7059 papers:
- CBSE-2015-KimBNMLSLP #analysis #probability #scheduling
- Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
- ECSA-2015-StierKGR #analysis #architecture #energy #modelling #performance
- Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
- ECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability
- Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
- WICSA-2015-AbukwaikNR #analysis #concept
- A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
- CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- CASE-2015-HanZ #analysis #energy
- Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
- CASE-2015-JiaZAX #analysis #performance
- Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
- CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
- CASE-2015-NonakaSLNKK #analysis #simulation #statistics
- The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
- CASE-2015-SaezMBT #analysis #hybrid #performance #realtime #simulation
- Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
- CASE-2015-XiePLLY #analysis
- Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
- CASE-2015-XieZLSD #agile #analysis #approach #multi #process
- Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
- CASE-2015-ZhongLBM #analysis #modelling
- Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
- DAC-2015-ChangHLW #analysis #encoding #functional #named
- TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
- DAC-2015-ChenTSHK #analysis #modelling #multi #reliability
- Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
- DAC-2015-EspinosaHAAR #analysis #correlation #robust #set #verification
- Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
- DAC-2015-HanF #analysis #approach #cpu #gpu #graph #scalability
- Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
- DAC-2015-KrishnaNRT #analysis #composition #modelling #product line
- Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
- DAC-2015-LiuZWYX #analysis #difference #encryption #fault #named
- DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
- DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
- DAC-2015-RoseM #analysis #design #performance
- Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
- DAC-2015-ThieleAE #analysis #scheduling
- Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
- DAC-2015-YangTJ #analysis
- Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
- DATE-2015-AhmadyanGNCV #analysis #diagrams #performance
- Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
- DATE-2015-AndradeMVAPL #analysis #data flow #modelling
- Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
- DATE-2015-BaldwinBRPB #analysis #array #predict #using
- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
- DATE-2015-BiondiB #analysis #modelling
- Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
- DATE-2015-ChangD #analysis #model checking #modelling #using
- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
- DATE-2015-DeyCAM #analysis #difference #fault
- Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
- DATE-2015-FeldS #analysis #dependence
- Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
- DATE-2015-GuanTW0 #analysis #realtime
- Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
- DATE-2015-HoqueMS #analysis #approach #maintenance #model checking #probability #reliability #towards
- Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
- DATE-2015-IqtedarHSH #analysis #distributed #probability
- Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
- DATE-2015-KhosraviMGT #analysis #optimisation #reliability
- Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
- DATE-2015-KriebelRSASH #analysis #combinator #configuration management #fault #named #performance
- ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
- DATE-2015-LezosDM #analysis #distance #locality #optimisation #reuse
- Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
- DATE-2015-MacherSBAK #analysis #named
- SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
- DATE-2015-MajumderLBP #analysis #architecture #manycore #probability
- NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
- DATE-2015-RamboE #analysis #communication #worst-case
- Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
- DATE-2015-SeylerSGNT #analysis #formal method
- Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
- DATE-2015-SonghoriMLK #automation #data analysis #framework #hardware #named
- AHEAD: automated framework for hardware accelerated iterative data analysis (EMS, AM, XL, FK), pp. 942–947.
- DATE-2015-ThangamuthuCCL #analysis #network
- Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
- DATE-2015-WartelKGBSTQLMB #analysis #case study #hardware
- Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
- DocEng-2015-NicholasB #analysis #documentation
- Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
- DRR-2015-ChenSWLHI #analysis #dataset #documentation #layout
- Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
- HT-2015-ApaolazaHJ #analysis #behaviour #interactive #low level #web
- Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
- HT-2015-Baeza-YatesS #analysis #generative
- Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
- HT-2015-BurnapCS #analysis #classification #communication #twitter
- Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
- HT-2015-MishraDBS #analysis #incremental #learning #sentiment
- Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
- SIGMOD-2015-0002KBDHKFG #coordination #program analysis #protocol #transaction
- The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
- SIGMOD-2015-ElgamalYAMH #analysis #big data #component #distributed #named #scalability
- sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
- SIGMOD-2015-ZengADAS #analysis #big data #interactive #named #online
- G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
- VLDB-2015-BrancotteYBBDH #analysis #rank
- Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
- VLDB-2015-YangCLW #analysis #nearest neighbour #query
- Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
- ITiCSE-2015-BellettiniLMMMT #analysis #how #performance #student
- How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
- ITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using
- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
- ITiCSE-2015-UraiUO #analysis #distributed #programming
- Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
- ESOP-2015-0002S #automation #cost analysis #parallel #source code
- Automatic Static Cost Analysis for Parallel Programs (JH, ZS), pp. 132–157.
- ESOP-2015-CernyHKRZ #abstraction #analysis #execution #worst-case
- Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
- ESOP-2015-ChengR #detection #spreadsheet #static analysis
- Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
- ESOP-2015-EmmiGMR #analysis #source code
- Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
- ESOP-2015-VasconcelosJFH #analysis #functional #lazy evaluation #recursion #type system
- Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
- TACAS-2015-AlbertFR #analysis #cumulative
- Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
- TACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification
- SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
- TACAS-2015-DjoudiB #analysis #low level #named
- BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
- TACAS-2015-FleuryLPV #analysis #framework #named
- Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
- TACAS-2015-GuanTAS0 #analysis #refinement #scalability
- Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
- TACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using
- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
- TACAS-2015-Immler #analysis #reachability
- Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
- TACAS-2015-KongGCC #analysis #hybrid #named
- dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
- TACAS-2015-NamjoshiT #analysis #network #process
- Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
- TACAS-2015-Sankur #analysis #automaton #robust
- Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
- ICPC-2015-LafetaMR #dynamic analysis #framework #using
- Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
- ICPC-2015-MartinCAA #analysis #empirical #open source
- Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
- ICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic
- ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
- ICPC-2015-Zeller #dynamic analysis
- Test complement exclusion: guarantees from dynamic analysis (AZ), pp. 1–2.
- ICSME-2015-DongAS #fault #static analysis #using
- Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
- ICSME-2015-DorningerPK #industrial #static analysis #user interface #using
- Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
- ICSME-2015-GoeminneM #analysis #database #framework #java #towards
- Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
- ICSME-2015-JongelingDS #analysis #re-engineering #research #sentiment #tool support
- Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
- ICSME-2015-KhadkaSKSHJDB #analysis #case study #legacy #what
- Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
- ICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
- Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
- ICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
- ICSME-2015-Yamashita #analysis #assessment #benchmark #case study #experience #metric #quality #visualisation
- Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
- ICSME-2015-YamashitaZFW #analysis #comparative #industrial #open source #replication #smell
- Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
- MSR-2015-ClaesMCV #analysis
- A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
- MSR-2015-MalikZG #analysis #energy
- Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
- MSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using
- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
- SANER-2015-Abi-AntounWKGR #graph #impact analysis
- Impact analysis based on a global hierarchical Object Graph (MAA, YW, EK, AG, VR), pp. 221–230.
- SANER-2015-AlawnehHH #analysis #metamodelling #performance #towards
- Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
- SANER-2015-CaiS #dependence #effectiveness #framework #impact analysis
- A framework for cost-effective dependence-based dynamic impact analysis (HC, RAS), pp. 231–240.
- SANER-2015-CaiS15a #analysis #dependence #fine-grained #named
- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
- SANER-2015-KoboriMI #analysis #evolution #java
- Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
- SANER-2015-LaverdiereBM #analysis #composition #graph #using
- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
- SANER-2015-Martin #analysis #framework #towards
- Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
- SANER-2015-MattsenWS #abstract domain #analysis
- A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
- SANER-2015-MedicherlaK #analysis #approximate #precise #scalability
- Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
- SANER-2015-MuskeB #on the #static analysis #tool support
- On implementational variations in static analysis tools (TM, PB), pp. 512–515.
- SANER-2015-NairJNH #analysis
- A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
- SANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support
- Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
- SANER-2015-SilvaCMS #analysis #fine-grained
- Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
- SCAM-2015-DarizRS #analysis #programmable
- A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
- SCAM-2015-PintoKT #analysis #automation #multi #performance
- Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
- PEPM-2015-HoekH #analysis #php
- Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
- PEPM-2015-KootH #analysis #exception #functional #higher-order #semantics #strict #type system
- Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
- PEPM-2015-VerstoepH #analysis #functional #higher-order #strict
- Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
- PLDI-2015-DeligiannisDKLT #analysis #programming #state machine #testing
- Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
- PLDI-2015-SinghPV #performance #program analysis
- Making numerical program analysis fast (GS, MP, MTV), pp. 303–313.
- PLDI-2015-WeijiangBLK #analysis #dependence
- Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
- SAS-2015-AlbertCJR #cost analysis #distributed #parallel
- Parallel Cost Analysis of Distributed Systems (EA, JC, EBJ, GRD), pp. 275–292.
- SAS-2015-AlbertGG #analysis #interprocedural #source code
- May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
- SAS-2015-AldousM #low level #static analysis
- Static Analysis of Non-interference in Expressive Low-Level Languages (PA, MM), pp. 1–17.
- SAS-2015-BakhirkinBP #analysis #set
- A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
- SAS-2015-CastelnuovoNRSY #analysis #bottom-up #case study #composition #top-down
- Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
- SAS-2015-CattaruzzaASK #analysis #bound
- Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
- SAS-2015-LeeHYC #static analysis
- Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
- SAS-2015-LiRC #analysis
- Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
- SAS-2015-LiTX #analysis #effectiveness
- Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
- SAS-2015-RapoportLT #analysis #correlation #data flow #precise
- Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
- STOC-2015-DworkFHPRR #adaptation #data analysis #statistics
- Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
- STOC-2015-SchulmanS #algorithm #analysis #matrix
- Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
- DLT-2015-BrandlS #analysis #automaton #complexity #finite #monad
- Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
- ICALP-v2-2015-Boreale #analysis #approximate #generative #probability
- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
- FM-2015-AlbertACGGMPR #analysis #concurrent #distributed #source code
- Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
- FM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
- FM-2015-Damm #analysis #automation #lessons learnt #named #verification
- AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
- FM-2015-LiuH #analysis #android #case study #kernel #security
- Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
- FM-2015-NelsonFK #difference #network #program analysis
- Static Differential Program Analysis for Software-Defined Networks (TN, ADF, SK), pp. 395–413.
