BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (885)
use (832)
system (793)
program (709)
model (703)

Stem analysi$ (all stems)

7059 papers:

CBSECBSE-2015-KimBNMLSLP #analysis #probability #scheduling
Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
ECSAECSA-2015-StierKGR #analysis #architecture #energy #modelling #performance
Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
ECSAECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
WICSAWICSA-2015-AbukwaikNR #analysis #concept
A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-HanZ #analysis #energy
Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
CASECASE-2015-JiaZAX #analysis #performance
Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-NonakaSLNKK #analysis #simulation #statistics
The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
CASECASE-2015-SaezMBT #analysis #hybrid #performance #realtime #simulation
Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
CASECASE-2015-XiePLLY #analysis
Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
CASECASE-2015-XieZLSD #agile #analysis #approach #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CASECASE-2015-ZhongLBM #analysis #modelling
Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
DACDAC-2015-ChangHLW #analysis #encoding #functional #named
TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DACDAC-2015-ChenTSHK #analysis #modelling #multi #reliability
Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
DACDAC-2015-EspinosaHAAR #analysis #correlation #robust #set #verification
Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
DACDAC-2015-HanF #analysis #approach #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KrishnaNRT #analysis #composition #modelling #product line
Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
DACDAC-2015-LiuZWYX #analysis #difference #encryption #fault #named
DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-RoseM #analysis #design #performance
Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DACDAC-2015-ThieleAE #analysis #scheduling
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DACDAC-2015-YangTJ #analysis
Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATEDATE-2015-AhmadyanGNCV #analysis #diagrams #performance
Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
DATEDATE-2015-AndradeMVAPL #analysis #data flow #modelling
Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BiondiB #analysis #modelling
Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
DATEDATE-2015-ChangD #analysis #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-DeyCAM #analysis #difference #fault
Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
DATEDATE-2015-FeldS #analysis #dependence
Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
DATEDATE-2015-GuanTW0 #analysis #realtime
Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
DATEDATE-2015-HoqueMS #analysis #approach #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-IqtedarHSH #analysis #distributed #probability
Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
DATEDATE-2015-KhosraviMGT #analysis #optimisation #reliability
Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
DATEDATE-2015-KriebelRSASH #analysis #combinator #configuration management #fault #named #performance
ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
DATEDATE-2015-LezosDM #analysis #distance #locality #optimisation #reuse
Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-MajumderLBP #analysis #architecture #manycore #probability
NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
DATEDATE-2015-RamboE #analysis #communication #worst-case
Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
DATEDATE-2015-SeylerSGNT #analysis #formal method
Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
DATEDATE-2015-SonghoriMLK #automation #data analysis #framework #hardware #named
AHEAD: automated framework for hardware accelerated iterative data analysis (EMS, AM, XL, FK), pp. 942–947.
DATEDATE-2015-ThangamuthuCCL #analysis #network
Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
DATEDATE-2015-WartelKGBSTQLMB #analysis #case study #hardware
Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
DocEngDocEng-2015-NicholasB #analysis #documentation
Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
DRRDRR-2015-ChenSWLHI #analysis #dataset #documentation #layout
Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
HTHT-2015-ApaolazaHJ #analysis #behaviour #interactive #low level #web
Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HTHT-2015-Baeza-YatesS #analysis #generative
Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
HTHT-2015-BurnapCS #analysis #classification #communication #twitter
Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
HTHT-2015-MishraDBS #analysis #incremental #learning #sentiment
Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
SIGMODSIGMOD-2015-0002KBDHKFG #coordination #program analysis #protocol #transaction
The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
SIGMODSIGMOD-2015-ElgamalYAMH #analysis #big data #component #distributed #named #scalability
sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
SIGMODSIGMOD-2015-ZengADAS #analysis #big data #interactive #named #online
G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
VLDBVLDB-2015-BrancotteYBBDH #analysis #rank
Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
VLDBVLDB-2015-YangCLW #analysis #nearest neighbour #query
Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
ITiCSEITiCSE-2015-BellettiniLMMMT #analysis #how #performance #student
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-UraiUO #analysis #distributed #programming
Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
ESOPESOP-2015-0002S #automation #cost analysis #parallel #source code
Automatic Static Cost Analysis for Parallel Programs (JH, ZS), pp. 132–157.
ESOPESOP-2015-CernyHKRZ #abstraction #analysis #execution #worst-case
Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
ESOPESOP-2015-ChengR #detection #spreadsheet #static analysis
Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
ESOPESOP-2015-EmmiGMR #analysis #source code
Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
ESOPESOP-2015-VasconcelosJFH #analysis #functional #lazy evaluation #recursion #type system
Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
TACASTACAS-2015-AlbertFR #analysis #cumulative
Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
TACASTACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
TACASTACAS-2015-DjoudiB #analysis #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
TACASTACAS-2015-FleuryLPV #analysis #framework #named
Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
TACASTACAS-2015-GuanTAS0 #analysis #refinement #scalability
Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-Immler #analysis #reachability
Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
TACASTACAS-2015-KongGCC #analysis #hybrid #named
dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
TACASTACAS-2015-NamjoshiT #analysis #network #process
Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
TACASTACAS-2015-Sankur #analysis #automaton #robust
Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework #using
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MartinCAA #analysis #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICPCICPC-2015-Zeller #dynamic analysis
Test complement exclusion: guarantees from dynamic analysis (AZ), pp. 1–2.
ICSMEICSME-2015-DongAS #fault #static analysis #using
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface #using
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-GoeminneM #analysis #database #framework #java #towards
Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
ICSMEICSME-2015-JongelingDS #analysis #re-engineering #research #sentiment #tool support
Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
ICSMEICSME-2015-KhadkaSKSHJDB #analysis #case study #legacy #what
Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
ICSMEICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
ICSMEICSME-2015-Yamashita #analysis #assessment #benchmark #case study #experience #metric #quality #visualisation
Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
ICSMEICSME-2015-YamashitaZFW #analysis #comparative #industrial #open source #replication #smell
Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
MSRMSR-2015-ClaesMCV #analysis
A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
MSRMSR-2015-MalikZG #analysis #energy
Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-Abi-AntounWKGR #graph #impact analysis
Impact analysis based on a global hierarchical Object Graph (MAA, YW, EK, AG, VR), pp. 221–230.
SANERSANER-2015-AlawnehHH #analysis #metamodelling #performance #towards
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
SANERSANER-2015-CaiS #dependence #effectiveness #framework #impact analysis
A framework for cost-effective dependence-based dynamic impact analysis (HC, RAS), pp. 231–240.
SANERSANER-2015-CaiS15a #analysis #dependence #fine-grained #named
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
SANERSANER-2015-KoboriMI #analysis #evolution #java
Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-Martin #analysis #framework #towards
Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
SANERSANER-2015-MattsenWS #abstract domain #analysis
A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SANERSANER-2015-MedicherlaK #analysis #approximate #precise #scalability
Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
SANERSANER-2015-MuskeB #on the #static analysis #tool support
On implementational variations in static analysis tools (TM, PB), pp. 512–515.
SANERSANER-2015-NairJNH #analysis
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support
Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
SANERSANER-2015-SilvaCMS #analysis #fine-grained
Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
SCAMSCAM-2015-DarizRS #analysis #programmable
A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAMSCAM-2015-PintoKT #analysis #automation #multi #performance
Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
PEPMPEPM-2015-HoekH #analysis #php
Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
PEPMPEPM-2015-KootH #analysis #exception #functional #higher-order #semantics #strict #type system
Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
PEPMPEPM-2015-VerstoepH #analysis #functional #higher-order #strict
Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
PLDIPLDI-2015-DeligiannisDKLT #analysis #programming #state machine #testing
Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
PLDIPLDI-2015-SinghPV #performance #program analysis
Making numerical program analysis fast (GS, MP, MTV), pp. 303–313.
PLDIPLDI-2015-WeijiangBLK #analysis #dependence
Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
SASSAS-2015-AlbertCJR #cost analysis #distributed #parallel
Parallel Cost Analysis of Distributed Systems (EA, JC, EBJ, GRD), pp. 275–292.
SASSAS-2015-AlbertGG #analysis #interprocedural #source code
May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
SASSAS-2015-AldousM #low level #static analysis
Static Analysis of Non-interference in Expressive Low-Level Languages (PA, MM), pp. 1–17.
SASSAS-2015-BakhirkinBP #analysis #set
A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
SASSAS-2015-CastelnuovoNRSY #analysis #bottom-up #case study #composition #top-down
Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
SASSAS-2015-CattaruzzaASK #analysis #bound
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
SASSAS-2015-LeeHYC #static analysis
Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
SASSAS-2015-LiRC #analysis
Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
SASSAS-2015-LiTX #analysis #effectiveness
Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
SASSAS-2015-RapoportLT #analysis #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
STOCSTOC-2015-DworkFHPRR #adaptation #data analysis #statistics
Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
STOCSTOC-2015-SchulmanS #algorithm #analysis #matrix
Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
DLTDLT-2015-BrandlS #analysis #automaton #complexity #finite #monad
Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
ICALPICALP-v2-2015-Boreale #analysis #approximate #generative #probability
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
FMFM-2015-AlbertACGGMPR #analysis #concurrent #distributed #source code
Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-Damm #analysis #automation #lessons learnt #named #verification
AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
FMFM-2015-LiuH #analysis #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
FMFM-2015-NelsonFK #difference #network #program analysis
Static Differential Program Analysis for Software-Defined Networks (TN, ADF, SK), pp. 395–413.
SEFMSEFM-2015-KamaliHKP #analysis #distributed #formal method
Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-TaentzerG #analysis #confluence #graph transformation #towards
Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
CHICHI-2015-AmershiCDLSS #analysis #machine learning #named #performance #tool support
ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
CHICHI-2015-AsthanaSG #analysis #assessment #human-computer
Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
CHICHI-2015-ButlerASGP #analysis #automation #design #game studies
Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
CHICHI-2015-DerbovenMS #analysis #case study #design #multimodal
Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
CHICHI-2015-HourcadeMWP #analysis #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HoyleTACK #analysis #privacy #smarttech
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHICHI-2015-HuangSHH #analysis #how
How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHICHI-2015-LesselAK #analysis #people
Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
CHICHI-2015-OskampBHG #analysis #design #evaluation #multi #named
TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
CHICHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-TinatiKSLSS #case study #data analysis #design #framework #multi
Designing for Citizen Data Analysis: A Cross-Sectional Case Study of a Multi-Domain Citizen Science Platform (RT, MVK, EPBS, MLR, RJS, NS), pp. 4069–4078.
CHICHI-2015-VatavuW #analysis #elicitation #formal method #metric #tool support
Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
CHICHI-2015-Wacharamanotham #analysis #named #statistics
Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
CSCWCSCW-2015-MacLeanGLMH #analysis #health #named #online
Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
CSCWCSCW-2015-SavageM #analysis #online
Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
HCIDHM-EH-2015-Hu0LZY #3d #analysis #development #finite
Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
HCIDHM-EH-2015-HuDLZY #analysis
Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
HCIDHM-EH-2015-HuZZRL #analysis #correlation
Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
HCIDHM-EH-2015-KanazawaOWWTGH15a #analysis #experience
Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
HCIDHM-EH-2015-LiuCKQF #data analysis #power management
Balancing Power Consumption and Data Analysis Accuracy Through Adjusting Sampling Rates: Seeking for the Optimal Configuration of Inertial Sensors for Power Wheelchair Users (TL, CC, MK, GQ, JF), pp. 184–192.
HCIDHM-EH-2015-TianLYJCS #analysis #scalability #video
Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhouYLXZ #analysis
Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
HCIDHM-HM-2015-BoringJM #analysis #modelling #performance #reliability
Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
HCIDHM-HM-2015-GotoLTYH #analysis #eye tracking
Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
HCIDHM-HM-2015-IkaiMKIH #analysis
Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
HCIDHM-HM-2015-KitajimaKMMMH #analysis #comprehension #process
Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
HCIDHM-HM-2015-KurataniHHKUGH #analysis #comparison #process
Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
HCIDHM-HM-2015-SendaSKST #analysis #process
Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
HCIDHM-HM-2015-SudaTHYGH #analysis #process
Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
HCIDHM-HM-2015-SugimotoYNG #analysis #process
EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
HCIDHM-HM-2015-WangTTITGH #analysis
Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
HCIDHM-HM-2015-WangTTTGH #analysis #process
Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
HCIDHM-HM-2015-WangTTTGH15a #analysis #process
Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
HCIDUXU-DD-2015-EmanuelRM #analysis #interactive
Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
HCIDUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
HCIDUXU-DD-2015-OliveiraMMM #analysis #behaviour #design
Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
HCIDUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability
Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-KoshiyamaPR #analysis #architecture #repository #usability
Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
HCIDUXU-IXD-2015-Naskova #analysis #usability
Usability Analysis of IxDA.org (JN), pp. 63–73.
HCIDUXU-IXD-2015-OliveiraVSBRS #analysis #interactive #usability
Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
HCIDUXU-IXD-2015-RaffaeleAJCPCS #analysis #game studies #legacy #multi #usability
Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
HCIDUXU-UI-2015-DaggeFR #analysis #comparative #named #process
HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
HCIDUXU-UI-2015-KronbauerMS #analysis #evaluation #experience #interactive #mobile #user interface
Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
HCIDUXU-UI-2015-LeeKK #analysis #case study #experience #user interface
A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
HCIDUXU-UI-2015-MarcusB #analysis #design
Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
HCIDUXU-UI-2015-MarczalJ #analysis #behaviour #mobile
Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
HCIDUXU-UI-2015-Nawrot #data analysis #difference #gender #question #towards #women
Gender Differences in Temporal Data Analysis — Toward Women or Men Empowerment? (IN), pp. 232–242.
