.
- ICLP-1995-BarbutiFS #execution #modelling #prolog
- Modeling OR-Parallel Execution of Prolog using CHOCS (RB, NDF, AS), pp. 547–561.
- ICLP-1995-ChiuL #constraints #linear #theorem proving
- Interval Linear Constraint Solving Using the Preconditioned Interval Gauss-Seidel Method (CKC, JHML), pp. 17–31.
- ICLP-1995-HermenegildoGC #concurrent #implementation #logic programming #parallel
- Using Attributed Variables in the Implementation of Concurrent and Parallel Logic Programming Systems (MVH, DCG, MC), pp. 631–645.
- ICLP-1995-Jain #logic programming #source code
- Projections of Logic Programs using Symbol Mappings (AJ), pp. 483–496.
- DL-1994-RusS #documentation
- Using Non-Textal Cues for Electronic Document Browsing (DR, KS), pp. 129–162.
- HT-ECHT-1994-Brailsford #experience
- Experience with the Use of Acrobat in the CAJUN Publishing Project (DFB), pp. 228–232.
- HT-ECHT-1994-ChristophidesR #documentation #hypermedia #query
- Querying Structured Documents with Hypertext Links using OODBMS (VC, AR), pp. 186–197.
- PODS-1994-FaloutsosK #analysis #concept #independence
- Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
- SIGMOD-1994-ChenR #adaptation #estimation #feedback #query
- Adaptive Selectivity Estimation Using Query Feedback (CMC, NR), pp. 161–172.
- SIGMOD-1994-LoR
- Spatial Joins Using Seeded Trees (MLL, CVR), pp. 209–220.
- VLDB-1994-KamelF
- Hilbert R-tree: An Improved R-tree using Fractals (IK, CF), pp. 500–509.
- VLDB-1994-LiC #database #integration #network #semantics #semistructured data
- Semantic Integration in Heterogeneous Databases Using Neural Networks (WSL, CC), pp. 1–12.
- CSEE-1994-BralickR #distance #education #multi #re-engineering
- Using a Multi-User Dialogue System to Support Software Engineering Distance Education (WABJ, JSR), pp. 565–582.
- CSEE-1994-Epstein #education #re-engineering
- The Use of Computer Ethics Scenarios in Software Engineering Education: The Case of the Killer Robot (RGE), pp. 429–440.
- CSEE-1994-Horton #automation #design #education
- Using Commercial CASE Environments to Teach Software Design (TBH), pp. 97–115.
- CSEE-1994-Zalewski #tool support
- Cohesive Use of Commercial Tools in a Classroom (JZ), pp. 65–75.
- ICSM-1994-AshAOL #health #maintenance #modelling
- Using Software Maintainability Models to Track Code Health (DA, JA, PWO, BL), pp. 154–160.
- ICSM-1994-CowanGLS #comprehension #readability
- Enhancing Code for Readability and Comprehension Using SGML (DDC, DMG, CJPdL, AvS), pp. 181–190.
- ICSM-1994-KinlochM #c #comprehension #graph #representation #source code
- Understanding C Programs Using the Combined C Graph Representation (DAK, MM), pp. 172–180.
- ICSM-1994-MatwinA #analysis #automation #composition #reuse
- Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
- ICSM-1994-PaulP #algebra #query #source code
- Querying Source Code Using an Algebraic Query Language (SP, AP), pp. 127–136.
- FME-1994-ErasmyS #case study #refinement
- Stepwise Refinement of Control Software — A Case Study Using RAISE (FE, ES), pp. 547–566.
- FME-1994-Evans #concurrent #specification #verification
- Specifying & Verifying Concurrent Systems Using Z (AE), pp. 366–380.
- FME-1994-FencottGLOP #algebra #formal method #modelling #process #semantics
- Formalising the Semantics of Ward/Mellor SA/RT Essential Models using a Process Algebra (PCF, AG, MAL, SJO, SP), pp. 681–702.
- FME-1994-RitchieBH #automaton #case study #experience
- Experiences in Using the Abstract Machine Notation in a GKS Case Study (BR, JB, HPH), pp. 93–104.
- FME-1994-StoreyH
- A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
- LFP-1994-AdityaFH #garbage collection #re-engineering #runtime
- Garbage Collection for Strongly-Typed Languages Using Run-Time Type Reconstruction (SA, CHF, JEH), pp. 12–23.
- LFP-1994-DeanC #towards
- Towards Better Inlining Decisions Using Inlining Trials (JD, CC), pp. 273–282.
- LFP-1994-Hall #representation #type inference
- Using Hindley-Milner Type Inference to Optimise List Representation (CVH), pp. 162–172.
- LFP-1994-HuelsbergenLA #data type #runtime #thread
- Using the Run-Time Sizes of Data Structures to Guide Parallel-Thread Creation (LH, JRL, AA), pp. 79–90.
- LFP-1994-Tolmach #garbage collection #parametricity
- Tag-Free Garbage Collection Using Explicit Type Parameters (APT), pp. 1–11.
- TAGT-1994-BlosteinFG #graph grammar
- Issues in the Practical Use of Graph Rewriting (DB, HF, AG), pp. 38–55.
- TAGT-1994-Drewes #algebra #graph #transducer
- The Use of Tree Transducers to Compute Translations Between Graph Algebras (FD), pp. 196–210.
- TAGT-1994-Wills #graph #parsing #source code
- Using Attributed Flow Graph Parsing to Recognize Clichés in Programs (LMW), pp. 170–184.
- CHI-1994-GoldsteinR94a #query #scalability #set
- Using aggregation and dynamic queries for exploring large data sets (JG, SFR), pp. 23–29.
- CHI-1994-Newman94a #analysis #human-computer #research
- A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
- CHI-1994-Ogozalek94a #comparison #interface #multi
- A comparison of the use of text and multimedia interfaces to provide information to the elderly (VZO), pp. 65–71.
- CHI-1994-RothKMG94a #automation #design #interactive
- Interactive graphic design using automatic presentation knowledge (SFR, JK, JM, JG), pp. 112–117.
- CHI-1994-Strommen94a #interface
- Children’s use of mouse-based interfaces to control virtual travel (ES), pp. 405–410.
- CHI-1994-WalkerSS94a #interface
- Using a human face in an interface (JHW, LS, RS), pp. 85–91.
- CSCW-1994-EvelandBBM #network #tool support
- The Role of “Help Networks” in Facilitating Use of CSCW Tools (JDE, ALB, WB, JM), pp. 265–274.
- CSCW-1994-KrautRCF #communication #social
- Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium (REK, RER, CC, RSF), pp. 13–21.
- CSCW-1994-PrakashS #collaboration #named #performance
- DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects (AP, HSS), pp. 153–164.
- CSCW-1994-TrevorRM #adaptation
- The Use of Adapters to Support Cooperative Sharing (JT, TR, JAM), pp. 219–230.
- CSCW-1994-WanJ #approach #collaboration #learning
- Computer Supported Collaborative Learning Using CLARE: The Approach and Experimental Findings (DW, PMJ), pp. 187–198.
- CAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience
- From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
- CAiSE-1994-Rosengren #query #visual notation
- Using Visual ER Query Systems in Real World Applications (PR), pp. 394–405.
- CAiSE-1994-SeoL #data type #formal method #process #reuse
- Formalisation of Data and Process Model Reuse Using Hierarchic Data Types (DS, PL), pp. 256–268.
- CIKM-1994-HalperGPK
- Integrating a Part Relationship Into an Open OODB System Using Metaclasses (MH, JG, YP, WK), pp. 10–17.
- CIKM-1994-KwonKC #adaptation #query
- Query Expansion Using Domain Adapted, Weighted Thesaurus in an Extended Boolean Model (OWK, MCK, KSC), pp. 140–146.
- CIKM-1994-LeeL #database #object-oriented #query
- Using Path Information for Query Processing in Object-Oriented Database Systems (DLL, WCL), pp. 64–71.
- CIKM-1994-LehmannC #integration #prototype #reliability #semantics
- The EGG/YOLK Reliability Hierarchy : Semantic Data Integration Using Sorts with Prototypes (FL, AGC), pp. 272–279.
- CIKM-1994-RezendeH #abstraction #semantics
- A Lock Method for KBMSs Using Abstraction Relationships’ Semantics (FdFR, TH), pp. 112–121.
- CIKM-1994-SyuL #information retrieval
- A Competition-Based Connectionist Model for Information Retrieval Using a Merged Thesaurus (IS, SDL), pp. 164–170.
- ICML-1994-CravenS #network #query
- Using Sampling and Queries to Extract Rules from Trained Neural Networks (MC, JWS), pp. 37–45.
- ICML-1994-OpitzS #knowledge-based #network #search-based
- Using Genetic Search to Refine Knowledge-based Neural Networks (DWO, JWS), pp. 208–216.
- KDD-1994-BerndtC
- Using Dynamic Time Warping to Find Patterns in Time Series (DJB, JC), pp. 359–370.
- KDD-1994-Kaufman #development #learning #multi #tool support
- Comparing International Development Patterns Using Multi-Operator Learning and Discovery Tools (KAK), pp. 431–440.
- KDD-1994-SasisekharanSW #machine learning #maintenance #network
- Proactive Network Maintenance Using Machine Learning (RS, VS, SMW), pp. 453–462.
- KDD-1994-ShenMOZ #database #deduction #induction #learning
- Using Metagueries to Integrate Inductive Learning and Deductive Database Technology (WMS, BGM, KO, CZ), pp. 335–346.
- KR-1994-Gotts #how
- How Far Can We “C”? Defining a “Doughnut” Using Connection Alone (NMG), pp. 246–257.
- KR-1994-McIlraith #abduction #generative #testing
- Generating Tests Using Abduction (SAM), pp. 449–460.
- SEKE-1994-AbranDMMS #analysis #hypermedia #learning
- Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
- SEKE-1994-FigueiredoPC #analysis #fuzzy #petri net #realtime
- Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
- SEKE-1994-Holm #communication #modelling
- The COMMODIOUS method — COMmunication MODelling as an aid to Illustrate the Organisational Use of Software (PH), pp. 10–19.
- SEKE-1994-KoskinenPS #dependence #hypermedia
- Program text as hypertext: using program dependences for transient linking (JK, JP, AS), pp. 209–216.
- SEKE-1994-ReynoldsZ #algorithm #learning
- Learning to understand software from examples using cultural algorithms (RGR, EZ), pp. 188–192.
- SEKE-1994-SuzukiT #abstraction #behaviour #retrieval
- Associative program retrieval using partially-ordered behavioral abstractions of a program (HS, NT), pp. 395–404.
- SIGIR-1994-BruzaH #axiom
- Investigating Aboutness Axioms using Information Fields (PB, TWCH), pp. 112–121.
- SIGIR-1994-Gey #probability
- Inferring Probability of Relevance Using the Method of Logistic Regression (FCG), pp. 222–231.
- SIGIR-1994-Hoch #analysis #classification #documentation #information retrieval
- Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
- SIGIR-1994-Hull #problem #retrieval #semantics
- Improving Text Retrieval for the Routing Problem using Latent Semantic Indexing (DAH), pp. 282–291.
- SIGIR-1994-Voorhees #query #semantics
- Query Expansion Using Lexical-Semantic Relations (EMV), pp. 61–69.
- ECOOP-1994-OkamuraI #programming
- Object Location Control Using Meta-level Programming (HO, YI), pp. 299–319.
- OOPSLA-1994-AmielGS #multi #optimisation
- Optimizing Multi-Method Dispatch Using Compressed Dispatch Tables (EA, OG, ES), pp. 244–258.
- OOPSLA-1994-BogleL
- Reducing Cross Domain Call Overhead using Batched Futures (PB, BL), pp. 341–354.
- OOPSLA-1994-Seidewitz #inheritance #self
- Genericity versus Inheritance Reconsidered: Self-Reference Using Generics (ES), pp. 153–163.
- TOOLS-EUROPE-1994-CharltonLR #database #inheritance #persistent
- Using Inheritance to Provide Subschema Views in a Shared Persistent Object Database (CCC, PHL, MR), pp. 419–428.
- TOOLS-EUROPE-1994-PereiraD #case study #comparison #experience #object-oriented #realtime
- Using Object-Orientation in Real-Time Applications: An Experience Report or (1 Application + 5 Approaches = 1 Comparison) (CEP, PD), pp. 147–158.
- TOOLS-EUROPE-1994-RuperezJA #behaviour #object-oriented #rule-based #simulation
- Embedding of Rule-based Expert System Capabilities in Object-Oriented Applications by Using or Simulating Active Behaviour (RFR, CJ, JRZA), pp. 315–327.
- TOOLS-EUROPE-1994-SurendharA #evolution #object-oriented
- Object-Oriented Type Evolution Using Reflection (MS, SA), pp. 271–280.
- AdaEurope-1994-BarbeyB #ada #data type #specification #testing
- Testing Ada Abstract Data Types Using Formal Specifications (SB, DB), pp. 76–89.
- ALP-1994-Miller #logic programming #multi #source code #specification
- Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
- LOPSTR-1994-BoulangerB #analysis #logic programming #program transformation
- Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
- LOPSTR-1994-FlenerP #induction #on the #reasoning #synthesis
- On the Use of Inductive Reasoning in Program Synthesis: Prejudice and Prospects (PF, LP), pp. 69–87.
- LOPSTR-1994-MarakakisG #data type #design #logic programming #source code #top-down
- Schema-Based Top-Down Design of Logic Programs Using Abstract Data Types (EIM, JPG), pp. 138–153.
- PLDI-1994-GranlundM #integer #invariant #multi
- Division by Invariant Integers using Multiplication (TG, PLM), pp. 61–72.
- PLDI-1994-HentenryckCC #analysis #graph #prolog
- Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
- PLDI-1994-Wismuller #analysis #data flow #debugging #source code
- Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
- PLILP-1994-BelkhirN #functional #logic #towards
- Towards Integrating Functional and Logic Styles Using Relation (AB, NN), pp. 463–464.
- PLILP-1994-BoulangerBD #approach
- Abstracting s-semantincs Using A Model-Theoretic Approach (DB, MB, MD), pp. 432–446.
- PLILP-1994-MetzemakersMSS #performance
- Improving Arithmetic Performance using Fine-Grain Unfolding (TM, AM, DS, RS), pp. 324–339.
- PLILP-1994-Miller #logic programming #multi #source code #specification
- Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
- PLILP-1994-Serrano #analysis #compilation #control flow #functional #higher-order
- Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
- POPL-1994-DiwanTM #garbage collection #memory management #performance #source code
- Memory Subsystem Performance of Programs Using Copying Garbage Collection (AD, DT, JEBM), pp. 1–14.
- POPL-1994-TofteT #call-by #implementation #stack #λ-calculus
- Implementation of the Typed Call-by-Value λ-Calculus using a Stack of Regions (MT, JPT), pp. 188–201.
- SAS-1994-CodishD #dependence #logic programming #multi #polymorphism #source code
- Deriving Polymorphic Type Dependencies for Logic Programs Using Multiple Incarnations of Prop (MC, BD), pp. 281–296.
- SAS-1994-GrasH #independence #strict
- Extracting Non-Strict Independent And-Parallelism Using Sharing and Freeness Information (DCG, MVH), pp. 297–313.
- SAS-1994-Jorgensen #analysis #finite #fixpoint
- Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
- SAS-1994-Mauborgne #abstract interpretation
- Abstract Interpretation Using TDGs (LM), pp. 363–379.
- TRI-Ada-1994-KayloeL #ada #architecture #named
- Easy-Sim: Using Ada 9X in a Graphics System Software Architecture (JRK, PKL), pp. 164–169.
- ICRE-1994-Alford #complexity #requirements
- Attacking requirements complexity using a separation of concerns (MWA), pp. 2–5.
- ICRE-1994-MaidenS #abstraction #requirements
- Requirements critiquing using domain abstractions (NAMM, AGS), pp. 184–193.
- ICRE-1994-ReizerAMP #formal method #requirements #specification #standard
- Using formal methods for requirements specification of a proposed POSIX standard (NRR, GDA, BCM, PRHP), pp. 118–125.
- FSE-1994-BatoryTS #compilation #data type #re-engineering #scalability
- Reengineering a Complex Application Using a Scalable Data Structure Compiler (DSB, JT, MS), pp. 111–120.
- FSE-1994-EvansGHT #named #specification
- LCLint: A Tool for Using Specifications to Check Code (DE, JVG, JJH, YMT), pp. 87–96.
- FSE-1994-VandevoordeG #analysis #composition #runtime
- Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
- ICSE-1994-Ardis #lessons learnt
- Lessons from Using Basic LOTOS (MAA), pp. 5–14.
- ICSE-1994-DevanbuJ #case study #experience #logic
- The Use of Description Logics in KBSE Systems: Experience Report (PTD, MAJ), pp. 23–35.
- ICSE-1994-YasumotoHT #process
- Software Process Description Using LOTOS and Its Enaction (KY, TH, KT), pp. 169–178.
- KBSE-1994-MintonW #machine learning #source code
- Using Machine Learning to Synthesize Search Programs (SM, SRW), pp. 31–38.
- KBSE-1994-WildR #evolution #reuse #specification
- Evolution and Reuse of Formal Specification Using Decision Structures (JCW, DR), pp. 108–115.
- SAC-1994-AbualiSW #algorithm #design #network #probability #search-based
- Designing telecommunications networks using genetic algorithms and probabilistic minimum spanning trees (FNA, DAS, RLW), pp. 242–246.
- SAC-1994-ChandH #realtime
- A real-time contol application using asynchronous remote procedure calls (GC, DMH), pp. 515–517.
- SAC-1994-ConnorCKM #evolution #persistent
- Using persistence technology to control schema evolution (RCHC, QIC, GNCK, RM), pp. 441–446.
- SAC-1994-FlachsbartBCH #algorithm #classification
- Using the ID3 symbolic classification algorithm to reduce data density (BF, WEB, DCSC, JH), pp. 292–296.
- SAC-1994-Foster #analysis #education #named
- FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
- SAC-1994-GentherG #automation #classification #clustering #fuzzy #generative
- Automatic generation of a fuzzy classification system using fuzzy clustering methods (HG, MG), pp. 180–183.
- SAC-1994-Konstam #algorithm #classification #search-based
- N-group classification using genetic algorithms (AHK), pp. 212–216.
- SAC-1994-KumarH #concept #fuzzy #logic #reduction
- Reduction of communications in a MasPar computer using fuzzy logic concepts (AGK, JH), pp. 351–356.
- SAC-1994-Lutsky #documentation #parsing #testing
- Using a document parser to automate software testing (PL), pp. 59–63.
- SAC-1994-PalmS #fuzzy #logic #optimisation
- Torque optimization for a locomotive using fuzzy logic (RP, KS), pp. 105–109.
- SAC-1994-RogersU #linear
- A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.
- SAC-1994-RosenG #network
- Training hard to learn networks using advanced simulated annealing methods (BER, JMG), pp. 256–260.
- SAC-1994-Sen94a #network
- File placement over a network using simulated annealing326741 (SS), pp. 251–255.
- SAC-1994-Shearer #design #multi
- Design of a Linda kernal using causal multicast (KS), pp. 518–523.
- SAC-1994-WarwickT #algorithm #problem #search-based
- Using a genetic algorithm to tackle the processors configuration problem (TW, EPKT), pp. 217–221.
- SAC-1994-WongD #hybrid #stack #thread
- Supporting thousands of threads using a hybrid stack sharing scheme (KFW, BD), pp. 493–498.
- SAC-1994-XiaoW #algorithm #search-based
- Molecular docking using genetic algorithms (YLX, DEW), pp. 196–200.
- ASPLOS-1994-GallagherCMGH #ambiguity #memory management
- Dynamic Memory Disambiguation Using the Memory Conflict Buffer (DMG, WYC, SAM, JCG, WmWH), pp. 183–193.