- SEFM-2015-KamaliHKP #analysis #distributed #formal method
- Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
- ICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification
- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
- ICGT-2015-TaentzerG #analysis #confluence #graph transformation #towards
- Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
- CHI-2015-AmershiCDLSS #analysis #machine learning #named #performance #tool support
- ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
- CHI-2015-AsthanaSG #analysis #assessment #human-computer
- Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
- CHI-2015-ButlerASGP #analysis #automation #design #game studies
- Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
- CHI-2015-DerbovenMS #analysis #case study #design #multimodal
- Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
- CHI-2015-HourcadeMWP #analysis #exclamation #using
- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
- CHI-2015-HoyleTACK #analysis #privacy #smarttech
- Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
- CHI-2015-HuangSHH #analysis #how
- How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
- CHI-2015-LesselAK #analysis #people
- Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
- CHI-2015-OskampBHG #analysis #design #evaluation #multi #named
- TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
- CHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
- How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
- CHI-2015-TinatiKSLSS #case study #data analysis #design #framework #multi
- Designing for Citizen Data Analysis: A Cross-Sectional Case Study of a Multi-Domain Citizen Science Platform (RT, MVK, EPBS, MLR, RJS, NS), pp. 4069–4078.
- CHI-2015-VatavuW #analysis #elicitation #formal method #metric #tool support
- Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
- CHI-2015-Wacharamanotham #analysis #named #statistics
- Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
- CSCW-2015-MacLeanGLMH #analysis #health #named #online
- Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
- CSCW-2015-SavageM #analysis #online
- Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
- DHM-EH-2015-Hu0LZY #3d #analysis #development #finite
- Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
- DHM-EH-2015-HuDLZY #analysis
- Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
- DHM-EH-2015-HuZZRL #analysis #correlation
- Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
- DHM-EH-2015-KanazawaOWWTGH15a #analysis #experience
- Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
- DHM-EH-2015-LiuCKQF #data analysis #power management
- Balancing Power Consumption and Data Analysis Accuracy Through Adjusting Sampling Rates: Seeking for the Optimal Configuration of Inertial Sensors for Power Wheelchair Users (TL, CC, MK, GQ, JF), pp. 184–192.
- DHM-EH-2015-TianLYJCS #analysis #scalability #video
- Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
- DHM-EH-2015-UchidaHKEMOUG #analysis #process #using
- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
- DHM-EH-2015-ZhouYLXZ #analysis
- Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
- DHM-HM-2015-BoringJM #analysis #modelling #performance #reliability
- Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
- DHM-HM-2015-GotoLTYH #analysis #eye tracking
- Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
- DHM-HM-2015-IkaiMKIH #analysis
- Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
- DHM-HM-2015-KitajimaKMMMH #analysis #comprehension #process
- Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
- DHM-HM-2015-KurataniHHKUGH #analysis #comparison #process
- Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
- DHM-HM-2015-SendaSKST #analysis #process
- Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
- DHM-HM-2015-SudaTHYGH #analysis #process
- Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
- DHM-HM-2015-SugimotoYNG #analysis #process
- EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
- DHM-HM-2015-WangTTITGH #analysis
- Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
- DHM-HM-2015-WangTTTGH #analysis #process
- Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
- DHM-HM-2015-WangTTTGH15a #analysis #process
- Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
- DUXU-DD-2015-EmanuelRM #analysis #interactive
- Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
- DUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
- Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
- DUXU-DD-2015-OliveiraMMM #analysis #behaviour #design
- Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
- DUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability
- Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
- DUXU-IXD-2015-IwamotoKM #analysis #case study #using
- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
- DUXU-IXD-2015-KoshiyamaPR #analysis #architecture #repository #usability
- Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
- DUXU-IXD-2015-Naskova #analysis #usability
- Usability Analysis of IxDA.org (JN), pp. 63–73.
- DUXU-IXD-2015-OliveiraVSBRS #analysis #interactive #usability
- Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
- DUXU-IXD-2015-RaffaeleAJCPCS #analysis #game studies #legacy #multi #usability
- Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
- DUXU-UI-2015-DaggeFR #analysis #comparative #named #process
- HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
- DUXU-UI-2015-KronbauerMS #analysis #evaluation #experience #interactive #mobile #user interface
- Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
- DUXU-UI-2015-LeeKK #analysis #case study #experience #user interface
- A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
- DUXU-UI-2015-MarcusB #analysis #design
- Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
- DUXU-UI-2015-MarczalJ #analysis #behaviour #mobile
- Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
- DUXU-UI-2015-Nawrot #data analysis #difference #gender #question #towards #women
- Gender Differences in Temporal Data Analysis — Toward Women or Men Empowerment? (IN), pp. 232–242.
- DUXU-UI-2015-RodriguesEM #analysis #collaboration
- Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
- HCI-DE-2015-GrobelnyM #algorithm #analysis #comparative #design #grid #visual notation
- Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
- HCI-DE-2015-HashizumeK #analysis #smarttech #usability
- Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
- HCI-IT-2015-MurataM #analysis #eye tracking #using
- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
- HCI-IT-2015-MutoM #analysis #development #interactive
- Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
- HCI-IT-2015-SarsharNR #analysis #human-computer #on the #smarttech #usability
- On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
- HCI-IT-2015-SatoAOO #analysis #automation #classification #image
- Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
- HCI-IT-2015-ZhuF #analysis #game studies #online
- A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
- HCI-UC-2015-Ujita #analysis #reliability #using
- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
- HIMI-IKC-2015-HayashiH #analysis #concept #learning #process
- Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
- HIMI-IKC-2015-MakhtarI #analysis #evaluation
- An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
- HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
- HIMI-IKC-2015-WangN #analysis #identification #matrix
- Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
- HIMI-IKC-2015-YamadaAY #analysis #internet
- An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
- HIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation
- Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
- HIMI-IKD-2015-MorizumiA #analysis #using
- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
- LCT-2015-AltanC #analysis #animation #education
- An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, KÇ), pp. 3–13.
- LCT-2015-DalipiYK #analysis #performance #semantics #using
- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
- SCSM-2015-GerritsenB #analysis #predict
- Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
- SCSM-2015-KastratiIYD #analysis #network #online #social #using
- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
- SCSM-2015-KinclNPS #analysis #independence #sentiment
- Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
- AdaEurope-2015-JaradatBP #analysis #maintenance #safety #using
- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
- AdaEurope-2015-ZamoranoG #analysis #scheduling
- Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
- ICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation
- Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
- ICEIS-v2-2015-Judrups #analysis #information management #integration
- Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
- ICEIS-v2-2015-PerezNGD #analysis #development #process
- A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
- ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
- ICEIS-v2-2015-SouzaVS #analysis #semantics
- Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
- ICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy
- Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
- ICEIS-v3-2015-BauerBTR #analysis #flexibility #maintenance #repository
- A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
- ICEIS-v3-2015-ThabetGG #analysis #mining #petri net #process
- Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
- ICEIS-v3-2015-ValentimCM #analysis #case study #specification
- Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
- ECIR-2015-BansalBV #analysis #semantics #towards
- Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
- ECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using
- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
- ECIR-2015-CaoC #analysis #behaviour #detection #social #social media
- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
- ECIR-2015-HienertHWK #analysis #named
- WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
- ECIR-2015-HuynhHR #analysis #learning #sentiment #strict
- Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
- ECIR-2015-Kelly #analysis #estimation #information retrieval #statistics
- Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
- ECIR-2015-KoolenBBK #analysis #social #social media
- Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
- ECIR-2015-Moghaddam #analysis #fault #feedback #mining #sentiment
- Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
- ECIR-2015-SabetghadamLBR #analysis #graph #reachability
- Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
- ICML-2015-GanCHCC #analysis #modelling #scalability #topic
- Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
- ICML-2015-GongY #analysis #convergence #memory management
- A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
- ICML-2015-HuangGS #analysis #component #independence
- Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
- ICML-2015-KomiyamaHN #analysis #multi #probability #problem
- Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
- ICML-2015-MaLF #analysis #canonical #correlation #dataset #linear #scalability
- Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
- ICML-2015-NishiharaLRPJ #analysis #convergence
- A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
- ICML-2015-PerrotH #analysis #learning #metric
- A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
- ICML-2015-PrasadPR #analysis #axiom #rank
- Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
- ICML-2015-WangWS #analysis #clustering
- A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
- ICML-2015-YangX15a #analysis #component #streaming
- Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
- ICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
- ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
- KDD-2015-ChaoHZ #analysis #kernel
- Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
- KDD-2015-EmbarBPV #analysis #online #social #topic
- Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
- KDD-2015-NagarajanWBNBHT #analysis #predict
- Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
- KDD-2015-OkumuraST #analysis #classification #incremental #linear #problem
- Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
- KDD-2015-ZhangLZSKYJ #analysis #biology #image #learning #modelling #multi
- Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
- KDD-2015-ZhouLB #analysis #clustering #graph
- Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
- MLDM-2015-AlzahraniAAB #data analysis
- Data Analysis for Courses Registration (NA, RA, NA, GB), pp. 357–367.