HCIDUXU-UI-2015-RodriguesEM #analysis #collaboration
Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
HCIHCI-DE-2015-GrobelnyM #algorithm #analysis #comparative #design #grid #visual notation
Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
HCIHCI-DE-2015-HashizumeK #analysis #smarttech #usability
Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
HCIHCI-IT-2015-MurataM #analysis #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-MutoM #analysis #development #interactive
Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
HCIHCI-IT-2015-SarsharNR #analysis #human-computer #on the #smarttech #usability
On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
HCIHCI-IT-2015-SatoAOO #analysis #automation #classification #image
Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
HCIHCI-IT-2015-ZhuF #analysis #game studies #online
A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
HCIHCI-UC-2015-Ujita #analysis #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-HayashiH #analysis #concept #learning #process
Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
HCIHIMI-IKC-2015-MakhtarI #analysis #evaluation
An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-WangN #analysis #identification #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCIHIMI-IKC-2015-YamadaAY #analysis #internet
An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
HCIHIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation
Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
HCIHIMI-IKD-2015-MorizumiA #analysis #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCILCT-2015-AltanC #analysis #animation #education
An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, ), pp. 3–13.
HCILCT-2015-DalipiYK #analysis #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCISCSM-2015-GerritsenB #analysis #predict
Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
HCISCSM-2015-KastratiIYD #analysis #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-KinclNPS #analysis #independence #sentiment
Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEuropeAdaEurope-2015-ZamoranoG #analysis #scheduling
Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
ICEISICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation
Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEISICEIS-v2-2015-Judrups #analysis #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEISICEIS-v2-2015-PerezNGD #analysis #development #process
A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-SouzaVS #analysis #semantics
Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEISICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy
Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEISICEIS-v3-2015-BauerBTR #analysis #flexibility #maintenance #repository
A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
ICEISICEIS-v3-2015-ThabetGG #analysis #mining #petri net #process
Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
ICEISICEIS-v3-2015-ValentimCM #analysis #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIRECIR-2015-BansalBV #analysis #semantics #towards
Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-CaoC #analysis #behaviour #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-HienertHWK #analysis #named
WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
ECIRECIR-2015-HuynhHR #analysis #learning #sentiment #strict
Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
ECIRECIR-2015-Kelly #analysis #estimation #information retrieval #statistics
Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
ECIRECIR-2015-KoolenBBK #analysis #social #social media
Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
ECIRECIR-2015-Moghaddam #analysis #fault #feedback #mining #sentiment
Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
ECIRECIR-2015-SabetghadamLBR #analysis #graph #reachability
Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
ICMLICML-2015-GanCHCC #analysis #modelling #scalability #topic
Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
ICMLICML-2015-GongY #analysis #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-HuangGS #analysis #component #independence
Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
ICMLICML-2015-KomiyamaHN #analysis #multi #probability #problem
Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
ICMLICML-2015-MaLF #analysis #canonical #correlation #dataset #linear #scalability
Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
ICMLICML-2015-NishiharaLRPJ #analysis #convergence
A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
ICMLICML-2015-PerrotH #analysis #learning #metric
A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
ICMLICML-2015-PrasadPR #analysis #axiom #rank
Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
ICMLICML-2015-WangWS #analysis #clustering
A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
ICMLICML-2015-YangX15a #analysis #component #streaming
Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
ICMLICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-ChaoHZ #analysis #kernel
Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
KDDKDD-2015-EmbarBPV #analysis #online #social #topic
Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
KDDKDD-2015-NagarajanWBNBHT #analysis #predict
Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
KDDKDD-2015-OkumuraST #analysis #classification #incremental #linear #problem
Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
KDDKDD-2015-ZhangLZSKYJ #analysis #biology #image #learning #modelling #multi
Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
KDDKDD-2015-ZhouLB #analysis #clustering #graph
Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
MLDMMLDM-2015-AlzahraniAAB #data analysis
Data Analysis for Courses Registration (NA, RA, NA, GB), pp. 357–367.
MLDMMLDM-2015-CoralloFMACCGS #analysis #approach #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-KarkkainenS #analysis #component #robust
Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
MLDMMLDM-2015-KrasotkinaM15a #analysis #approach
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-ShaluntsB #analysis #named #sentiment
SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
RecSysRecSys-2015-SifaOB #analysis #migration
User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
RecSysRecSys-2015-SousaDBM #analysis #named #network #recommendation
CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
SEKESEKE-2015-BarchetSF #analysis #collaboration #dependence #risk management
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
SEKESEKE-2015-GokhaleE #analysis #network #social
Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
SEKESEKE-2015-RamosCRSAP #analysis #architecture #recommendation
Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
SEKESEKE-2015-SaputriL #analysis #machine learning #perspective
Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-Tasse #analysis #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-ValeSSA #agile #analysis #evaluation #industrial #named #process
RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
SEKESEKE-2015-ZhangGAU #analysis #mobile
Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
SEKESEKE-2015-ZouCH #impact analysis #mobile #topic #user interface
Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps (QZ, XC, YH), pp. 477–482.
SIGIRSIGIR-2015-Dori-Hacohen #analysis #detection
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
SIGIRSIGIR-2015-KrstovskiSK #analysis #modelling #retrieval
Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
SIGIRSIGIR-2015-SeverynM15a #analysis #network #sentiment #twitter
Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
AMTAMT-2015-GholizadehDKM #analysis #model transformation
Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
BXBX-2015-HidakaBTM #analysis #approach #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BerardinelliMPP #analysis #design #energy
Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
MoDELSMoDELS-2015-Rodriguez-Echeverria #analysis #approach #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
ECOOPECOOP-2015-Alimadadi0P #hybrid #impact analysis #javascript
Hybrid DOM-Sensitive Change Impact Analysis for JavaScript (SA, AM, KP), pp. 321–345.
ECOOPECOOP-2015-CentonzePT #analysis
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ECOOPECOOP-2015-HauzarK #framework #php #static analysis
Framework for Static Analysis of PHP Applications (DH, JK), pp. 689–711.
ECOOPECOOP-2015-ParkR #javascript #precise #scalability #static analysis
Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity (CP, SR), pp. 735–756.
ECOOPECOOP-2015-WeiR #adaptation #analysis #javascript
Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
OOPSLAOOPSLA-2015-DaraisMH #composition #program analysis #reuse
Galois transformers and modular abstract interpreters: reusable metatheory for program analysis (DD, MM, DVH), pp. 552–571.
OOPSLAOOPSLA-2015-DietrichHS #analysis #java #points-to
Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
OOPSLAOOPSLA-2015-FuBS #analysis #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
OOPSLAOOPSLA-2015-MadsenTL #javascript #static analysis
Static analysis of event-driven Node.js JavaScript applications (MM, FT, OL), pp. 505–519.
OOPSLAOOPSLA-2015-OhYY #adaptation #learning #optimisation #program analysis
Learning a strategy for adapting a program analysis via bayesian optimisation (HO, HY, KY), pp. 572–588.
OOPSLAOOPSLA-2015-ToffolaPG #dynamic analysis #performance #problem
Performance problems you can fix: a dynamic analysis of memoization opportunities (LDT, MP, TRG), pp. 607–622.
GPCEGPCE-2015-El-SharkawyKS #analysis #semantics #tool support
Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
PPDPPPDP-2015-GarciaLL #static analysis
Static analysis of cloud elasticity (AG, CL, ML), pp. 125–136.
PPDPPPDP-2015-Hofmann #analysis #automation
Automatic amortized analysis (MH), p. 5.
QAPLQAPL-2015-RosendahlK #analysis #probability
Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
POPLPOPL-2015-ChatterjeePV #analysis #interprocedural
Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
POPLPOPL-2015-PredaGLM #analysis #automaton #bytecode #semantics #similarity
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
POPLPOPL-2015-TangWZXZM #analysis #data flow
Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
SACSAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-DuanZHX #analysis #framework #network #performance
Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SACSAC-2015-FerreiraMME #analysis #comparison #kernel #memory management
An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SACSAC-2015-GimenesGRG #analysis #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SACSAC-2015-IqbalKK #analysis #sentiment
Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SACSAC-2015-IsraelHS #analysis #multi #semantics #summary
Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SACSAC-2015-Jung0B #analysis #embedded #encoding #identification #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #analysis #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-MaltaPSBF #analysis #bibliography #case study #distance #information management
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SACSAC-2015-OjameruayeB #analysis #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SACSAC-2015-PiMMG #analysis #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SACSAC-2015-Puffitsch #analysis #bound #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SACSAC-2015-RaniseTV #analysis #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SACSAC-2015-SilvaMS #analysis #quality
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
ESEC-FSEESEC-FSE-2015-0002SGBZ #automation #impact analysis #named #natural language #requirements
NARCIA: an automated tool for change impact analysis in natural language requirements (CA, MS, AG, LCB, FZ), pp. 962–965.
ESEC-FSEESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ESEC-FSEESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-LiLWH #analysis #android #java #string
String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ESEC-FSEESEC-FSE-2015-MangalZNN #approach #program analysis
A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSEESEC-FSE-2015-SmithJMCL #developer #security #static analysis
Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
ICSEICSE-v1-2015-AvgustinovBHLMM #developer #static analysis
Tracking Static Analysis Violations over Time to Capture Developer Characteristics (PA, AIB, ASH, RGL, GM, OdM, MS, JT), pp. 437–447.
ICSEICSE-v1-2015-HuangLR #analysis #concurrent #named #predict
GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
ICSEICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSEICSE-v1-2015-PanW0G #analysis #javascript
Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
ICSEICSE-v1-2015-PradelSS #analysis #consistency #javascript #named #nondeterminism
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
ICSEICSE-v1-2015-SadowskiGJSW #ecosystem #named #program analysis
Tricorder: Building a Program Analysis Ecosystem (CS, JvG, CJ, ES, CW), pp. 598–608.
ICSEICSE-v1-2015-WeissRL #fault #program analysis #scalability
Database-Backed Program Analysis for Scalable Error Propagation (CW, CRG, BL), pp. 586–597.
ICSEICSE-v1-2015-YangYWWR #analysis #android #control flow
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSEICSE-v1-2015-YiYLZW #analysis #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-AlexandruG #agile #analysis #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-Berghe #analysis #security #towards
Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSEICSE-v2-2015-Bichhawat #analysis
Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
ICSEICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
ICSEICSE-v2-2015-HermansM #analysis #dataset #email #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
ICSEICSE-v2-2015-KlasBDSH #analysis #evaluation #modelling #scalability #testing
A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-Palomba #analysis #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-Zieris #analysis #information management #programming
Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
SLESLE-2015-Bagge #analysis #library
Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
SPLCSPLC-2015-BeekFG #adaptation #analysis #paradigm #product line
Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
SPLCSPLC-2015-BeekFGM #analysis #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeekLLV #analysis #constraints #modelling #probability #product line #statistics
Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-KassmeyerSS #impact analysis #process #safety #variability
A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
SPLCSPLC-2015-LiangGCR #analysis #feature model #modelling #satisfiability #scalability
SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
SPLCSPLC-2015-YueAS #analysis #case study #cyber-physical #experience #product line
Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
ASPLOSASPLOS-2015-SenguptaBZBK #bound #dynamic analysis #hybrid
Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
CCCC-2015-AllenSK #analysis #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-OanceaR #analysis #induction #scalability
Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
HPCAHPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability
Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
HPDCHPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
HPDCHPDC-2015-SuWA #data analysis #generative #performance
In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps (YS, YW, GA), pp. 61–72.
LCTESLCTES-2015-0001HL #analysis #kernel #realtime
Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
LCTESLCTES-2015-BarijoughHKG #analysis #streaming #trade-off
Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
LCTESLCTES-2015-StilkerichLES #analysis #embedded #realtime
A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
LCTESLCTES-2015-ZhangK #abstract interpretation #analysis #persistent #precise
Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
PPoPPPPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread
Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
SOSPSOSP-2015-HooffLZZ #analysis #named #scalability
Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
CAVCAV-2015-AbateBCK #adaptation #analysis #markov #network
Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
CAVCAV-2015-BozzanoCGM #analysis #modelling #performance #safety
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAVCAV-2015-BozzanoCPJKPRT #analysis #design #safety
Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CSLCSL-2015-ClementeL #analysis #automaton #first-order #reachability
Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
CSLCSL-2015-SchwentickVZ #source code #static analysis
Static Analysis for Logic-based Dynamic Programs (TS, NV, TZ), pp. 308–324.
ICLPICLP-2015-KieslST #analysis #on the #source code
On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT).
ICLPICLP-J-2015-GangeNSSS #horn clause #program analysis #program transformation #representation
Horn clauses as an intermediate representation for program analysis and transformation (GG, JAN, PS, HS, PJS), pp. 526–542.
ICSTICST-2015-0001YPGS #analysis #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-MidtgaardM #static analysis
QuickChecking Static Analysis Properties (JM, AM), pp. 1–10.
ICSTICST-2015-NardoPB #analysis #generative #modelling #mutation testing #testing
Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
ISSTAISSTA-2015-AquinoBCDP #constraints #program analysis #proving #reuse
Reusing constraint proofs in program analysis (AA, FAB, MC, GD, MP), pp. 305–315.
ISSTAISSTA-2015-DimjasevicG #analysis #assurance #generative #runtime #testing #verification
Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
ISSTAISSTA-2015-HuangDMD #analysis #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTAISSTA-2015-QiLAR #analysis #correctness #generative
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
RTARTA-2015-GenetS #analysis #reachability
Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
RTARTA-2015-NageleFM #analysis #automation #confluence #term rewriting
Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
ICSTSAT-2015-FalknerLH #analysis #automation #named #performance #satisfiability
SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
TAPTAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
TLCATLCA-2015-HofmannM #analysis #multi #term rewriting
Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
VMCAIVMCAI-2015-BackesR #abstraction #analysis #clustering #graph transformation #infinity
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
VMCAIVMCAI-2015-NagarS #analysis #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
VMCAIVMCAI-2015-PrabhakarS #abstraction #analysis #hybrid
Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
ECSAECSA-2014-BerardinelliMP #analysis #design #network #performance
fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
ECSAECSA-2014-XiongFPM #architecture #as a service #cost analysis #performance #scalability
Scalable Architectures for Platform-as-a-Service Clouds: Performance and Cost Analysis (HX, FF, CP, NM), pp. 226–233.