- ASPLOS-1994-YoungS #branch #correlation #predict
- Improving the Accuracy of Static Branch Prediction Using Branch Correlation (CY, MDS), pp. 232–241.
- CC-1994-Binkley #constant #data flow #dependence #graph #interprocedural
- Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model (DB), pp. 374–388.
- DAC-1994-BaldwinC #design #graph grammar
- Design Methodology Management Using Graph Grammars (RAB, MJC), pp. 472–478.
- DAC-1994-BeattyB #simulation #verification
- Formally Verifying a Microprocessor Using a Simulation Methodology (DLB, REB), pp. 596–602.
- DAC-1994-ChenF #analysis
- Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
- DAC-1994-GuptaCDP #design #experience #image #tool support
- Experience with Image Compression Chip Design using Unified System Construction Tools (PG, CTC, JCDB, ACP), pp. 250–256.
- DAC-1994-ImanPC #fuzzy #logic
- Technology Mapping Using Fuzzy Logic (SI, MP, KC), pp. 333–338.
- DAC-1994-KahngM #analysis #equation
- Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
- DAC-1994-KeeSGK #framework
- The Use of CAD Frameworks in a CIM Environment (WTK, DS, JG, LKK), pp. 257–261.
- DAC-1994-Minato #algebra #set
- Calculation of Unate Cube Set Algebra Using Zero-Suppressed BDDs (SiM), pp. 420–424.
- DAC-1994-MurgaiBS #composition #encoding #functional
- Optimum Functional Decomposition Using Encoding (RM, RKB, ALSV), pp. 408–414.
- DAC-1994-NagumoNNMM #fault #named #reduction
- VFSIM: Vectorized Fault Simulator Using a Reduction Technique Excluding Temporarily Unobservable Faults (TN, MN, TN, MM, SM), pp. 510–515.
- DAC-1994-PomeranzR #combinator #fault #scalability
- Design-for-Testability for Path Delay Faults in Large Combinatorial Circuits Using Test-Points (IP, SMR), pp. 358–364.
- DAC-1994-PotkonjakD #optimisation #resource management #testing
- Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
- DAC-1994-PotkonjakSC #constant #multi #performance
- Efficient Substitution of Multiple Constant Multiplications by Shifts and Additions Using Iterative Pairwise Matching (MP, MBS, AC), pp. 189–194.
- DAC-1994-RiessDJ #clustering #scalability
- Partitioning Very Large Circuits Using Analytical Placement Techniques (BMR, KD, FMJ), pp. 646–651.
- DAC-1994-SaldanhaHMBS #optimisation #performance
- Performance Optimization Using Exact Sensitization (AS, HH, PCM, RKB, ALSV), pp. 425–429.
- DAC-1994-ShipleHSB #heuristic
- Heuristic Minimization of BDDs Using Don’t Cares (TRS, RH, ALSV, RKB), pp. 225–231.
- DAC-1994-SilveiraEWCK #approach #performance #simulation
- An Efficient Approach to Transmission Line Simulation Using Measured or Tabulated S-parameter Data (LMS, IME, JW, MC, KSK), pp. 634–639.
- DAC-1994-TsaiM
- Boolean Matching Using Generalized Reed-Muller Forms (CCT, MMS), pp. 339–344.
- DAC-1994-VittalM #design
- Minimal Delay Interconnect Design Using Alphabetic Trees (AV, MMS), pp. 392–396.
- EDAC-1994-AhmedCC #approach #fault #modelling #optimisation
- A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
- EDAC-1994-BaharCHMS #analysis
- Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
- EDAC-1994-BrashearMOPM #analysis #performance #predict #statistics
- Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
- EDAC-1994-ByrneMLD #optimisation #overview
- An Overview of Analogue Optimisation Using “AD-OPT” (EB, OM, DL, BD), pp. 540–545.
- EDAC-1994-DalkilicP #bound #scheduling
- Optimal Operation Scheduling Using Resource Lower Bound Estimations (MED, VP), pp. 319–324.
- EDAC-1994-HuangR #behaviour #performance #throughput
- Maximizing the Throughput of High Performance DSP Applications Using Behavioral Transformations (SHH, JMR), pp. 25–30.
- EDAC-1994-NaganumaOH #algorithm #debugging #design #validation
- High-Level Design Validation Using Algorithmic Debugging (JN, TO, TH), pp. 474–480.
- EDAC-1994-WangD #approximate #linear #optimisation #performance
- An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
- HPDC-1994-AgrawalCLS
- Investigating Weak Memories Using Maya (DA, MC, HVL, AKS), pp. 123–130.
- HPDC-1994-ArmstrongM #distributed #framework #parallel
- The Use of Frameworks for Scientific Computation in a Parallel Distributed Environment (RCA, JM), pp. 15–25.
- HPDC-1994-NguyenZZ #distributed #problem
- Distributed Computation of Electromagnetic Scattering Problems Using Finite-Difference Time-Domain Decompositions (SN, BJZ, XZ), pp. 85–89.
- HPDC-1994-Stevens #multi
- Multimedia Supercomputing: The Use of Supercomputers to Drive High-Performance Multimedia Systems and Virtual Environments (RS), p. 3.
- PDP-1994-AhmedBA #parallel #simulation
- Parallel Discrete Event Simulation Using Space-time Events (HA, LB, RA), pp. 40–47.
- PDP-1994-BirdC #communication #logic programming #modelling #network
- Modelling Logic Programming Using A Network Of Communicating Machines (PRB, AJC), pp. 156–161.
- PDP-1994-HowardKTAJ #configuration management #logic #named #novel #parallel
- Zelig: A Novel Parallel Computing Machine Using Reconfigurable Logic (NJH, AK, AMT, NMA, AJJ), pp. 70–75.
- PDP-1994-StuartW #algorithm #approach #linear #parallel #visualisation
- The Enhancement Of Parallel Numerical Linear Algorithms Using A Visualization Approach (EJS, JSW), pp. 274–281.
- STOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics
- Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
- CADE-1994-BronsardRH #induction #order
- Induction using Term Orderings (FB, USR, RWH), pp. 102–117.
- CADE-1994-ChuP #first-order #proving #semantics #theorem proving
- Semantically Guided First-Order Theorem Proving using Hyper-Linking (HC, DAP), pp. 192–206.
- CADE-1994-McPheeCG #geometry #proving #theorem
- Mechanically Proving Geometry Theorems Using a Combination of Wu’s Method and Collins’ Method (NFM, SCC, XSG), pp. 401–415.
- CAV-1994-BouajjaniER #hybrid #linear #verification
- Verification of Context-Free Timed Systems Using Linear Hybrid Observers (AB, RE, RR), pp. 118–131.
- CAV-1994-DamsGDHKP #abstraction #adaptation #model checking
- Model Checking Using Adaptive State and Data Abstraction (DD, RG, GD, RH, PK, HP), pp. 455–467.
- CAV-1994-GorrieriS #realtime #verification
- Real-Time System Verification using P/T Nets (RG, GS), pp. 14–26.
- CAV-1994-Graf #abstraction #distributed #memory management #verification
- Verification of a Distributed Cache Memory by Using Abstractions (SG), pp. 207–219.
- CAV-1994-HojatiMB #graph
- Improving Language Containment Using Fairness Graphs (RH, RBMT, RKB), pp. 391–403.
- CAV-1994-NaikS #model checking #modelling #protocol #verification
- Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
- CAV-1994-OliveroSY #abstraction #hybrid #linear #verification
- Using Abstractions for the Verification of Linear Hybrid Systems (AO, JS, SY), pp. 81–94.
- ILPS-1994-Cras #constraints #logic programming
- Using Constraint Logic Programming in Services: A Few Short Tales (YC), pp. 3–16.
- ILPS-1994-JourdanFRD #concurrent #constraints #modelling #parallel #programming #scheduling
- Data Alignment and Task Scheduling On Parallel Machines Using Concurrent Constraint Model-based Programming (JJ, FF, DR, AD), p. 678.
- ILPS-1994-Ross #constraints
- A Syntactic Stratification Condition Using Constraints (KAR), pp. 76–90.
- ISSTA-1994-Karam #timeline #visualisation
- Visualization using Timelines (GMK), pp. 125–137.
- ISSTA-1994-MurrillM #approach #fault #semantics
- An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (BWM, LJM), p. 200.
- ICDAR-1993-AgazziK #2d #documentation #image #markov #modelling #normalisation #pseudo #recognition
- Joint normalization and recognition of degraded document images using pseudo-2D hidden Markov models (OEA, SsK), pp. 155–158.
- ICDAR-1993-AminW #network #recognition
- Hand-printed character recognition system using artificial neural networks (AA, WHW), pp. 943–946.
- ICDAR-1993-AraiAN #interactive #network #recognition
- Intelligent interactive map recognition using neural networks (HA, SA, MN), pp. 922–925.
- ICDAR-1993-Bai #multi #recognition
- Multifont Chinese character recognition using side-stroke-end feature (GB), pp. 794–797.
- ICDAR-1993-Breul #bound #fault #recognition
- Recognition of handprinted digits using optimal bounded error matching (TMB), pp. 493–496.
- ICDAR-1993-ChenWB #detection #image #keyword #markov #modelling
- Detecting and locating partially specified keywords in scanned images using hidden Markov models (FC, LW, DSB), pp. 133–138.
- ICDAR-1993-DoermannRW #geometry #invariant #recognition
- Logo recognition using geometric invariants (DSD, ER, IW), pp. 894–897.
- ICDAR-1993-GillouxLB #markov #modelling #recognition #word
- Strategies for handwritten words recognition using hidden Markov models (MG, ML, JMB), pp. 299–304.
- ICDAR-1993-HerrmannS #documentation #image #layout #retrieval
- Retrieval of document images using layout knowledge (PH, GS), pp. 537–540.
- ICDAR-1993-HoriuchiTYY #on the #recognition
- On method of training dictionaries for handwritten character recognition using relaxation matching (TH, KT, KY, HY), pp. 638–641.
- ICDAR-1993-HoriuchiTYY93a #image #recognition
- Stamped character recognition method using range image (TH, KT, HY, KY), pp. 782–785.
- ICDAR-1993-ImadeTW #classification #documentation #image #network #segmentation
- Segmentation and classification for mixed text/image documents using neural network (SI, ST, TW), pp. 930–934.
- ICDAR-1993-InoharaKSS #complexity #database #retrieval
- Retrieval method of textile pictures database using a complexity scale (TI, KK, HS, SS), pp. 699–702.
- ICDAR-1993-JainC #analysis #locality
- Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
- ICDAR-1993-JiangKT #recognition #representation
- Recognition and representation of text characters using rubber band (JJ, WK, HT), pp. 955–958.
- ICDAR-1993-Kita #automation #recognition #taxonomy
- Making a personal recognition dictionary from characters automatically generated by using handwriting model (NK), pp. 76–81.
- ICDAR-1993-LamH #markov #modelling
- Reading constrained text using hierarchical hidden Markov models (SWL, WKH), pp. 151–154.
- ICDAR-1993-LeeS #design #modelling
- Optimal design of reference models using simulated annealing combined with an improved LVQ3 (SWL, HHS), pp. 244–249.
- ICDAR-1993-LiiPS #recognition #syntax
- Address block location using character recognition and address syntax (JL, PWP, SNS), pp. 330–334.
- ICDAR-1993-MarukawaKSF #recognition
- A post-processing method for handwritten Kanji name recognition using Furigana information (KM, MK, YS, HF), pp. 218–221.
- ICDAR-1993-MonaganR #graph #representation
- Appropriate base representation using a run graph (GM, MR), pp. 623–626.
- ICDAR-1993-MykaG #automation #documentation #hypermedia #re-engineering
- Using electronic facsimiles of documents for automatic reconstruction of underlying hypertext structures (AM, UG), pp. 528–532.
- ICDAR-1993-NakamuraSANK #string
- A method for recognizing character strings from maps using linguistic knowledge (AN, OS, MA, CN, HK), pp. 561–564.
- ICDAR-1993-OhkuraSSH #on the
- On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
- ICDAR-1993-ParkerJS
- Thresholding using an illumination model (JRP, CJ, AGS), pp. 270–273.
- ICDAR-1993-PasternakN #adaptation #constraints #object-oriented #specification
- Adaptable drawing interpretation using object-oriented and constraint-based graphic specification (BP, BN), pp. 359–364.
- ICDAR-1993-Pavlidis #image
- Threshold selection using second derivatives of the gray scale image (TP), pp. 274–277.
- ICDAR-1993-Pflug #n-gram #recognition #set
- Using n-grams for the definition of a training set for cursive handwriting recognition (VP), pp. 295–298.
- ICDAR-1993-SendaMI #documentation #image #process #recognition #retrieval
- Document image retrieval system using character candidates generated by character recognition process (SS, MM, KI), pp. 541–546.
- ICDAR-1993-SeniorF
- Using constrained snakes for feature spotting in off-line cursive script (AWS, FF), pp. 305–310.
- ICDAR-1993-Sinha #constraints #on the #recognition
- On using syntactic constraints in text recognition (RMKS), pp. 858–861.
- ICDAR-1993-Srihari #modelling #recognition
- From pixels to paragraphs: The use of contextual models in text recognition (SNS), pp. 416–423.
- ICDAR-1993-StefanoTV #reliability
- Using entropy for drawing reliable templates (CDS, FT, MV), pp. 345–348.
- ICDAR-1993-StrathySK #segmentation
- Segmentation of handwritten digits using contour features (NWS, CYS, AK), pp. 577–580.
- ICDAR-1993-Viard-GaudinNB #2d #algorithm #approach
- A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
- ICDAR-1993-Yan93a #classification #image #nearest neighbour #segmentation
- Color map image segmentation using optimized nearest neighbor classifiers (HY), pp. 111–114.
- ICDAR-1993-YangHT #approximate #automation #identification
- Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
- ICDAR-1993-YoshimuraSY #locality #recognition
- A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
- SIGMOD-1993-AnanthanarayananGKLP #approach #object-oriented #relational
- Using the Co-existence Approach to Achieve Combined Functionality of Object-Oriented and Relational Systems (RA, VG, WK, TJL, HP), pp. 109–118.
- SIGMOD-1993-BrinkhoffKS #performance
- Efficient Processing of Spatial Joins Using R-Trees (TB, HPK, BS), pp. 237–246.
- SIGMOD-1993-LuniewskiSSST #information management
- Information Organization Using Rufus (AL, PMS, KAS, JS, JT), pp. 560–561.
- SIGMOD-1993-Mukhopadhyay
- Interoperability Using APPC (DM), pp. 479–482.
- SIGMOD-1993-ShatdalN #memory management #parallel
- Using Shared Virtual Memory for Parallel Join Processing (AS, JFN), pp. 119–128.
- SIGMOD-1993-WoelkACMSST #dependence #scheduling
- Task Scheduling Using Intertask Dependencies in Carot (DW, PCA, PC, GM, APS, MPS, CT), pp. 491–494.
- VLDB-1993-ChenR93a #adaptation #database #feedback #query
- Adaptive Database Buffer Allocation Using Query Feedback (CMC, NR), pp. 342–353.
- VLDB-1993-MillerIR #capacity #integration
- The Use of Information Capacity in Schema Integration and Translation (RJM, YEI, RR), pp. 120–133.
- VLDB-1993-ZobelMS #scalability
- Searching Large Lexicons for Partially Specified Terms using Compressed Inverted Files (JZ, AM, RSD), pp. 290–301.
- CSM-1993-Abd-El-HafizB #library #source code
- Documenting Programs Using a Library of Tree Structured Plans (SKAEH, VRB), pp. 152–161.
- CSM-1993-EdwardsM #lifecycle #logic
- Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method (HME, MM), pp. 162–171.
- CSM-1993-LoyallM #analysis #dependence #maintenance #process
- Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
- CSM-1993-Narat #case study #database #maintenance #relational
- Using a Relational Database for Software Maintenance: A Case Study (VN), pp. 244–251.
- FME-1993-CauR #fault tolerance #refinement
- Using Relative Refinement for Fault Tolerance (AC, WPdR), pp. 19–41.
- FME-1993-HaxthausenG #case study #concurrent
- A Concurrency Case Study Using RAISE (AEH, CG), pp. 367–387.
- FPCA-1993-Nocker #analysis #reduction #strict
- Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
- HCI-ACS-1993-Ala-Siuru #case study #experience #specification #user interface
- Using QFD Techniques in User Interface Specification: First Experiences (PAS), pp. 456–461.
- HCI-ACS-1993-ChasePHH #case study #documentation
- Task-Oriented User Documentation Using the User Action Notation: A Case Study (JDC, MP, HRH, DH), pp. 421–426.
- HCI-ACS-1993-Chung
- Decision Maker’s Knowledge Level and the Selection of Decision Strategies in Using a Decision Support System (HMMC), pp. 487–491.
- HCI-ACS-1993-Hjelmquist #communication #people
- Communication Between People Using a Computer-Mediated Communication System (EH), pp. 955–960.
- HCI-ACS-1993-McFarlane #automation #development
- Current Status of Development and Use of Tethered and Autonomous Underwater Vehicles and the Potential for Further Automation (JRM), pp. 301–306.
- HCI-ACS-1993-PouraghabagherB #evaluation #eye tracking #monitoring
- An Evaluation of Information Highlighting Methods on Computer Screens Using an Eye Movement Monitor (RP, DB), pp. 762–767.
- HCI-ACS-1993-Sundstrom-Frisk
- Near-Accidents in the Use of Advanced Medical Equipment (CSF), pp. 821–826.
- HCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
- Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
- HCI-SHI-1993-AndersonJBA
- The Use of Computer Simulated Cases to Study Factors that Influence Clinical Practice Styles (JGA, SJJ, CB, MMA), pp. 742–747.
- HCI-SHI-1993-BorgesBLT #design #education #framework #knowledge base
- A Framework for Building a Knowledge Based System Using Several Experts — With an Application for Curriculum Design of Engineering Degree Courses (MNB, YB, ML, MTT), pp. 344–349.
- HCI-SHI-1993-EnomotoNNS
- Virtual Kitchen System using Kansei Engineering (NE, MN, JN, KS), pp. 657–662.
- HCI-SHI-1993-GodbertPS #concept #constraints #interface #natural language #specification
- Natural Language Interfaces: Specifying and Using Conceptual Constraints (EG, RP, PS), pp. 385–390.
- HCI-SHI-1993-GreavesWO #image #speech #visual notation
- Enhancing Speech Intelligibility Using Visual Images (CG, MW, OÖ), pp. 1097–1102.
- HCI-SHI-1993-HsiA93a #design #education #multi
- Use of Multimedia Technology in Teaching Engineering Design (SH, AMA), pp. 778–783.
- HCI-SHI-1993-KamalaSC #difference #multi #student
- Individual Differences in the Use of Hyper/Multimedia by Undergraduate Students at the University of Hawaii at Manoa (TNK, JS, MEC), pp. 507–512.
- HCI-SHI-1993-KamijoK #artificial reality
- A Virtual Reality System Using Physiological Data — Application to Virtual Sports CAI (KK, AK), pp. 675–680.
- HCI-SHI-1993-KatoO #analysis
- Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
- HCI-SHI-1993-KirschA #approach #education #multi #visual notation
- Using Multimedia to Teach Visual Literacy: A Systematic Approach (RPK, RMA), pp. 531–536.
- HCI-SHI-1993-Lowgren #editing #visual notation
- Using Domain Knowledge to Support Graphical Editing (JL), pp. 421–426.
- HCI-SHI-1993-MoriiKT #animation #detection #evaluation #eye tracking #realtime
- Evaluation of a Gaze Using Real-Time CG Eye-Animation Combined with Eye Movement Detector (KM, FK, NT), pp. 1103–1108.
- HCI-SHI-1993-SharitC #reasoning #rule-based
- The Use of Expert Systems for Training Humans in Rule-Based Reasoning (JS, SC), pp. 819–824.