- MLDM-2015-CoralloFMACCGS #analysis #approach #sentiment
- Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
- MLDM-2015-KarkkainenS #analysis #component #robust
- Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
- MLDM-2015-KrasotkinaM15a #analysis #approach
- A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
- MLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using
- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
- MLDM-2015-ShaluntsB #analysis #named #sentiment
- SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
- RecSys-2015-SifaOB #analysis #migration
- User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
- RecSys-2015-SousaDBM #analysis #named #network #recommendation
- CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
- SEKE-2015-BarchetSF #analysis #collaboration #dependence #risk management
- Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
- SEKE-2015-GokhaleE #analysis #network #social
- Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
- SEKE-2015-RamosCRSAP #analysis #architecture #recommendation
- Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
- SEKE-2015-SaputriL #analysis #machine learning #perspective
- Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
- SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
- SEKE-2015-Tasse #analysis #identification #metric #using
- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
- SEKE-2015-ValeSSA #agile #analysis #evaluation #industrial #named #process
- RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
- SEKE-2015-ZhangGAU #analysis #mobile
- Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
- SEKE-2015-ZouCH #impact analysis #mobile #topic #user interface
- Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps (QZ, XC, YH), pp. 477–482.
- SIGIR-2015-Dori-Hacohen #analysis #detection
- Controversy Detection and Stance Analysis (SDH), p. 1057.
- SIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards
- Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
- SIGIR-2015-KrstovskiSK #analysis #modelling #retrieval
- Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
- SIGIR-2015-SeverynM15a #analysis #network #sentiment #twitter
- Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
- MoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
- A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
- MoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
- A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
- AMT-2015-GholizadehDKM #analysis #model transformation
- Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
- BX-2015-HidakaBTM #analysis #approach #bidirectional #graph transformation
- Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
- ECMFA-2015-BerardinelliMPP #analysis #design #energy
- Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
- MoDELS-2015-Rodriguez-Echeverria #analysis #approach #evolution #model transformation #statistics
- A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
- ECOOP-2015-Alimadadi0P #hybrid #impact analysis #javascript
- Hybrid DOM-Sensitive Change Impact Analysis for JavaScript (SA, AM, KP), pp. 321–345.
- ECOOP-2015-CentonzePT #analysis
- Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
- ECOOP-2015-HauzarK #framework #php #static analysis
- Framework for Static Analysis of PHP Applications (DH, JK), pp. 689–711.
- ECOOP-2015-ParkR #javascript #precise #scalability #static analysis
- Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity (CP, SR), pp. 735–756.
- ECOOP-2015-WeiR #adaptation #analysis #javascript
- Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
- OOPSLA-2015-DaraisMH #composition #program analysis #reuse
- Galois transformers and modular abstract interpreters: reusable metatheory for program analysis (DD, MM, DVH), pp. 552–571.
- OOPSLA-2015-DietrichHS #analysis #java #points-to
- Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
- OOPSLA-2015-FuBS #analysis #automation #fault
- Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
- OOPSLA-2015-MadsenTL #javascript #static analysis
- Static analysis of event-driven Node.js JavaScript applications (MM, FT, OL), pp. 505–519.
- OOPSLA-2015-OhYY #adaptation #learning #optimisation #program analysis
- Learning a strategy for adapting a program analysis via bayesian optimisation (HO, HY, KY), pp. 572–588.
- OOPSLA-2015-ToffolaPG #dynamic analysis #performance #problem
- Performance problems you can fix: a dynamic analysis of memoization opportunities (LDT, MP, TRG), pp. 607–622.
- GPCE-2015-El-SharkawyKS #analysis #semantics #tool support
- Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
- PPDP-2015-GarciaLL #static analysis
- Static analysis of cloud elasticity (AG, CL, ML), pp. 125–136.
- PPDP-2015-Hofmann #analysis #automation
- Automatic amortized analysis (MH), p. 5.
- QAPL-2015-RosendahlK #analysis #probability
- Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
- POPL-2015-ChatterjeePV #analysis #interprocedural
- Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
- POPL-2015-PredaGLM #analysis #automaton #bytecode #semantics #similarity
- Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
- POPL-2015-TangWZXZM #analysis #data flow
- Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
- SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
- SAC-2015-DuanZHX #analysis #framework #network #performance
- Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
- SAC-2015-FerreiraMME #analysis #comparison #kernel #memory management
- An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
- SAC-2015-GimenesGRG #analysis #graph #multimodal #repository
- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
- SAC-2015-IqbalKK #analysis #sentiment
- Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
- SAC-2015-IsraelHS #analysis #multi #semantics #summary
- Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
- SAC-2015-Jung0B #analysis #embedded #encoding #identification #power management
- Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
- SAC-2015-KrutzMS #analysis #detection #effectiveness #using
- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
- SAC-2015-LopezR #analysis #metaprogramming
- Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
- SAC-2015-MaltaPSBF #analysis #bibliography #case study #distance #information management
- A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
- SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- SAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation
- Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
- SAC-2015-OjameruayeB #analysis #framework
- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
- SAC-2015-PiMMG #analysis #health #ontology #security
- Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
- SAC-2015-Puffitsch #analysis #bound #branch #predict
- Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
- SAC-2015-RaniseTV #analysis #automation #constraints #policy
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- SAC-2015-SilvaMS #analysis #quality
- Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
- ESEC-FSE-2015-0002SGBZ #automation #impact analysis #named #natural language #requirements
- NARCIA: an automated tool for change impact analysis in natural language requirements (CA, MS, AG, LCB, FZ), pp. 962–965.
- ESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
- ESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer
- Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
- ESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
- ESEC-FSE-2015-LiLWH #analysis #android #java #string
- String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
- ESEC-FSE-2015-MangalZNN #approach #program analysis
- A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
- ESEC-FSE-2015-SmithJMCL #developer #security #static analysis
- Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
- ICSE-v1-2015-AvgustinovBHLMM #developer #static analysis
- Tracking Static Analysis Violations over Time to Capture Developer Characteristics (PA, AIB, ASH, RGL, GM, OdM, MS, JT), pp. 437–447.
- ICSE-v1-2015-HuangLR #analysis #concurrent #named #predict
- GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
- ICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
- ICSE-v1-2015-PanW0G #analysis #javascript
- Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
- ICSE-v1-2015-PradelSS #analysis #consistency #javascript #named #nondeterminism
- TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
- ICSE-v1-2015-SadowskiGJSW #ecosystem #named #program analysis
- Tricorder: Building a Program Analysis Ecosystem (CS, JvG, CJ, ES, CW), pp. 598–608.
- ICSE-v1-2015-WeissRL #fault #program analysis #scalability
- Database-Backed Program Analysis for Scalable Error Propagation (CW, CRG, BL), pp. 586–597.
- ICSE-v1-2015-YangYWWR #analysis #android #control flow
- Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
- ICSE-v1-2015-YiYLZW #analysis #testing
- A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
- ICSE-v2-2015-AlexandruG #agile #analysis #multi
- Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
- ICSE-v2-2015-Berghe #analysis #security #towards
- Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
- ICSE-v2-2015-Bichhawat #analysis
- Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
- ICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards
- Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
- ICSE-v2-2015-HermansM #analysis #dataset #email #spreadsheet
- Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
- ICSE-v2-2015-KlasBDSH #analysis #evaluation #modelling #scalability #testing
- A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
- ICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
- ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
- ICSE-v2-2015-Palomba #analysis #detection #smell
- Textual Analysis for Code Smell Detection (FP), pp. 769–771.
- ICSE-v2-2015-SadeghiBM #analysis #android #security #using
- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
- ICSE-v2-2015-Zieris #analysis #information management #programming
- Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
- SLE-2015-Bagge #analysis #library
- Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
- SPLC-2015-BeekFG #adaptation #analysis #paradigm #product line
- Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
- SPLC-2015-BeekFGM #analysis #product line #using
- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
- SPLC-2015-BeekLLV #analysis #constraints #modelling #probability #product line #statistics
- Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
- SPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability
- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
- SPLC-2015-KassmeyerSS #impact analysis #process #safety #variability
- A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
- SPLC-2015-LiangGCR #analysis #feature model #modelling #satisfiability #scalability
- SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
- SPLC-2015-YueAS #analysis #case study #cyber-physical #experience #product line
- Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
- ASPLOS-2015-SenguptaBZBK #bound #dynamic analysis #hybrid
- Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
- CC-2015-AllenSK #analysis #points-to #scalability #staged
- Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
- CGO-2015-NagarajG #analysis #approximate #mining #pointer #using
- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
- CGO-2015-OanceaR #analysis #induction #scalability
- Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
- HPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability
- Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
- HPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
- HPDC-2015-SuWA #data analysis #generative #performance
- In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps (YS, YW, GA), pp. 61–72.
- LCTES-2015-0001HL #analysis #kernel #realtime
- Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
- LCTES-2015-BarijoughHKG #analysis #streaming #trade-off
- Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
- LCTES-2015-StilkerichLES #analysis #embedded #realtime
- A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
- LCTES-2015-ZhangK #abstract interpretation #analysis #persistent #precise
- Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
- PPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread
- Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
- SOSP-2015-HooffLZZ #analysis #named #scalability
- Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
- CAV-2015-AbateBCK #adaptation #analysis #markov #network
- Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
- CAV-2015-BozzanoCGM #analysis #modelling #performance #safety
- Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
- CAV-2015-BozzanoCPJKPRT #analysis #design #safety
- Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
- CSL-2015-ClementeL #analysis #automaton #first-order #reachability
- Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
- CSL-2015-SchwentickVZ #source code #static analysis
- Static Analysis for Logic-based Dynamic Programs (TS, NV, TZ), pp. 308–324.