WICSAWICSA-2014-FuZBX #analysis
A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
ASEASE-2014-AbalBW #analysis #debugging #kernel #linux #variability
42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
ASEASE-2014-Angerer #impact analysis #multi #product line #variability
Variability-aware change impact analysis of multi-language product lines (FA), pp. 903–906.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise #using
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-EllisHKLLLMM #analysis #automation #requirements
Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
ASEASE-2014-MarasSC #analysis #named #reuse #web
Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
ASEASE-2014-NearJ #analysis #interactive #named #security #web
Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASEASE-2014-RamaK #dynamic analysis #refactoring
A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
ASEASE-2014-SeguraSC #analysis #automation #case study #e-commerce #experience #testing #variability
Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
ASEASE-2014-StephenSSE #big data #program analysis
Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
ASEASE-2014-TarvoR #analysis #automation #modelling #parallel #performance #source code #thread
Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
CASECASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-GargSYPCHPAG #analysis #automation #reachability
Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
CASECASE-2014-HanZH #analysis
System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
CASECASE-2014-HuYLC #analysis #automation #modelling #multi #petri net
Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-JiaZAX #analysis
Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
CASECASE-2014-LiaoLCHF #analysis
Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
CASECASE-2014-PengHHW #analysis #effectiveness #metric
An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
CASECASE-2014-WangGWG #analysis #behaviour #generative #multi
Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
CASECASE-2014-WuCT #analysis #memory management #modelling #multi
Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
CASECASE-2014-ZhuWQZ #analysis #clustering #constraints #modelling #multi #petri net #scheduling #tool support
Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-IyengarG #analysis #embedded #memory management #modelling #power management #robust
Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
DACDAC-2014-KiamehrOTN #analysis #approach #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-KleebergerMS #analysis
Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
DACDAC-2014-LiangC #analysis #clustering #named #network #probability #reduction #scalability #smarttech
ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
DACDAC-2014-LinL #analysis #parallel #reachability #verification
Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
DACDAC-2014-NandakumarM #analysis
System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
DACDAC-2014-QuintonBHNNE #analysis #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-SchneiderPP #agile #analysis #multi
MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
DACDAC-2014-ShankarSWP #analysis #concept #design #specification
Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
DACDAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
DACDAC-2014-ShrivastavaRJW #analysis #control flow #fault
Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
DACDAC-2014-SiyoumGC #analysis #data flow
Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-XueQBYT #analysis #framework #manycore #scalability
Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
DACDAC-2014-ZhengBB #analysis #identification #named #robust #towards
CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATEDATE-2014-AltmeyerD #analysis #correctness #on the #precise #probability
On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
DATEDATE-2014-BeneventiBVDB #analysis #identification #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATEDATE-2014-ButtazzoBB #adaptation #analysis #design
Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
DATEDATE-2014-ChenHD #analysis #graph #modelling
May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
DATEDATE-2014-ChienYHLC #analysis #geometry #image
Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
DATEDATE-2014-EbrahimiETSCA #analysis #embedded #fault
Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
DATEDATE-2014-FischerCM #analysis #design #modelling
Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
DATEDATE-2014-FrijnsASVGSC #analysis #graph
Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
DATEDATE-2014-GanapathyCACGR #analysis #framework #memory management #named #robust
INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
DATEDATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance
Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATEDATE-2014-GhalatyAS #analysis #fault
Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
DATEDATE-2014-Guan0 #analysis #performance #scheduling
General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
DATEDATE-2014-HoffmanRAA #analysis #fault #memory management
Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATEDATE-2014-KarakonstantisSSAB #analysis #approach #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KhanAHKKRC #analysis #bias
Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
DATEDATE-2014-LongLY #analysis #bound #evaluation #modelling #multi
Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATEDATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATEDATE-2014-PandeyV #analysis #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RadojicicGMP #analysis
Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
DATEDATE-2014-RamboTDAE #analysis #realtime
Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATEDATE-2014-RanaC #analysis #named #reduction #scalability #simulation
SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DATEDATE-2014-SalunkheMB #analysis #data flow #modelling
Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
DATEDATE-2014-SiddiqueT #analysis #formal method #towards
Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
DATEDATE-2014-SinghSWPWC #analysis #specification
Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
DATEDATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-VillenaS #analysis #network #performance #variability
Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
DATEDATE-2014-ZhangB #analysis #probability
Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
DATEDATE-2014-ZhangYW #analysis #performance #problem
Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
DocEngDocEng-2014-DiemKS #analysis #classification #documentation
Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DRRDRR-2014-FengLLLT #analysis #geometry
Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
DRRDRR-2014-LiPLD #analysis #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
DRRDRR-2014-LiuWTLG #analysis #automation #comprehension #image
Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
HTHT-2014-KimWWO #analysis #multi #twitter
Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
HTHT-2014-ZhangBR #analysis #empirical #network #social #social media
Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
PODSPODS-2014-Cohen #analysis #graph #sketching
All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
PODSPODS-2014-NgoNRR #analysis #worst-case
Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
SIGMODSIGMOD-2014-BlanasWBDS #data analysis #parallel
Parallel data analysis directly on scientific file formats (SB, KW, SB, BD, AS), pp. 385–396.
SIGMODSIGMOD-2014-GulwaniM #data analysis #interactive #named #natural language #programming #spreadsheet
NLyze: interactive programming by natural language for spreadsheet data analysis and manipulation (SG, MM), pp. 803–814.
SIGMODSIGMOD-2014-Musleh #analysis #twitter #visual notation
Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
SIGMODSIGMOD-2014-ZhuGCL #analysis #clustering #graph #sentiment #social #social media
Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
VLDBVLDB-2014-DeutchMT #analysis #framework #process
A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
VLDBVLDB-2014-JacobKS #analysis
A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
VLDBVLDB-2014-Markl #big data #data analysis #declarative #independence
Breaking the Chains: On Declarative Data Analysis and Data Independence in the Big Data Era (VM), pp. 1730–1733.
VLDBVLDB-2014-MortonBGM #challenge
Support the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems (KM, MB, DG, JDM), pp. 453–456.
VLDBVLDB-2014-ProserpioGM #data analysis
Calibrating Data to Sensitivity in Private Data Analysis (DP, SG, FM), pp. 637–648.
VLDBVLDB-2014-ZhangTCO #analysis #data transformation #in memory #performance
Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-KohNBR #analysis #validation
Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
ESOPESOP-2014-Fu #abstraction #analysis #memory management
Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
ESOPESOP-2014-MangalNY #analysis #interprocedural
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FASEFASE-2014-CohenM #analysis #configuration management #semantics #specification
Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
FASEFASE-2014-FerraraSB #cost analysis #named
TouchCost: Cost Analysis of TouchDevelop Scripts (PF, DS, LB), pp. 109–124.
FASEFASE-2014-HuangDM #analysis #java #type system #web
Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
FASEFASE-2014-KowalST #analysis #performance
Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-SadeghiEM #analysis #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FoSSaCSFoSSaCS-2014-BonnetKL #analysis #parallel #probability #process
Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
TACASTACAS-2014-BrockschmidtEFFG #analysis #complexity #integer #runtime #source code
Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
WRLAWRLA-2014-RochaMM #analysis #smt
Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
SANERCSMR-WCRE-2014-AlalfiCD #analysis #clustering #experience #industrial
Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-BinkleyHLO #analysis #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICPCICPC-2014-GuptaS #program analysis #quality
A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
ICSMEICSME-2014-ChaikalisLMC #analysis #evolution #named
SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
ICSMEICSME-2014-KlattKS #analysis #dependence
Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
ICSMEICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
ICSMEICSME-2014-MondalRS #analysis #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #analysis #bibliography #clustering
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-SajnaniSOL #analysis #component #quality
Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-TaoQ #analysis #concurrent #java #refactoring #source code
Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
ICSMEICSME-2014-WongXZHZM #analysis #fault #locality #segmentation
Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
MSRMSR-2014-BloemenAKO #analysis #database #dependence #open source
Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
MSRMSR-2014-FarahTC #analysis #architecture #named #quality #scalability
OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
MSRMSR-2014-GuzmanAL #analysis #commit #empirical #git #sentiment
Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
MSRMSR-2014-HanamTHL #ranking #static analysis
Finding patterns in static analysis alerts: improving actionable alert ranking (QH, LT, RH, PL), pp. 152–161.
MSRMSR-2014-MurgiaTAO #analysis #developer
Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
MSRMSR-2014-PleteaVS #analysis #git #security #sentiment
Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
MSRMSR-2014-SteidlHJ #analysis #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
MSRMSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code
Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
SCAMSCAM-2014-CaiJSZZ #analysis #named #predict
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAMSCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAMSCAM-2014-LiangSM #analysis #performance
Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAMSCAM-2014-LiangSMKH #analysis #automaton #exception
Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAMSCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAMSCAM-2014-YadegariD #analysis
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
PEPMPEPM-2014-HanusS #analysis #composition #functional #logic programming #source code
A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
PEPMPEPM-2014-KerneisSH #continuation #named #performance #static analysis
QEMU/CPC: static analysis and CPS conversion for safe, portable, and efficient coroutines (GK, CS, SH), pp. 83–94.
PLDIPLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDIPLDI-2014-BorgesFdPV #analysis #composition #probability #quantifier
Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
PLDIPLDI-2014-MitraLABSG #analysis #debugging #parallel #scalability
Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
PLDIPLDI-2014-OhLHYY #context-sensitive grammar
Selective context-sensitivity guided by impact pre-analysis (HO, WL, KH, HY, KY), p. 49.
PLDIPLDI-2014-SmaragdakisKB #analysis #context-sensitive grammar
Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
PLDIPLDI-2014-ZhangMNY #analysis #bottom-up #hybrid #interprocedural #top-down
Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
SASSAS-2014-AlbertFR #cost analysis #distributed
Peak Cost Analysis of Distributed Systems (EA, JCF, GRD), pp. 18–33.
SASSAS-2014-BakhirkinBP #abstraction #analysis #approximate
Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
SASSAS-2014-BessonJV #java #named #static analysis
SawjaCard: A Static Analysis Tool for Certifying Java Card Applications (FB, TPJ, PV), pp. 51–67.
SASSAS-2014-CoxCR #analysis #automation #source code
Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
SASSAS-2014-MadsenM #analysis #data flow #pointer #reachability
Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SASSAS-2014-YeSX #analysis #pointer
Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
STOCSTOC-2014-BhaskaraCMV #analysis
Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
STOCSTOC-2014-DworkTT0 #analysis #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
FLOPSFLOPS-2014-HoffmannS #analysis #array #integer #type system
Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
ICALPICALP-v1-2014-DosaS #analysis
Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
LATALATA-2014-FelgenhauerT #analysis #automaton #reachability
Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
LATALATA-2014-SeidlK #analysis #data flow #interprocedural #xml
Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
FMFM-2014-AntoninoSW #analysis #concurrent #csp #network #process #refinement
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
FMFM-2014-BaeOM #analysis #multi #semantics
Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
FMFM-2014-ButinM #analysis
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
FMFM-2014-ForejtKNS #analysis #communication #precise #predict #source code
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
FMFM-2014-KordyLMP #algorithm #analysis #automaton #robust
A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
FMFM-2014-LakshmiAK #analysis #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-LiuGL #analysis #reliability
MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
FMFM-2014-WenMM #analysis #formal method #information management #towards
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
IFMIFM-2014-BruniSNN #analysis #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-CalvaneseKSVZ #analysis #data type
Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
IFMIFM-2014-GilmoreTV #analysis #evaluation
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
IFMIFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
SEFMSEFM-2014-BeckerSAB #analysis #constraints #deployment #fault tolerance #formal method
A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
SEFMSEFM-2014-BratNSV #abstract interpretation #framework #named #static analysis
IKOS: A Framework for Static Analysis Based on Abstract Interpretation (GB, JAN, NS, AV), pp. 271–277.
SEFMSEFM-2014-DeganoFG #adaptation #reliability #static analysis
A Two-Phase Static Analysis for Reliable Adaptation (PD, GLF, LG), pp. 347–362.
SEFMSEFM-2014-GrovO #analysis #consistency #formal method #multi
Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
SFMSFM-2014-BubelMH #analysis #execution #modelling
Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
ICFPICFP-2014-ChenE #analysis #parametricity #product line #type system
Type-based parametric analysis of program families (SC, ME), pp. 39–51.
ICFPICFP-2014-KakiJ #analysis #framework #higher-order #relational
A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
IFLIFL-2014-AdsitF #analysis #control flow #performance #system f
An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
LISPILC-2014-LevineY #analysis #assessment #profiling
Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
GRAPHITEGRAPHITE-2014-DelzannoRT #analysis #protocol
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
GRAPHITEGRAPHITE-2014-FernandezKP #analysis #framework #graph grammar #interactive #modelling
Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
ICGTICGT-2014-AnjorinLST #graph grammar #model transformation #performance #static analysis
A Static Analysis of Non-confluent Triple Graph Grammars for Efficient Model Transformation (AA, EL, AS, GT), pp. 130–145.
CHICHI-2014-GoyalLCF #analysis #collaboration
Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
CHICHI-2014-LeeSS #analysis #bound #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-LiuGFXHK #analysis
CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
CHICHI-2014-ShelleyLMDSS #data analysis #design #student
Information-building applications: designing for data exploration and analysis by elementary school students (TS, LL, TM, CD, BLS, AS), pp. 2123–2132.