- HCI-SHI-1993-ShibuyaT #communication #image
- Use of Bi-Directional Image Exchange in Facilitating Precontact Communication (YS, HT), pp. 943–948.
- HCI-SHI-1993-SillinceM #human-computer #hypermedia
- Using Argumentation to Overcome Hypertext’s HCI Failings (JAAS, RHM), pp. 639–644.
- HCI-SHI-1993-Stelovsky #hypermedia #implementation #parametricity #reuse
- Use of Parameters to Facilitate the Implementation of Reusable Hypermedia Modules (JS), pp. 525–530.
- HCI-SHI-1993-UetakeNTT #analysis
- A Meeting Support System Based on Analyses of Human-Communication — Using the Context and Contents of Meetings (TU, MN, KT, HT), pp. 967–972.
- HCI-SHI-1993-WatersonO #multi
- Using Animated Demonstrations in Multimedia Applications: Some Suggestions Based upon Experimental Evidence (PEW, CO), pp. 543–548.
- INTERCHI-1993-BerlinJOPW #design #memory management
- Where did you put it? Issues in the design and use of a group memory (LMB, RJ, VLO, AP, CW), pp. 23–30.
- INTERCHI-1993-BrownMS #graph #perspective
- Browsing graphs using a fisheye view (MHB, JRM, MS), p. 516.
- INTERCHI-1993-Byrne #documentation
- Using icons to find documents: simplicity is critical (MDB), pp. 446–453.
- INTERCHI-1993-HigakiTM
- A telewriting system on a LAN using a pen-based computer as the terminal (SH, HT, SM), p. 303.
- INTERCHI-1993-KabbashMB #performance
- Human performance using computer input devices in the preferred and non-preferred hands (PK, ISM, WB), pp. 474–481.
- INTERCHI-1993-KurtenbachB #performance
- The limits of expert performance using hierarchic marking menus (GK, WB), pp. 482–487.
- INTERCHI-1993-McKerlieM #design
- QOC in action (abstract): using design rationale to support design (DM, AM), p. 519.
- INTERCHI-1993-NardiSKLWS
- Turning away from talking heads: the use of video-as-data in neurosurgery (BAN, HS, AK, RL, SW, RJS), pp. 327–334.
- INTERCHI-1993-SteffenE #interactive #visualisation
- High interaction data visualization using Seesoft to visualize program change history (JLS, SGE), p. 517.
- INTERCHI-1993-Wang
- A groupware engine using UIMS methodologies (LW), pp. 249–250.
- CAiSE-1993-AntonellisV #reuse #specification
- Temporal Apsects in Reuse of Requirement Specifications (VDA, LV), pp. 504–520.
- CAiSE-1993-GullaW #execution #modelling #validation
- Using Explanations to Improve the Validation of Executable Models (JAG, GW), pp. 118–142.
- CAiSE-1993-PalanqueBDS #design #interface #petri net
- Design of User-Driven Interfaces Using Petri Nets and Objects (PAP, RB, LD, CSB), pp. 569–585.
- CIKM-1993-AzarbodP #concept #incremental #integration
- Building Concept Hierarchies for Schema Integration in HDDBS Using Incremental Concept Formation (CA, WP), pp. 732–734.
- CIKM-1993-MehtaGPN #generative
- The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
- CIKM-1993-Riloff #classification
- Using Cases to Represent Context for Text Classification (ER), pp. 105–113.
- CIKM-1993-Sussna #ambiguity #for free #network #semantics #word
- Word Sense Disambiguation for Free-text Indexing Using a Massive Semantic Network (MS), pp. 67–74.
- CIKM-1993-ZhangOCF #data type #optimisation #query
- A Method of Using Semijoins to Optimizing Queries with ADT Functions (XZ, NO, HC, YF), pp. 723–725.
- ICML-1993-Cardie #learning
- Using Decision Trees to Improve Case-Based Learning (CC), pp. 25–32.
- ICML-1993-ClarkM #induction #learning #modelling
- Using Qualitative Models to Guide Inductive Learning (PC, SM), pp. 49–56.
- ICML-1993-CravenS #learning #network
- Learning Symbolic Rules Using Artificial Neural Networks (MC, JWS), pp. 73–80.
- SEKE-1993-BachateneCS #design #re-engineering
- Using Software Engineering Principles to Design Intelligent Cooperative Systems (HB, MC, AEFS), pp. 309–313.
- SEKE-1993-Bhansali #architecture #reuse
- Architecture-driven Reuse of Code in KASE (SB), pp. 483–490.
- SEKE-1993-ChuP #reuse #scalability
- A Re-cnginacring Tool for the Reuse of Large Scale Software Systems (WCC, SP), pp. 94–101.
- SEKE-1993-LeloucheV #automation #knowledge-based #testing
- Using the Inference Engine Strategy in the Automatic Construction of Test Cases for a Knowledge-Based System (RL, LV), pp. 388–395.
- SEKE-1993-MacMillanFLLS #architecture #natural language #reuse #tool support
- A Common Architecture To Encourage Reuse Of Natural Language/Text Processing Tools (TRM, MLF, SJL, EPL, LJS), pp. 266–270.
- SEKE-1993-Paterno #logic #user interface
- Definition of Properties of User Interfaces Using Action-Based Temporal Logic (FP), pp. 314–318.
- SEKE-1993-PirriP #datalog #deduction #design #taxonomy
- Using Datalog as a Language for Data Dictionary Design: A Deductive Support (FP, CP), pp. 304–308.
- SEKE-1993-ReynoldsM #metric #process #programming language #refinement
- The Use of Refinement Metrics to Assess Programming Language Support for the Stepwise Refinement Process (RGR, JIM), pp. 150–157.
- SIGIR-1993-CallanC #evaluation #query
- An Evaluation of Query Processing Strategies Using the TIPSTER Collection (JPC, WBC), pp. 347–355.
- SIGIR-1993-Hull #evaluation #retrieval #statistics #testing
- Using Statistical Testing in the Evaluation of Retrieval Experiments (DAH), pp. 329–338.
- SIGIR-1993-Kupiec #approach #named #online #robust
- MURAX: A Robust Linguistic Approach for Question Answering Using an On-Line Encyclopedia (JK), pp. 181–190.
- SIGIR-1993-Voorhees #retrieval #word
- Using WordNet to Disambiguate Word Senses for Text Retrieval (EMV), pp. 171–180.
- ECOOP-1993-GammaHJV #abstraction #design pattern #object-oriented #reuse
- Design Patterns: Abstraction and Reuse of Object-Oriented Design (EG, RH, REJ, JMV), pp. 406–431.
- OOPSLA-1993-BalK #runtime
- Object Distribution in Orca using Compile-Time and Run-Time Techniques (HEB, MFK), pp. 162–177.
- OOPSLA-1993-BinghamHH #case study #experience #library #object-oriented
- Experiences Developing and Using an Object-Oriented Library for Program Manipulation (TB, NH, DH), pp. 83–89.
- OOPSLA-1993-GodinM #maintenance
- Building and Maintaining Analysis-Level Class Hierarchies Using Galois Lattices (RG, HM), pp. 394–410.
- OOPSLA-1993-MatsuokaTY #concurrent #encapsulation #object-oriented #performance
- Highly Efficient and Encapsulated Re-use of Synchronization Code in Concurrent Object-Oriented Languages (SM, KT, AY), pp. 109–126.
- TOOLS-EUROPE-1993-DecooninckNJ #modelling #object-oriented
- Satellite Modeling Using Object-Oriented Technologies (ASD, PN, FJ), pp. 19–30.
- TOOLS-EUROPE-1993-KetabchiS #analysis #automation #documentation #generative #maintenance
- Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
- TOOLS-PACIFIC-1993-Dew #agile #concept #object-oriented #prototype #realtime
- A Rapid Prototyping System for Real-time Systems Using Object-oriented Concepts (RAD), pp. 279–291.
- TOOLS-PACIFIC-1993-Grant #ada #object-oriented #paradigm #re-engineering
- Software Engineering Using the Object-Oriented Paradigm: The Promise of Ada 9X (DDG), p. 329.
- TOOLS-PACIFIC-1993-LingD #comparison #concurrent #object-oriented #paradigm #specification
- A Comparison of Techniques for Specifying Concurrent Systems Using the Object-Oriented Paradigm (SL, BD), pp. 155–177.
- TOOLS-USA-1993-Brandis #c++ #design #scalability
- An O-O Case History: Large System Design Using C++ (CB), p. 534.
- TOOLS-USA-1993-VideiraS #c++ #design #development #framework
- Using C++ in the Development of an Electronic Design Framework (IV, HS), pp. 255–264.
- AdaEurope-1993-Lundberg #ada #evaluation #parallel #performance #source code
- Performance Evaluation of Parallel Ada Programs Using an Experimental Multiprocessor (LL), pp. 280–297.
- AdaEurope-1993-Schwille #exception #guidelines
- Use and Abuse of Exceptions — 12 Guidelines for Proper Exception Handling (JS), pp. 141–152.
- LOPSTR-1993-BoulangerB #abstract interpretation
- Using Abstract Interpretation for Goal Replacement (DB, MB), pp. 210–228.
- LOPSTR-1993-Johansson #incremental #interactive
- Interactive Program Derivation Using Program Schemata and Incrementally Generated Strategies (ALJ), pp. 100–112.
- LOPSTR-1993-MaddenHGB #automation #generative #performance #proving #source code #theorem proving
- A General Technique for Automatically Generating Efficient Programs Through the Use of Proof Planning (PM, JH, IG, AB), pp. 64–66.
- PEPM-1993-Lawall #induction #partial evaluation #proving
- Proofs by Structural Induction using Partial Evaluation (JLL), pp. 155–166.
- PEPM-1993-Seward #analysis #polymorphism #strict
- Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
- PLDI-1993-BarrettZ #memory management #performance #predict
- Using Lifetime Predictors to Improve Memory Allocation Performance (DAB, BGZ), pp. 187–196.
- PLILP-1993-JourdanBPR #attribute grammar #implementation #specification
- Specification and Implementation of Grammar Couplings using Attribute Grammars (MJ, CLB, DP, GR), pp. 123–136.
- PLILP-1993-Moreno-NavarroKMWH #analysis #lazy evaluation #performance
- Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
- PLILP-1993-Poetzsch-Heffter #programming language #prototype #specification
- Programming Language Specification and Prototyping Using the MAX System (APH), pp. 137–150.
- POPL-1993-BatesH #dependence #graph #incremental #testing
- Incremental Program Testing Using Program Dependence Graphs (SB, SH), pp. 384–396.
- POPL-1993-Lakhotia #dependence #graph #multi
- Constructing Call Multigraphs Using Dependence Graphs (AL), pp. 273–284.
- TRI-Ada-1993-DownsDMTT #ada
- Using X with the ADA Mind-Set (MD, JD, KM, LT, CT), pp. 20–28.
- TRI-Ada-1993-GieringMB #ada #design #implementation #thread
- Implementing Ada 9X Features Using POSIX Threads: Design Issues (EWG, FM, TPB), pp. 214–228.
- TRI-Ada-1993-Nickerson #ada #design #representation #visual notation
- Visual Conventions for System Design Using Ada 9X: Representing Asynchronous Transfer of Control (JVN), pp. 379–384.
- TRI-Ada-1993-White #ada #interface #semantics #specification
- A Universal Delogger Using the Ada Semantic Interface Specification (ASIS) (MW), pp. 347–353.
- WSA-1993-FergusonH #abstract interpretation #algorithm #performance
- Fast Abstract Interpretation Using Sequential Algorithms (AF, JH), pp. 45–59.
- ICRE-1993-HoffmannD #design #execution #process #prototype #specification
- Using Executable Specifications for Prototyping System Design Process (CH, BD), pp. 135–145.
- RE-1993-AndersonD #requirements
- Using scenarios in deficiency-driven requirements engineering (JSA, BD), pp. 134–141.
- RE-1993-CastanoA #concept #reuse #specification
- Reuse of conceptual requirement specifications (SC, VDA), pp. 121–124.
- RE-1993-GreenspanF #paradigm #requirements
- Requirements engineering using the SOS paradigm (SJG, MF), pp. 260–263.
- RE-1993-IshiharaSK #dependence #natural language #specification
- A translation method from natural language specifications into formal specifications using contextual dependencies (YI, HS, TK), pp. 232–239.
- ESEC-1993-JengC #component #formal method #library
- Using Formal Methods to Construct a Software Component Library (JJJ, BHCC), pp. 397–417.
- FSE-1993-AbowdAG #architecture
- Using Style to Understand Descriptions of Software Architecture (GDA, RA, DG), pp. 9–20.
- FSE-1993-Wood #approach #calculus #re-engineering #refinement
- A Practical Approach to Software Engineering Using Z and the Refinement Calculus (KRW), pp. 79–88.
- ICSE-1993-BastaniDP #correctness #evaluation
- Experimental Evaluation of a Fuzzy-Set Based Measure of Software Correctness Using Program Mutation (FBB, GD, AP), pp. 45–54.
- ICSE-1993-GerhartCR #formal method #industrial
- Observations on Industrial Practice Using Formal Methods (SLG, DC, TR), pp. 24–33.
- ICSE-1993-OrnburnL #component #generative
- Building, Modifying and Using Component Generators (SBO, RJL), pp. 391–402.
- ICSE-1993-Zelkowitz #classification
- Use of an Environment Classification Model (MVZ), pp. 348–357.
- KBSE-1993-KingstonVD #approach #development #evaluation #hybrid
- Development of an Expert Assistant for Software Evaluation using a Hybrid Approach (GK, RV, PD), p. 26.
- KBSE-1993-MacMillanFLLS #architecture #natural language #reuse #tool support
- A Common Architecture to Encourage Reuse of Natural Language/Text Processing Tools (TRM, MF, SL, EPL, LJS), p. 20.
- KBSE-1993-Redmiles #empirical #knowledge-based #re-engineering
- Observations on Using Empirical Studies in Developing a Knowledge-Based Software Engineering Tool (DFR), p. 24.
- SAC-1993-AguirreBBG #information management #prototype #representation
- Using a High Level Knowledge Representation for Expert Systems Knowledge Acquisition and Prototyping (JLA, OB, RFB, MNG), pp. 490–497.
- SAC-1993-Al-HaddadGG #implementation #object-oriented #paradigm #programming #reuse
- Dynamic Selection and Reuse of Implementations in the Object-Oriented Programming Paradigm (HMAH, KMG, TG), pp. 452–459.
- SAC-1993-ChewSK #object-oriented
- Use of Object-Oriented Structures to Represent Knowledge in Expert Systems (GC, MS, AK), pp. 498–503.
- SAC-1993-Konstam #algorithm #analysis #linear #search-based
- Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
- SAC-1993-RankinW #combinator #fixpoint #prolog
- Finding Fixed Point Combinators Using Prolog (RR, RWW), pp. 604–608.
- SAC-1993-Sen #low cost #probability #set
- Minimal Cost Set Covering Using Probabilistic Methods (SS), pp. 157–164.
- SAC-1993-ThangiahN #adaptation
- Dynamic Trajectory Routing Using an Adaptive Search Method (SRT, KEN), pp. 131–138.
- DAC-1993-ChakradharDPR #optimisation
- Sequential Circuit Delay optimization Using Global Path Delays (STC, SD, MP, SGR), pp. 483–489.
- DAC-1993-ChengK #automation #finite #functional #generative #state machine #testing
- Automatic Functional Test Generation Using the Extended Finite State Machine Model (KTC, ASK), pp. 86–91.
- DAC-1993-ChouCC #finite #modelling #performance #simulation
- High-Speed Interconnect Modeling and High-Accuracy Simulation Using SPICE and Finite Element Methods (TYC, JC, ZJC), pp. 684–690.
- DAC-1993-HamadaCC #approach #linear #named #network
- Prime: A Timing-Driven Placement Tool using A Piecewise Linear Resistive Network Approach (TH, CKC, PMC), pp. 531–536.
- DAC-1993-HeebPR #modelling
- Frequency Domain Microwave Modeling Using Retarded Partial Element Equivalent Circuits (HH, SP, AER), pp. 702–706.
- DAC-1993-IqbalPDP #algebra
- Critical Path Minimization Using Retiming and Algebraic Speed-Up (ZI, MP, SD, ACP), pp. 573–577.
- DAC-1993-LadageL #algorithm
- Resistance Extraction using a Routing Algorithm (LL, RL), pp. 38–42.
- DAC-1993-LamBS #modelling
- Circuit Delay Models and Their Exact Computation Using Timed Boolean Functions (WKCL, RKB, ALSV), pp. 128–134.
- DAC-1993-LiaoDWC #metaprogramming #network #polynomial
- S-Parameter Based Macro Model of Distributed-Lumped Networks Using Exponentially Decayed Polynomial Function (HL, WWMD, RW, FYC), pp. 726–731.
- DAC-1993-LiuCS #behaviour #simulation #verification
- Analog System Verification in the Presence of Parasitics Using Behavioral Simulation (EWYL, HCC, ALSV), pp. 159–163.
- DAC-1993-MandayamV #attribute grammar #performance #specification
- Performance Specification Using Attributed Grammars (RM, RV), pp. 661–667.
- DAC-1993-MotoharaHMMKSS #algorithm #matrix #traversal
- A State Traversal Algorithm Using a State Covariance Matrix (AM, TH, MM, HM, KK, YS, SS), pp. 97–101.
- DAC-1993-OhlrichEGS #algorithm #identification #morphism #named #performance
- SubGemini: Identifying SubCircuits using a Fast Subgraph Isomorphism Algorithm (MO, CE, EG, LS), pp. 31–37.
- DAC-1993-PullelaMP #optimisation #reliability
- Reliable Non-Zero Skew Clock Trees Using Wire Width Optimization (SP, NM, LTP), pp. 165–170.
- DAC-1993-SantucciCG #behaviour #heuristic
- Speed up of Behavioral A.T.P.G. using a Heuristic Criterion (JFS, ALC, NG), pp. 92–96.
- DAC-1993-SuttonBD #design
- Design Management Using Dynamically Defined Flows (PRS, JBB, SWD), pp. 648–653.
- DAC-1993-WangDNS #architecture #multi #scalability #synthesis
- High-Level Synthesis of Scalable Architectures for IIR Filters using Multichip Modules (HW, NDD, AN, KYS), pp. 336–342.
- DAC-1993-YaoCDNL
- Cell-Based Hierarchical Pitchmatching Compaction Using Minimal LP (SZY, CKC, DD, SN, CYL), pp. 395–400.
- HPDC-1993-ColombetDM #modelling #network
- Star Modeling on IBM RS6000 Networks Using PVM (LC, LD, FM), pp. 121–128.
- HPDC-1993-CrutcherLFZ #3d #network
- Management of Broadband Networks Using a 3D Virtual World (LAC, AAL, SF, MXZ), pp. 306–315.
- HPDC-1993-MukherjeeS #adaptation #concurrent #configuration management #multi #performance #thread
- Improving Performance by Use of Adaptive Objects: Experimentation with a Configurable Multiprocessor Thread Package (BM, KS), pp. 59–66.
- HPDC-1993-TanenbaumBK #distributed #programming
- Programming a Distributed System Using Shared Objects (AST, HEB, MFK), pp. 5–12.
- PDP-1993-AzharF #adaptation #network
- Adaptive robot control using a processor network (FA, DAF), pp. 351–358.
- PDP-1993-LawsonMH #matrix #named
- SMART: a neurocomputer using sparse matrices (JCL, NM, JH), pp. 59–64.
- PDP-1993-Montiel-NelsonAFN #development #library
- Using the ES2 library and SILOS simulator in the development of a single chip with three processors and analog IO (JAMN, VdA, DQMF, AN), pp. 359–368.