- ICLP-2015-KieslST #analysis #on the #source code
- On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT).
- ICLP-J-2015-GangeNSSS #horn clause #program analysis #program transformation #representation
- Horn clauses as an intermediate representation for program analysis and transformation (GG, JAN, PS, HS, PJS), pp. 526–542.
- ICST-2015-0001YPGS #analysis #generative #testing #using
- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
- ICST-2015-MidtgaardM #static analysis
- QuickChecking Static Analysis Properties (JM, AM), pp. 1–10.
- ICST-2015-NardoPB #analysis #generative #modelling #mutation testing #testing
- Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
- ISSTA-2015-AquinoBCDP #constraints #program analysis #proving #reuse
- Reusing constraint proofs in program analysis (AA, FAB, MC, GD, MP), pp. 305–315.
- ISSTA-2015-DimjasevicG #analysis #assurance #generative #runtime #testing #verification
- Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
- ISSTA-2015-HuangDMD #analysis #android #precise #scalability
- Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
- ISSTA-2015-QiLAR #analysis #correctness #generative
- An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
- RTA-2015-GenetS #analysis #reachability
- Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
- RTA-2015-NageleFM #analysis #automation #confluence #term rewriting
- Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
- SAT-2015-FalknerLH #analysis #automation #named #performance #satisfiability
- SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
- TAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
- TLCA-2015-HofmannM #analysis #multi #term rewriting
- Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
- VMCAI-2015-BackesR #abstraction #analysis #clustering #graph transformation #infinity
- Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
- VMCAI-2015-NagarS #analysis #using
- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
- VMCAI-2015-PrabhakarS #abstraction #analysis #hybrid
- Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
- ECSA-2014-BerardinelliMP #analysis #design #network #performance
- fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
- ECSA-2014-XiongFPM #architecture #as a service #cost analysis #performance #scalability
- Scalable Architectures for Platform-as-a-Service Clouds: Performance and Cost Analysis (HX, FF, CP, NM), pp. 226–233.
- WICSA-2014-FuZBX #analysis
- A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
- ASE-2014-AbalBW #analysis #debugging #kernel #linux #variability
- 42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
- ASE-2014-Angerer #impact analysis #multi #product line #variability
- Variability-aware change impact analysis of multi-language product lines (FA), pp. 903–906.
- ASE-2014-CaiS #dependence #impact analysis #named #precise #using
- Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
- ASE-2014-EllisHKLLLMM #analysis #automation #requirements
- Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
- ASE-2014-MarasSC #analysis #named #reuse #web
- Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
- ASE-2014-NearJ #analysis #interactive #named #security #web
- Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
- ASE-2014-RamaK #dynamic analysis #refactoring
- A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
- ASE-2014-SeguraSC #analysis #automation #case study #e-commerce #experience #testing #variability
- Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
- ASE-2014-StephenSSE #big data #program analysis
- Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
- ASE-2014-TarvoR #analysis #automation #modelling #parallel #performance #source code #thread
- Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
- CASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling
- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
- CASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using
- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
- CASE-2014-GargSYPCHPAG #analysis #automation #reachability
- Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
- CASE-2014-HanZH #analysis
- System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
- CASE-2014-HuYLC #analysis #automation #modelling #multi #petri net
- Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
- CASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using
- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
- CASE-2014-JiaZAX #analysis
- Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
- CASE-2014-LiaoLCHF #analysis
- Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
- CASE-2014-PengHHW #analysis #effectiveness #metric
- An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
- CASE-2014-WangGWG #analysis #behaviour #generative #multi
- Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
- CASE-2014-WuCT #analysis #memory management #modelling #multi
- Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
- CASE-2014-ZhuWQZ #analysis #clustering #constraints #modelling #multi #petri net #scheduling #tool support
- Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
- DAC-2014-AthavaleMHV #analysis #source code #test coverage #using
- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
- DAC-2014-IyengarG #analysis #embedded #memory management #modelling #power management #robust
- Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
- DAC-2014-KiamehrOTN #analysis #approach #fault
- Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
- DAC-2014-KleebergerMS #analysis
- Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
- DAC-2014-LiangC #analysis #clustering #named #network #probability #reduction #scalability #smarttech
- ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
- DAC-2014-LinL #analysis #parallel #reachability #verification
- Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
- DAC-2014-NandakumarM #analysis
- System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
- DAC-2014-QuintonBHNNE #analysis #design #network
- Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
- DAC-2014-SchneiderPP #agile #analysis #multi
- MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
- DAC-2014-ShankarSWP #analysis #concept #design #specification
- Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
- DAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
- DAC-2014-ShrivastavaRJW #analysis #control flow #fault
- Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
- DAC-2014-SiyoumGC #analysis #data flow
- Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
- DAC-2014-WaksmanRSS #analysis #assessment #functional #identification
- A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
- DAC-2014-XueQBYT #analysis #framework #manycore #scalability
- Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
- DAC-2014-ZhengBB #analysis #identification #named #robust #towards
- CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
- DATE-2014-AltmeyerD #analysis #correctness #on the #precise #probability
- On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
- DATE-2014-BeneventiBVDB #analysis #identification #logic
- Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
- DATE-2014-ButtazzoBB #adaptation #analysis #design
- Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
- DATE-2014-ChenHD #analysis #graph #modelling
- May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
- DATE-2014-ChienYHLC #analysis #geometry #image
- Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
- DATE-2014-EbrahimiETSCA #analysis #embedded #fault
- Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
- DATE-2014-FischerCM #analysis #design #modelling
- Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
- DATE-2014-FrijnsASVGSC #analysis #graph
- Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
- DATE-2014-GanapathyCACGR #analysis #framework #memory management #named #robust
- INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
- DATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance
- Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
- DATE-2014-GhalatyAS #analysis #fault
- Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
- DATE-2014-Guan0 #analysis #performance #scheduling
- General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
- DATE-2014-HoffmanRAA #analysis #fault #memory management
- Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
- DATE-2014-KarakonstantisSSAB #analysis #approach #energy #variability
- A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
- DATE-2014-KhanAHKKRC #analysis #bias
- Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
- DATE-2014-LongLY #analysis #bound #evaluation #modelling #multi
- Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
- DATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf
- Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
- DATE-2014-PandeyV #analysis #fault #safety
- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
- DATE-2014-RadojicicGMP #analysis
- Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
- DATE-2014-RamboTDAE #analysis #realtime
- Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
- DATE-2014-RanaC #analysis #named #reduction #scalability #simulation
- SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
- DATE-2014-SalunkheMB #analysis #data flow #modelling
- Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
- DATE-2014-SiddiqueT #analysis #formal method #towards
- Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
- DATE-2014-SinghSWPWC #analysis #specification
- Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
- DATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction
- Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
- DATE-2014-VijaykumarV #analysis #canonical #statistics #using
- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
- DATE-2014-VillenaS #analysis #network #performance #variability
- Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
- DATE-2014-ZhangB #analysis #probability
- Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
- DATE-2014-ZhangYW #analysis #performance #problem
- Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
- DocEng-2014-DiemKS #analysis #classification #documentation
- Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
- DocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using
- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
- DRR-2014-FengLLLT #analysis #geometry
- Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
- DRR-2014-LiPLD #analysis #online #verification
- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
- DRR-2014-LiuWTLG #analysis #automation #comprehension #image
- Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
- HT-2014-KimWWO #analysis #multi #twitter
- Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
- HT-2014-ZhangBR #analysis #empirical #network #social #social media
- Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
- PODS-2014-Cohen #analysis #graph #sketching
- All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
- PODS-2014-NgoNRR #analysis #worst-case
- Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
- SIGMOD-2014-BlanasWBDS #data analysis #parallel
- Parallel data analysis directly on scientific file formats (SB, KW, SB, BD, AS), pp. 385–396.
- SIGMOD-2014-GulwaniM #data analysis #interactive #named #natural language #programming #spreadsheet
- NLyze: interactive programming by natural language for spreadsheet data analysis and manipulation (SG, MM), pp. 803–814.
- SIGMOD-2014-Musleh #analysis #twitter #visual notation
- Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
- SIGMOD-2014-ZhuGCL #analysis #clustering #graph #sentiment #social #social media
- Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
- VLDB-2014-DeutchMT #analysis #framework #process
- A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
- VLDB-2014-JacobKS #analysis
- A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
- VLDB-2014-Markl #big data #data analysis #declarative #independence
- Breaking the Chains: On Declarative Data Analysis and Data Independence in the Big Data Era (VM), pp. 1730–1733.
- VLDB-2014-MortonBGM #challenge
- Support the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems (KM, MB, DG, JDM), pp. 453–456.
- VLDB-2014-ProserpioGM #data analysis
- Calibrating Data to Sensitivity in Private Data Analysis (DP, SG, FM), pp. 637–648.
- VLDB-2014-ZhangTCO #analysis #data transformation #in memory #performance
- Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
- CSEET-2014-Steppe #analysis #dependence #design #education #graph #using
- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
- ITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using
- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
- ITiCSE-2014-KohNBR #analysis #validation
- Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
- ESOP-2014-Fu #abstraction #analysis #memory management
- Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
- ESOP-2014-MangalNY #analysis #interprocedural
- A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
- FASE-2014-CohenM #analysis #configuration management #semantics #specification
- Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
- FASE-2014-FerraraSB #cost analysis #named
- TouchCost: Cost Analysis of TouchDevelop Scripts (PF, DS, LB), pp. 109–124.