CHICHI-2014-Smith #analysis #comprehension #game studies #generative
Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
CHICHI-2014-XuYRFHB #analysis #exclamation
Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
CSCWCSCW-2014-BackstromK #analysis #facebook #network #social
Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
CSCWCSCW-2014-KangKK #analysis #collaboration #information management #tool support
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
HCIDHM-2014-ItoTGK #analysis #research
Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
HCIDHM-2014-KarlovicPMSRRS #analysis #case study #comparison
Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
HCIDHM-2014-MirandaRV #analysis #development #memory management #mobile #testing
Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
HCIDHM-2014-OhgiriYYKH #analysis #comparison
Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
HCIDHM-2014-OkaGTNH #analysis
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-SugimotoYG #analysis
Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
HCIDHM-2014-WongpatikasereeKT #analysis
Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
HCIDHM-2014-ZhouLXZZ #analysis #metric #parametricity
Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
HCIDUXU-DI-2014-ChammasQM #analysis #design #interactive
An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
HCIDUXU-DI-2014-NovickVSG #analysis #empirical #game studies #usability
Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
HCIDUXU-DI-2014-ShafiqICRAAR #analysis #case study #learning #smarttech #usability #user satisfaction #what
To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-SilvaPS #analysis #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-TMT-2014-FilippiB #analysis #aspect-oriented #functional #human-computer #interactive #nondeterminism
In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
HCIDUXU-TMT-2014-NieminenRTN #analysis #collaboration #industrial #information management
Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
HCIDUXU-TMT-2014-QuaresmaG #analysis #smarttech #usability
Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
HCIDUXU-TMT-2014-Tao #analysis #identification #user interface
Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCIHCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics
Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCIHCI-AS-2014-HooeyABF #analysis #design #fault
Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
HCIHCI-AS-2014-LandyLNPLM #analysis #comparative #development #predict
Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
HCIHCI-AS-2014-RafalakBW #analysis #evaluation
Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
HCIHIMI-AS-2014-Coelho #analysis
Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
HCIHIMI-AS-2014-JangKJS #analysis #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-AS-2014-TanikawaA #analysis #bibliography
User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
HCIHIMI-DE-2014-KimitaNS #analysis #education
Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
HCIHIMI-DE-2014-LinKT #analysis #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-NazemiRKK #adaptation #analysis #similarity #visualisation
User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
HCILCT-NLE-2014-BrayshawGNWB #analysis #case study #evaluation #heuristic
Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
HCILCT-NLE-2014-IbanezN #analysis #architecture #interactive
An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
HCILCT-NLE-2014-Jo0L #analysis #empirical #people
Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
HCISCSM-2014-AhangamaLKP #analysis #mobile #monitoring
Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
HCISCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter
Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
HCISCSM-2014-IoannidisPKKFA #analysis #named #social #social media
SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
HCISCSM-2014-LopesMP #analysis #social #web
Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
HCISCSM-2014-MendesFFC #analysis #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
VISSOFTVISSOFT-2014-VoineaT #analysis #visual notation
Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
AdaEuropeAdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis
Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
AdaEuropeAdaEurope-2014-QamhiehM #analysis #graph #multi #scheduling
Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
CAiSECAiSE-2014-NobauerSG #analysis #approach #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
CAiSECAiSE-2014-RuizCEFP #analysis #information management #process
Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
EDOCEDOC-2014-FlorezSV #analysis #approach #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
EDOCEDOC-2014-Franke #analysis #architecture #enterprise
Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
EDOCEDOC-2014-MukkamalaHV #analysis #sentiment #social
Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
EDOCEDOC-2014-NardiFA #analysis #modelling #ontology
An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
ICEISICEIS-v1-2014-LettnerZ #data analysis #framework #industrial #product line
A Data Analysis Framework for High-variety Product Lines in the Industrial Manufacturing Domain (CL, MZ), pp. 209–216.
ICEISICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v2-2014-PanfilenkoEML #impact analysis #independence #model transformation #recommendation #requirements
Recommendations for Impact Analysis of Model Transformations — From the Requirements Model to the Platform-independent Model (DVP, AE, CM, PL), pp. 428–434.
ICEISICEIS-v2-2014-PereiraZS #concept analysis
Extraction of Classes Through the Application of Formal Concept Analysis (DP, LZ, MS), pp. 275–282.
ICEISICEIS-v2-2014-ProcaciSA #analysis #community #metric #online #people #reduction #reliability
Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
ICEISICEIS-v2-2014-VieiraJF #analysis #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-AlvesVS #analysis #architecture
Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
ICEISICEIS-v3-2014-NaranjoSV #analysis #architecture #enterprise #named
PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
CIKMCIKM-2014-ArapakisLV #analysis #comprehension #gesture
Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
CIKMCIKM-2014-CarmelMPS #analysis #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-JiaDGZ #analysis #community #network
Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
CIKMCIKM-2014-LinJXWCW #analysis #sentiment
A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
CIKMCIKM-2014-MengCS #analysis #approximate #keyword #query #semantics
Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
CIKMCIKM-2014-PhanDXPK #analysis #health #network #physics #process #social
Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
CIKMCIKM-2014-RahimiSK #analysis #axiom #information retrieval
Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
CIKMCIKM-2014-RosenthalJ #analysis #enterprise
Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
CIKMCIKM-2014-ShangLCC #analysis #component #robust
Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
CIKMCIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social
People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKMCIKM-2014-TaoIWS #analysis #canonical #correlation
Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
CIKMCIKM-2014-TaxidouF #agile #analysis #information management #named #realtime #twitter
RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
CIKMCIKM-2014-WilkieA #analysis #bias #performance #retrieval
A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
CIKMCIKM-2014-YilmazVCRB #analysis #documentation
Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
ECIRECIR-2014-MonizJ #analysis #sentiment
Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
ECIRECIR-2014-WilkieA #analysis #bias #empirical #retrieval
Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
ICMLICML-c1-2014-ChazalGLM #convergence #data analysis #diagrams #estimation #persistent
Convergence rates for persistence diagram estimation in Topological Data Analysis (FC, MG, CL, BM), pp. 163–171.
ICMLICML-c1-2014-MillerBAG #analysis #process
Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
ICMLICML-c1-2014-TangMNMZ #analysis #comprehension #modelling #topic
Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
ICMLICML-c2-2014-Lopez-PazSSGS #analysis #component #random
Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
ICMLICML-c2-2014-MukutaH #analysis #canonical #correlation #probability
Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
ICMLICML-c2-2014-NguyenMVEB #analysis #correlation #multi
Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
ICMLICML-c2-2014-NieYH #analysis #component #robust
Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
ICMLICML-c2-2014-SatoKN #analysis #normalisation
Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SunZZ #analysis #convergence
A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
ICMLICML-c2-2014-TaylorGP #analysis #approximate #linear #programming
An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
ICMLICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICMLICML-c2-2014-TuZWQ #analysis #scalability
Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
ICMLICML-c2-2014-ZhaoMXZZ #analysis #component #robust
Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
ICPRICPR-2014-AhmadKM #analysis
Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
ICPRICPR-2014-AndreuLMG #analysis #automation #classification #gender #image
Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
ICPRICPR-2014-ArvanitopoulosBT #analysis #learning
Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
ICPRICPR-2014-BauckhageM #analysis #clustering #kernel #web
Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-ChengY #analysis
Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICPRICPR-2014-ChenYJ #analysis #feature model #linear #robust
An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
ICPRICPR-2014-DengHXC #analysis #composition #matrix #rank
Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
ICPRICPR-2014-FernandezT #analysis #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-FuscoEM #data analysis #locality #network
Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
ICPRICPR-2014-Hess-FloresRJ #analysis #multi #nondeterminism
Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
ICPRICPR-2014-HongZP #analysis #estimation #image
Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
ICPRICPR-2014-HuDGX #analysis #distance #reduction
Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
ICPRICPR-2014-KrytheL #analysis #linear
Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
ICPRICPR-2014-KurtekS #analysis #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LinCCLH #analysis #detection
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LinH #analysis #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiuS #analysis
Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
ICPRICPR-2014-LiuXYZ #analysis
Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
ICPRICPR-2014-LiWQXG #analysis #estimation
Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MollerPB #analysis #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKO #analysis #collaboration #framework #online #search-based
Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
ICPRICPR-2014-OhPKHB #analysis #image #personalisation #social
Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
ICPRICPR-2014-OkadaFWP #analysis #random
Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
ICPRICPR-2014-OnalAVFOOY #analysis #modelling
Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, , FTYV), pp. 3339–3344.
ICPRICPR-2014-SariE #analysis #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SeckDT #3d #analysis #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-SlitiHBA #analysis #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-TavakoliYRHS #analysis #eye tracking #recognition
Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
ICPRICPR-2014-TuXN #analysis #detection #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-WangGLYWY #analysis #canonical #correlation
Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
ICPRICPR-2014-WatanabeW #analysis #component #distance #learning #metric #performance
Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
ICPRICPR-2014-YanRLSS #analysis #clustering #invariant #linear #multi #recognition
Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
ICPRICPR-2014-YeWH #analysis #component #graph
Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
ICPRICPR-2014-ZhangWGZZ #analysis #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
KDDKDD-2014-AkibaMK #analysis #network
Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
KDDKDD-2014-JiangCWXZY #analysis #behaviour #flexibility #multi #named
FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDDKDD-2014-LanSB #analysis #learning
Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
KDDKDD-2014-TamhaneISDA #analysis #predict #risk management #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-YuH0 #analysis #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDDKDD-2014-ZhuSY #analysis #mining #network #social
Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
KDIRKDIR-2014-CastelltortL #analysis #graph
NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
KDIRKDIR-2014-HafethAC #analysis #case study #classification
Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
KDIRKDIR-2014-LiuF #analysis #classification #sentiment #topic #web
Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
KDIRKDIR-2014-LiuF14a #analysis #classification #n-gram #sentiment #similarity #web
Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
KDIRKDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-WanJLL #analysis #challenge #sentiment #web
Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
KEODKEOD-2014-AzaiezA #analysis #how #question #towards
How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KRKR-2014-BhattST #analysis #architecture #design #experience #industrial #user interface
Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
KRKR-2014-Delgrande #analysis #towards
Towards a Knowledge Level Analysis of Forgetting (JPD).
RecSysRecSys-2014-NoiaORTS #analysis #recommendation #towards
An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
SEKESEKE-2014-BarnesL #analysis #clustering
Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
SEKESEKE-2014-ChenHQJ #performance #static analysis #using
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-El-KharboutlyGF #analysis #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKESEKE-2014-Garcia-NunesSZB #analysis #collaboration #fuzzy #modelling
Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
SEKESEKE-2014-JuniorCMS #data analysis #gpu #repository
Exploratory Data Analysis of Software Repositories via GPU Processing (JRDSJ, EC, LM, AS), pp. 495–500.
SEKESEKE-2014-PaikariF #analysis #design #implementation #simulation
Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis #using
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SchotsRS #analysis #performance #process
A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
SEKESEKE-2014-VianaCS #analysis #information management
Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
SEKESEKE-2014-WangC #analysis #approach #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-WanZWS #analysis #graph #performance #points-to
Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
SEKESEKE-2014-YangWSFC #analysis #debugging #fault
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
SIGIRSIGIR-2014-FangZ #analysis #axiom #information retrieval #modelling #optimisation
Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
SIGIRSIGIR-2014-GoeuriotKL #analysis #information retrieval #query
An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
SIGIRSIGIR-2014-LourencoVPMFP #analysis #sentiment
Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
SIGIRSIGIR-2014-NiuLGCG #data analysis #learning #rank #robust #what
What makes data robust: a data analysis in learning to rank (SN, YL, JG, XC, XG), pp. 1191–1194.
SIGIRSIGIR-2014-PelejaSM #analysis #sentiment
Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
SIGIRSIGIR-2014-ThomasL #composition #data analysis #distance #information retrieval
Compositional data analysis (CoDA) approaches to distance in information retrieval (PT, DL), pp. 991–994.
SIGIRSIGIR-2014-TsolmonL #analysis #modelling #timeline
An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
SIGIRSIGIR-2014-UstaAVOU #analysis #education #how #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIRSIGIR-2014-ZhangL0ZLM #analysis #modelling #recommendation #sentiment
Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
AMTAMT-2014-GogollaHH #dynamic analysis #modelling #ocl #on the #uml
On Static and Dynamic Analysis of UML and OCL Transformation Models (MG, LH, FH), pp. 24–33.
ECMFAECMFA-2014-Moreno-DelgadoDZT #analysis #composition #domain-specific language #flexibility
Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
ICMTICMT-2014-GonzalezC #analysis #constraints #generative #model transformation #testing
Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
ICMTICMT-2014-GuanaS #analysis
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
ECOOPECOOP-2014-LiT #analysis #fault #python #source code
Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
ECOOPECOOP-2014-WeiR #analysis #behaviour #javascript #points-to
State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLAOOPSLA-2014-AndreasenM #static analysis
Determinacy in static analysis for jQuery (EA, AM), pp. 17–31.
OOPSLAOOPSLA-2014-BrutschyF0 #developer #independence #static analysis
Static analysis for independent app developers (LB, PF, PM), pp. 847–860.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-ParrHF #adaptation #dynamic analysis #ll #parsing #power of
Adaptive LL(*) parsing: the power of dynamic analysis (TP, SH, KF), pp. 579–598.
OOPSLAOOPSLA-2014-ZhangXZYS #alias #analysis #c #performance
Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
POPLPOPL-2014-ChaudhuriFK #analysis #consistency #source code
Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
POPLPOPL-2014-CoughlinC #analysis #composition #invariant
Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
POPLPOPL-2014-SergeyVJ #analysis #composition #higher-order #theory and practice
Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
POPLPOPL-2014-SharmaNA #program analysis #trade-off
Bias-variance tradeoffs in program analysis (RS, AVN, AA), pp. 127–138.
RERE-2014-AnishG #analysis #requirements
Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
RERE-2014-BadgerTC #analysis #design #named #requirements #verification
VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
RERE-2014-GuzmanM #analysis #fine-grained #how #sentiment
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-NguyenGA #analysis #automation #named #ontology #requirements
GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
RERE-2014-SaxenaC #agile #analysis #named #requirements
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
REFSQREFSQ-2014-AlebrahimFHM #analysis #interactive #problem #requirements
Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
REFSQREFSQ-2014-NairVMTdB #analysis #problem #safety #traceability
Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
REFSQREFSQ-2014-RiegelD #analysis #elicitation #heuristic #optimisation #performance
An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
REFSQREFSQ-2014-SannierB #analysis #approach #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
REFSQREFSQ-2014-SethiaP #analysis #elicitation #empirical #performance #requirements
The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
REFSQREFSQ-2014-YangLJC #adaptation #analysis #bibliography #modelling #requirements #self
A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
SACSAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology
Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SACSAC-2014-ChangCHKL #analysis #behaviour #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SACSAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SACSAC-2014-HalderZC #analysis #database #information management #query
Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SACSAC-2014-HuangLD #analysis #modelling #multi #network #performance
Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SACSAC-2014-HuangYKYLYGFQ #analysis #clustering #self
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SACSAC-2014-KangI #dynamic analysis
Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SACSAC-2014-KangS #analysis #implementation #scheduling
Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SACSAC-2014-KumeNNS #dynamic analysis #framework
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
SACSAC-2014-OliveiraO #analysis #kernel #linux
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SACSAC-2014-OliveiraSB #analysis #coordination
Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SACSAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParkH #analysis #network #performance
Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SACSAC-2014-QuilleTR #analysis
Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SACSAC-2014-SeoKTC #analysis #framework #network #social
A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SACSAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SACSAC-2014-TragatschnigTZ #impact analysis #using
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-XiaLWZ #analysis #predict
Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SACSAC-2014-ZhanLS #analysis #in the cloud #mobile
A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
FSEFSE-2014-Banerjee #energy #performance #static analysis #testing
Static analysis driven performance and energy testing (AB), pp. 791–794.