- PDP-1993-StuartW #algorithm #array #matrix #parallel #scalability #set #symmetry
- An algorithm far the parallel computation of subsets of eigenvalues and associated eigenvectors of large symmetric matrices using an array processor (EJS, JSW), pp. 211–217.
- PPoPP-1993-HallHKMMOPR #case study #editing #experience #interactive #parallel #programming
- Experiences Using the ParaScope Editor: an Interactive Parallel Programming Tool (MWH, TJH, KK, NM, KSM, JDO, MHP, GR), pp. 33–43.
- PPoPP-1993-KontothanassisW #performance
- Using Scheduler Information to Achieve Optimal Barrier Synchronization Performance (LIK, RWW), pp. 64–72.
- PPoPP-1993-Siegl #algorithm #symbolic computation
- Parallelizing Algorithms for Symbolic Computation using ||MAPLE|| (KS), pp. 179–186.
- SOSP-1993-HauserJTWW #case study #interactive #thread
- Using Threads in Interactive Systems: A Case Study (CH, CJ, MT, BBW, MW), pp. 94–105.
- TAPSOFT-1993-Esparza #model checking
- Model Checking Using Net Unfoldings (JE), pp. 613–628.
- TAPSOFT-1993-GiannottiL #abstract interpretation #specification
- Gate Splitting in LOTOS Specifications Using Abstract Interpretation (FG, DL), pp. 437–452.
- TAPSOFT-1993-InverardiKY #case study #formal method #named
- Yeast: A Case Study for a Practical Use of Formal Methods (PI, BK, DY), pp. 105–120.
- TAPSOFT-1993-Kirkwood #automation #equation #implementation #reasoning
- Automating (Specififation = Implementation) Using Equational Reasoning and LOTOS (CK), pp. 544–558.
- TAPSOFT-1993-PenaA #liveness #process #specification
- A Technique for Specifying and Refining TCSP Processes by Using Guards and Liveness Conditions (RP, LMA), pp. 328–342.
- CAV-1993-GuptaF #induction #parametricity #representation
- Parametric Circuit Representation Using Inductive Boolean Functions (AG, ALF), pp. 15–28.
- CAV-1993-HojatiBK #debugging #design
- BDD-Based Debugging Of Design Using Language Containment and Fair CTL (RH, RKB, RPK), pp. 41–58.
- CAV-1993-HuD #invariant #performance #verification
- Efficient Verification with BDDs using Implicitly Conjoined Invariants (AJH, DLD), pp. 3–14.
- CAV-1993-Peled #model checking
- All from One, One for All: on Model Checking Using Representatives (DP), pp. 409–423.
- CAV-1993-Shankar #realtime #verification
- Verification of Real-Time Systems Using PVS (NS), pp. 280–291.
- CSL-1993-BaazZ #equivalence #proving
- Short Proofs of Tautologies Using the Schema of Equivalence (MB, RZ), pp. 33–35.
- ICLP-1993-CarlssonG #automation #constraints
- Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques (MC, MG), pp. 647–665.
- ICLP-1993-LiRSVBPPSCDRSS #named #parallel
- APPLAUSE: Applications Using the ElipSys Parallel CLP System (LLL, MR, KS, AV, JB, CP, ZP, TS, DAC, SD, CJR, JS, GS), pp. 847–848.
- ILPS-1993-BoizumaultDP #problem
- Solving a real life exams problem using CHIP (PB, YD, LP), p. 661.
- ILPS-1993-CodishD #logic programming #source code
- Analysing Logic Programs Using “Prop”-ositional Logic Programs and a Magic Wand (MC, BD), pp. 114–129.
- ILPS-1993-CodognetD #constraints #theorem proving
- Boolean Constraint Solving Using clp(FD) (PC, DD), pp. 525–539.
- ILPS-1993-Vargas-VeraVR #editing #prolog #scalability #source code
- Building Large-Scale Prolog Programs using a Techniques Editing System (MVV, WWV, DSR), p. 636.
- ISSTA-1993-AvritzerL #testing
- Load Testing Software Using Deterministic State Testing (AA, BL), pp. 82–88.
- ISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction
- Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
- ISSTA-1993-UntchOH #analysis #mutation testing
- Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
- IWPTS-1993-UlrichK
- Test Derivation from LOTOS Using Structure Information (AU, HK), pp. 279–293.
- IWPTS-1993-WittemanW #network #principle #testing
- ATM Broadband Network Testing Using the Ferry Principle (MFW, RCvW), pp. 125–138.
- HT-ECHT-1992-FreiS #hypermedia
- Making Use of Hypertext Links when Retrieving Information (HPF, DS), pp. 102–111.
- HT-ECHT-1992-GuinanS #hypermedia #information retrieval
- Information Retrieval from Hypertext using Dynamically Planned Guided Tours (CG, AFS), pp. 122–130.
- HT-ECHT-1992-WiilL #distributed #hypermedia #named
- Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems (UKW, JJL), pp. 251–261.
- HT-ECHT-1992-ZhengP #hypermedia
- Using Statecharts to Model Hypertext (YZ, MCP), pp. 242–250.
- SIGMOD-1992-AgrawalAJ #database #protocol #realtime
- Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
- SIGMOD-1992-Bamford #consistency #multi #performance
- Using Multiversioning to Improve Performance Without Loss of Consistency (RB), p. 164.
- SIGMOD-1992-JhingranK #analysis #database #protocol
- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
- SIGMOD-1992-LanzelotteVZ #object-oriented #optimisation #query #recursion
- Optimization of Object-Oriented Recursive Queries using Cost-Controlled Strategies (RSGL, PV, MZ), pp. 256–265.
- SIGMOD-1992-MohanL #concurrent #named #performance
- ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
- VLDB-1992-AnsariNRS #flexibility #multi #transaction
- Using Flexible Transactions to Support Multi-System Telecommunication Applications (MA, LN, MR, APS), pp. 65–76.
- VLDB-1992-ChenLYY #execution #pipes and filters
- Using Segmented Right-Deep Trees for the Execution of Pipelined Hash Joins (MSC, MLL, PSY, HCY), pp. 15–26.
- VLDB-1992-Raz #multi #principle
- The Principle of Commitment Ordering, or Guaranteeing Serializability in a Heterogeneous Environment of Multiple Autonomous Resource Mangers Using Atomic Commitment (YR), pp. 292–312.
- SEI-1992-WildeG #re-engineering
- Use of the Individual Exchange Project Model in an Undergraduate Software Engineering Laboratory (NW, JKG), pp. 339–348.
- LFP-1992-CooperNS #garbage collection #memory management #performance
- Improving the Performance of SML Garbage Collection Using Application-Specific Virtual Memory Management (EC, SN, IS), pp. 43–52.
- CHI-1992-FrankGGF #user interface
- Building User Interfaces Interactively Using Pre- and Postconditions (MRF, JJdG, DFG, JDF), pp. 641–642.
- CHI-1992-Hill #constraints #paradigm #user interface
- The abstraction-link-view paradigm: using constraints to connect user interfaces to applications (RDH), pp. 335–342.
- CHI-1992-KitajimaP #user interface #visual notation
- A Computational Model of Skilled Use of a Graphical User Interface (MK, PGP), pp. 241–249.
- CHI-1992-Muller #design
- Retrospective on a year of participatory design using the PICTIVE technique (MJM), pp. 455–462.
- CHI-1992-SellenBA
- Using Spatial Cues to Improve Videoconferencing (AS, WB, JLA), pp. 651–652.
- CSCW-1992-HymesO #editing
- Unblocking Brainstorming Through the Use of a Simple Group Editor (CMH, GMO), pp. 99–106.
- CSCW-1992-TakemuraK
- Cooperative Work Environment Using Virtual Workspace (HT, FK), pp. 226–232.
- KR-1992-Konolige #reasoning
- Using Default and Causal Reasoning in Diagnosis (KK), pp. 509–520.
- KR-1992-Nayak #order #reasoning
- Order of Magnitude Reasoning using Logarithms (PPN), pp. 201–210.
- ML-1992-GiordanaS #algorithm #concept #learning #search-based
- Learning Structured Concepts Using Genetic Algorithms (AG, CS), pp. 169–178.
- ML-1992-McCallum #learning #performance #proximity
- Using Transitional Proximity for Faster Reinforcement Learning (AM), pp. 316–321.
- ML-1992-OliveiraS #feature model #induction
- Constructive Induction Using a Non-Greedy Strategy for Feature Selection (ALO, ALSV), pp. 355–360.
- ML-1992-OmlinG #higher-order #network
- Training Second-Order Recurrent Neural Networks using Hints (CWO, CLG), pp. 361–366.
- SEKE-1992-LiKL #architecture #design #reuse
- The Reuse of Software Design and Software Architecture (HL, JvK, AML), pp. 170–177.
- SEKE-1992-MillerQ #approach #knowledge-based #modelling #reuse #simulation #source code
- A Knowledge-Based Approach to Encouraging Reuse of Simulation and Modeling Programs (LM, AQ), pp. 158–163.
- SEKE-1992-ReynoldsMZ #induction
- Extracting Procedural Knowledge from Software Systems Using Inductive Leaning in the PM system (RGR, JIM, EZ), pp. 131–139.
- SEKE-1992-SatoMI #refinement
- Program Refinement Using Generic Object (YS, YM, TI), pp. 18–25.
- SEKE-1992-Wong #incremental #library
- Using Version Spaces to Support Incremental Searches in a Software Library (YCW), pp. 412–419.
- SIGIR-1992-Grefenstette #retrieval
- Use of Syntactic Context to Produce Term Association Lists for Text Retrieval (GG), pp. 89–97.
- SIGIR-1992-MasandLW #memory management #reasoning
- Classifying News Stories using Memory Based Reasoning (BMM, GL, DLW), pp. 59–65.
- SIGIR-1992-RobertsonW #database
- Searching for Historical Word-Forms in a Database of 17th-Century English Text Using Spelling-Correction Methods (AMR, PW), pp. 256–265.
- ECOOP-1992-Gabelgaard #implementation #object-oriented #programming
- Using Object-Oriented Programming Techniques for Implementing ISDN Supplementary Services (BG), pp. 213–232.
- ECOOP-1992-Holland #component #contract #reuse #specification
- Specifying Reusable Components Using Contracts (IMH), pp. 287–308.
- OOPSLA-1992-EggenschwilerG
- ET++ Swaps Manager: Using Object Technology in the Financial Engineering Domain (TE, EG), pp. 166–177.
- OOPSLA-1992-Johnson #framework
- Documenting Frameworks using Patterns (REJ), pp. 63–76.
- TOOLS-EUROPE-1992-DojatP #prototype #representation #smalltalk
- Representation of a Medical Expertise using the Smalltalk Environment: Putting a Prototype to Work (MD, FP), pp. 379–389.
- TOOLS-EUROPE-1992-Zhao #approach #geometry #object-oriented #online #recognition
- On-Line Geometry Recognition Using C++, an Object-Oriented Approach (RZ), pp. 371–378.
- TOOLS-PACIFIC-1992-Goldberg #object-oriented #question
- Can A Manager Be Successful Using Object-Oriented Technology? (AG), p. 3.
- TOOLS-PACIFIC-1992-MaE #approach #library #relational
- A Practical Approach to Class Library Management Using a Relational DBMS (JM, JME), pp. 165–173.
- TOOLS-PACIFIC-1992-McNamara #development #object-oriented
- Objects in Context: the Use of Scope in Object-Oriented Development (ARM), pp. 205–211.
- TOOLS-USA-1992-FirthOFBN #development #object-oriented
- Improving a software development environment using object-oriented technology (MAF, MHO, REF, SKB, TCN), pp. 41–49.
- AdaEurope-1992-BayassiBJL #ada #distributed #paradigm
- A Practical Use of the Ada Rendez-Vous Paradigm in Distributed Systems (MB, HB, JFJ, PL), pp. 312–324.
- AdaEurope-1992-DuellSW #ada #code generation #scalability #source code
- Using Ada Source Code Generators in a Large Project (RD, HJS, FCAdW), pp. 47–59.
- AdaEurope-1992-Groeneveld #ada
- Using Ada in Integrating ATC Systems (MG), pp. 72–79.
- AdaEurope-1992-LooneyO #ada #distributed
- Distributed Application Designed Using MASCOT and Implemented in Ada (MJL, AO), pp. 1–8.
- LOPSTR-1992-BoulangerB #abstract interpretation #logic programming #source code
- Deriving Transformations for Logic Programs Using Abstract Interpretation (DB, MB), pp. 99–117.
- PEPM-1992-RufW #analysis #control flow #higher-order
- Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
- PLDI-1992-GranlundK #branch #c #compilation
- Eliminating Branches using a Superoptimizer and the GNU C Compiler (TG, RK), pp. 341–352.
- PLDI-1992-HanxledenK #constraints #control flow
- Relaxing SIMD Control Flow Constraints using Loop Transformations (RvH, KK), pp. 188–199.
- PLDI-1992-PughW #data flow #dependence
- Eliminating False Data Dependences using the Omega Test (WP, DW), pp. 140–151.
- PLILP-1992-Hanus #functional #logic programming #source code
- Improving Control of Logic Programs by Using Functional Logic Languages (MH), pp. 1–23.
- PLILP-1992-PenningsSV #attribute grammar #incremental
- Using Cached Functions and Constructors for Incremental Attribute Evaluation (MP, SDS, HV), pp. 130–144.
- TRI-Ada-C-1992-Blair #ada #configuration management #library #version control
- Managing Ada Using Rational’s Configuration Management/Version Control and IBM’s Software Configuration Library Manager (DJB), pp. 424–431.
- TRI-Ada-C-1992-Carmichael #architecture #design #object-oriented
- Defining Software Architectures Using the Hierarchical Object-Oriented Design Nethod (HOOD) (ARC), pp. 211–219.
- TRI-Ada-C-1992-CramerD #ada #fault tolerance
- The Use of Ada to Achieve Fault Tolerance in AAS (RSC, JDD), pp. 545–552.
- TRI-Ada-C-1992-GieringB #ada #thread
- Using POSIX Threads to Implement Ada Tasking: Description of Work in Progress (EWG, TPB), pp. 518–529.
- TRI-Ada-T1-1992-FeldmanP #ada #education
- Teaching and Using Ada in CS1/CS2 (MBF, REP), pp. 1–59.
- WSA-1992-GiannottiL #abstract interpretation #specification
- Using Abstract Interpretation for Gate splitting in LOTOS Specifications (FG, DL), pp. 194–204.
- ICSE-1992-HorwitzR #dependence #graph #re-engineering
- The Use of Program Dependence Graphs in Software Engineering (SH, TWR), pp. 392–411.
- SOSP-WIP-1991-HartyC92 #memory management #physics
- Application-Controlled Physical Memory using External Page-Cache Management (KH, DRC), p. 19.
- ASPLOS-1992-HartyC #memory management #physics
- Application-Controlled Physical Memory using External Page-Cache Management (KH, DRC), pp. 187–197.
- ASPLOS-1992-PanSR #branch #correlation #predict
- Improving the Accuracy of Dynamic Branch Prediction Using Branch Correlation (STP, KS, JTR), pp. 76–84.
- CC-1992-Grosch #pattern matching
- Transformation of Attributed Trees Using Pattern Matching (JG), pp. 1–15.
- CC-1992-Samples #compilation #data type #implementation
- Compiler Implementation of ADTs Using Profile Data (ADS), pp. 72–87.
- DAC-1992-BamjiV #design
- Hierarchical Pitchmatching Compaction Using Minimum Design (CB, RV), pp. 311–317.
- DAC-1992-BergamaschiLK #behaviour #optimisation #synthesis
- Control Optimization in High-Level Synthesis Using Behavioral Don’t Cares (RAB, DAL, AK), pp. 657–661.
- DAC-1992-BhattacharyaAA #fault #generative #testing
- Delay Fault Test Generation for Scan/Hold Circuits Using Boolean Expressions (DB, PA, VDA), pp. 159–164.
- DAC-1992-GennartL #simulation #validation
- Validating Discrete Event Simulations Using Event Pattern Mappings (BAG, DCL), pp. 414–419.
- DAC-1992-JuS #incremental #simulation
- Incremental Circuit Simulation Using Waveform Relaxation (YCJ, RAS), pp. 8–11.
- DAC-1992-KimLS #graph #layout #modelling
- A New Hierarchical Layout Compactor Using Simplified Graph Models (WK, JL, HS), pp. 323–326.
- DAC-1992-KrishnamoorthyN
- Data Path Allocation using an Extended Binding Model (GK, JAN), pp. 279–284.
- DAC-1992-LeeR #analysis #evaluation #linear #named
- AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
- DAC-1992-Malik #multi #network #optimisation
- Optimization of Primitive Gate Networks Using Multiple Output Two-Level Minimization (AAM), pp. 449–453.
- DAC-1992-PomeranzC
- State Assignment Using Input/Output Functions (IP, KTC), pp. 573–577.
- DAC-1992-RundensteinerG #functional #optimisation #synthesis
- Functional Synthesis Using Area and Delay Optimization (EAR, DG), pp. 291–296.
- ESOP-1992-Levaire #case study #programming
- Using the Centaur System to for Data-Parallel SIMD Programming: A Case Study (JLL), pp. 341–350.
- CADE-1992-HeskethBS #reasoning #recursion #source code #synthesis
- Using Middle-Out Reasoning to Control the Synthesis of Tail-Recursive Programs (JH, AB, AS), pp. 310–324.
- CADE-1992-Uribe #constraints #set #unification
- Sorted Unification Using Set Constraints (TEU), pp. 163–177.
- CADE-1992-WalshNB #proving #theorem proving
- The Use of Proof Plans to Sum Series (TW, AN, AB), pp. 325–339.
- CAV-1992-HamaguchiHY #branch #design #logic #verification
- Design Verification of a Microprocessor Using Branching Time Regular Temporal Logic (KH, HH, SY), pp. 206–219.
- CAV-1992-McMillan #explosion #problem #verification
- Using Unfoldings to Avoid the State Explosion Problem in the Verification of Asynchronous Circuits (KLM), pp. 164–177.
- CAV-1992-WrightL #algorithm #concurrent #proving #reasoning #theorem proving
- Using a Theorem Prover for Reasoning about Concurrent Algorithms (JvW, TL), pp. 56–68.
- JICSLP-1992-BigotDM #abstract interpretation #analysis #comprehension
- Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
- HT-1991-BassettiPS #effectiveness #hypermedia
- Applications Navigator: Using Hypertext to Support Effective Scientific Information Exchange (OB, DP, MS), pp. 411–416.
- HT-1991-CreechFG #component #hypermedia #reuse
- Using Hypertext in Selecting Reusable Software Components (MLC, DFF, MLG), pp. 25–38.
- HT-1991-NanardN #hypermedia
- Using Structured Types to Incorporate Knowledge in Hypertext (JN, MN), pp. 329–343.
- PODS-1991-SohnG #detection #logic programming #source code #termination
- Termination Detection in Logic Programs using Argument Sizes (KS, AVG), pp. 216–226.
- SIGMOD-1991-AgrawalK #execution #multi #transaction
- Using Multiversion Data for Non-interfering Execution of Write-only Transactions (DA, VK), pp. 98–107.
- VLDB-1991-Elmasri #modelling
- Conecptual Modeling Using and Extended E-R Model (RE), p. 67.
- VLDB-1991-SullivanS #data type #database #fault tolerance
- Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
- ICALP-1991-ChazelleEGGHSS
- Ray Shooting in Polygons Using Geodesic Triangulations (BC, HE, MG, LJG, JH, MS, JS), pp. 661–646.
- ICALP-1991-LagergrenA #congruence #finite
- Finding Minimal Forbidden Minors Using a Finite Congruence (JL, SA), pp. 532–543.
- RTA-1991-DenneheuvelKLS #optimisation #query
- Query Optimization Using Rewrite Rules (SvD, KLK, GRRdL, ES), pp. 252–263.