- FASE-2014-HuangDM #analysis #java #type system #web
- Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
- FASE-2014-KowalST #analysis #performance
- Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
- FASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using
- Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
- FASE-2014-SadeghiEM #analysis #mining #repository #security
- Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
- FoSSaCS-2014-BonnetKL #analysis #parallel #probability #process
- Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
- TACAS-2014-BrockschmidtEFFG #analysis #complexity #integer #runtime #source code
- Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
- WRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using
- Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
- WRLA-2014-RochaMM #analysis #smt
- Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
- CSMR-WCRE-2014-AlalfiCD #analysis #clustering #experience #industrial
- Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
- CSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using
- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
- ICPC-2014-BinkleyHLO #analysis #comprehension #source code
- Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
- ICPC-2014-GuptaS #program analysis #quality
- A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
- ICSME-2014-ChaikalisLMC #analysis #evolution #named
- SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
- ICSME-2014-KlattKS #analysis #dependence
- Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
- ICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
- Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
- ICSME-2014-MondalRS #analysis #fine-grained
- A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
- ICSME-2014-Muske #analysis #bibliography #clustering
- Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
- ICSME-2014-SajnaniSOL #analysis #component #quality
- Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
- ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
- ICSME-2014-TaoQ #analysis #concurrent #java #refactoring #source code
- Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
- ICSME-2014-WongXZHZM #analysis #fault #locality #segmentation
- Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
- MSR-2014-BloemenAKO #analysis #database #dependence #open source
- Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
- MSR-2014-FarahTC #analysis #architecture #named #quality #scalability
- OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
- MSR-2014-GuzmanAL #analysis #commit #empirical #git #sentiment
- Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
- MSR-2014-HanamTHL #ranking #static analysis
- Finding patterns in static analysis alerts: improving actionable alert ranking (QH, LT, RH, PL), pp. 152–161.
- MSR-2014-MurgiaTAO #analysis #developer
- Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
- MSR-2014-PleteaVS #analysis #git #security #sentiment
- Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
- MSR-2014-SteidlHJ #analysis #incremental #source code
- Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
- MSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code
- Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
- SCAM-2014-CaiJSZZ #analysis #named #predict
- SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
- SCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread
- C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
- SCAM-2014-LiangSM #analysis #performance
- Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
- SCAM-2014-LiangSMKH #analysis #automaton #exception
- Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
- SCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
- Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
- SCAM-2014-YadegariD #analysis
- Bit-Level Taint Analysis (BY, SD), pp. 255–264.
- PEPM-2014-HanusS #analysis #composition #functional #logic programming #source code
- A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
- PEPM-2014-KerneisSH #continuation #named #performance #static analysis
- QEMU/CPC: static analysis and CPS conversion for safe, portable, and efficient coroutines (GK, CS, SH), pp. 83–94.
- PLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
- PLDI-2014-BorgesFdPV #analysis #composition #probability #quantifier
- Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
- PLDI-2014-MitraLABSG #analysis #debugging #parallel #scalability
- Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
- PLDI-2014-OhLHYY #context-sensitive grammar
- Selective context-sensitivity guided by impact pre-analysis (HO, WL, KH, HY, KY), p. 49.
- PLDI-2014-SmaragdakisKB #analysis #context-sensitive grammar
- Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
- PLDI-2014-ZhangMNY #analysis #bottom-up #hybrid #interprocedural #top-down
- Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
- SAS-2014-AlbertFR #cost analysis #distributed
- Peak Cost Analysis of Distributed Systems (EA, JCF, GRD), pp. 18–33.
- SAS-2014-BakhirkinBP #abstraction #analysis #approximate
- Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
- SAS-2014-BessonJV #java #named #static analysis
- SawjaCard: A Static Analysis Tool for Certifying Java Card Applications (FB, TPJ, PV), pp. 51–67.
- SAS-2014-CoxCR #analysis #automation #source code
- Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
- SAS-2014-MadsenM #analysis #data flow #pointer #reachability
- Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
- SAS-2014-YeSX #analysis #pointer
- Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
- STOC-2014-BhaskaraCMV #analysis
- Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
- STOC-2014-DworkTT0 #analysis #bound #component #privacy
- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
- FLOPS-2014-HoffmannS #analysis #array #integer #type system
- Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
- ICALP-v1-2014-DosaS #analysis
- Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
- LATA-2014-FelgenhauerT #analysis #automaton #reachability
- Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
- LATA-2014-SeidlK #analysis #data flow #interprocedural #xml
- Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
- FM-2014-AntoninoSW #analysis #concurrent #csp #network #process #refinement
- A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
- FM-2014-BaeOM #analysis #multi #semantics
- Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
- FM-2014-ButinM #analysis
- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
- FM-2014-ForejtKNS #analysis #communication #precise #predict #source code
- Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
- FM-2014-KordyLMP #algorithm #analysis #automaton #robust
- A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
- FM-2014-LakshmiAK #analysis #liveness #reachability #using
- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
- FM-2014-LiuGL #analysis #reliability
- MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
- FM-2014-WenMM #analysis #formal method #information management #towards
- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
- IFM-2014-BruniSNN #analysis #protocol #security
- Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
- IFM-2014-CalvaneseKSVZ #analysis #data type
- Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
- IFM-2014-GilmoreTV #analysis #evaluation
- An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
- IFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
- A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
- SEFM-2014-BeckerSAB #analysis #constraints #deployment #fault tolerance #formal method
- A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
- SEFM-2014-BratNSV #abstract interpretation #framework #named #static analysis
- IKOS: A Framework for Static Analysis Based on Abstract Interpretation (GB, JAN, NS, AV), pp. 271–277.
- SEFM-2014-DeganoFG #adaptation #reliability #static analysis
- A Two-Phase Static Analysis for Reliable Adaptation (PD, GLF, LG), pp. 347–362.
- SEFM-2014-GrovO #analysis #consistency #formal method #multi
- Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
- SFM-2014-BubelMH #analysis #execution #modelling
- Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
- ICFP-2014-ChenE #analysis #parametricity #product line #type system
- Type-based parametric analysis of program families (SC, ME), pp. 39–51.
- ICFP-2014-KakiJ #analysis #framework #higher-order #relational
- A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
- IFL-2014-AdsitF #analysis #control flow #performance #system f
- An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
- ILC-2014-LevineY #analysis #assessment #profiling
- Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
- GRAPHITE-2014-DelzannoRT #analysis #protocol
- Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
- GRAPHITE-2014-FernandezKP #analysis #framework #graph grammar #interactive #modelling
- Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
- ICGT-2014-AnjorinLST #graph grammar #model transformation #performance #static analysis
- A Static Analysis of Non-confluent Triple Graph Grammars for Efficient Model Transformation (AA, EL, AS, GT), pp. 130–145.
- CHI-2014-GoyalLCF #analysis #collaboration
- Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
- CHI-2014-LeeSS #analysis #bound #design #research
- Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
- CHI-2014-LiuGFXHK #analysis
- CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
- CHI-2014-ShelleyLMDSS #data analysis #design #student
- Information-building applications: designing for data exploration and analysis by elementary school students (TS, LL, TM, CD, BLS, AS), pp. 2123–2132.
- CHI-2014-Smith #analysis #comprehension #game studies #generative
- Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
- CHI-2014-XuYRFHB #analysis #exclamation
- Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
- CSCW-2014-BackstromK #analysis #facebook #network #social
- Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
- CSCW-2014-KangKK #analysis #collaboration #information management #tool support
- Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
- DHM-2014-ItoTGK #analysis #research
- Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
- DHM-2014-KarlovicPMSRRS #analysis #case study #comparison
- Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
- DHM-2014-MirandaRV #analysis #development #memory management #mobile #testing
- Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
- DHM-2014-OhgiriYYKH #analysis #comparison
- Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
- DHM-2014-OkaGTNH #analysis
- Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
- DHM-2014-SugimotoYG #analysis
- Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
- DHM-2014-WongpatikasereeKT #analysis
- Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
- DHM-2014-ZhouLXZZ #analysis #metric #parametricity
- Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
- DUXU-DI-2014-ChammasQM #analysis #design #interactive
- An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
- DUXU-DI-2014-NovickVSG #analysis #empirical #game studies #usability
- Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
- DUXU-DI-2014-ShafiqICRAAR #analysis #case study #learning #smarttech #usability #user satisfaction #what
- To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
- DUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using
- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
- DUXU-DP-2014-SilvaPS #analysis #concept #using
- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
- DUXU-TMT-2014-FilippiB #analysis #aspect-oriented #functional #human-computer #interactive #nondeterminism
- In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
- DUXU-TMT-2014-NieminenRTN #analysis #collaboration #industrial #information management
- Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
- DUXU-TMT-2014-QuaresmaG #analysis #smarttech #usability
- Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
- DUXU-TMT-2014-Tao #analysis #identification #user interface
- Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
- HCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics
- Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
- HCI-AS-2014-HooeyABF #analysis #design #fault
- Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
- HCI-AS-2014-LandyLNPLM #analysis #comparative #development #predict
- Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
- HCI-AS-2014-RafalakBW #analysis #evaluation
- Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
- HIMI-AS-2014-Coelho #analysis
- Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
- HIMI-AS-2014-JangKJS #analysis #framework #reliability
- A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
- HIMI-AS-2014-TanikawaA #analysis #bibliography
- User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
- HIMI-DE-2014-KimitaNS #analysis #education
- Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
- HIMI-DE-2014-LinKT #analysis #collaboration #design #learning
- A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
- HIMI-DE-2014-NazemiRKK #adaptation #analysis #similarity #visualisation
- User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
- LCT-NLE-2014-BrayshawGNWB #analysis #case study #evaluation #heuristic
- Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
- LCT-NLE-2014-IbanezN #analysis #architecture #interactive
- An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
- LCT-NLE-2014-Jo0L #analysis #empirical #people
- Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
- SCSM-2014-AhangamaLKP #analysis #mobile #monitoring
- Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
- SCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter
- Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
- SCSM-2014-IoannidisPKKFA #analysis #named #social #social media
- SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
- SCSM-2014-LopesMP #analysis #social #web
- Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
- SCSM-2014-MendesFFC #analysis #classification #how #social #using
- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
- VISSOFT-2014-VoineaT #analysis #visual notation
- Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
- AdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis
- Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
- AdaEurope-2014-QamhiehM #analysis #graph #multi #scheduling
- Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
- CAiSE-2014-NobauerSG #analysis #approach #automation #evaluation #product line #similarity
- Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
- CAiSE-2014-RuizCEFP #analysis #information management #process
- Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
- EDOC-2014-FlorezSV #analysis #approach #automation #enterprise #modelling
- Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
- EDOC-2014-Franke #analysis #architecture #enterprise
- Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
- EDOC-2014-MukkamalaHV #analysis #sentiment #social
- Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
- EDOC-2014-NardiFA #analysis #modelling #ontology
- An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
- ICEIS-v1-2014-LettnerZ #data analysis #framework #industrial #product line
- A Data Analysis Framework for High-variety Product Lines in the Industrial Manufacturing Domain (CL, MZ), pp. 209–216.
- ICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management
- Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
- ICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
- ICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation
- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
- ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
- ICEIS-v2-2014-PanfilenkoEML #impact analysis #independence #model transformation #recommendation #requirements
- Recommendations for Impact Analysis of Model Transformations — From the Requirements Model to the Platform-independent Model (DVP, AE, CM, PL), pp. 428–434.
- ICEIS-v2-2014-PereiraZS #concept analysis
- Extraction of Classes Through the Application of Formal Concept Analysis (DP, LZ, MS), pp. 275–282.
- ICEIS-v2-2014-ProcaciSA #analysis #community #metric #online #people #reduction #reliability
- Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
- ICEIS-v2-2014-VieiraJF #analysis #network
- A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
- ICEIS-v3-2014-AlvesVS #analysis #architecture
- Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
- ICEIS-v3-2014-NaranjoSV #analysis #architecture #enterprise #named
- PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
- CIKM-2014-ArapakisLV #analysis #comprehension #gesture
- Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
- CIKM-2014-CarmelMPS #analysis #community #using
- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
- CIKM-2014-JiaDGZ #analysis #community #network
- Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
- CIKM-2014-LinJXWCW #analysis #sentiment
- A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
- CIKM-2014-MengCS #analysis #approximate #keyword #query #semantics
- Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
- CIKM-2014-PhanDXPK #analysis #health #network #physics #process #social
- Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
- CIKM-2014-RahimiSK #analysis #axiom #information retrieval
- Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
- CIKM-2014-RosenthalJ #analysis #enterprise
- Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
- CIKM-2014-ShangLCC #analysis #component #robust
- Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
- CIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social
- People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
- CIKM-2014-TaoIWS #analysis #canonical #correlation
- Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
- CIKM-2014-TaxidouF #agile #analysis #information management #named #realtime #twitter
- RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
- CIKM-2014-WilkieA #analysis #bias #performance #retrieval
- A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
- CIKM-2014-YilmazVCRB #analysis #documentation
- Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
- ECIR-2014-MonizJ #analysis #sentiment
- Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
- ECIR-2014-WilkieA #analysis #bias #empirical #retrieval
- Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
- ICML-c1-2014-ChazalGLM #convergence #data analysis #diagrams #estimation #persistent
- Convergence rates for persistence diagram estimation in Topological Data Analysis (FC, MG, CL, BM), pp. 163–171.
- ICML-c1-2014-MillerBAG #analysis #process
- Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
- ICML-c1-2014-TangMNMZ #analysis #comprehension #modelling #topic
- Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
- ICML-c2-2014-Lopez-PazSSGS #analysis #component #random
- Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
- ICML-c2-2014-MukutaH #analysis #canonical #correlation #probability
- Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
- ICML-c2-2014-NguyenMVEB #analysis #correlation #multi
- Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
- ICML-c2-2014-NieYH #analysis #component #robust
- Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
- ICML-c2-2014-SatoKN #analysis #normalisation
- Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
- ICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using
- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
- ICML-c2-2014-SunZZ #analysis #convergence
- A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
- ICML-c2-2014-TaylorGP #analysis #approximate #linear #programming
- An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
- ICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
- Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
- ICML-c2-2014-TuZWQ #analysis #scalability
- Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
- ICML-c2-2014-ZhaoMXZZ #analysis #component #robust
- Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
- ICPR-2014-AhmadKM #analysis
- Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
- ICPR-2014-AndreuLMG #analysis #automation #classification #gender #image
- Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
- ICPR-2014-ArvanitopoulosBT #analysis #learning
- Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
- ICPR-2014-BauckhageM #analysis #clustering #kernel #web
- Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
- ICPR-2014-BiswasZLMV #analysis #detection #image #using
- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
- ICPR-2014-ChengY #analysis
- Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
- ICPR-2014-ChenYJ #analysis #feature model #linear #robust
- An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
- ICPR-2014-DengHXC #analysis #composition #matrix #rank
- Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
- ICPR-2014-FernandezT #analysis #documentation #layout
- EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
- ICPR-2014-FuscoEM #data analysis #locality #network
- Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
- ICPR-2014-Hess-FloresRJ #analysis #multi #nondeterminism
- Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
- ICPR-2014-HongZP #analysis #estimation #image
- Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
- ICPR-2014-HuDGX #analysis #distance #reduction
- Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
- ICPR-2014-KrytheL #analysis #linear
- Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
- ICPR-2014-KurtekS #analysis #segmentation #using
- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
- ICPR-2014-LinCCLH #analysis #detection
- Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
- ICPR-2014-LinH #analysis #using
- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
- ICPR-2014-LiuS #analysis
- Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
- ICPR-2014-LiuXYZ #analysis
- Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
- ICPR-2014-LiWQXG #analysis #estimation
- Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
- ICPR-2014-MoilanenZP #agile #analysis #difference #using
- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
- ICPR-2014-MollerPB #analysis #quantifier #using
- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
- ICPR-2014-MoriKO #analysis #collaboration #framework #online #search-based
- Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
- ICPR-2014-OhPKHB #analysis #image #personalisation #social
- Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
- ICPR-2014-OkadaFWP #analysis #random
- Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
- ICPR-2014-OnalAVFOOY #analysis #modelling
- Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, IÖ, FTYV), pp. 3339–3344.
- ICPR-2014-SariE #analysis #detection #fault #independence #using
- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
- ICPR-2014-SeckDT #3d #analysis #geometry #using
- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
- ICPR-2014-SlitiHBA #analysis #robust #using
- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
- ICPR-2014-TavakoliYRHS #analysis #eye tracking #recognition
- Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
- ICPR-2014-TuXN #analysis #detection #process
- Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
- ICPR-2014-WangGLYWY #analysis #canonical #correlation
- Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
- ICPR-2014-WatanabeW #analysis #component #distance #learning #metric #performance
- Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
- ICPR-2014-YanRLSS #analysis #clustering #invariant #linear #multi #recognition
- Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
- ICPR-2014-YeWH #analysis #component #graph
- Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
- ICPR-2014-ZhangWGZZ #analysis #using #verification
- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
- KDD-2014-AkibaMK #analysis #network
- Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
- KDD-2014-JiangCWXZY #analysis #behaviour #flexibility #multi #named
- FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
- KDD-2014-LanSB #analysis #learning
- Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
- KDD-2014-TamhaneISDA #analysis #predict #risk management #student
- Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
- KDD-2014-YuH0 #analysis #detection #named #social #social media
- GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
- KDD-2014-ZhuSY #analysis #mining #network #social
- Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
- KDIR-2014-CastelltortL #analysis #graph
- NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
- KDIR-2014-HafethAC #analysis #case study #classification
- Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
- KDIR-2014-LiuF #analysis #classification #sentiment #topic #web
- Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
- KDIR-2014-LiuF14a #analysis #classification #n-gram #sentiment #similarity #web
- Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
- KDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
- Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
- KDIR-2014-WanJLL #analysis #challenge #sentiment #web
- Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
- KEOD-2014-AzaiezA #analysis #how #question #towards
- How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
- KR-2014-BhattST #analysis #architecture #design #experience #industrial #user interface
- Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
- KR-2014-Delgrande #analysis #towards
- Towards a Knowledge Level Analysis of Forgetting (JPD).
- RecSys-2014-NoiaORTS #analysis #recommendation #towards
- An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
- SEKE-2014-BarnesL #analysis #clustering
- Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
- SEKE-2014-ChenHQJ #performance #static analysis #using
- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
- SEKE-2014-El-KharboutlyGF #analysis #security
- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
- SEKE-2014-Garcia-NunesSZB #analysis #collaboration #fuzzy #modelling
- Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
- SEKE-2014-JuniorCMS #data analysis #gpu #repository
- Exploratory Data Analysis of Software Repositories via GPU Processing (JRDSJ, EC, LM, AS), pp. 495–500.
- SEKE-2014-PaikariF #analysis #design #implementation #simulation
- Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
- SEKE-2014-SalmanSD14a #concept analysis #impact analysis #using
- Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
- SEKE-2014-SchotsRS #analysis #performance #process
- A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
- SEKE-2014-VianaCS #analysis #information management
- Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
- SEKE-2014-WangC #analysis #approach #social #visualisation
- User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
- SEKE-2014-WanZWS #analysis #graph #performance #points-to
- Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
- SEKE-2014-YangWSFC #analysis #debugging #fault
- Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
- SIGIR-2014-FangZ #analysis #axiom #information retrieval #modelling #optimisation
- Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
- SIGIR-2014-GoeuriotKL #analysis #information retrieval #query
- An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
- SIGIR-2014-LourencoVPMFP #analysis #sentiment
- Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
- SIGIR-2014-NiuLGCG #data analysis #learning #rank #robust #what
- What makes data robust: a data analysis in learning to rank (SN, YL, JG, XC, XG), pp. 1191–1194.