FSEFSE-2014-DevroeyPCPLS #analysis #mutation testing #variability
A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
FSEFSE-2014-FengADA #android #detection #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSEFSE-2014-Gao #program analysis #testing
Numerical program analysis and testing (ZG), pp. 779–782.
FSEFSE-2014-Gui00ND #agile #analysis #named #nondeterminism #reliability #tool support
RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
FSEFSE-2014-KashyapDKWGSWH #framework #javascript #named #static analysis
JSAI: a static analysis platform for JavaScript (VK, KD, EAK, JW, KG, JS, BW, BH), pp. 121–132.
FSEFSE-2014-LerchHBM #analysis #named #performance #scalability
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
FSEFSE-2014-LuoHEM #analysis #empirical #testing
An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
FSEFSE-2014-XiaoCK #analysis #architecture #named #quality #tool support
Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
FSEFSE-2014-Yang #analysis #bibliography #network #open source #perspective #social
Social network analysis in open source software peer review (XY), pp. 820–822.
ICSEICSE-2014-AndroutsopoulosCDHH #analysis #fault #testing
An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
ICSEICSE-2014-BagheriTS #automation #dynamic analysis #named
TradeMaker: automated dynamic analysis of synthesized tradespaces (HB, CT, KJS), pp. 106–116.
ICSEICSE-2014-HuangMSZ #analysis #performance #testing
Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant #using
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SuR #analysis #empirical #parametricity #probability
Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
LDTALDTA-J-2011-SauthoffG #analysis #domain-specific language #optimisation #programming
Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
SPLCSPLC-2014-DomisSGAK #analysis #case study #experience #industrial #reuse
Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
CCCC-2014-MadsenA #analysis #string
String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
CGOCGO-2014-RountevY #analysis #android #user interface
Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
CGOCGO-2014-StadlerWM #analysis #java
Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPDCHPDC-2014-BeaumontM #analysis #matrix #multi #scheduling
Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
HPDCHPDC-2014-SuAWBS #analysis #correlation #dataset #distributed #parallel
Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
HPDCHPDC-2014-YinWFZZ #analysis #middleware #named #scalability #visualisation
SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
ISMMISMM-2014-RatnakarN #analysis #constraints #graph #performance #points-to
Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
LCTESLCTES-2014-BallabrigaCR #analysis
Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
LCTESLCTES-2014-RoyRWW #analysis #approximate #automation #named
ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
OSDIOSDI-2014-ChowMFPW #analysis #internet #performance #scalability
The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
OSDIOSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
PPoPPPPoPP-2014-MaAC #algorithm #analysis #manycore #thread
Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
CAVCAV-2014-AlglaveKNP #approach #automation #static analysis
Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAVCAV-2014-ChatterjeeCD #analysis #probability
CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
CAVCAV-2014-EsparzaLMMN #analysis #approach #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-HeizmannHP #analysis #learning #source code #termination
Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
CAVCAV-2014-ItzhakyBRST #analysis
Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
CAVCAV-2014-LeGQC #analysis #higher-order
Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
CAVCAV-2014-SinnZV #bound #complexity #scalability #static analysis
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICSTICST-2014-HaysHB #testing #validation
Validation of Software Testing Experiments: A Meta-Analysis of ICST 2013 (MH, JHH, ACB), pp. 333–342.
ICSTICST-2014-LiO #analysis #empirical #modelling #testing
An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
ICSTICST-2014-MiicBT #analysis #automation #multi #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
ICSTICST-2014-WiklundSEL #analysis #automation #empirical #testing
Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
ISSTAISSTA-2014-Chen #constraints #program analysis #proving #reuse #scalability
Reusing constraint proofs for scalable program analysis (MC), pp. 449–452.
ISSTAISSTA-2014-HendersonPYHWZY #analysis #framework #performance
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
ISSTAISSTA-2014-Just #analysis #framework #java #mutation testing #performance #scalability
The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
ISSTAISSTA-2014-JustEF #analysis #clustering #execution #mutation testing #performance
Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
ISSTAISSTA-2014-MarinescuHC #analysis #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
ISSTAISSTA-2014-XiaoBIMGC #analysis #dependence #effectiveness #type system
ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
LICSLICS-CSL-2014-BaierDK #analysis #model checking #probability #trade-off
Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
RTARTA-TLCA-2014-HirokawaM #analysis #automation #complexity
Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
RTARTA-TLCA-2014-LiuDJ #analysis #confluence
Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
ICSTSAT-2014-BacchusN #algorithm #analysis #satisfiability
Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
SMTSMT-2014-CarlssonGP #analysis #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
SMTSMT-2014-FremontS #program analysis #smt
Speeding Up SMT-Based Quantitative Program Analysis (DJF, SAS), pp. 3–13.
VMCAIVMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability
Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-Mine #abstract interpretation #analysis #relational #thread
Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAIVMCAI-2014-SchwarzSVA #analysis #precise #source code
Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
CBSECBSE-2013-LednickiCS #analysis #execution #worst-case
Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
ECSAECSA-2013-BuchgeherW #analysis #architecture #consistency #towards
Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
ECSAECSA-2013-GoknilSPM #analysis #constraints #modelling
Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
QoSAQoSA-2013-BeckerLB #adaptation #analysis #performance #requirements #self #validation
Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
QoSAQoSA-2013-BerardinelliLM #analysis #execution #non-functional
Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
QoSAQoSA-2013-KlattK #analysis #architecture #difference
Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
QoSAQoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance
Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
ASEASE-2013-AnnervazKSS #analysis #domain model #modelling #natural language #quality #requirements
Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
ASEASE-2013-GarciaIM #analysis #architecture #comparative
A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
ASEASE-2013-LetsholoZC #analysis #modelling #named #requirements
TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
ASEASE-2013-OhmannL #analysis #control flow #debugging #lightweight
Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
ASEASE-2013-PalepuXJ #dependence #dynamic analysis #performance #summary
Improving efficiency of dynamic analysis with dynamic dependence summaries (VKP, G(X, JAJ), pp. 59–69.
ASEASE-2013-RosnerSAKF #alloy #analysis #clustering #modelling #named #parallel
Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
ASEASE-2013-Servant #analysis #debugging #using
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASECASE-2013-ChenZAX #analysis #finite
Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
CASECASE-2013-ChenZH #analysis #modelling #performance
Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
CASECASE-2013-FantiIRU #analysis #scheduling #simulation
A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
CASECASE-2013-GiulianiCP #analysis #optimisation
A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-Markovski #analysis #synthesis
Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
CASECASE-2013-SaidiM #analysis #configuration management #development #self
Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
CASECASE-2013-WuCY #analysis #policy #reachability
A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASECASE-2013-XieLSD #analysis #approach #markov #modelling #process
Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASECASE-2013-ZhangH #algorithm #analysis #convergence #coordination #implementation #optimisation #parallel
Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
CASECASE-2013-ZhaoL #analysis #exponential #multi
Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
CASECASE-2013-ZhongLEHF #analysis #modelling #process #testing
Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
CASECASE-2013-ZhouKZS #analysis
Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
DACDAC-2013-AgostaBMP #analysis
Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DACDAC-2013-AlleMD #analysis #dependence #pipes and filters #runtime #synthesis
Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
DACDAC-2013-AndalamGSRR #analysis #precise
Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
DACDAC-2013-ChippaCRR #analysis #approximate
Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
DACDAC-2013-DingLM #analysis #multi #realtime
Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
DACDAC-2013-EbrahimiAT #analysis #approach #multi
A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DACDAC-2013-KuruvillaSPVC #analysis #optimisation #set #statistics
Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
DACDAC-2013-LinLM #analysis #hybrid #kernel #reachability #verification
Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
DACDAC-2013-MallikZLCBBBCRBMV #analysis #evaluation #framework #named
TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
DACDAC-2013-Miskov-ZivanovMF #analysis #automation #behaviour #design #network
Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
DACDAC-2013-RaiSST #algorithm #analysis #distributed #network #process
Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
DATEDATE-2013-AhmadyanV #analysis #reachability #reduction #set
Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
DATEDATE-2013-AitkenFKRR #analysis #how #question #reliability
Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
DATEDATE-2013-AlieeGRT #analysis #automation #fault #reliability
Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
DATEDATE-2013-BanaiyanMofradDG #analysis #distributed #fault tolerance #modelling
Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
DATEDATE-2013-BoleyCAC #analysis #estimation #performance
Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
DATEDATE-2013-BundMS #analysis
Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
DATEDATE-2013-CaiHMM #analysis #memory management #modelling
Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
DATEDATE-2013-CastellanaF #analysis #independence #liveness #scheduling #synthesis
Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
DATEDATE-2013-ChenM #analysis #modelling #reliability
System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
DATEDATE-2013-ChenRSIFC #analysis #process
A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
DATEDATE-2013-DiazSSR #analysis #network #performance #security #simulation
Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
DATEDATE-2013-DoganBCABA #analysis #embedded #execution #multi #power management
Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-FirouziKTN #analysis #runtime
Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
DATEDATE-2013-GuanYL0 #analysis #approach #estimation
FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method #using
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HellwegeHPP #analysis #metric #reliability
Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATEDATE-2013-ImagawaTOS #analysis #architecture #configuration management #effectiveness
A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
DATEDATE-2013-KosmidisCQABC #analysis #design #probability
Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
DATEDATE-2013-LishernessLC #analysis #mutation testing
Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
DATEDATE-2013-LiZCZ #analysis #multi #simulation
Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
DATEDATE-2013-MalburgFF #analysis #comprehension #data flow #design
Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
DATEDATE-2013-MaYGGTBH #analysis #architecture #towards #validation
Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
DATEDATE-2013-NegreanKE #analysis #manycore
Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
DATEDATE-2013-NeukirchnerQMAE #analysis #realtime
Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
DATEDATE-2013-PollexFSMMW #analysis #constant #realtime
Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
DATEDATE-2013-QianJBTMM #analysis #named #performance #using
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-QuintonNE #analysis #formal method #realtime
Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management #using
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-SchneiderZGMC #analysis #composition
Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
DATEDATE-2013-ShahKA #analysis #bound
Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATEDATE-2013-StanisicVCDMLM #analysis #embedded #performance #power management
Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TheissingMSSS #analysis #fault
Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
DATEDATE-2013-WagnerW #analysis #performance #statistics
Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
DATEDATE-2013-WildermannZT #analysis #distributed #game studies #manycore
Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
DATEDATE-2013-YaoYW #adaptation #analysis #modelling #online #performance
Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
DATEDATE-2013-YilmazSWO #analysis #fault #industrial #scalability #simulation
Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SimistiraPKC #analysis #online
Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
HTHT-2013-WangQS #analysis #realtime #social #twitter
Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
HTHT-2013-WeiHGLZW #analysis #behaviour #case study #twitter
Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
ICDARICDAR-2013-AlkalaiBSL #analysis #identification
Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDARICDAR-2013-AntonacopoulosCPP #analysis #contest #layout
ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
ICDARICDAR-2013-GriechischML #analysis #online
Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDARICDAR-2013-KirbyH #analysis #using
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-LiPXW #analysis #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-StammLD #analysis #approach #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-TangHF #analysis #approach #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-WangLD #analysis #recognition
Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
ICDARICDAR-2013-WeiBSI #analysis #classification #documentation #evaluation #layout
Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
ICDARICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation #using
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
PODSPODS-2013-CalvaneseGM #analysis #database #perspective #process
Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
SIGMODSIGMOD-2013-GuilleFHZ #analysis #framework #mining #named #open source #social
SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
SIGMODSIGMOD-2013-HuangB0 #data analysis #in the cloud #named #optimisation #statistics
Cumulon: optimizing statistical data analysis in the cloud (BH, SB, JY), pp. 1–12.
SIGMODSIGMOD-2013-LapeineHHG #data analysis #interactive #mobile #query
Mobile interaction and query optimizationin a protein-ligand data analysis system (ML, KGH, EH, NMG), pp. 1291–1292.
SIGMODSIGMOD-2013-MoustafaMDG #analysis #declarative #interactive #named #network
GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
SIGMODSIGMOD-2013-SuZWHZ #analysis #similarity
Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
SIGMODSIGMOD-2013-TaoYLBCHKSWWW #analysis #named #network #research
Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
VLDBVLDB-2013-DeutchMT #analysis #named #process
PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
VLDBVLDB-2013-MoyersSWKVBC #analysis #array #image #parallel
A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
VLDBVLDB-2013-OkcanRPF #analysis #named
Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
VLDBVLDB-2013-SeoPSL #analysis #distributed #graph #scalability
Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
VLDBVLDB-2013-SowellSCDG #analysis #in memory #memory management
An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
VLDBVLDB-2013-Taxidou #analysis #information management #realtime #social #social media
Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
ITiCSEITiCSE-2013-HerreroLOST13a #analysis #empirical #performance
An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
ITiCSEITiCSE-2013-Trakhtenbrot #algorithm #analysis #complexity #concept #problem #student
Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
ESOPESOP-2013-AlpuenteBFS #analysis #logic #specification
Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
ESOPESOP-2013-CollingbourneDKQ #analysis #gpu #kernel #semantics #verification
Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
ESOPESOP-2013-HofmannR #analysis #automation #type inference
Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
FASEFASE-2013-LinPEHR #analysis #behaviour #requirements #sequence #specification #string
Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
FASEFASE-2013-TrippPCCG #analysis #named #scalability #security #web
Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
FoSSaCSFoSSaCS-2013-HainryMP #analysis #complexity #process #type system
Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
TACASTACAS-2013-BalasubramanianPKL #analysis #multi #named #statechart
Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
TACASTACAS-2013-FerraraMP #analysis #data access #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-GodefroidY #analysis #source code
Analysis of Boolean Programs (PG, MY), pp. 214–229.