- VDME-1991-BicarreguiR #reasoning
- Reasoning about VDM Developments using the VDM Support Tool in MURAL (JB, BR), pp. 371–388.
- VDME-1991-Bril #algebra #specification
- A Model-Oriented Method for Algebraic Specification using COLD-1 as Notation (RJB), pp. 106–124.
- VDME-1991-ChalmersDGPZ
- Using RAISE — First Impressions from the LaCoS Applications (DLC, BD, JG, JSP, EZ), pp. 645–657.
- VDME-1991-HoustonK #case study #cics #experience
- CICS Project Report: Experiences and Results from the use of Z in IBM (IH, SK), pp. 588–596.
- VDME-1991-MarshallS #framework #object-oriented
- Using VDM within an Object-Oriented Framework (LSM, LS), pp. 619–628.
- FPCA-1991-Fradet #continuation #detection #thread
- Syntactic Detection of Single-Threading Using Continuations (PF), pp. 241–258.
- CHI-1991-Mackay91a #guidelines #question #video
- Ethical issues in the use of video: is it time to establish guidelines? (WEM), pp. 403–405.
- CHI-1991-ManteiBSBMW #case study #experience
- Experiences in the use of a media space (MMM, RMB, AS, WB, TM, BW), pp. 203–208.
- CHI-1991-MurakamiT #gesture #network #recognition
- Gesture recognition using recurrent neural networks (KM, HT), pp. 237–242.
- CHI-1991-RobertsonMC91a #3d #animation #interactive #visualisation
- Information visualization using 3D interactive animation (GGR, JDM, SKC), pp. 461–462.
- CHI-1991-SiochiH #analysis #case study #evaluation #user interface
- A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
- CHI-1991-Stasko #algorithm #animation
- Using direct manipulation to build algorithm animations by demonstration (JTS), pp. 307–314.
- CHI-1991-TetzlaffS #design #guidelines #interface
- The use of guidelines in interface design (LT, DRS), pp. 329–333.
- CAiSE-1991-HillstonOP #case study
- A Case Study Using the IMSE Experimentation Tool (JH, ALO, RP), pp. 284–306.
- CAiSE-1991-KrogstieMOS #development #information management #process #rule-based
- Information Systems Development Using a Combination of Process and Rule Based Approaches (JK, PM, RO, AHS), pp. 319–335.
- KDD-1991-ChenM #estimation #summary
- Summary Data Estimation Using Decision Trees (MCC, LM), pp. 309–324.
- KDD-1991-Frawley #induction #statistics
- Using Functions to Encode Domain and Contextual Knowledge in Statistical Induction (WJF), pp. 261–276.
- KDD-1991-SmythG #induction
- Rule Induction Using Information Theory (PS, RMG), pp. 159–176.
- KR-1991-RodiP
- A Nonmonotonic Assumption-Based TMS Using Stable Bases (WLR, SGP), pp. 485–495.
- ML-1991-BottaRSS #abduction #learning
- Improving Learning Using Causality and Abduction (MB, SR, LS, SBS), pp. 480–484.
- ML-1991-HummeS
- Using Inverse Resolution to Learn Relations from Experiments (DH, CS), pp. 412–416.
- ML-1991-Jones #refinement
- Knowledge Refinement Using a High Level, Non-Technical Vocabulary (EKJ), pp. 18–22.
- ML-1991-Kwok #adaptation #architecture #learning #query
- Query Learning Using an ANN with Adaptive Architecture (KLK), pp. 260–264.
- ML-1991-ThompsonLI #concept
- Using Background Knowledge in Concept Formation (KT, PL, WI), pp. 554–558.
- SIGIR-1991-CroftTL #information retrieval #query
- The Use of Phrases and Structured Queries in Information Retrieval (WBC, HRT, DDL), pp. 32–45.
- SIGIR-1991-Sutcliffe #distributed #information retrieval
- Distributed Representations in a Text Based Information Retrieval System: A New Way of Using the Vector Space Model (RFES), pp. 123–132.
- SIGIR-1991-WilkinsonH #documentation #network
- Using the Cosine Measure in a Neural Network for Document (RW, PH), pp. 202–210.
- ECOOP-1991-MedeirosP
- Object Integrity Using Rules (CBM, PP), pp. 219–230.
- OOPSLA-1991-HansonHR #case study #database #experience #implementation #object-oriented #persistent #programming language #tool support
- Experiences in DBMS Implementation Using an Object-Oriented Persistent Programming Language and a Database Toolkit (ENH, TMH, MAR), pp. 314–328.
- OOPSLA-1991-Hayes
- Using Key Object Opportunism to Collect Old Objects (BH), pp. 33–46.
- OOPSLA-1991-KonstanR #object-oriented #programming
- Developing a GUIDE Using Object-Oriented Programming (JAK, LAR), pp. 75–88.
- TOOLS-USA-1991-Goldberg #named #object-oriented #question
- Keynote: Can a Manager Be Successful Using Object-Oriented Technology? (AG), p. 5.
- TOOLS-USA-1991-KitchelM
- Using Descriptor Classes in O-O Systems (SWK, NLM), pp. 167–178.
- AdaEurope-1991-BadaroM #ada #named #reuse
- ROSE-Ada: a Method and a Tool to Help Reuse of Ada Codes (NB, TM), pp. 304–325.
- AdaEurope-1991-ChengU #ada #petri net
- Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets (JC, KU), pp. 125–146.
- AdaEurope-1991-CurtisS #ada #modelling
- Modelling the Temporal Summation of Neural Membranes Using the Ada Language (MCC, VJDS), pp. 2–19.
- AdaEurope-1991-DelisT #ada #assessment #design #static analysis
- Design Assessment of Ada Systems Using Static Analysis (AD, WMT), pp. 227–250.
- AdaEurope-1991-ElradW #3d #ada
- The Use of Ada in Reactive Systems: A 3-Dimensional Model (TE, VW), pp. 20–36.
- AdaEurope-1991-GilbertTB #ada #embedded #experience #process #realtime
- Experience Developing two Ada Applications for Embedded Real-Time Systems Using Different Software Processes (BG, MT, GB), pp. 394–403.
- AdaEurope-1991-SouposG #ada #distributed #object-oriented #transaction
- Using Ada to Implement the Transaction Mechanism of a Distributed Object-Oriented DBMS (PS, SG), pp. 252–259.
- LOPSTR-1991-AlexandreBQ #logic programming #on the #source code
- On Using Mode Input-output for Transforming Logic Programs (FA, KB, AQ), pp. 129–146.
- LOPSTR-1991-JiaoG #database #object-oriented #optimisation #prolog #query
- Query Optimization in an Object-Oriented Database using Prolog (ZJ, PMDG), pp. 332–334.
- LOPSTR-1991-SolnonR #design #object-oriented #prolog #prototype
- Using a Prolog Prototype for Designing an Object Oriented Scheme (CS, MR), pp. 300–317.
- PEPM-1991-KhooS #compilation #inheritance #partial evaluation
- Compiling Inheritance using Partial Evaluation (SCK, RSS), pp. 211–222.
- PEPM-1991-McNerney #abstract interpretation #compilation #correctness #verification
- Verifying the Correctness of Compiler Transformations on Basic Blocks using Abstract Interpretation (TSM), pp. 106–115.
- PEPM-1991-RufW
- Using Types to Avoid Redundant Specialization (ER, DW), pp. 321–333.
- PEPM-1991-ShermanSD #equation #optimisation #partial evaluation #source code
- Optimization of Equational Programs Using Partial Evaluation (DS, RS, ID), pp. 72–82.
- PEPM-1991-Sundaresh #incremental #partial evaluation #source code
- Building Incremental Programs using Partial Evaluation (RSS), pp. 83–93.
- PLDI-1991-Wall #behaviour #predict
- Predicting Program Behavior Using Real or Estimated Profiles (DWW), pp. 59–70.
- PLILP-1991-ErtlK #constraints #logic programming #scheduling
- Optimal Instruction Scheduling using Constraint Logic Programming (MAE, AK), pp. 75–86.
- POPL-1991-PinterP #optimisation #parallel
- Program Optimization and Parallelization Using Idioms (SSP, RYP), pp. 79–92.
- Best-of-PLDI-1991-Wall91a #behaviour #predict
- Predicting program behavior using real or estimated profiles (with retrospective) (DWW), pp. 429–441.
- ICSE-1991-GorlickR #analysis
- Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
- ICSE-1991-Hartman #composition #comprehension #source code
- Understanding Natural Programs Using Proper Decomposition (JH), pp. 62–73.
- KBSE-1991-JohnsonH #requirements #reuse
- Sharing and Reuse of Requirements Knowledge (WLJ, DRH), pp. 57–66.
- KBSE-1991-Setliff
- Using Domain Knowledge to Synthesize Routing Software (DES), pp. 77–82.
- DAC-1991-BergamaschiCP #analysis #synthesis
- Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
- DAC-1991-Burch #multi #verification
- Using BDDs to Verify Multipliers (JRB), pp. 408–412.
- DAC-1991-CardenC #algorithm #approximate #multi #performance
- A Global Router Using An Efficient Approximate Multicommodity Multiterminal Flow Algorithm (RCCI, CKC), pp. 316–321.
- DAC-1991-ChakrabortyBBL #testing
- Enhanced Controllability for IDDQ Test Sets Using Partial Scan (TJC, SB, RB, CJL), pp. 278–281.
- DAC-1991-Harrison #layout
- VLSI Layout Compaction Using Radix Priority Search Trees (AJH), pp. 732–735.
- DAC-1991-HolmesSS #algorithm
- New Algorithm for Over-the-Cell Channel Routing Using Vacant Terminals (NDH, NAS, MS), pp. 126–131.
- DAC-1991-PomeranzR #fault #on the
- On Achieving a Complete Fault Coverage for Sequential Machines Using the Transition Fault Model (IP, SMR), pp. 341–346.
- DAC-1991-ShihK #approach #equation #named #performance
- ILLIADS: A New Fast MOS Timing Simulator Using Direct Equation-Solving Approach (YHS, SMK), pp. 20–25.
- DAC-1991-SoeK #logic
- Logic Minimization using Two-column Rectangle Replacement (SS, KK), pp. 470–473.
- DAC-1991-Utesch #adaptation #approach #interactive
- A New Approach to Hierarchical Adaptation Using Sequence-Control Based on Cell Interactions (MCU), pp. 723–726.
- PPoPP-1991-YangC #metalanguage #program transformation
- Parallel-Program Transformation Using A Metalanguage (JAY, YiC), pp. 11–20.
- SOSP-1991-DravesBRD #communication #concurrent #continuation #operating system #thread
- Using Continuations to Implement Thread Management and Communication in Operating Systems (RD, BNB, RFR, RWD), pp. 122–136.
- CAAP-1991-Broek #algebra #category theory #graph grammar
- Algebraic Graph Rewriting Using a Single Pushout (PMvdB), pp. 90–102.
- CCPSD-1991-Cardell-Oliver #higher-order #logic #modelling #protocol #realtime
- Using Higher Order Logic for Modelling Real-Time Protocols (RCO), pp. 259–282.
- CCPSD-1991-CazinCJLM #reuse
- Construction and Reuse of Formal Program Developments (JC, PC, RJ, ML, PM), pp. 120–136.
- STOC-1991-Adleman #integer
- Factoring Numbers Using Singular Integers (LMA), pp. 64–71.
- STOC-1991-BarnesR #algorithm #polynomial #sublinear
- Deterministic Algorithms for Undirected s-t Connectivity Using Polynomial Time and Sublinear Space (GB, WLR), pp. 43–53.
- STOC-1991-KushilevitzM #fourier #learning
- Learning Decision Trees Using the Fourier Sprectrum (EK, YM), pp. 455–464.
- CAV-1991-BarbeauB #approach #fault #petri net #verification
- The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
- CAV-1991-DillHW #simulation
- Checking for Language Inclusion Using Simulation Preorders (DLD, AJH, HWT), pp. 255–265.
- CAV-1991-GodefroidW #concurrent #partial order #performance #safety #verification
- Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties (PG, PW), pp. 332–342.
- CAV-1991-HamaguchiHY #branch #logic #model checking #verification
- Formal Verification of Speed-Dependent Asynchronous Cicuits Using Symbolic Model Checking of branching Time Regular Temporal Logic (KH, HH, SY), pp. 410–420.
- CAV-1991-Mutz #behaviour #correctness #proving #term rewriting
- Using the HOL Prove Assistant for proving the Correctness of term Rewriting Rules reducing Terms of Sequential Behavior (MM), pp. 277–287.
- CAV-1991-SegerJ #verification
- A Two-Level Formal Verification Methodology using HOL and COSMOS (CJHS, JJJ), pp. 299–309.
- ICLP-1991-ColussiM #axiom #correctness #logic programming #proving #semantics #source code
- Proving Correctness of Logic Programs Using Axiomatic Semantics (LC, EM), pp. 629–642.
- ICLP-1991-FujitaH #algorithm #generative #proving #theorem proving
- A Model Generation Theorem Prover in KL1 Using a Ramified -Stack Algorithm (HF, RH), pp. 535–548.
- ICLP-1991-Marre #algebra #automation #logic programming #specification #testing #towards
- Toward Automatic Test Data Set Selection Using Algebraic Specifications and Logic Programming (BM), pp. 202–219.
- ICLP-1991-Monin #compilation #prolog
- Real-size Compiler Writing Using Prolog with Arrows (JFM), pp. 188–201.
- ICLP-1991-SatohI #abduction
- Computing Abduction by Using the TMS (KS, NI), pp. 505–518.
- ICLP-1991-VerschaetseS #logic programming #proving #source code #termination
- Deriving Termination Proofs for Logic Programs, Using Abstract Procedures (KV, DDS), pp. 301–315.
- ISLP-1991-FosterKT #composition #parallel #programming #source code
- Using Compositional Programming to Write Portable, High-Performance Parallel Programs (ITF, CK, ST), pp. 737–738.
- ISLP-1991-Szeredi #prolog
- Using Dynamic Predicates in an Or--Parallel Prolog System (PS), pp. 355–371.
- IWPTS-1991-CavalliK #consistency #generative #graph grammar #protocol #term rewriting #testing
- Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
- TAV-1991-DuesterwaldS #analysis #concurrent #data flow #framework
- Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
- TAV-1991-YehY #algebra #analysis #composition #process #reachability
- Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
- SIGMOD-1990-BernsteinHM #implementation
- Implementing Recoverable Requests Using Queues (PAB, MH, BM), pp. 112–122.
- VLDB-1990-BhargavaB #adaptation
- Adaptable Recovery Using Dynamic Quorum Assignments (BKB, SB), pp. 231–242.
- VLDB-1990-KemperM #data access #query
- Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
- VLDB-1990-PucheralTV #data transformation #in memory #memory management #performance
- Efficient Main Memory Data Management Using the DBGraph Storage Model (PP, JMT, PV), pp. 683–695.
- VDME-1990-Hall #calculus #object-oriented #specification
- Using Z as a Specification Calculus for Object-Oriented Systems (AH), pp. 290–318.
- VDME-1990-Lange #approach #formal method #hypermedia #prototype #specification
- A Formal Approach to Hypertext using Post-Prototype Formal Specification (DBL), pp. 99–121.
- VDME-1990-Weber-Wulff #implementation
- A Buffering System Implementation using VDM (DWW), pp. 135–149.
- LFP-1990-Burn #analysis
- Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
- CHI-1990-BohringerP #algorithm #automation #constraints #graph #layout
- Using constraints to achieve stability in automatic graph layout algorithms (KFB, FNP), pp. 43–51.
- CHI-1990-FischerLMM
- Using critics to empower users (GF, ACL, TWM, AIM), pp. 337–347.
- CHI-1990-GongE #approach #design #documentation #evaluation #usability
- Designing minimal documentation using a GOMS model: a usability evaluation of an engineering approach (RG, JE), pp. 99–107.
- CHI-1990-YoungW #analysis #concept #fault #predict
- Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
- CSCW-1990-YakemovicC #development #information management
- Report on a Development Project Use of an Issue-Based Information System (KCBY, EJC), pp. 105–118.
- CAiSE-1990-WijersD #automation #case study #experience
- Experiences with the Use of CASE-Tools in the Netherlands (GMW, HED), pp. 5–20.
- ML-1990-ArunkumarY #information management #learning #representation
- Knowledge Acquisition from Examples using Maximal Representation Learning (SA, SY), pp. 2–8.
- ML-1990-Kodratoff #abduction #problem #proving
- Using Abductive Recovery of Failed Proofs for Problem Solving by Analogy (YK), pp. 295–303.
- ML-1990-LairdHYT
- Correcting and Extending Domain Knowledge using Outside Guidance (JEL, MH, ESY, CMT), pp. 235–243.
- ML-1990-McCallumS #algorithm #search-based
- Using Genetic Algorithms to Learn Disjunctive Rules from Examples (AM, KAS), pp. 149–152.
- SEKE-1990-RizmanR #agile #data flow #knowledge-based #prototype #specification
- Using Data-flow Description Supported By The Rapid Prototyping Tool For Specifying and Developing of Knowledge-Based System (KR, IR), pp. 58–63.
- SEKE-1990-YangH #modelling
- Modeling Software Objects Using Hypergraph (YY, FH), pp. 39–44.
- SIGIR-1990-CringeanEMW #parallel
- Parallel Text Searching in Serial Files Using a Processor Farm (JKC, RE, GAM, PW), pp. 429–453.
- SIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval
- Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
- ALP-1990-DebartEL #equation #logic programming #multi #order
- Multi-Modal Logic Programming using Equational and Order-Sorted Logic (FD, PE, ML), pp. 55–69.
- PLDI-1990-Wendt #code generation #performance
- Fast Code Generation Using Automatically-Generated Decision Trees (ALW), pp. 9–15.
- PLILP-1990-Ferdinand #functional #model transformation #pattern matching #transformation language
- Pattern Matching in a Functional Transformation Language using Treeparsing (CF), pp. 358–371.
- PLILP-1990-Sahlin #fixpoint #prolog
- Finding the Least Fixed Point Using Wait-Declarations in Prolog (DS), pp. 151–158.
- ICSE-1990-Bush90b #quality
- Improving Software Quality: The Use of Formal Inspections at the JPL (MWB), pp. 196–199.
- ICSE-1990-DeMarcoG #documentation #video
- Use of Video for Program Documentation (TD, CG), pp. 126–128.
- ICSE-1990-Dowson #experience
- Experience Using the Graphite Meta-Tool (MD), pp. 192–195.
- ICSE-1990-LafontaineLS #case study #development #empirical #formal method #proving #theorem proving
- An Experiment in Formal Software Development: Using the B Theorem Prover on a VDM Case Study (CL, YL, PYS), pp. 34–42.
- ICSE-1990-ZucconiMW #development #object-oriented #prototype
- Using Object-Oriented Development for Support Prototyping (LZ, GM, LGW), pp. 129–132.
- WAGA-1990-DelestF #attribute grammar
- Counting Polyominoes Using Attribute Grammars (MPD, JMF), pp. 46–60.
- WAGA-1990-Rosendahl #abstract interpretation #attribute grammar
- Abstract Interpretation Using Attribute Grammar (MR), pp. 143–156.
- WAGA-1990-ShinodaK #algorithm #attribute grammar #distributed #implementation #object-oriented
- Object-Oriented Extension of Attribute Grammars and its Implementation Using Distributed Attribute Evaluation Algorithm (YS, TK), pp. 177–191.
- WAGA-1990-Waite #attribute grammar #compilation
- Use of Attribute Grammars in Compiler Construction (WMW), pp. 255–265.
- CC-1990-DesplandMR #generative #named #term rewriting
- PAGODE: A Back End Generator Using Attribute Abstract Syntaxes and Term Rewritings (AD, MM, RR), pp. 86–105.
- CC-1990-Larcheveque #compilation #incremental #lalr #parsing
- Using an LALR Compiler Compiler to Generate Incremental Parsers (JML), pp. 147–164.
- DAC-1990-BurchCMD #model checking #verification
- Sequential Circuit Verification Using Symbolic Model Checking (JRB, EMC, KLM, DLD), pp. 46–51.
- DAC-1990-ChakradharAB #automation #generative #polynomial #programming #testing
- Automatic Test Generation Using Quadratic 0-1 Programming (STC, VDA, MLB), pp. 654–659.
- DAC-1990-CompasanoB #algorithm #scheduling #synthesis
- Synthesis Using Path-Based scheduling: algorithms and Exercises (RC, RAB), pp. 450–455.
- DAC-1990-DonathNABHKLM
- Timing Driven Placement Using Complete Path Delays (WED, RJN, BKA, SEB, SYH, JMK, PL, RIM), pp. 84–89.
- DAC-1990-HungWGS #parallel #simulation
- Parallel Circuit Simulation Using Hierarchical Relaxation (GGH, YCW, KG, RAS), pp. 394–399.
- DAC-1990-IshiuraDY #diagrams #simulation
- Coded Time-Symbolic Simulation Using Shared Binary Decision Diagram (NI, YD, SY), pp. 130–135.
- DAC-1990-KucukcakarP #trade-off
- Data Path Tradeoffs Using MABAL (KK, ACP), pp. 511–516.
- DAC-1990-KundaARN #generative #testing
- Speed Up of Test Generation Using High-Level Primitives (RPK, JAA, BDR, PN), pp. 594–599.
- DAC-1990-MartelloLC #verification
- Timing Verification Using HDTV (ARM, SPL, DMC), pp. 118–123.
- DAC-1990-SavojB #multi #network
- The Use of Observability and External Don’t Cares for the Simplification of Multi-Level Networks (HS, RKB), pp. 297–301.
- STOC-1990-EvenR #distributed #network
- The Use of a Synchronizer Yields Maximum Computation Rate in Distributed Networks (SE, SR), pp. 95–105.
- CADE-1990-Hagiya #higher-order #programming #proving #unification
- Programming by Example and Proving by Example Using Higher-order Unification (MH), pp. 588–602.
- CAV-1990-BryantS #modelling #verification
- Formal Verification of Digital Circuits Using Symbolic Ternary System Models (REB, CJHS), pp. 33–43.
- CAV-1990-CamuratiGPR #model checking
- The Use of Model Checking in ATPG for Sequential Circuits (PC, MG, PP, MSR), pp. 86–95.
- CAV-1990-Godefroid #automation #partial order #verification
- Using Partial Orders to Improve Automatic Verification Methods (PG), pp. 176–185.
- CAV-1990-JanickiK #graph #reachability #simulation
- Using Optimal Simulations to Reduce Reachability Graphs (RJ, MK), pp. 166–175.
- CAV-1990-LaiPD #on the #protocol #verification
- On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
- CAV-1990-LloretAV #communication #composition #design #petri net #protocol #verification
- Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
- CAV-1990-LoewensteinD #higher-order #logic #multi #protocol #simulation #verification
- Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
- CAV-1990-NakamuraKFT #logic #verification
- A Data Path Verifier for Register Transfer Level Using Temporal Logic Language Tokio (HN, YK, MF, HT), pp. 76–85.
- CAV-1990-ProbstL #explosion #partial order #problem #semantics
- Using Partial-Order Semantics to Avoid the State Explosion Problem in Asynchronous Systems (DKP, HFL), pp. 146–155.
- CLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict
- A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
- LICS-1990-CleavelandS #proving #specification
- When is “Partial” Adequate? A Logic-Based Proof Technique Using Partial Specifications (RC, BS), pp. 440–449.
- LICS-1990-LarsenX #equation
- Equation Solving Using Modal Transition Systems (KGL, LX), pp. 108–117.
- HT-1989-CrouchCA #clustering #hypermedia #information retrieval
- The Use of Cluster Hierarchies in Hypertext Information Retrieval (DBC, CJC, GA), pp. 225–237.
- HT-1989-YoderW #hypermedia
- Using Hypertext in a Law Firm (EAY, TCW), pp. 159–167.
- PODS-1989-FaloutsosM #clustering #fault
- Declustering Using Error Correcting Codes (CF, DNM), pp. 253–258.
- VLDB-1989-Motro #constraints #query #relational
- Using Integrity Constraints to Provide Intensional Answers to Relational Queries (AM), pp. 237–246.
- SEI-1989-Tomayko #education #maintenance #scalability
- Teaching Maintenance Using Large Software Artifacts (JET), pp. 3–15.
- SEI-1989-WerthW #education #object-oriented #programming
- Teaching Object-Oriented Programming Using the Macintosh MPW/MacApp Environment (LHW, JW), pp. 141–155.
- FPCA-1989-Rittri #library
- Using Types as Search Keys in Function Libraries (MR), pp. 174–183.
- CHI-1989-BrownNG #empirical #visual notation
- An experiment into the use of auditory cues to reduce visual workload (MLB, SLN, EPG), pp. 339–346.
- CHI-1989-CohenDMPSGST #natural language
- Synergistic use of direct manipulation and natural language (PRC, MD, DBM, FCNP, JWS, RAGJ, JLS, SWT), pp. 227–233.
- CHI-1989-IwaiDYFT #architecture #automation #documentation #layout
- A document layout system using automatic document architecture extraction (II, MD, KY, MF, YT), pp. 369–374.
- CAiSE-1989-Ihme #design #embedded #knowledge-based #reuse #specification
- A Knowledge-based Support System for the Reuse of Structured Specifications and Designs of Embedded Computer Systems (TI).
- CAiSE-1989-LaenensSSV #case study #design #knowledge base #object-oriented
- A Case Study in Object-Oriented Knowledge-Base Design Using the KIWI System (EL, JS, FS, DV).
- CAiSE-1989-McDaniel #information management
- Using PSL/PSA to Model Information System Planning for The United States Department of the Army Headquarters (PDM).
- KR-1989-RossiM #constraints #linear #network
- Exact Solution in Linear Time of Networks of Constraints Using Perfect Relaxation (FR, UM), pp. 394–399.
- ML-1989-AllenL #concept
- Using Concept Hierarchies to Organize Plan Knowledge (JAA, PL), pp. 229–231.
- ML-1989-Buntine #classification #learning
- Learning Classification Rules Using Bayes (WLB), pp. 94–98.
- ML-1989-CaruanaSE #algorithm #bias #induction #multi #search-based
- Using Multiple Representations to Improve Inductive Bias: Gray and Binary Coding for Genetic Algorithms (RC, JDS, LJE), pp. 375–378.
- ML-1989-FriedrichN #algorithm #induction #learning
- Using Domain Knowledge to Improve Inductive Learning Algorithms for Diagnosis (GF, WN), pp. 75–77.
- ML-1989-Mahadevan #problem
- Using Determinations in EBL: A Solution to the incomplete Theory Problem (SM), pp. 320–325.
- ML-1989-Rose
- Using Domain Knowledge to Aid Scientific Theory Revision (DR), pp. 272–277.
- ML-1989-Seifert #feature model #retrieval
- A Retrieval Model Using Feature Selection (CMS), pp. 52–54.
- ML-1989-SobekL #learning
- Using Learning to Recover Side-Effects of Operators in Robotics (RPS, JPL), pp. 205–208.
- SEKE-1989-Czejdo #database #query #recursion #specification
- Recursive Query Specification Using Nested Databases (BDC), pp. 140–145.
- SIGIR-1989-Belew #adaptation #documentation #information retrieval #representation
- Adaptive Information Retrieval: Using a Connectionist Representation to Retrieve and Learn About Documents (RKB), pp. 11–20.
- SIGIR-1989-CampagnoniE #information retrieval
- Information Retrieval Using a Hypertext-Based Help System (FRC, KE), pp. 212–220.
- SIGIR-1989-KrovetzC #ambiguity #word
- Word Sense Disambiguation Using Machine-Readable Dictionaries (RK, WBC), pp. 127–136.
- SIGIR-1989-RaghavanBJ #evaluation #precise #problem #retrieval
- Retrieval System Evaluation Using Recall and Precision: Problems and Answers (VVR, PB, GSJ), pp. 59–68.
- OOPSLA-1989-HarrisonSS #development #experience #object-oriented #paradigm
- Good News, Bad News: Experience Building a Software Development Environment Using the Object-Oriented Paradigm (WHH, JJS, PFS), pp. 85–94.
- OOPSLA-1989-Jerrell #automation #c++ #difference
- Function Minimization and Automatic Differentiation Using C++ (MEJ), pp. 169–173.
- OOPSLA-1989-MullerRKS #interface #multi
- The Use of Multimethods and Method Combination in a CLOS Based Window System Interface (HM, JRR, JK, TS), pp. 239–253.
- OOPSLA-1989-RussoC #design #memory management #multi #object-oriented #operating system
- Virtual Memory and Backing Storage Management in Multiprocessor Operating Systems Using Object-Oriented Design Techniques (VFR, RHC), pp. 267–278.
- PLDI-1989-ChiD #liveness
- Unified Management of Registers and Cache Using Liveness and Cache Bypass (CHC, HGD), pp. 344–355.
- ESEC-1989-FranceD #analysis #specification
- Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
- ESEC-1989-MorascaP #ada #concurrent #execution #source code #symbolic computation #validation
- Validation of Concurrent ADA Programs using Symbolic Execution (SM, MP), pp. 469–486.
- ESEC-1989-Shutt #development #program analysis #specification #tool support
- A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
- ESEC-1989-WirsingHS #named #reuse #specification
- MENU — An Example for the Systematic Reuse of Specifications (MW, RH, RS), pp. 20–41.
- ICSE-1989-Jameson #design #reuse
- A Model for the Reuse of Software Design Information (KWJ), pp. 205–216.
- ASPLOS-1989-Karger #performance
- Using Registers to Optimize Cross-Domain Call Performance (PAK), pp. 194–204.
- DAC-1989-AudeK #adaptation #design #representation
- Representation and Use of Design Rules within a Technology Adaptable CAD System (JSA, HJK), pp. 478–484.
- DAC-1989-ChengY #difference #fault #memory management #performance #simulation
- Differential Fault Simulation — a Fast Method Using Minimal Memory (WTC, MLY), pp. 424–428.
- DAC-1989-ChungC #parallel #simulation
- Data Parallel Simulation Using Time-Warp on the Connection Machine (MJC, YC), pp. 98–103.
- DAC-1989-DaveP #generative #testing
- A Functional-Level Test Generation Methodology Using Two-level Representations (UJD, JHP), pp. 722–725.
- DAC-1989-GoreR #array #automation #equation #logic #programmable #synthesis
- Automatic Synthesis of Boolean Equations Using Programmable Array Logic (RG, KR), pp. 283–289.
- DAC-1989-HedenstiernaJ #design #layout
- The Use of Inverse Layout Trees for Hierarchical Design Rule Checking (NH, KOJ), pp. 508–512.
- DAC-1989-HwangOI #communication #complexity #logic #multi #synthesis
- Multi-Level Logic Synthesis Using Communication Complexity (TH, RMO, MJI), pp. 215–220.
- DAC-1989-HwangWF #architecture #configuration management #evaluation
- Evaluation of a Reconfigurable Architecture for Digital Beamforming Using the OODRA Workbench (DLH, TLW, WKF), pp. 614–617.
- DAC-1989-LeeHK #fault #generative #testing
- Test Generation of Stuck-open Faults Using Stuck-at Test Sets in CMOS Combinational Circuits (HKL, DSH, KK), pp. 345–350.
- DAC-1989-LisG #modelling #synthesis
- VHDL Synthesis Using Structured Modeling (JL, DG), pp. 606–609.
- DAC-1989-Muller-GlaserB #approach #design #specification
- An Approach to Intelligent Assistance for the Specification of ASIC Design Using Objects and Rules (KDMG, JB), pp. 472–477.
- DAC-1989-RajsumanJM #detection #fault
- CMOS Stuck-open Fault Detection Using Single Test Patterns (RR, APJ, YKM), pp. 714–717.
- DAC-1989-RoyA #approach #novel #verification
- A Novel Approach to Accurate Timing Verification Using RTL Descriptions (KR, JAA), pp. 638–641.
- DAC-1989-SaldanhaWBS #logic #multi
- Multi-level Logic Simplification Using Don’t Cares and Filters (AS, ARW, RKB, ALSV), pp. 277–282.
- DAC-1989-SaucierDP
- State Assignment Using a New Embedding Method Based on an Intersecting Cube Theory (GS, CD, FP), pp. 321–326.
- DAC-1989-WinslettKHW #coordination #design
- Use of Change Coordination in an Information-rich Design Environment (MW, DWK, KH, GW), pp. 252–257.
- AS-1989-VissersSSB #design #distributed #on the
- On the Use of Specifiation Styles in the Design of Distributed Systems (Abstract) (CAV, GS, MvS, EB), p. 60.
- CCIPL-1989-ClementI #behaviour #specification #visual notation
- Specifying the Behavior of Graphical Objects Using Esterel (DC, JI), pp. 111–125.
- STOC-1989-HastadLN #performance
- Fast Computation Using Faulty Hypercubes (JH, FTL, MN), pp. 251–263.
- STOC-1989-RivestS #automaton #finite #sequence
- Inference of Finite Automata Using Homing Sequences (RLR, RES), pp. 411–420.
- CSL-1989-PrieseN #metric #semantics
- Semantic for Abstract Fairness using Metric Spaces (LP, DN), pp. 355–368.
- NACLP-1989-InamuraIRN #evaluation #multi #optimisation
- Optimizing Techniques Using the MRB and Their Evaluation on the Multi-PSI/V2 (YI, NI, KR, KN), pp. 907–921.
- NACLP-1989-SataluriF #logic programming #semantics #source code #specification
- Semantic Specification Using Logic Programs (SRS, ACF), pp. 772–791.
- TAV-1989-KotikM #analysis #automation #program transformation #testing
- Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
- PODS-1988-ParedaensG #algebra
- Possibilities and Limitations of Using Flat Operators in Nested Algebra Expressions (JP, DVG), pp. 29–38.
- SIGMOD-1988-MazumdarSS #proving #security #theorem proving
- Resolving the Tension between Integrity and Security Using a Theorem Prover (SM, DWS, TS), pp. 233–242.
- VLDB-1988-NakayamaK
- Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
- SEI-1988-ChandhokG #ada
- Ada Edu Project: Supporting the Use of Ada in Introductory Computer Science (RC, TAG), pp. 199–207.
- VDME-1988-Boddy
- The Use of VDM within the Alvey Flagship Project (GB), pp. 153–166.
- VDME-1988-ButhB #code generation #correctness #proving #specification #term rewriting
- Correctness Proofs for Meta IV Written Code Generator Specification using Term Rewriting (BB, KHB), pp. 406–433.
- VDME-1988-Scullard #testing
- Test Case Selection using VDM (GTS), pp. 178–186.
- VDME-1988-TeoA #specification
- The Use of VDM in the Specification of Chinese Characters (GST, MMaA), pp. 476–499.
- VDME-1988-WoodcockD #case study #experience
- Using VDM with Rely and Guarantee-Conditions — Experiences from a Real Project (JW, BD), pp. 434–458.
- LFP-1988-Norman #combinator #hardware #performance #reduction
- Faster Combinator Reduction Using stock Hardware (ACN), pp. 235–243.
- CSCW-1988-Bly #collaboration
- A Use of Drawing Surfaces in Different Collaborative Settings (SAB), pp. 250–256.
- CSCW-1988-LelandFK #collaboration #documentation
- Collaborative Document Production Using Quilt (MDPL, RSF, REK), pp. 206–215.
- CSCW-1988-Mackay #communication #email
- More than just a Communication System: Diversity in the Use of Electronic Mail (WEM), pp. 344–353.
- CSCW-1988-SingerBR #collaboration
- Children’s Collaborative Use of a Computer Microworld (JS, SDB, JR), pp. 271–281.
- ML-1988-Gross #concept #incremental #learning #multi
- Incremental Multiple Concept Learning Using Experiments (KPG), pp. 65–72.
- ML-1988-JongS #game studies #learning
- Using Experience-Based Learning in Game Playing (KADJ, ACS), pp. 284–290.
- ML-1988-Kerber
- Using a Generalization Hierarchy to Learn from Examples (RK), pp. 1–7.
- ML-1988-Mel #modelling
- Building and Using Mental Models in a Sensory-Motor Domain (BWM), pp. 207–213.
- ML-1988-TanE #classification #network
- Using Weighted Networks to Represent Classification Knowledge in Noisy Domains (MT, LJE), pp. 121–134.
- SIGIR-1988-BonziL #documentation #information retrieval
- The Use of Anaphoric Resolution for Document Description in Information Retrieval (SB, EDL), pp. 53–66.
- SIGIR-1988-Case #comprehension #how #retrieval #scalability
- How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
- SIGIR-1988-FurnasDDLHSL #composition #information retrieval #semantics
- Information Retrieval using a Singular Value Decomposition Model of Latent Semantic Structure (GWF, SCD, STD, TKL, RAH, LAS, KEL), pp. 465–480.
- SIGIR-1988-HirabayashiMK #documentation #information retrieval
- Information Retrieval using Impression of Documents as a Clue (FH, HM, YK), pp. 233–244.
- SIGIR-1988-SaltonB #automation #information retrieval #on the
- On the Use of Spreading Activation Methods in Automatic Information Retrieval (GS, CB), pp. 147–160.
- ECOOP-1988-DoiKH #concurrent #implementation #kernel #object-oriented #operating system
- An Implementation of an Operating System Kernel Using Concurrent Object-Oriented Language ABCL/c+ (ND, YK, KH), pp. 250–266.
- ECOOP-1988-Pasquier-BoltuckGC #approach #interactive #object-oriented #prototype
- Prototyping an Interactive Electronic Book System Using an Object-Oriented Approach (JPB, EG, GC), pp. 177–190.
- OOPSLA-1988-DuhlD #benchmark #comparison #database #metric #performance #relational
- A Performance Comparison of Object and Relational Databases Using the Sun Benchmark (JD, CD), pp. 153–163.
- OOPSLA-1988-KleynG #comprehension #named #object-oriented
- GraphTrace — Understanding Object-Oriented Systems Using Concurrently Animated Views (MFK, PCG), pp. 191–205.
- OOPSLA-1988-MatsuokaK #communication #distributed #object-oriented #tuple
- Using Tuple Space Communication in Distributed Object-Oriented Languages (SM, SK), pp. 276–284.
- OOPSLA-1988-Rumbaugh
- Controlling Propagation of Operations Using Attributes on Relations (JER), pp. 285–296.
- PLDI-1988-HorwitzRB #dependence #graph #interprocedural #slicing
- Interprocedural Slicing Using Dependence Graphs (SH, TWR, DB), pp. 35–46.
- PLILP-1988-AsirelliI #database #development #logic
- Using Logic Databases in Software Development Environments (PA, PI), pp. 292–299.
- PLILP-1988-Dang #definite clause grammar #interactive #specification
- Formal Specification of Interactive Languages Using Definite Clause Grammars (WD), pp. 283–291.
- PLILP-1988-RiedewaldL #attribute grammar #logic programming
- Using an Attribute Grammar as a Logic Program (GR, UL), pp. 161–179.
- Best-of-PLDI-1988-HorwitzRB88a #dependence #graph #interprocedural #slicing
- Interprocedural slicing using dependence graphs (with retrospective) (SH, TWR, DB), pp. 229–243.
- ICSE-1988-ChaLS #analysis #fault #safety #verification
- Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
- ICSE-1988-EvangelistSFG #design #distributed
- Using Raddle To Design Distributed Systems (ME, VYS, IRF, MG), pp. 102–115.