TACASTACAS-2013-Lowe #analysis #contest
CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
TACASTACAS-2013-VizelGS #analysis #reachability #using
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
TACASTACAS-2013-Wendler #analysis #contest
CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
CSMRCSMR-2013-BhattacharyaUNK #analysis #android #debugging #empirical #open source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMRCSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-JezekHB #analysis #compilation #library
Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
CSMRCSMR-2013-LehnertFR #impact analysis #rule-based
Rule-Based Impact Analysis for Heterogeneous Software Artifacts (SL, QuaF, MR), pp. 209–218.
CSMRCSMR-2013-Nagy #data-driven #static analysis
Static Analysis of Data-Intensive Applications (CN), pp. 435–438.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-PruijtKB #analysis #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICPCICPC-2013-SteidlHJ #analysis #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AnandEKSBK #abstraction #analysis #bytecode #framework #memory management #stack
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
ICSMEICSM-2013-Beck #analysis #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #analysis #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-OsmanCP #algorithm #analysis #diagrams #machine learning
An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
ICSMEICSM-2013-SahaRS #analysis #evolution #named
gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
ICSMEICSM-2013-TianLS #analysis #debugging #multi #named #predict
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
ICSMEICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-YukselS #analysis #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-DemeyerMWL #analysis #exclamation
Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
MSRMSR-2013-FuLLDZX #analysis #behaviour #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSRMSR-2013-VasquezDP #analysis #development #mobile #stack overflow #using
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
SCAMSCAM-2013-BiallasOCH #analysis #named #pointer
PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SCAMSCAM-2013-FabryRJ #analysis #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-MuskeBS #bibliography #clustering #reduction #static analysis
Review efforts reduction by partitioning of static analysis warnings (TBM, AB, TS), pp. 106–115.
SCAMSCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SCAMSCAM-2013-SvajlenkoRD #analysis #generative #named #similarity #tool support
ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
WCREWCRE-2013-ClearyGVSSP #analysis #interactive #memory management #multi
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
WCREWCRE-2013-FryW #clustering #fault #maintenance #static analysis
Clustering static analysis defect reports to reduce maintenance costs (ZPF, WW), pp. 282–291.
WCREWCRE-2013-SaeidiHKJ #analysis #legacy #modelling #named #tool support
Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
PEPMPEPM-2013-SunCZ #analysis #constraints #locality #source code
Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
PLDIPLDI-2013-KastrinisS #analysis #context-sensitive grammar #hybrid #points-to
Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
PLDIPLDI-2013-SankaranarayananCG #probability #source code #static analysis
Static analysis for probabilistic programs: inferring whole program properties from finitely many paths (SS, AC, SG), pp. 447–458.
PLDIPLDI-2013-SchaferSDT #analysis
Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
PLDIPLDI-2013-ZhangLYS #algorithm #alias #analysis #performance
Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
PLDIPLDI-2013-ZhangNY #abstraction #analysis #data flow #parametricity
Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
SASSAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification
Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
SASSAS-2013-DragoiES #analysis #data type
Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
SASSAS-2013-Goubault #abstract interpretation #source code #static analysis
Static Analysis by Abstract Interpretation of Numerical Programs and Systems, and FLUCTUAT (EG), pp. 1–3.
SASSAS-2013-Sankaranarayanan #static analysis
Static Analysis in the Continuously Changing World (SS), pp. 4–5.
SASSAS-2013-WhiteM #algebra #analysis #memory management #optimisation #using
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
STOCSTOC-2013-HardtR #analysis #worst-case
Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
STOCSTOC-2013-KwokLLGT #algorithm #analysis #clustering #difference #higher-order
Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
CIAACIAA-2013-DreyfusHK #analysis #approximate #reachability
Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
ICALPICALP-v1-2013-DeDS #algorithm #analysis #difference #fourier #geometry #robust
A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
ICALPICALP-v2-2013-HartungNNS #analysis #complexity #graph
A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
ICALPICALP-v2-2013-PetricekOM #named #static analysis
Coeffects: Unified Static Analysis of Context-Dependence (TP, DAO, AM), pp. 385–397.
LATALATA-2013-FernauHV #analysis #automaton #multi #problem
A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
IFMIFM-2013-GiachinoGLLW #analysis #concurrent #theory and practice
Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
IFMIFM-2013-Song00LD #analysis #divide and conquer #reachability
Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
SEFMSEFM-2013-TranST #composition #static analysis #transaction
Compositional Static Analysis for Implicit Join Synchronization in a Transactional Setting (TMTT, MS, HT), pp. 212–228.
SFMSFM-2013-GratieIP #analysis #biology
ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
SFMSFM-2013-KopfR #analysis #automation #data flow
Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
GT-VMTGT-VMT-2013-MaximovaEE #analysis #graph transformation
Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
CHICHI-2013-AlperBRIF #analysis #comparison #graph
Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHICHI-2013-BrownML #analysis #mobile #video
iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHICHI-2013-GoyalLF #analysis #visualisation
Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
CHICHI-2013-HarpsteadMA #data analysis #education #game studies #learning
In search of learning: facilitating data analysis in educational games (EH, BAM, VA), pp. 79–88.
CHICHI-2013-VellosoBG #analysis #modelling #named
MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
CHICHI-2013-WalshFYD #analysis #design #framework
FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
CHICHI-2013-WangBK #analysis #facebook #gender #topic
Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
CSCWCSCW-2013-AlmuhimediWLSA #analysis #scalability #twitter
Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
CSCWCSCW-2013-Hautasaari #analysis #process #quote #wiki
“Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
CSCWCSCW-2013-Robert #analysis #multi
A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
CSCWCSCW-2013-SmithQC #analysis #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDHM-SET-2013-ChiLC #analysis
The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
HCIDHM-SET-2013-HungCSC #analysis #case study #comparative #education #effectiveness #women
A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
HCIDUXU-CXC-2013-AsanoY #analysis #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-CarvalhoSNM #analysis #comparative #game studies #interactive #usability
Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
HCIDUXU-NTE-2013-BarrosSFCC #analysis #artificial reality #people
Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
HCIDUXU-NTE-2013-Danylak #analysis #gesture #human-computer #interactive
Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
HCIDUXU-NTE-2013-Gyoda #ad hoc #analysis #communication #evaluation #network #performance
Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
HCIDUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability #using
Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
HCIDUXU-PMT-2013-KohnoYSN #analysis #approach #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-ZhangD #analysis #interactive
User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
HCIDUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation
Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
HCIDUXU-WM-2013-Kim13a #analysis #query
Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
HCIHCI-III-2013-IteyaMK #analysis #using #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-KimKAPW #analysis #artificial reality #social
Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
HCIHCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-IMT-2013-Farhadi-NiakiEA #analysis #design #gesture #usability
Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
HCIHCI-IMT-2013-SakataKN #analysis #collaboration #communication #scalability
Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
HCIHCI-IMT-2013-SrivastavaT #analysis #realtime #using
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-TajimaIK #analysis
Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
HCIHIMI-D-2013-KobayashiYA #analysis #behaviour
Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HCIHIMI-D-2013-KotaniKSA #analysis #development #memory management #using
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-SusukiTOM #analysis #behaviour
Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HCIHIMI-HSM-2013-ChiangWCH #analysis #performance #smarttech
An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
HCIHIMI-HSM-2013-HerronV #analysis #bibliography
Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
HCIHIMI-HSM-2013-LeeJ #analysis #simulation #using
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-Noda #analysis #industrial #monitoring #performance #statistics
Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
HCIHIMI-LCCB-2013-AntolosLLV #analysis #using
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-KuritaKWS #analysis
A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HCIHIMI-LCCB-2013-YajimaHY #analysis #communication #design
Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
HCIOCSC-2013-Abascal-MenaLZ #analysis #behaviour #mining #twitter
User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
HCIOCSC-2013-AdnanHAT #analysis #behaviour #eye tracking #network #online #social
Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
HCIOCSC-2013-YamauchiHN #analysis #source code #twitter
Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
VISSOFTVISSOFT-2013-KarranTD #analysis #named #thread #visual notation
SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILTHILT-2013-CarterFHHT #analysis #named
SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
HILTHILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability #using
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
CAiSECAiSE-2013-BeheshtiBN #ad hoc #analysis #aspect-oriented #process
Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
CAiSECAiSE-2013-PapottiPSCP #analysis #code generation #modelling
A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
EDOCEDOC-2013-TranZ #analysis #approach #architecture #verification
Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEISICEIS-J-2013-BouneffaA13a #approach #graph grammar #impact analysis #ontology
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEISICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEISICEIS-J-2013-RothPS13a #analysis #twitter
Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
ICEISICEIS-v1-2013-BentayebK #adaptation #analysis #constraints #semantics
Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
ICEISICEIS-v1-2013-ChiuFW #analysis #collaboration #integration #performance #social
An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
ICEISICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear #using
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-ZaamouneBPB #analysis #approach #multi #relational
A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEISICEIS-v2-2013-CuzzocreaF #analysis #comparative #exclamation #metamodelling #power of #state of the art
Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
ICEISICEIS-v2-2013-SampaioM #analysis
Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
ICEISICEIS-v2-2013-SuB #analysis #composition #data flow #graph #web #web service
Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
ICEISICEIS-v3-2013-AndargoliBK #analysis
Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
ICEISICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #using #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
CIKMCIKM-2013-ArdonBMRSTT #analysis #topic #twitter
Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
CIKMCIKM-2013-FangHZ #analysis #bibliography #sentiment
Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
CIKMCIKM-2013-KellerMWB #adaptation #analysis #flexibility
Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
CIKMCIKM-2013-SubbianAS #analysis #mining #social
Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
ECIRECIR-2013-ChenC #analysis #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-HuiGHL #analysis #keyword
Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
ECIRECIR-2013-NarangNMSD #analysis #evolution #microblog #social #topic
Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
ECIRECIR-2013-PicaultR #analysis #interactive #multi #named #social
SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
ICMLICML-c1-2013-AvronBTZ #analysis #canonical #correlation #performance #reduction
Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
ICMLICML-c1-2013-HanL13a #analysis #component
Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
ICMLICML-c1-2013-LivniLSNSG #analysis #component
Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
ICMLICML-c1-2013-ZhangC #analysis #linear
Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
ICMLICML-c2-2013-ChangKKZ #analysis #canonical #correlation #independence #kernel
Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
ICMLICML-c2-2013-Goerg #analysis #component
Forecastable Component Analysis (GMG), pp. 64–72.
ICMLICML-c3-2013-AndrewABL #analysis #canonical #correlation
Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
ICMLICML-c3-2013-BaktashmotlaghHBLS #analysis #classification #video
Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
ICMLICML-c3-2013-Kuleshov #algorithm #analysis #component #performance
Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
KDDKDD-2013-CaiQ #analysis #linear #on the #rank
On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
KDDKDD-2013-ChenTTY #analysis #kernel #modelling #performance
Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
KDDKDD-2013-DavidsonGCW #analysis #network
Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
KDDKDD-2013-KermanyMBNM #analysis #framework
Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
KDDKDD-2013-MaiyaTLR #analysis #documentation
Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
KDDKDD-2013-SunXY #analysis #component #robust
Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
KDDKDD-2013-WangLLWWC #analysis #named #twitter
SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
KDDKDD-2013-Wright #data analysis #learning #optimisation
Optimization in learning and data analysis (SJW), p. 3.
KDDKDD-2013-ZhuYGM #analysis #modelling #scalability #topic
Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
KDIRKDIR-KMIS-2013-Gonzalez-BrambilaJG #analysis #database #research
Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-LlavoriLGNAS #analysis #framework #named #sentiment #towards
i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
KDIRKDIR-KMIS-2013-OliveiraCL #analysis #concept
Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
KDIRKDIR-KMIS-2013-PapulaVH #analysis #enterprise #network #process
Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
KDIRKDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process
An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
MLDMMLDM-2013-NikovskiWESSMT #data analysis #detection
Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDMMLDM-2013-SentzH #analysis
Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
MLDMMLDM-2013-YasojimaFBOS #analysis #case study #generative #power management
Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
RecSysRecSys-2013-ChowJKS #data analysis #difference #recommendation
Differential data analysis for recommender systems (RC, HJ, BPK, GS), pp. 323–326.
RecSysRecSys-2013-DoerfelJ #analysis #evaluation #recommendation
An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-ChaoY #analysis #order #reachability #scalability
A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
SEKESEKE-2013-HansenM #analysis #ecosystem #network #towards
Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
SEKESEKE-2013-JanesMSS #analysis #problem #programming #requirements
Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (S) (AJ, SM, AS, GS), pp. 226–231.
SEKESEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-NishiuraMWH #analysis #mutation testing #testing
Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
SEKESEKE-2013-SantosBC #analysis #education #game studies #modelling #programming #semantics
A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
SEKESEKE-2013-WangWMX #analysis #how #performance
How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (S) (YW, JW, JM, BX), pp. 537–541.
SEKESEKE-2013-WangZLBCT #analysis #modelling #non-functional #object-oriented #requirements
Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (S) (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
SEKESEKE-2013-WeiX #analysis #e-commerce #effectiveness #evaluation
A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
SIGIRSIGIR-2013-AnH #analysis #information retrieval #probability #semantics
Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
SIGIRSIGIR-2013-ChaBHC #analysis #modelling #network #social #topic
Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
SIGIRSIGIR-2013-GippMBLN #analysis #detection
Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIRSIGIR-2013-GolbusA #analysis #framework #information retrieval
A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
SIGIRSIGIR-2013-PappasP #analysis #collaboration #sentiment
Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
SIGIRSIGIR-2013-SonKP #analysis #locality #recommendation #semantics
A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
AMTAMT-2013-AgirreES #architecture #automation #development #impact analysis #migration #modelling
Automatic Impact Analysis of Software Architecture Migration on Model Driven Software Development (JAA, LE, GS), pp. 52–61.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-SaadB #analysis #data flow
Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MODELSMoDELS-2013-StorrleF #analysis #physics #towards #visual notation
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-SaadB #analysis #data flow
Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MODELSMoDELS-2013-StorrleF #analysis #physics #towards #visual notation
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
ECOOPECOOP-2013-AliL #named #program analysis
Averroes: Whole-Program Analysis without the Whole Program (KA, OL), pp. 378–400.