- ICSE-1988-NakagawaFTS #algebra #specification
- Algebraic Specification of Macintosh’s Quickdraw Using OBJ2 (ATN, KF, ST, TS), pp. 334–343.
- ICSE-1988-Sharp #automation #design #evaluation #named #refinement
- KDA — A Tool for Automatic Design Evaluation and Refinement Using the Blackboard Model of Control (HCS), pp. 407–417.
- ICSE-1988-TarumiAO #object-oriented #programming #reuse
- A Programming Environment Supporting Reuse of Object-Oriented Software (HT, KA, YO), pp. 265–273.
- DAC-1988-AugustinGHLS #design #verification
- Verification of VHDL Designs Using VAL (LMA, BAG, YH, DCL, AGS), pp. 48–53.
- DAC-1988-BeattyB #analysis #incremental #performance
- Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
- DAC-1988-GaedeRMB #automation #concurrent #named #parallel #testing
- CATAPULT: Concurrent Automatic Testing Allowing Parallelization and Using Limited Topology (RKG, DER, MRM, KMB), pp. 597–600.
- DAC-1988-KimTH #automation #hardware
- Automatic Insertion of BIST Hardware Using VHDL (KK, JGT, DSH), pp. 9–15.
- DAC-1988-MadreB #behaviour #comparison #correctness #proving
- Proving Circuit Correctness Using Formal Comparison Between Expected and Extracted Behaviour (JCM, JPB), pp. 205–210.
- DAC-1988-MaoC #algorithm #generative #metric #named #self #testing
- Dytest: A Self-Learning Algorithm Using Dynamic Testability Measures to Accelerate Test Generation (WM, MDC), pp. 591–596.
- DAC-1988-SaitohINKMHHK #logic #simulation
- Logic Simulation System Using Simulation Processor (SP) (MS, KI, AN, MK, JM, HH, FH, NK), pp. 225–230.
- DAC-1988-Sechen #metaprogramming
- Chip-Planning, Placement, and Global Routing of Macro/Custom Cell Integrated Circuits Using Simulated Annealing (CS), pp. 73–80.
- DAC-1988-StarkH #network #power management
- Analyzing CMOS Power Supply Networks Using Ariel (DS, MH), pp. 460–464.
- PPEALS-1988-Katseff #assembly #clustering #parallel
- Using Data Partitioning to Implement a Parallel Assembler (HPK), pp. 66–76.
- STOC-1988-AdlemanK #parallel
- Using Smoothness to Achieve Parallelism (LMA, KK), pp. 528–538.
- STOC-1988-Ben-OrC #algebra #constant
- Computing Algebraic Formulas Using a Constant Number of Registers (MBO, RC), pp. 254–257.
- CADE-1988-Bundy #induction #proving
- The Use of Explicit Plans to Guide Inductive Proofs (AB), pp. 111–120.
- CADE-1988-DonatW #higher-order #learning
- Learning and Applying Generalised Solutions using Higher Order Resolution (MRD, LAW), pp. 41–60.
- CADE-1988-ZhangK #first-order #proving #theorem proving
- First-Order Theorem Proving Using Conditional Rewrite Rules (HZ, DK), pp. 1–20.
- CSL-1988-SaakeL #database #logic #specification
- Using Finite-Linear Temporal Logic for Specifying Database Dynamics (GS, UWL), pp. 288–300.
- JICSCP-1988-McCroskyK88 #array #prolog
- Improving First-Class Array Expressions Using Prolog (CM, AJK), pp. 18–25.
- JICSCP-1988-Port88 #approach
- A Simple Approach to Finding the Cause of Non-Unifiability (GSP), pp. 651–665.
- HT-1987-Marshall #hypermedia #problem #representation
- Exploring Representation Problems Using Hypertext (CCM), pp. 253–268.
- VLDB-1987-SiebesK #axiom #database #design #semantics
- Using Design Axioms and Topology to Model Database Semantics (AS, MLK), pp. 51–59.
- ICALP-1987-LarsenM #bisimulation #protocol #verification
- Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
- VDME-1987-ChedgeyKK #ada #development #object-oriented
- Using VDM in an Object-Oriented Development Method for Ada Software (CC, SK, HJK), pp. 63–76.
- VDME-1987-Crispin #experience
- Experience Using VDM in STC (RJC), pp. 19–32.
- VDME-1987-HaffO
- Use of VDM within CCITT (PH, AO), pp. 324–330.
- VDME-1987-Jones87b #data flow #semantics
- A Formal Semantics for a DataFlow Machine — Using VDM (KDJ), pp. 331–355.
- VDME-1987-MinkowitzH #object-oriented #programming
- A Formal Description of Object-Oriented Programming Using VDM (CM, PBH), pp. 237–259.
- HCI-CE-1987-Moser #comprehension #debugging #design #visual notation
- Understanding Complex Software Systems Using GADD: A Tool for Graphical Animated Design and Debugging (MCM), pp. 449–456.
- HCI-CE-1987-Ruggles #design
- Enhancing a Traditional Typeface Design Environment Through the Use of Contemporary Computing Technology (LR), pp. 481–488.
- HCI-SES-1987-Bradley #industrial
- Changing Roles in an Electronic Industry: Engineers Using CAD System and Secretaries Using work-Processing System (GB), pp. 295–302.
- SIGIR-1987-Borgman #difference #information retrieval
- Individual Differences in the Use of Information Retrieval Systems: Some Issues and Some Data (CLB), pp. 61–71.
- SIGIR-1987-OommenM #automaton #clustering #learning #performance #probability
- Fast Object Partitioning Using Stochastic Learning Automata (BJO, DCYM), pp. 111–122.
- SIGIR-1987-RasmussenW #array #clustering #distributed #documentation
- Non-Hierarchic Document Clustering Using the ICL Distributed Array Processor (EMR, PW), pp. 132–139.
- SIGIR-1987-TongAAC #concept #information retrieval
- Conceptual Information Retrieval Using RUBRIC (RMT, LAA, VNA, JFC), pp. 247–253.
- ECOOP-1987-HalbertO #inheritance #object-oriented
- Using Types and Inheritance in Object-Oriented Languages (DCH, PDO), pp. 20–31.
- OOPSLA-1987-BarryATW #design
- Using Objects To Design and Build Radar ESM Systems (BMB, JRA, DAT, MW), pp. 192–201.
- OOPSLA-1987-KerrP #analysis #object-oriented #programming
- Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
- ESEC-1987-GarzottoGMM #logic programming #on the #realtime #specification
- On the Specification of Real-Time Systems Using Logic Programming (FG, CG, DM, AM), pp. 180–190.
- ESEC-1987-Szwillus #data flow #editing #interactive #operating system #specification #user interface
- Using Data Flow Specifications and Interactive Editing in the Operating System User Interface (GS), pp. 149–157.
- ICSE-1987-Bjorner #development #formal method #on the
- On the Use of Formal Methods in Software Development (DB), pp. 17–29.
- ICSE-1987-LubarsH #design #knowledge-based
- Knowledge-Based Software Design Using Design Schemas (MDL, MTH), pp. 253–262.
- ICSE-1987-MiyazakiM #metric
- Software Metrics Using Deviation Value (YM, NM), pp. 83–95.
- ICSE-1987-Nomura #re-engineering #tool support
- Use of Software Engineering Tools in Japan (TN), pp. 263–269.
- ASPLOS-1987-WallP #experience
- The Mahler Experience: Using and Intermediate Language as the Machine Description (DWW, MLP), pp. 100–104.
- DAC-1987-ChangCH #approach #automation #generative #layout #matrix
- Automated Layout Generation Using Gate Matrix Approach (YCC, SCC, LHH), pp. 552–558.
- DAC-1987-Grover #standard
- Standard Cell Placement Using Simulated Sintering (LKG), pp. 56–59.
- DAC-1987-KlingB #evolution #named #standard
- ESP: A New Standard Cell Placement Package Using Simulated Evolution (RMK, PB), pp. 60–66.
- DAC-1987-YuKL #adaptation #optimisation #testing
- VLSI Circuit Testing Using an Adaptive Optimization Model (PSY, CMK, YHL), pp. 399–406.
- SOSP-1987-Hagmann #commit #file system
- Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
- SOSP-1987-Nichols
- Using Idle Workstations in a Shared Computing Environment (DAN), pp. 5–12.
- STOC-1987-Vazirani #performance
- Efficiency Considerations in Using Semi-random Sources (UVV), pp. 160–168.
- CSL-1987-HeiselRS #logic #verification
- Program Verification Using Dynamic Logic (MH, WR, WS), pp. 102–117.
- LICS-1987-GallierRS #equation #proving #theorem proving
- Theorem Proving Using Rigid E-Unification Equational Matings (JHG, SR, WS), pp. 338–346.
- PODS-1986-Robinson #linear #order #statistics
- Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
- SIGMOD-1986-Faloutsos #multi
- Multiattribute Hashing Using Gray Codes (CF), pp. 227–238.
- SIGMOD-1986-HarandiSC
- Rule Base Management Using Meta Knowledge (MTH, TS, SC), pp. 261–267.
- VLDB-1986-ChakravarthyM #database #deduction #graph #multi #query
- Multiple Query Processing in Deductive Databases using Query Graphs (USC, JM), pp. 384–391.
- VLDB-1986-CheineyFMT #clustering #multi #reliability
- A Reliable Backend Using Multiattribute Clustering and Select-Join Operator (JPC, PF, RM, JMT), pp. 220–227.
- VLDB-1986-SarinKS #database #process
- Using History Information to Process Delayed Database Updates (SKS, CWK, JES), pp. 71–78.
- LFP-1986-LeeP #implementation #lisp #on the #semantics
- On the Use of LISP in Implementing Denotational Semantics (PL, UFP), pp. 233–248.
- GG-1986-MoldovanP #analysis #graph grammar #parallel #rule-based
- Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
- CSCW-1986-JohnsonWODM #collaboration #empirical
- Using a computer-based tool to support collaboration: a field experiment (BJ, GW, MHO, RD, GM), pp. 343–352.
- SIGIR-1986-BelkinK #documentation #retrieval
- Using Structural Representations of Anomalous States of Knowledge for Choosing Document Retrieval Strategies (NJB, BHK), pp. 11–22.
- SIGIR-1986-El-HamdouchiW #clustering #documentation
- Hierarchic Document Clustering Using Ward’s Method (AEH, PW), pp. 149–156.
- SIGIR-1986-TeuholaR #predict
- Text Compression Using Prediction (JT, TR), pp. 97–102.
- SIGIR-1986-Zarri #database #relational #retrieval #scalability
- The Use of Inference Mechanisms to Improve the Retrieval Facilities from Large Relational Databases (GPZ), pp. 221–227.
- OOPSLA-1986-Lieberman #behaviour #object-oriented #prototype
- Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems (HL), pp. 214–223.
- POPL-1986-JonesM #analysis #data flow #graph #source code
- Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
- POPL-1986-MacQueen #composition #dependent type
- Using Dependent Types to Express Modular Structure (DBM), pp. 277–286.
- DAC-1986-BapatV #logic #reasoning
- Reasoning about digital systems using temporal logic (SB, GV), pp. 215–219.
- DAC-1986-BushnellD #integration #tool support
- VLSI CAD tool integration using the Ulysses environment (MLB, SWD), pp. 55–61.
- DAC-1986-Gonzalez-SustaetaB #automation #concept #database #design
- An automated database design tool using the ELKA conceptual model (JGS, APB), pp. 752–759.
- DAC-1986-LadjadjMHM #array #testing
- Use of the subscripted DALG in submodule testing with applications in cellular arrays (ML, JFM, DHH, WM), pp. 346–353.
- DAC-1986-LigthartAB #statistics
- Design-for-testability of PLA’s using statistical cooling (MML, EHLA, FPMB), pp. 339–345.
- DAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis
- Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
- DAC-1986-PincusD #reduction
- Delay reduction using simulated annealing (JDP, AMD), pp. 690–695.
- DAC-1986-Sasao #generative #multi #named #synthesis
- MACDAS: multi-level AND-OR circuit synthesis using two-variable function generators (TS), pp. 86–93.
- CADE-1986-DickC #automation #empirical #equation #reasoning
- Using Narrowing to do Isolation in Symbolic Equation Solving — An Experiment in Automated Reasoning (AJJD, JC), pp. 272–280.
- CADE-1986-Hussmann #algebra #prototype #specification
- The Passau RAP System: Prototyping Algebraic Specifications Using Conditional Narrowing (HH), pp. 689–690.
- CADE-1986-KapurNZ #induction #proving #testing
- Proof by Induction Using Test Sets (DK, PN, HZ), pp. 99–117.
- CADE-1986-Plaisted86a #abstraction
- Abstraction Using Generalization Functions (DAP), pp. 365–376.
- ICLP-1986-GoebelFP86 #approach #constraints #reasoning
- Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning (RG, KF, DP), pp. 211–222.
- ICLP-1986-KanamoriS86 #execution #prolog #source code #verification
- Verification of Prolog Programs Using an Extension of Execution (TK, HS), pp. 475–489.
- ICLP-1986-RawlingsTNFS86 #prolog
- Using Prolog to Represent and Reason about Protein Structure (CJR, WRT, JN, JF, MJES), pp. 536–543.
- LICS-1986-Browne #algorithm #automation #finite #logic #verification
- An Improved Algorithm for the Automatic Verification of Finite State Systems Using Temporal Logic (MCB), pp. 260–266.
- LICS-1986-Plaisted #nondeterminism #recursion #semantics #source code
- The Denotional Semantics of Nondeterministic Recursive Programs using Coherent Relations (DAP), pp. 163–174.
- SLP-1986-Gelder86 #logic programming #source code
- Negation as Failure Using Tight Derivations for General Logic Programs (AVG), pp. 127–138.
- SIGMOD-1985-Christodoulakis #architecture #documentation
- Issues in the Architecture of a Document Archiver using Optical Disk Technology (SC), pp. 34–50.
- SIGMOD-1985-EickL #database #design
- Acquisition of Terminological Knowledge Using Database Design Techniques (CFE, PCL), pp. 84–94.
- SIGMOD-1985-RoussopoulosL #database
- Direct Spatial Search on Pictorial Databases Using Packed R-Trees (NR, DL), pp. 17–31.
- SIGMOD-1985-ShinI #approach #clustering #database #knowledge-based #relational
- Partitioning a Relational Database Horizontally Using a Knowledge-Based Approach (DGS, KBI), pp. 95–105.
- VLDB-1985-MondR #concurrent #database
- Concurrency Control in B+-Trees Databases Using Preparatory Operations (YM, YR), pp. 331–334.
- ICALP-1985-SippuS #algorithm #design #on the #performance #relational
- On the Use of Relational Expressions in the Design of Efficient Algorithms (SS, ESS), pp. 456–464.
- ICALP-1985-VarmanR #array #matrix #multi #on the
- On Matrix Multiplication Using Array Processors (PJV, IVR), pp. 487–496.
- FPCA-1985-Sheeran85 #architecture #array #design #higher-order
- Designing Regular Array Architectures using Higher Order Functions (MS), pp. 220–237.
- ICSE-1985-BasiliS #metric #set
- Calculation and Use of an Environment’s Characteristic Software Metric Set (VRB, RWS), pp. 386–393.
- ICSE-1985-BrunoM #agile #petri net #prototype
- Rapid Prototyping of Control Systems Using High Level Petri Nets (GB, GM), pp. 230–237.
- ICSE-1985-GirgisW #analysis #data flow #testing
- An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
- ICSE-1985-KafuraC #metric #validation
- A Validation of Software Metrics Using Many Metrics and Two Resources (DGK, JC), pp. 378–385.
- ICSE-1985-PeschSSS #generative #prolog #testing
- Test Case Generation Using Prolog (HP, PS, HS, APS), pp. 252–258.
- ICSE-1985-RamseyB #process #testing
- Analyzing the Test Process Using Structural Coverage (JR, VRB), pp. 306–312.
- ICSE-1985-Schaul #design #education #overview #re-engineering
- Design Using Software Engineering Principles: Overview of an Educational Program (MS), pp. 201–209.
- DAC-1985-AshokCS #data flow #modelling #simulation
- Modeling switch-level simulation using data flow (VA, RLC, PS), pp. 637–644.
- DAC-1985-Blanks #polynomial
- Near-optimal placement using a quadratic objective function (JPB), pp. 609–615.
- DAC-1985-Bryant #representation #visual notation
- Symbolic manipulation of Boolean functions using a graphical representation (REB), pp. 688–694.
- DAC-1985-Frank #data-driven #simulation
- Switch-level simulation of VLSI using a special-purpose data-driven computer (EHF), pp. 735–738.
- DAC-1985-HillFL #effectiveness #generative #grid
- Effective use of virtual grid compaction in macro-module generators (DDH, JPF, MDPL), pp. 777–780.
- DAC-1985-TygarE #comparison #performance
- Efficient netlist comparison using hierarchy and randomization (JDT, RE), pp. 702–708.
- SOSP-1985-Clark
- The Structuring of Systems Using Upcalls (DDC), pp. 171–180.
- CSE-1985-LevesonS #fault tolerance #petri net #safety
- Analyzing Safety and Fault Tolerance Using Time Petri Nets (NGL, JLS), pp. 339–355.
- CSE-1985-MadhavjiLV
- Software Construction Using Typed Fragments (NHM, NL, DV), pp. 163–178.
- PODS-1984-BuckleyS #concurrent #graph #protocol
- Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
- PODS-1984-HwangDG #multi #process #query
- Using Semiouterjoins to Process Queries in Multidatabase Systems (HYH, UD, MGG), pp. 153–162.
- SIGMOD-1984-Chang #database #design #distributed #network
- Simplifying Distributed Database Systems Design by Using a Broadcast Network (JMC), pp. 223–233.
- SIGMOD-1984-Fedorowicz #database #evaluation #multi
- Database Evaluation Using Multiple Regression Techniques (JF), pp. 70–76.
- SIGMOD-1984-Salton #information retrieval #logic
- The Use of Extended Boolean Logic in Information Retrieval (GS), pp. 277–285.
- SIGMOD-1984-ValduriezV #multi
- A Multikey Hashing Scheme Using Predicate Trees (PV, YV), pp. 107–114.
- SIGMOD-1984-Willard #calculus #performance #query #relational
- Efficient Processing of Relational Calculus Expressions Using Range Query Theory (DEW), pp. 164–175.
- VLDB-1984-Ward
- Name-Tracing Using the ICL Content Addressable Filestore (AGW), pp. 523–528.
- SIGIR-1984-CroftT #adaptation #documentation #retrieval
- The Use of Adaptive Mechanisms for Selection of Search Strategies in Document Retrieval Systems (WBC, RT), pp. 95–110.
- SCC-1984-ChristopherHK #code generation #programming
- Using dynamic programming to generate optimized code in a Graham-Glanville style code generator (TWC, PJH, RCK), pp. 25–36.
- SCC-1984-Pleban #compilation #prototype #semantics
- Compiler prototyping using formal semantics (UFP), pp. 94–105.
- ICSE-1984-AzemaJSM #distributed #petri net #prolog #specification #verification
- Specification and Verification of Distributed Systems Using PROLOG Interpreded Petri Nets (PA, GJ, ES, MM), pp. 510–519.
- ICSE-1984-DuncanHBCFKMMS #ada #communication #design
- Communication System Design Using Ada (AGD, JSH, JWB, TMC, AF, EK, TM, DM, SBS), pp. 398–407.
- ICSE-1984-RomanD #distributed #multi #process #specification
- Multifaceted Distributed Systems Specification Using Processes and Event Synchronization (GCR, MSD), pp. 44–55.
- DAC-1984-Blanks #array
- Initial placement of gate arrays using least-squares methods (JPB), pp. 670–671.
- DAC-1984-DunlopADJKW #layout #optimisation
- Chip layout optimization using critical path weighting (AED, VDA, DND, MFJ, PK, MW), pp. 133–136.
- DAC-1984-HorstmannS #design #logic programming
- Computer aided design (CAD) using logic programming (PWH, EPS), pp. 144–151.
- DAC-1984-SaucierB #control flow
- VLSI test expertise system using a control flow model (GS, CB), pp. 497–503.
- CADE-1984-PelinG #algebra #complexity #problem #word
- Solving Word Problems in Free Algebras Using Complexity Functions (AP, JHG), pp. 476–495.
- CADE-1984-Plaisted #analysis #dependence #graph #proving #theorem proving
- Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
- ILPC-1984-Johansson84 #logic programming #source code #symmetry
- Using Symmetry for the Derivation of Logic Programs (ALJ), pp. 243–251.
- SLP-1984-Borgwardt84 #parallel #prolog #stack
- Parallel Prolog Using Stack Segements on Shared-Memory Multiprocessors (PB), pp. 2–11.
- SLP-1984-TaylorLMS84 #logic programming #parallel
- Logic Programming Using Parallel Associative Operations (ST, AL, GQMJ, SJS), pp. 58–68.
- ICALP-1983-AptD #axiom #logic
- An Axiomatization of the Intermittent Assertion Method Using Temporal Logic (KRA, CD), pp. 15–27.
- ICALP-1983-MycroftN #abstract interpretation
- Strong Abstract Interpretation Using Power Domains (AM, FN), pp. 536–547.
- SIGIR-1983-BatesB #information retrieval #interface #natural language
- Information Retrieval Using a Transportable Natural Language Interface (MB, RJB), pp. 81–86.
- SIGIR-1983-BrooksB #analysis #design #information retrieval #interactive
- Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
- SIGIR-1983-RaghavanSY #evaluation
- Evaluation of The 2-Poisson Model as a Basis for Using Term Frequency Data in Searching (VVR, HPS, CTY), pp. 88–100.
- SIGIR-1983-Zarri #information management #information retrieval #representation
- Reseda, An Information Retrieval System Using Artificial Intelligence and Knowledge Representation Techniques (GPZ), pp. 189–195.
- Ada-1983-Persch #compilation
- The Use of Diana in Compilers, Language Transformers, Formatters and Debuggers (GP), pp. 76–87.
- POPL-1983-ClarkeES #approach #automation #concurrent #finite #logic #specification #verification
- Automatic Verification of Finite State Concurrent Systems Using Temporal Logic Specifications: A Practical Approach (EMC, EAE, APS), pp. 117–126.
- POPL-1983-LampsonS #polymorphism
- Practical Use of a Polymorphic Applicative Language (BWL, EES), pp. 237–255.
- RE-1983-Partsch #algebra #on the #requirements
- On the Use of Algebraic Methods for Formal Requirements Definitions (HP), pp. 138–158.
- RE-1983-Reisig #design #petri net
- System Design Using Petri Nets (WR), pp. 29–41.
- DAC-1983-BarzilaiHSTW #logic #simulation
- Simulating pass transistor circuits using logic simulation machines (ZB, LMH, GMS, DTT, LSW), pp. 157–163.
- DAC-1983-FukunagaYSK #approach #graph
- Placement of circuit modules using a graph space approach (KF, SY, HSS, TK), pp. 465–471.
- DAC-1983-JainA #generative #testing
- Test generation for MOS circuits using D-algorithm (SKJ, VDA), pp. 64–70.
- DAC-1983-PrazicB #array #automation
- Automatic routing of double layer gate arrays using a moving cursor (BDP, MAB), pp. 644–650.
- DAC-1983-RothermelM #design
- Routing method for VLSI design using irregular cells (HJR, DAM), pp. 257–262.
- PODS-1982-Maier #database #memory management
- Using Write-once Memory for Database Storage (DM), pp. 239–246.
- SIGMOD-1982-KambayashiYY #database #distributed #query
- Query Processing for Distributed Databases Using Generalized Semi-Joins (YK, MY, SY), pp. 151–160.
- VLDB-1982-SaccoS #database #relational #set
- A Mechanism for Managing the Buffer Pool in a Relational Database System Using the Hot Set Model (GMS, MS), pp. 257–262.
- VLDB-1982-WhangWS #database #design #network #physics
- Physical Design of Network Model Databases Using the Property of Separability (KYW, GW, DS), pp. 98–107.
- LFP-1982-Moss #how #prolog
- How to Define a Language Using PROLOG (CDSM), pp. 67–73.
- GG-1982-Pratt #semantics #specification
- Formal specification of software using H-graph semantics (TWP), pp. 314–332.
- SIGIR-1982-TagueN #database #retrieval #simulation
- Simulation of Bibliographic Retrieval Databases Using Hyperterms (JT, MJN), pp. 194–208.
- POPL-1982-GanapathiF #attribute grammar #code generation
- Description-Driven Code Generation using Attribute Grammars (MG, CNF), pp. 108–119.
- POPL-1982-Wolper #communication #logic #process #specification #synthesis
- Specification and Synthesis of Communicating Processes using an Extended Temporal Logic (PW), pp. 20–33.
- SCC-1982-KoskimiesRS #attribute grammar #compilation
- Compiler Construction Using Attribute Grammars (KK, KJR, MS), pp. 153–159.
- ICSE-1982-Ling #design #diagrams #source code
- Designing Data Entry Programs Using State Diagram as a Common Model (MML), pp. 296–308.
- ASPLOS-1982-McDaniel #analysis #set
- An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
- DAC-1982-GrayBR #array #compilation #design
- Designing gate arrays using a silicon compiler (JPG, IB, PSR), pp. 377–383.
- DAC-1982-ShivaC #composition #simulation #synthesis
- Modular description/simulation/synthesis using DDL (SGS, JAC), pp. 321–329.
- DAC-1982-Shliferstein #interactive
- Experiments using interactive color raster graphics for CAD (ARS), pp. 445–452.
- CADE-1982-Weyhrauch
- An Example of FOL Using Metatheory (RWW), pp. 151–158.
- SIGMOD-1981-KedemS #concurrent #database
- Deadlock Removal Using Partial Rollback in Database Systems (DSF, ZMK, AS), pp. 65–73.
- SIGMOD-1981-Sagiv #question
- Can We Use the Universal Instance Assumption Without Using Nulls? (YS), pp. 108–120.
- SIGMOD-1981-StearnsR #concurrent #database #distributed
- Distributed Database Concurrency Controls Using Before-Values (RES, DJR), pp. 74–83.
- VLDB-1981-Sevcik #database #performance #predict
- Data Base System Performance Prediction Using an Analytical Model (KCS), pp. 182–198.
- SIGIR-1981-SmeatonR #algorithm #bound #information retrieval #nearest neighbour #problem
- The Nearest Neighbour Problem in Information Retrieval: An Algorithm Using Upperbounds (AFS, CJvR), pp. 83–87.
- ICSE-1981-ChenZ #analysis #clustering #re-engineering
- Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
- ICSE-1981-DuncanH #attribute grammar #design #implementation
- Using Attributed Grammars to Test Designs and Implementations (AGD, JSH), pp. 170–178.
- ICSE-1981-KomodaHKS #analysis #approach #modelling #requirements
- An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
- DAC-1981-Akers #algorithm #linear #on the
- On the use of the linear assignment algorithm in module placement (SBA), pp. 137–144.
- DAC-1981-AlmyR #fault
- Using error latch trace to obtain diagnostic information (PMA, JLR), pp. 355–359.
- DAC-1981-Scoble #interactive
- Creating and updating space occupancy and building plans using interactive graphics (RAS), pp. 66–73.
- SIGMOD-1980-LuskOP #database #design #implementation
- A Practical Design Methodology for the Implementation of IMS Databases, Using the Entity-Relationship Model (ELL, RAO, BDP), pp. 9–21.
- VLDB-1980-BernsteinBC #maintenance #performance #semantics
- Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data (PAB, BTB, EMC), pp. 126–136.
- ICALP-1980-EmersonC #correctness #fixpoint #parallel #source code
- Characterizing Correctness Properties of Parallel Programs Using Fixpoints (EAE, EMC), pp. 169–181.
- ICALP-1980-Turchin #optimisation #proving #theorem proving
- The Use of Metasystem Transition in Theorem Proving and Program Optimization (VFT), pp. 645–657.
- SIGIR-1980-LeaS #runtime
- An Associative File Store Using Fragments for Run-Time Indexing and Compression (RML, EJS), pp. 280–295.
- POPL-1980-BuddDLS #correctness #functional #source code
- Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs (TAB, RAD, RJL, FGS), pp. 220–233.
- DAC-1980-DyerLMS #design #simulation
- The use of graphics processors for circuit design simulation at GTE AE Labs (JD, AL, EJM, WDS), pp. 446–450.
- DAC-1980-Mallmann
- The management of engineering changes using the PRIMUS system (FPM), pp. 348–361.
- DAC-1980-TadaYKS #performance #strict
- A fast maze router with iterative use of variable search space restriction (FT, KY, TK, TS), pp. 250–254.
- SDCG-1980-Reynolds #category theory #design
- Using category theory to design implicit conversions and generic operators (JCR), pp. 211–258.
- STOC-1980-Yao #performance #programming
- Efficient Dynamic Programming Using Quadrangle Inequalities (FFY), pp. 429–435.
- CADE-1980-AielloW #algebra #reasoning
- Using Meta-Theoretic Reasoning to do Algebra (LCA, RWW), pp. 1–13.
- CADE-1980-BundyW #algebra #multi
- Using Meta-Level Inference for Selective Application of Multiple Rewrite Rules in Algebraic Manipulation (AB, BW), pp. 24–38.
- CADE-1980-Furtek #constraints #distributed #formal method #realtime #specification #verification
- Specification and Verification of Real-Time, Distributed Systems Using the Theory of Constraints (FCF), pp. 110–125.
- SIGMOD-1979-El-MasriW #integration
- Data Model Integration Using the Structural Model (RE, GW), pp. 191–202.
- SIGIR-1979-Dattola #documentation #retrieval
- Use of Dynamic Discrimination Values in a Document Retrieval System (RTD), pp. 23–32.
- SIGIR-1979-Jamieson #implementation #retrieval #scalability
- The Economic Implementation of Experimental Retrieval Techniques on a Very Large Scale Using an Intelligent Terminal (SHJ), pp. 45–51.
- POPL-1979-HoffmanO #generative #interpreter #pattern matching
- Interpreter Generation Using Tree Pattern Matching (CMH, MJO), pp. 169–179.
- SCC-1979-Feldman #compilation #fortran #implementation #tool support
- Implementation of a portable Fortran 77 compiler using modern tools (SIF), pp. 98–106.
- SCC-1979-Pleban #compilation #matrix #recursion
- The use of transition matrices in a recursive-descent compiler (UFP), pp. 144–151.
- ICSE-1979-AnconaDD #development
- Cross Software Development for Microprocessors Using a Translator Writing System (MA, GD, ELD), pp. 399–402.
- ICSE-1979-BauerF #generative #testing
- Test Plan Generation Using Formal Grammars (JAB, ABF), pp. 425–432.
- ICSE-1979-BerryP #design #specification
- The Use of a Module Interconnection Specification Capability in the SARA System Design Methodology (DMB, MH(P), pp. 294–307.
- DAC-1979-Ayres79a
- Silicon compilation-a hierarchical use of PLAs (RA), pp. 314–326.
- DAC-1979-CarlsonPC #3d #data transformation #design
- The use of color and 3-D temporal and spatial data management techniques in computer-aided design (WEC, REP, CC), pp. 32–38.
- DAC-1979-Chang #layout #recognition
- LSI layout checking using bipolar device recognition technique (CSC), pp. 95–101.
- DAC-1979-KawatoSMU #design #scalability #verification
- Design and verification of large-scale computers by using DDL (NK, TS, FM, TU), pp. 360–366.
- DAC-1979-KjelkerudT #deduction #fault #generative #logic #simulation #testing
- Generation of hazard free tests using the D-algorithm in a timing accurate system for logic and deductive fault simulation (EK, OT), pp. 180–184.
- DAC-1979-OhnoMS #logic #scalability #verification
- Logic verification system for very large computers using LSI’s (YO, MM, KS), pp. 367–374.
- DAC-1979-WeingartenKC #3d #interactive #named
- DRAW3D: Time sharing graphic interaction using a device-space buffer (NHW, WK, MC), pp. 135–141.
- VLDB-1978-AdibaCE #database #distributed #logic #relational
- A Distributed Data Base System Using Logical Relational Machines (MEA, JYC, CE), pp. 450–461.
- ICALP-1978-CremersH
- Mutual Exclusion of N Processors Using an O(N)-Valued Message Variable (ABC, TNH), pp. 165–176.
- GG-1978-Pratt #graph #programming language #semantics
- Definition of Programming Language Semantics Using Grammars for Hierarchical Graphs (TWP), pp. 389–400.
- ICSE-1978-Brooks #behaviour #comprehension #re-engineering
- Using a Behavioral Theory of Program Comprehension in Software Engineering (REB), pp. 196–201.
- ICSE-1978-ChungG #diagrams
- Use of State Diagrams to Engineer Communications Software (PC, BG), pp. 215–221.
- ICSE-1978-Lindstrom #parsing #top-down
- Control Structure Aptness: A Cast Study Using Top-Down Parsing (GL), pp. 5–12.
- DAC-1978-Fortin #approximate #diagrams #named
- BUBBLE: Relationship diagrams using iterative vector approximation (GF), pp. 145–151.
- DAC-1978-Huey #graph #problem #reduction
- Guiding sensitization searches using problem reduction graphs (BH), pp. 312–320.
- DAC-1978-LekkosP #how #logic #pseudo #refinement
- How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
- DAC-1978-Raeger #design #interactive
- The design of a dense PCB using an interactive DA system (DR), p. 454.
- STOC-1978-Tompa #trade-off
- Time-Space Tradeoffs for Computing Functions, Using Connectivity Properties of their Circuits (MT), pp. 196–204.
- VLDB-1977-FieldsN
- Using New Clues to Find Data (CF, NN), pp. 156–158.
- POPL-1977-Soisalon-Soininen #lr #parsing #reduction
- Elimination of Single Productions from LR Parsers in Conjunction with the Use of Default Reductions (ESS), pp. 183–193.
- DAC-1977-Brown #component #design
- Using a computer aided graphics system to help design and draft automotive components (NLB), pp. 112–117.
- DAC-1977-JaffeY #automation #diagrams
- Automating analog circuit diagrams using a list processing language (RCJ, JPY), pp. 391–395.
- DAC-1977-MorrisMG #network #scalability #simulation
- Simulation of large communications networks using SPIN (ILM, JM, RG), pp. 194–204.
- DAC-1977-Waldvogel #hybrid #multi
- Computer designed multilayer hybrid substrate using thick film technology (CWW), pp. 351–353.
- SIGMOD-1976-WelchG #multi #order #retrieval
- Retrieval Using Ordered Lists in Inverted and Multilist Files (JWW, JWG), pp. 21–29.
- ICSE-1976-Mashey #programming language
- Using a Command Language as a High-Level Programming Language (JRM), pp. 169–176.
- ICSE-1976-Stonebraker #comparison #database #relational
- A Comparison of the Use of Links and Secondary Indices in a Relational Data Base System (MS), pp. 527–531.
- DAC-1976-Lerman #design
- Computer aided design of printed circuit boards using remote graphics and TSO (HNL), pp. 104–108.
- DAC-1976-Marks #design #documentation #online
- Use of an on-line, time-shared graphics system to design and document printed circuit boards (LM), pp. 91–103.
- DAC-1976-Zobniw #multi #realtime
- Multi-defect real time diagnosis using a single pin probe (LMZ), pp. 179–185.
- SIGMOD-1975-WelchG #information retrieval #set
- Information Retrieval in Files Described Using Sets (JWW, JWG), pp. 92–98.
- VLDB-1975-Carlson #database #interactive #problem #scalability
- Using Large Data Bases for Interactive Problem Solving (EDC), pp. 499–501.
- VLDB-1975-HofferS #analysis #clustering #database #design #physics
- The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
- VLDB-1975-RoussopoulosM #database #network #semantics
- Using Semantic Networks for Database Management (NR, JM), pp. 144–172.
- VLDB-1975-YaoM
- Selection of File Organization Using an Analytic Model (SBY, AGM), pp. 255–267.
- DAC-1975-BlainLR #industrial
- The system bal: a technique for spreading the use of CAD techniques within an industrial environment (GB, AL, JCR), pp. 77–84.
- DAC-1975-SchulerUBB #concurrent #generative #logic #random testing #simulation #testing
- Random test generation using concurrent logic simulation (DMS, EGU, TEB, SPB), pp. 261–267.
- DAC-1975-Sherman #testing
- Program function test definition using a three-value simulator (WJS), pp. 189–194.
- DAC-1975-Zobniw #realtime
- Real time diagnosis using single pin probe (LMZ), pp. 268–285.
- SIGFIDET-1974-RamirezRP #automation #generative #source code
- Automatic Generation of Data Conversion Programs Using A Data Description Language (JAR, NAR, NSP), pp. 207–225.
- ICALP-1974-EhrenfeuchtR #morphism #term rewriting #trade-off
- Trade-off between the Use of Nonterminals, Codings and Homomorphisms in Defining Languages for Some Classes of Rewriting Systems (AE, GR), pp. 473–480.
- ICALP-1974-FischerP #algorithm #matrix #performance
- Efficient Procedures for Using Matrix Algorithms (PCF, RLP), pp. 413–427.
- DAC-1974-Sr #performance #simulation
- Using simulation to evaluate system performance (EKBS), pp. 359–365.
- DAC-1974-ThompsonSBP #analysis #fault #simulation
- Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
- SIGFIDET-1972-Smith
- A Method for Data Translation Using the Stored Data Definition and Translation Task Group Languages (DCPS), pp. 107–124.
- SIGFIDET-1972-Stonebraker #performance #retrieval
- Retrieval Efficiency Using Combined Indexes (MS), pp. 243–256.
- DAC-1972-Grant #architecture #design #problem #proximity
- Combining proximity criteria with nature-of-the-spot criteria in architectural and urban design space planning problems using a computer-aided space allocation technique: A proposed technique and an example of its application (DPG), pp. 197–202.
- SOSP-J-1973-CoffmanR72 #case study #clustering #locality
- A Study of Storage Partitioning Using a Mathematical Model of Locality (EGCJ, TAR), pp. 185–190.
- DAC-1971-Grason #approach #graph
- An approach to computerized space planning using graph theory (JG), pp. 170–178.
- SOSP-1971-CoffmanR #case study #clustering
- A Study of Storage Partitioning Using a Mathematical Model (EGCJ, TAR), pp. 122–129.
- SIGFIDET-1970-Beitz
- The Interpretation of Structured Stored Data Using Delimiters (EHB), pp. 188–200.
- DAC-1970-Urban #design #effectiveness
- Effective use of a computer aided design system (SJU), pp. 243–249.
- STOC-1970-Chang #2d #analysis
- The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
- DAC-1968-CorreiaD #documentation #logic
- The use of engineering documentation in support of a high density logic test system (MC, RLD).
- DAC-1968-Marin #algorithm #logic #on the #strict #synthesis
- On a general synthesis algorithm of logical circuits using a restricted inventory of integrated circuits (MAM).
- SHARE-1966-Feigin #design #optimisation
- Use of design optimization techniques at Norden (LF).
- SHARE-1964-Branin #analysis #network
- D-C and transient analysis of networks using a digital computer (FHBJ).
- LISP-1963-McIntosh #lisp
- The use of operator predicates in LISP (HVM), p. 9.
- LISP-1963-Thomas #array #lisp #source code
- Use of arrays in LISP. Group theory programs (BST), p. 11.