ECOOPECOOP-2013-AnsaloniKZBBT #composition #java #program analysis #tool support #virtual machine
Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine (DA, SK, YZ, LB, WB, PT), pp. 352–377.
OnwardOnward-2013-Repenning #interactive #program analysis #programming
Conversational programming: exploring interactive program analysis (AR), pp. 63–74.
OnwardOnward-2013-RossoJ #analysis #concept #design #git #what
What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
OnwardOnward-2013-ValleeWZFK #modelling #problem #reasoning #security
Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
OOPSLAOOPSLA-2013-BhattacharyaGN #detection #program analysis
Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLAOOPSLA-2013-ChongDKKQ #abstraction #analysis #gpu #invariant #kernel
Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
OOPSLAOOPSLA-2013-MeyerovichR #analysis #empirical #programming language
Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
OOPSLAOOPSLA-2013-SmaragdakisBK #analysis #points-to #preprocessor
Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
OOPSLAOOPSLA-2013-TetaliLMM #named #static analysis
MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
GPCEGPCE-2013-MarekKZBBTASS #framework #java #named #program analysis #robust
ShadowVM: robust and comprehensive dynamic program analysis for the java platform (LM, SK, YZ, LB, WB, PT, DA, AS, AS), pp. 105–114.
LOPSTRLOPSTR-2013-AlbertGG #analysis #approach
A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
LOPSTRLOPSTR-2013-LiqatKSGLGHE #analysis #energy #modelling #source code
Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
PPDPPPDP-2013-MontenegroPS #analysis #functional #regular expression #using
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
QAPLQAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread
Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
PADLPADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi #using
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
RERE-2013-BreauxR #analysis #formal method #multi #privacy #requirements #specification
Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
RERE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements
Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
RERE-2013-NistalaK #analysis #approach #consistency #requirements #validation
An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
REFSQREFSQ-2013-BonBGALTBFGATA #analysis #case study #requirements
Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
REFSQREFSQ-2013-BreauxG #analysis #requirements #specification #traceability #using
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
SACSAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving #safety
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
SACSAC-2013-AbeniM #analysis #interactive
Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
SACSAC-2013-CameronSNMM #analysis #component #performance #realtime #rule-based
Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
SACSAC-2013-ChenLWW #abstraction #source code #static analysis
Static analysis of list-manipulating programs via bit-vectors and numerical abstractions (LC, RL, XW, JW), pp. 1204–1210.
SACSAC-2013-DelahayeKS #c #dynamic analysis #source code #specification
Common specification language for static and dynamic analysis of C programs (MD, NK, JS), pp. 1230–1235.
SACSAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SACSAC-2013-HogenboomBFBJK #analysis #sentiment
Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
SACSAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SACSAC-2013-KalyanC #analysis #navigation #using
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KoPH #analysis #design #realtime #video
Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
SACSAC-2013-MeloAOAMB #analysis #approach #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SACSAC-2013-PayetDKV #analysis #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
SACSAC-2013-SenatoreP #collaboration #concept analysis #fuzzy #navigation
Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis (SS, GP), pp. 920–926.
SACSAC-2013-TsukudaOYIT #analysis #coordination
Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
SACSAC-2013-VeeraragavanBMVNM #analysis #comprehension #distributed #experience #interactive #metric #multi #quality
Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
SACSAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SACSAC-2013-ZhongM #analysis #empirical #game studies
Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #analysis #data flow #using
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-JiangZLSHGS #analysis #reliability #runtime
System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
ESEC-FSEESEC-FSE-2013-KimMKBSBd #combinator #configuration management #dynamic analysis #lightweight #named #testing
SPLat: lightweight dynamic analysis for reducing combinatorics in testing configurable systems (CHPK, DM, SK, DSB, SS, PB, Md), pp. 257–267.
ESEC-FSEESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability
Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSEESEC-FSE-2013-KumarN #static analysis #tool support
The economics of static analysis tools (RK, AVN), pp. 707–710.
ESEC-FSEESEC-FSE-2013-LiebigRKADL #analysis #scalability
Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
ESEC-FSEESEC-FSE-2013-MadsenLF #framework #javascript #library #static analysis
Practical static analysis of JavaScript applications in the presence of frameworks and libraries (MM, BL, MF), pp. 499–509.
ESEC-FSEESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical
An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSEESEC-FSE-2013-SenKBG #dynamic analysis #framework #javascript #named
Jalangi: a selective record-replay and dynamic analysis framework for JavaScript (KS, SK, TGB, SG), pp. 488–498.
ESEC-FSEESEC-FSE-2013-SenKBG13a #dynamic analysis #framework #javascript #named #testing
Jalangi: a tool framework for concolic testing, selective record-replay, and dynamic analysis of JavaScript (KS, SK, TGB, SG), pp. 615–618.
ESEC-FSEESEC-FSE-2013-WangZCZZ #javascript #program analysis
Extracting URLs from JavaScript via program analysis (QW, JZ, YC, YZ, JZ), pp. 627–630.
ESEC-FSEESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault
Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ESEC-FSEESEC-FSE-2013-ZhengZG #analysis #named #string #web
Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-CarrenoW #analysis #approach #evolution #requirements
Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSEICSE-2013-FilieriPV #analysis #reliability
Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
ICSEICSE-2013-HaoLHG #energy #mobile #program analysis #using
Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSEICSE-2013-Johnson04a #comprehension #program analysis
Novice understanding of program analysis tool notifications (BJ), pp. 1432–1434.
ICSEICSE-2013-JohnsonSMB #debugging #developer #question #static analysis #tool support #why
Why don’t software developers use static analysis tools to find bugs? (BJ, YS, ERMH, RWB), pp. 672–681.
ICSEICSE-2013-Le #analysis
Segmented symbolic analysis (WL), pp. 212–221.
ICSEICSE-2013-Muslu #analysis #development #maintenance
Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
ICSEICSE-2013-NguyenQRC #analysis #named #program repair #semantics
SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
ICSEICSE-2013-SchwankeXC #analysis #architecture #quality
Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
ICSEICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
ICSEICSE-2013-ZhengZ #detection #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
LDTALDTA-J-2009-SoderbergEHM #abstract syntax tree #analysis #syntax
Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
SLESLE-2013-WachsmuthKVGV #analysis #incremental #independence
A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
PLEASEPLEASE-2013-HuangYKHU #analysis #domain-specific language #mining #repository #towards
Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
SPLCSPLC-2013-EichelbergerS #analysis #modelling #variability
A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
SPLCSPLC-2013-KoziolekGGDS #analysis #case study #experience #identification #reuse
Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
SPLCSPLC-2013-McGregor #analysis #ecosystem #modelling #tutorial
Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
CCCC-2013-KastrinisS #analysis #effectiveness #exception #java #performance #points-to
Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
CCCC-2013-LuSXX #analysis #incremental #points-to
An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
CCCC-2013-SiegelS #analysis #named
FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
CGOCGO-2013-JeonGT #named #performance #program analysis
Skadu: Efficient vector shadow memories for poly-scopic program analysis (DJ, SG, MBT), p. 12.
CGOCGO-2013-KruijfS #analysis #code generation #evaluation #implementation
Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
CGOCGO-2013-LaiS #analysis #bound #optimisation #performance
Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
CGOCGO-2013-PienaarH #javascript #memory management #named #static analysis
JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
ISMMISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-MorenoFH #analysis #debugging #embedded
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
PLOSPLOS-2013-BurtsevMER #analysis #named #performance #streaming
Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
PPoPPPPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management
Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
PPoPPPPoPP-2013-YukiFRS #analysis #array #data flow #source code
Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
SOSPSOSP-2013-HuangBRLKL #analysis #facebook
An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
CADECADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #protocol #symmetry #unification
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAVCAV-2013-ChakarovS #probability #program analysis
Probabilistic Program Analysis with Martingales (AC, SS), pp. 511–526.
CAVCAV-2013-FarzanK #bound #named #parallel #static analysis
Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
CAVCAV-2013-HolikLRSV #analysis #automation #automaton
Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
CAVCAV-2013-MeierSCB #analysis #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-Sankur #analysis #automaton #named #robust
Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
ICLPICLP-J-2013-LiangK #analysis #logic programming #scalability #source code
A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
ICLPICLP-J-2013-MaLWRL #analysis #approach #declarative #distributed #execution #specification
A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICSTICST-2013-CarrozzaCNPR #analysis #industrial #predict
Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
ICSTICST-2013-GargantiniGM #analysis #automation #named #robust
AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
ICSTICST-2013-ShuSHP #analysis #dependence #framework #named
JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
ISSTAISSTA-2013-Ghaith #analysis #performance #testing #transaction
Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
ISSTAISSTA-2013-HillsKV #empirical #perspective #php #static analysis
An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
ISSTAISSTA-2013-HowarGR #analysis #generative #hybrid #interface #learning
Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
ISSTAISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
ISSTAISSTA-2013-WeiR #analysis #javascript
Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
LICSLICS-2013-ChaudhuriSV #analysis
Regular Real Analysis (SC, SS, MYV), pp. 509–518.
RTARTA-2013-BauLNW #analysis #term rewriting #termination
Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
TAPTAP-2013-GogollaBC #analysis #benchmark #metric #ocl #tool support #uml
Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
VMCAIVMCAI-2013-DAntoniV #static analysis #string
Static Analysis of String Encoders and Decoders (LD, MV), pp. 209–228.
VMCAIVMCAI-2013-SamantaDC #analysis #robust
Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
VMCAIVMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support #using
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
CBSECBSE-2012-BenesBCO #analysis #component #development #model checking #probability #reliability
Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
CBSECBSE-2012-Carlson #analysis #component #embedded
Timing analysis of component-based embedded systems (JC), pp. 151–156.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
WICSA-ECSAWICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling
Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSAWICSA-ECSA-2012-SuYZ #analysis #architecture #component #semantics
Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
WICSA-ECSAWICSA-ECSA-2012-TauschPA #analysis #domain-specific language #named #traceability
TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
ASEASE-2012-AlmorsyGI #analysis #automation #using
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to #using
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-Shang0X #analysis #experience #incremental #performance #points-to #precise #summary
Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
ASEASE-2012-TamrawiNNN #analysis #named #refactoring
SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASEASE-2012-XiaoTFHM #analysis #privacy
User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
CASECASE-2012-ChenF #analysis #rule-based
Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
CASECASE-2012-ChenZAB #analysis #approach #performance #realtime
Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
CASECASE-2012-ChoiFN #analysis #assembly
Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
CASECASE-2012-CostantinoDEFS #analysis #evaluation #fuzzy #novel #performance
A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
CASECASE-2012-HoerningSWS #analysis #robust #simulation #tool support
Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
CASECASE-2012-Kim #analysis #fuzzy #robust
Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
CASECASE-2012-LinKH #analysis #functional #modelling
Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
CASECASE-2012-LiuJCLX #analysis #canonical #correlation #fault #identification #linear #research
Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
CASECASE-2012-QiaoWZ #analysis #clustering #petri net #scheduling #tool support
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
CASECASE-2012-ShinPKA #analysis #linear
Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-YumKK #analysis #bibliography #perspective
Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
DACDAC-2012-AgostaBP #analysis
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DACDAC-2012-ChungJ #analysis #functional #performance
Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
DACDAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics
Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DACDAC-2012-JungPL #3d #reliability
Chip/package co-analysis of thermo-mechanical stress and reliability in TSV-based 3D ICs (MJ, DZP, SKL), pp. 317–326.
DACDAC-2012-KumarBKV #analysis #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LoS #analysis #execution #monitoring #parallel #runtime #worst-case
Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
DACDAC-2012-MeirR #analysis #biology #named #network #performance #using
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-RajendranPSK #analysis #logic #obfuscation #security
Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
DACDAC-2012-RoyC #analysis #predict
Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
DACDAC-2012-UkhovBEP #analysis #embedded #multi #optimisation #reliability
Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
DACDAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DACDAC-2012-ZhaoSL #3d #analysis
Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
DACDAC-2012-ZolotovSHFVXLV #analysis #statistics
Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
DATEDATE-2012-BesteT #analysis #robust #standard
Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
DATEDATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support
State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
DATEDATE-2012-CaiHMM #analysis #fault #memory management #metric
Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
DATEDATE-2012-ChangCM #analysis
RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
DATEDATE-2012-Chaturvedi #static analysis
Static analysis of asynchronous clock domain crossings (SC), pp. 1122–1125.
DATEDATE-2012-JafariJL #analysis #scheduling #worst-case
Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
DATEDATE-2012-KnothJS #analysis #modelling
Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
DATEDATE-2012-LiH #analysis #logic #named #performance #reliability
RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
DATEDATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-LiuTW #analysis #approach #graph #parallel #statistics
Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
DATEDATE-2012-MaricauJG #analysis #learning #multi #reliability #using
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinhoNPP #analysis #float #scheduling
Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
DATEDATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid #protocol
Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATEDATE-2012-MengC #3d #analysis #energy #performance #runtime
Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
DATEDATE-2012-MiryalaCMP #analysis #network
IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
DATEDATE-2012-NeogyR #analysis #design #injection
Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
DATEDATE-2012-OzTKT #analysis #parallel #thread #trade-off
Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
DATEDATE-2012-PerinTBM #analysis #implementation
Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
DATEDATE-2012-PiscitelliP #analysis #design #hybrid
Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
DATEDATE-2012-QuintonEBY #analysis #challenge #probability #roadmap
Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
DATEDATE-2012-QuintonHE #analysis #formal method #realtime
Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
DATEDATE-2012-RahimiBG #analysis
Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
DATEDATE-2012-RajendranPSK #analysis #encryption #fault #logic #perspective
Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
DATEDATE-2012-RoxEG #analysis #design #network #using
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SchrijenL #analysis #comparative
Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
DATEDATE-2012-TangZBM #analysis #correlation #modelling #statistics
Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
DATEDATE-2012-ThieleE #analysis #data flow #graph #optimisation #performance
Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
DATEDATE-2012-TsaiLL #analysis #configuration management #design
Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
DATEDATE-2012-XuLHRHT #analysis #power management
Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
DATEDATE-2012-ZhangPM #3d #analysis #grid #power management
Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DATEDATE-2012-ZimmermannBR #analysis #multi #power management
Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
DATEDATE-2012-ZohnerKSH #analysis
Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
DocEngDocEng-2012-JunediGL #analysis #independence #revisited #xml
XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
DRRDRR-2012-ChazalonC #analysis #documentation #interactive #performance
Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
HTHT-2012-AisoposPTV #analysis #comparative #microblog #sentiment
Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
HTHT-2012-KlienS #analysis #network
Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
HTHT-2012-NakajimaZIN #analysis #detection #scalability
Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
PODSPODS-2012-LetelierPPS #optimisation #query #semantics #static analysis #web
Static analysis and optimization of semantic web queries (AL, JP, RP, SS), pp. 89–100.
PODSPODS-2012-Mahoney #approximate #data analysis #scalability
Approximate computation and implicit regularization for very large-scale data analysis (MWM), pp. 143–154.
SIGMODSIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance #using
Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
SIGMODSIGMOD-2012-MohanTSSC #data analysis #named #privacy
GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
SIGMODSIGMOD-2012-YangZMWX #analysis #difference #privacy
Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
VLDBVLDB-2012-AlsubaieeAABBBCGHKLOPVW #analysis #big data #data transformation #named #open source
ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
VLDBVLDB-2012-DalviMP #analysis #web
An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
VLDBVLDB-2012-DasTADY #analysis #framework #what
Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
VLDBVLDB-2012-GawadeK #analysis #execution #framework #interactive #named #query #visual notation
Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
VLDBVLDB-2012-LetelierPPS #analysis #named
SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
VLDBVLDB-2012-RoyDMSW #analysis
Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
VLDBVLDB-2012-Shim #algorithm #big data #data analysis #pipes and filters
MapReduce Algorithms for Big Data Analysis (KS), pp. 2016–2017.
VLDBVLDB-2012-SunHYY #analysis #approach #mining #network
Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDBVLDB-2012-XuLGC #analysis #big data #clustering #in the cloud #interactive #named #visual notation
CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
VLDBVLDB-2012-ZhangZXYW #analysis #difference #functional #privacy
Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
VLDBVLDB-2013-ZhaoT12 #analysis #network #scalability #social #visual notation
Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
ITiCSEITiCSE-2012-BrownPSE #analysis #complexity #generative #named
JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
TACASTACAS-2012-BouajjaniE #analysis #bound #message passing #source code
Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACASTACAS-2012-DSilvaHKT #analysis #bound #learning
Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACASTACAS-2012-FehnkerGHMPT #analysis #automation #using
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-FriedmannL #analysis #automaton
Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
TACASTACAS-2012-LoweW #analysis #contest
CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
TACASTACAS-2012-ShvedMM #analysis #contest
Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
TACASTACAS-2012-WangTGLS #analysis #formal method
Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
WRLAWRLA-2012-FadlisyahOA #analysis #formal method #modelling
Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, ), pp. 139–161.
WRLAWRLA-2012-HillsKV #program analysis #rascal
Program Analysis Scenarios in Rascal (MH, PK, JJV), pp. 10–30.
WRLAWRLA-2012-WirsingEMM #analysis #architecture #design #maude
Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
CSMRCSMR-2012-Dovgalyuk #debugging #dynamic analysis #execution #multi
Deterministic Replay of System’s Execution with Multi-target QEMU Simulator for Dynamic Analysis and Reverse Debugging (PD), pp. 553–556.
CSMRCSMR-2012-GauthierM #case study #concept analysis #data access #modelling
Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
CSMRCSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict #using
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-HashimotoM #analysis #fine-grained #mining
Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
CSMRCSMR-2012-HoraADBCVM #analysis #debugging #visual notation
Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
CSMRCSMR-2012-JaszSBOG #impact analysis #using
Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMRCSMR-2012-KazatoHOMHS #concept analysis #feature model #multi
Feature Location for Multi-Layer System Based on Formal Concept Analysis (HK, SH, SO, SM, TH, MS), pp. 429–434.
CSMRCSMR-2012-KimKKB #analysis #database
Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
CSMRCSMR-2012-LamkanfiD #analysis #debugging
Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
CSMRCSMR-2012-PerezDGM #analysis #ecosystem #named
SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
CSMRCSMR-2012-TerceiroMCC #analysis #complexity #comprehension #evolution
Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
ICPCICPC-2012-TenevD #analysis
Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
ICSMEICSM-2012-BauerHHJC #analysis #framework #incremental #quality #scalability
A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
ICSMEICSM-2012-BavotaQOLB #analysis #empirical #maintenance #smell #testing
An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
ICSMEICSM-2012-ChaikalisMC #analysis #evolution #named #network
SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
ICSMEICSM-2012-HindleBZN #analysis #developer #implementation #question #requirements #topic
Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
ICSMEICSM-2012-KimuraHIK #dynamic analysis #refactoring
Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
ICSMEICSM-2012-Pollock #analysis #challenge #natural language
Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
ICSMEICSM-2012-QuAR #impact analysis #testing #using
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RaemaekersDV #analysis #library
Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
ICSMEICSM-2012-RungtaPB #behaviour #evolution #impact analysis
A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
ICSMEICSM-2012-Wilkerson #impact analysis #taxonomy
A software change impact analysis taxonomy (JWW), pp. 625–628.
ICSMEICSM-2012-YazdanshenasM #component #fine-grained #impact analysis #product line
Fine-grained change impact analysis for component-based product families (ARY, LM), pp. 119–128.
MSRMSR-2012-GigerPG #analysis #empirical #predict
Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
MSRMSR-2012-GuanaRHS #analysis #android #architecture #multi
Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
MSRMSR-2012-HarmanJZ #analysis #mining
App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
MSRMSR-2012-RotellaC #analysis #bibliography
Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
SCAMSCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using
Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAMSCAM-2012-GutzmannLL #analysis #framework #points-to
Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
SCAMSCAM-2012-KargenS #analysis #comprehension #data flow #named
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
SCAMSCAM-2012-LazarescuL #analysis #c #dependence #parallel #source code
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
SCAMSCAM-2012-MayerS #analysis #refactoring
Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAMSCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
SCAMSCAM-2012-Xie #analysis #testing
Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
SCAMSCAM-2012-ZollerS #java #named
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
WCREWCRE-2012-ClearySCSP #analysis #assembly #named
ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
WCREWCRE-2012-HanZFHWS #analysis #android #comprehension #debugging #topic
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise #using
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-Kinder #obfuscation #static analysis #towards
Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
WCREWCRE-2012-SteidlHJ #analysis #network #recommendation #using
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
PEPMPEPM-2012-AlbertCPR #analysis #incremental #resource management
Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
PLDIPLDI-2012-BenzHH #float #problem #program analysis
A dynamic program analysis to find floating-point accuracy problems (FB, AH, SH), pp. 453–462.
PLDIPLDI-2012-ChiwKRSS #analysis #domain-specific language #image #named #parallel #visualisation
Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
PLDIPLDI-2012-HolewinskiRRFPRS #analysis
Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
PLDIPLDI-2012-KruijfSJ #compilation #design #static analysis
Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
PLDIPLDI-2012-LeeCFN #hybrid #named #program analysis
Chimera: hybrid program analysis for determinism (DL, PMC, JF, SN), pp. 463–474.
PLDIPLDI-2012-WuTHCY #analysis #parallel #precise #source code
Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
SASSAS-2012-Alonso-BlasG #approach #cost analysis #on the
On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
SASSAS-2012-CalvertM #analysis #calculus #control flow
Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
SASSAS-2012-GoubaultPV #composition #static analysis
Modular Static Analysis with Zonotopes (EG, SP, FV), pp. 24–40.
SASSAS-2012-HenryMM #abstract interpretation #algorithm #analysis #evaluation
Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
SASSAS-2012-HoweK #analysis #parametricity #using
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-KhedkerMR #analysis #pointer
Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
SASSAS-2012-Ledesma-GarzaR #analysis #functional #higher-order #reachability #source code
Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
SASSAS-2012-LeePMH #analysis #parallel #performance
Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
SASSAS-2012-MadhavanRV #analysis #composition #higher-order #source code
Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
STOCSTOC-2012-BrandtIKK #analysis
An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
STOCSTOC-2012-BrunschR #analysis #multi #optimisation
Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
STOCSTOC-2012-ChanP #analysis #bound #fourier #network
Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
FLOPSFLOPS-2012-TobitaTK #analysis #higher-order #model checking
Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
LATALATA-2012-NikolicS #analysis #array
Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
FMFM-2012-BeekMS #analysis #named #variability
VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
FMFM-2012-MinamideM #analysis #html #parsing #reachability #specification #testing
Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
FMFM-2012-NguyenSLDL #analysis
Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
FMFM-2012-OwreSS #analysis #automation #cyber-physical
Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
IFMIFM-2012-BorgerCG #analysis #framework #web
Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
IFMIFM-2012-KazemeyniJOB #analysis #modelling #network #probability
MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
IFMIFM-2012-ZhangNN #model checking #revisited #static analysis
Model Checking as Static Analysis: Revisited (FZ, FN, HRN), pp. 99–112.
SEFMSEFM-2012-AyraultBDP #analysis #dependence #ml
ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
SEFMSEFM-2012-CuoqKKPSY #analysis #named #perspective
Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
SFMSFM-2012-Becker #analysis #model transformation #non-functional
Model Transformations in Non-functional Analysis (SB), pp. 263–289.
SFMSFM-2012-CortellessaMT #analysis #modelling #performance
Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
ICFPICFP-2012-EarlSMH #analysis #automaton #higher-order #source code
Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
ICFPICFP-2012-SimoesVFJH #analysis #automation #functional #lazy evaluation #memory management #source code
Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
IFLIFL-2012-Fluet #analysis #control flow #system f
A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
GRAPHITEGRAPHITE-2012-BeckmannFKM #analysis #graph
A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
CHICHI-2012-BaurBB #analysis #component #music #scalability
Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
CHICHI-2012-BrechtEBG #analysis #network #social
Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
CHICHI-2012-ChuangRMH #analysis #design #modelling #trust #visualisation
Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHICHI-2012-DixonFW #analysis #interface #using #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-FolstadLH #analysis #bibliography #evaluation #usability
Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
CHICHI-2012-KapteinR #analysis #statistics
Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHICHI-2012-MustafaLM #analysis #visual notation
EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
CHICHI-2012-WallnerK #analysis #approach #visualisation
A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CHICHI-2012-WillettHA #crowdsourcing #data analysis #social
Strategies for crowdsourcing social data analysis (WW, JH, MA), pp. 227–236.
CHICHI-2012-ZiemkiewiczGL #analysis #graph #visualisation
Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
CSCWCSCW-2012-BorgeGSC #analysis #process
Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
CSCWCSCW-2012-EhrlichC #analysis #communication #development #distributed #multi #performance
All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
CSCWCSCW-2012-HarboeMIH #collaboration #data analysis #diagrams
Computer support for collaborative data analysis: augmenting paper affinity diagrams (GH, JM, II, EMH), pp. 1179–1182.
CSCWCSCW-2012-KeeganGC #analysis #collaboration #editing #multi #network #statistics #wiki
Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
CSCWCSCW-2012-McDonaldGZ #analysis #prototype #social #type system
Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
CSCWCSCW-2012-NguyenF #analysis #how
How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
HILTHILT-2012-LiSRM #analysis #protocol #realtime #scheduling
Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
CAiSECAiSE-2012-ZawawyKMM #analysis #logic #markov #network #using
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
EDOCEDOC-2012-BinzLNS #analysis #enterprise #graph transformation #segmentation
Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
EDOCEDOC-2012-BurattinMAS #analysis #declarative #process
Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
EDOCEDOC-2012-WangWART #analysis #composition #ecosystem #modelling
Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
ICEISICEIS-J-2012-AmarGMHLN12a #automation #concept analysis
Finding Semi-Automatically a Greatest Common Model Thanks to Formal Concept Analysis (BA, AOG, AM, MH, TL, CN), pp. 72–91.
ICEISICEIS-J-2012-GeJG #analysis #recommendation
Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
ICEISICEIS-v1-2012-AmarGMHLN #concept analysis #using
Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEISICEIS-v2-2012-ChenIAPGLMW #enterprise #impact analysis #scalability
Change Impact Analysis for Large-scale Enterprise Systems (WC, AI, AA, JP, CG, ML, TSEM, AW), pp. 359–368.
ICEISICEIS-v2-2012-FonteBCGH #evaluation #program analysis #using
Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEISICEIS-v2-2012-PolasikGWKPT #analysis #mobile #process
Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
ICEISICEIS-v2-2012-SemenovV #analysis #architecture #social #social media
Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
ICEISICEIS-v3-2012-BauerEFH #analysis #consistency #process
Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
ICEISICEIS-v3-2012-BonacinHRPB #analysis #aspect-oriented #challenge #problem #social
Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
ICEISICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi #using
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
CIKMCIKM-2012-AmatiAG #analysis #microblog
Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
CIKMCIKM-2012-AshkanC #analysis #behaviour #modelling
Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
CIKMCIKM-2012-DengSZ #analysis #documentation #performance #scalability
Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
CIKMCIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKMCIKM-2012-EldardiryN #analysis #classification #graph #how #predict
An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
CIKMCIKM-2012-HuHXLUZ #analysis #mining
Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
CIKMCIKM-2012-JatowtT #analysis #scalability
Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
CIKMCIKM-2012-JatowtT12a #analysis #comparative #readability #wiki
Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
CIKMCIKM-2012-Jin #analysis #multi #process #profiling
User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
CIKMCIKM-2012-KazaiCYT #analysis #fault #information retrieval
An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
CIKMCIKM-2012-LeelanupabZJ #analysis #cumulative #parametricity
A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
CIKMCIKM-2012-LiuW #analysis #on the #semantics
On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
CIKMCIKM-2012-LiuZG #analysis #ranking
Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
CIKMCIKM-2012-RahmanBH #algorithm #analysis #approximate #graph #named #scalability
GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
CIKMCIKM-2012-YueJHH #analysis #collaboration #query #web
Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
ECIRECIR-2012-AlbakourKNASFR #analysis #query #web
Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
ECIRECIR-2012-Bloom #analysis #graph
Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
ECIRECIR-20