- SIGIR-2014-PelejaSM #analysis #sentiment
- Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
- SIGIR-2014-ThomasL #composition #data analysis #distance #information retrieval
- Compositional data analysis (CoDA) approaches to distance in information retrieval (PT, DL), pp. 991–994.
- SIGIR-2014-TsolmonL #analysis #modelling #timeline
- An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
- SIGIR-2014-UstaAVOU #analysis #education #how #learning #student
- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
- SIGIR-2014-ZhangL0ZLM #analysis #modelling #recommendation #sentiment
- Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
- AMT-2014-GogollaHH #dynamic analysis #modelling #ocl #on the #uml
- On Static and Dynamic Analysis of UML and OCL Transformation Models (MG, LH, FH), pp. 24–33.
- ECMFA-2014-Moreno-DelgadoDZT #analysis #composition #domain-specific language #flexibility
- Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
- ICMT-2014-GonzalezC #analysis #constraints #generative #model transformation #testing
- Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
- ICMT-2014-GuanaS #analysis
- ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
- ECOOP-2014-LiT #analysis #fault #python #source code
- Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
- ECOOP-2014-WeiR #analysis #behaviour #javascript #points-to
- State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
- OOPSLA-2014-AndreasenM #static analysis
- Determinacy in static analysis for jQuery (EA, AM), pp. 17–31.
- OOPSLA-2014-BrutschyF0 #developer #independence #static analysis
- Static analysis for independent app developers (LB, PF, PM), pp. 847–860.
- OOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using
- Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
- OOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web
- Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
- OOPSLA-2014-ParrHF #adaptation #dynamic analysis #ll #parsing #power of
- Adaptive LL(*) parsing: the power of dynamic analysis (TP, SH, KF), pp. 579–598.
- OOPSLA-2014-ZhangXZYS #alias #analysis #c #performance
- Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
- POPL-2014-ChaudhuriFK #analysis #consistency #source code
- Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
- POPL-2014-CoughlinC #analysis #composition #invariant
- Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
- POPL-2014-SergeyVJ #analysis #composition #higher-order #theory and practice
- Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
- POPL-2014-SharmaNA #program analysis #trade-off
- Bias-variance tradeoffs in program analysis (RS, AVN, AA), pp. 127–138.
- RE-2014-AnishG #analysis #requirements
- Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
- RE-2014-BadgerTC #analysis #design #named #requirements #verification
- VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
- RE-2014-GuzmanM #analysis #fine-grained #how #sentiment
- How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
- RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
- RE-2014-NguyenGA #analysis #automation #named #ontology #requirements
- GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
- RE-2014-SaxenaC #agile #analysis #named #requirements
- Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
- REFSQ-2014-AlebrahimFHM #analysis #interactive #problem #requirements
- Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
- REFSQ-2014-NairVMTdB #analysis #problem #safety #traceability
- Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
- REFSQ-2014-RiegelD #analysis #elicitation #heuristic #optimisation #performance
- An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
- REFSQ-2014-SannierB #analysis #approach #modelling #named #requirements
- INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
- REFSQ-2014-SethiaP #analysis #elicitation #empirical #performance #requirements
- The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
- REFSQ-2014-YangLJC #adaptation #analysis #bibliography #modelling #requirements #self
- A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
- SAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology
- Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
- SAC-2014-ChangCHKL #analysis #behaviour #mobile
- Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
- SAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
- SAC-2014-HalderZC #analysis #database #information management #query
- Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
- SAC-2014-HuangLD #analysis #modelling #multi #network #performance
- Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
- SAC-2014-HuangYKYLYGFQ #analysis #clustering #self
- Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
- SAC-2014-KangI #dynamic analysis
- Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
- SAC-2014-KangS #analysis #implementation #scheduling
- Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
- SAC-2014-KumeNNS #dynamic analysis #framework
- A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
- SAC-2014-OliveiraO #analysis #kernel #linux
- Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
- SAC-2014-OliveiraSB #analysis #coordination
- Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
- SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
- SAC-2014-ParkH #analysis #network #performance
- Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
- SAC-2014-QuilleTR #analysis
- Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
- SAC-2014-SeoKTC #analysis #framework #network #social
- A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
- SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
- SAC-2014-TragatschnigTZ #impact analysis #using
- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
- SAC-2014-XiaLWZ #analysis #predict
- Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
- SAC-2014-ZhanLS #analysis #in the cloud #mobile
- A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
- FSE-2014-Banerjee #energy #performance #static analysis #testing
- Static analysis driven performance and energy testing (AB), pp. 791–794.
- FSE-2014-DevroeyPCPLS #analysis #mutation testing #variability
- A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
- FSE-2014-FengADA #android #detection #named #semantics #static analysis
- Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
- FSE-2014-Gao #program analysis #testing
- Numerical program analysis and testing (ZG), pp. 779–782.
- FSE-2014-Gui00ND #agile #analysis #named #nondeterminism #reliability #tool support
- RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
- FSE-2014-KashyapDKWGSWH #framework #javascript #named #static analysis
- JSAI: a static analysis platform for JavaScript (VK, KD, EAK, JW, KG, JS, BW, BH), pp. 121–132.
- FSE-2014-LerchHBM #analysis #named #performance #scalability
- FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
- FSE-2014-LuoHEM #analysis #empirical #testing
- An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
- FSE-2014-XiaoCK #analysis #architecture #named #quality #tool support
- Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
- FSE-2014-Yang #analysis #bibliography #network #open source #perspective #social
- Social network analysis in open source software peer review (XY), pp. 820–822.
- ICSE-2014-AndroutsopoulosCDHH #analysis #fault #testing
- An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
- ICSE-2014-BagheriTS #automation #dynamic analysis #named
- TradeMaker: automated dynamic analysis of synthesized tradespaces (HB, CT, KJS), pp. 106–116.
- ICSE-2014-HuangMSZ #analysis #performance #testing
- Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
- ICSE-2014-NguyenKWF #dynamic analysis #invariant #using
- Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
- ICSE-2014-SuR #analysis #empirical #parametricity #probability
- Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
- ICSE-2014-YaoHJ #analysis #case study #equivalence #using
- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
- LDTA-J-2011-SauthoffG #analysis #domain-specific language #optimisation #programming
- Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
- SPLC-2014-DomisSGAK #analysis #case study #experience #industrial #reuse
- Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
- CC-2014-MadsenA #analysis #string
- String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
- CGO-2014-RountevY #analysis #android #user interface
- Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
- CGO-2014-StadlerWM #analysis #java
- Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
- CGO-2014-YeSX #analysis #detection
- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
- HPDC-2014-BeaumontM #analysis #matrix #multi #scheduling
- Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
- HPDC-2014-SuAWBS #analysis #correlation #dataset #distributed #parallel
- Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
- HPDC-2014-YinWFZZ #analysis #middleware #named #scalability #visualisation
- SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
- ISMM-2014-RatnakarN #analysis #constraints #graph #performance #points-to
- Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
- LCTES-2014-BallabrigaCR #analysis
- Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
- LCTES-2014-RoyRWW #analysis #approximate #automation #named
- ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
- OSDI-2014-ChowMFPW #analysis #internet #performance #scalability
- The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
- OSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
- PPoPP-2014-MaAC #algorithm #analysis #manycore #thread
- Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
- CAV-2014-AlglaveKNP #approach #automation #static analysis
- Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
- CAV-2014-ChatterjeeCD #analysis #probability
- CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
- CAV-2014-EsparzaLMMN #analysis #approach #smt
- An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
- CAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using
- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
- CAV-2014-HeizmannHP #analysis #learning #source code #termination
- Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
- CAV-2014-ItzhakyBRST #analysis
- Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
- CAV-2014-LeGQC #analysis #higher-order
- Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
- CAV-2014-SinnZV #bound #complexity #scalability #static analysis
- A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
- ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
- ICST-2014-HaysHB #testing #validation
- Validation of Software Testing Experiments: A Meta-Analysis of ICST 2013 (MH, JHH, ACB), pp. 333–342.
- ICST-2014-LiO #analysis #empirical #modelling #testing
- An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
- ICST-2014-MiicBT #analysis #automation #multi #test coverage #testing
- Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
- ICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing
- Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
- ICST-2014-WiklundSEL #analysis #automation #empirical #testing
- Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
- ISSTA-2014-Chen #constraints #program analysis #proving #reuse #scalability
- Reusing constraint proofs for scalable program analysis (MC), pp. 449–452.
- ISSTA-2014-HendersonPYHWZY #analysis #framework #performance
- Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
- ISSTA-2014-Just #analysis #framework #java #mutation testing #performance #scalability
- The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
- ISSTA-2014-JustEF #analysis #clustering #execution #mutation testing #performance
- Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
- ISSTA-2014-MarinescuHC #analysis #evolution #framework #named
- Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
- ISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
- Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
- ISSTA-2014-XiaoBIMGC #analysis #dependence #effectiveness #type system
- ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
- LICS-CSL-2014-BaierDK #analysis #model checking #probability #trade-off
- Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
- RTA-TLCA-2014-HirokawaM #analysis #automation #complexity
- Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
- RTA-TLCA-2014-LiuDJ #analysis #confluence
- Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
- SAT-2014-BacchusN #algorithm #analysis #satisfiability
- Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
- SMT-2014-CarlssonGP #analysis #constraints #programming #protocol
- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
- SMT-2014-FremontS #program analysis #smt
- Speeding Up SMT-Based Quantitative Program Analysis (DJF, SAS), pp. 3–13.
- VMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability
- Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
- VMCAI-2014-GustavssonGL #analysis #execution #parallel #using
- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
- VMCAI-2014-Mine #abstract interpretation #analysis #relational #thread
- Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
- VMCAI-2014-SchwarzSVA #analysis #precise #source code
- Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
- CBSE-2013-LednickiCS #analysis #execution #worst-case
- Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
- ECSA-2013-BuchgeherW #analysis #architecture #consistency #towards
- Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
- ECSA-2013-GoknilSPM #analysis #constraints #modelling
- Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
- QoSA-2013-BeckerLB #adaptation #analysis #performance #requirements #self #validation
- Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
- QoSA-2013-BerardinelliLM #analysis #execution #non-functional
- Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
- QoSA-2013-KlattK #analysis #architecture #difference
- Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
- QoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance
- Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
- ASE-2013-AnnervazKSS #analysis #domain model #modelling #natural language #quality #requirements
- Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
- ASE-2013-GarciaIM #analysis #architecture #comparative
- A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
- ASE-2013-LetsholoZC #analysis #modelling #named #requirements
- TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
- ASE-2013-OhmannL #analysis #control flow #debugging #lightweight
- Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
- ASE-2013-PalepuXJ #dependence #dynamic analysis #performance #summary
- Improving efficiency of dynamic analysis with dynamic dependence summaries (VKP, G(X, JAJ), pp. 59–69.
- ASE-2013-RosnerSAKF #alloy #analysis #clustering #modelling #named #parallel
- Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
- ASE-2013-Servant #analysis #debugging #using
- Supporting bug investigation using history analysis (FS), pp. 754–757.
- ASE-2013-Wu0LD #analysis #automation #component #dependence #using
- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
- CASE-2013-ChenZAX #analysis #finite
- Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
- CASE-2013-ChenZH #analysis #modelling #performance
- Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
- CASE-2013-FantiIRU #analysis #scheduling #simulation
- A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
- CASE-2013-GiulianiCP #analysis #optimisation
- A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
- CASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
- CASE-2013-Markovski #analysis #synthesis
- Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
- CASE-2013-SaidiM #analysis #configuration management #development #self
- Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
- CASE-2013-WuCY #analysis #policy #reachability
- A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
- CASE-2013-XieLSD #analysis #approach #markov #modelling #process
- Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
- CASE-2013-ZhangH #algorithm #analysis #convergence #coordination #implementation #optimisation #parallel
- Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
- CASE-2013-ZhaoL #analysis #exponential #multi
- Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
- CASE-2013-ZhongLEHF #analysis #modelling #process #testing
- Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
- CASE-2013-ZhouKZS #analysis
- Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
- DAC-2013-AgostaBMP #analysis
- Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
- DAC-2013-AlleMD #analysis #dependence #pipes and filters #runtime #synthesis
- Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
- DAC-2013-AndalamGSRR #analysis #precise
- Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
- DAC-2013-ChippaCRR #analysis #approximate
- Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
- DAC-2013-DingLM #analysis #multi #realtime
- Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
- DAC-2013-EbrahimiAT #analysis #approach #multi
- A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
- DAC-2013-KuruvillaSPVC #analysis #optimisation #set #statistics
- Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
- DAC-2013-LinLM #analysis #hybrid #kernel #reachability #verification
- Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
- DAC-2013-MallikZLCBBBCRBMV #analysis #evaluation #framework #named
- TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
- DAC-2013-Miskov-ZivanovMF #analysis #automation #behaviour #design #network
- Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
- DAC-2013-RaiSST #algorithm #analysis #distributed #network #process
- Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
- DATE-2013-AhmadyanV #analysis #reachability #reduction #set
- Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
- DATE-2013-AitkenFKRR #analysis #how #question #reliability
- Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
- DATE-2013-AlieeGRT #analysis #automation #fault #reliability
- Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
- DATE-2013-BanaiyanMofradDG #analysis #distributed #fault tolerance #modelling
- Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
- DATE-2013-BoleyCAC #analysis #estimation #performance
- Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
- DATE-2013-BundMS #analysis
- Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
- DATE-2013-CaiHMM #analysis #memory management #modelling
- Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
- DATE-2013-CastellanaF #analysis #independence #liveness #scheduling #synthesis
- Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
- DATE-2013-ChenM #analysis #modelling #reliability
- System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
- DATE-2013-ChenRSIFC #analysis #process
- A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
- DATE-2013-DiazSSR #analysis #network #performance #security #simulation
- Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
- DATE-2013-DoganBCABA #analysis #embedded #execution #multi #power management
- Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
- DATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using
- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
- DATE-2013-FirouziKTN #analysis #runtime
- Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
- DATE-2013-GuanYL0 #analysis #approach #estimation
- FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
- DATE-2013-HasanA #analysis #fault #feedback #formal method #using
- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
- DATE-2013-HellwegeHPP #analysis #metric #reliability
- Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
- DATE-2013-ImagawaTOS #analysis #architecture #configuration management #effectiveness
- A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
- DATE-2013-KosmidisCQABC #analysis #design #probability
- Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
- DATE-2013-LishernessLC #analysis #mutation testing
- Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
- DATE-2013-LiZCZ #analysis #multi #simulation
- Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
- DATE-2013-MalburgFF #analysis #comprehension #data flow #design
- Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
- DATE-2013-MaYGGTBH #analysis #architecture #towards #validation
- Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
- DATE-2013-NegreanKE #analysis #manycore
- Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
- DATE-2013-NeukirchnerQMAE #analysis #realtime
- Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
- DATE-2013-PollexFSMMW #analysis #constant #realtime
- Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
- DATE-2013-QianJBTMM #analysis #named #performance #using
- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
- DATE-2013-QuintonNE #analysis #formal method #realtime
- Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
- DATE-2013-RaminiGBB #3d #analysis #manycore #power management #using
- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
- DATE-2013-SchneiderZGMC #analysis #composition
- Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
- DATE-2013-ShahKA #analysis #bound
- Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
- DATE-2013-StanisicVCDMLM #analysis #embedded #performance #power management
- Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
- DATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using
- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
- DATE-2013-TheissingMSSS #analysis #fault
- Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
- DATE-2013-WagnerW #analysis #performance #statistics
- Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
- DATE-2013-WildermannZT #analysis #distributed #game studies #manycore
- Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
- DATE-2013-YaoYW #adaptation #analysis #modelling #online #performance
- Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
- DATE-2013-YilmazSWO #analysis #fault #industrial #scalability #simulation
- Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
- DRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using
- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
- DRR-2013-SimistiraPKC #analysis #online
- Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
- HT-2013-WangQS #analysis #realtime #social #twitter
- Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
- HT-2013-WeiHGLZW #analysis #behaviour #case study #twitter
- Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
- ICDAR-2013-AlkalaiBSL #analysis #identification
- Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
- ICDAR-2013-AntonacopoulosCPP #analysis #contest #layout
- ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
- ICDAR-2013-GriechischML #analysis #online
- Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
- ICDAR-2013-KirbyH #analysis #using
- Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
- ICDAR-2013-LiPXW #analysis #consistency #online #order #verification
- A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
- ICDAR-2013-StammLD #analysis #approach #documentation #multi #partial order
- Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
- ICDAR-2013-TangHF #analysis #approach #recognition
- A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
- ICDAR-2013-WangLD #analysis #recognition
- Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
- ICDAR-2013-WeiBSI #analysis #classification #documentation #evaluation #layout
- Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
- ICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel
- A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
- ICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation #using
- A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
- PODS-2013-CalvaneseGM #analysis #database #perspective #process
- Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
- SIGMOD-2013-GuilleFHZ #analysis #framework #mining #named #open source #social
- SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
- SIGMOD-2013-HuangB0 #data analysis #in the cloud #named #optimisation #statistics
- Cumulon: optimizing statistical data analysis in the cloud (BH, SB, JY), pp. 1–12.
- SIGMOD-2013-LapeineHHG #data analysis #interactive #mobile #query
- Mobile interaction and query optimizationin a protein-ligand data analysis system (ML, KGH, EH, NMG), pp. 1291–1292.
- SIGMOD-2013-MoustafaMDG #analysis #declarative #interactive #named #network
- GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
- SIGMOD-2013-SuZWHZ #analysis #similarity
- Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
- SIGMOD-2013-TaoYLBCHKSWWW #analysis #named #network #research
- Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
- VLDB-2013-DeutchMT #analysis #named #process
- PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
- VLDB-2013-MoyersSWKVBC #analysis #array #image #parallel
- A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
- VLDB-2013-OkcanRPF #analysis #named
- Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
- VLDB-2013-SeoPSL #analysis #distributed #graph #scalability
- Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
- VLDB-2013-SowellSCDG #analysis #in memory #memory management
- An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
- VLDB-2013-Taxidou #analysis #information management #realtime #social #social media
- Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
- ITiCSE-2013-HerreroLOST13a #analysis #empirical #performance
- An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
- ITiCSE-2013-Trakhtenbrot #algorithm #analysis #complexity #concept #problem #student
- Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
- ESOP-2013-AlpuenteBFS #analysis #logic #specification
- Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
- ESOP-2013-CollingbourneDKQ #analysis #gpu #kernel #semantics #verification
- Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
- ESOP-2013-HofmannR #analysis #automation #type inference
- Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
- FASE-2013-LinPEHR #analysis #behaviour #requirements #sequence #specification #string
- Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
- FASE-2013-TrippPCCG #analysis #named #scalability #security #web
- Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
- FoSSaCS-2013-HainryMP #analysis #complexity #process #type system
- Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
- TACAS-2013-BalasubramanianPKL #analysis #multi #named #statechart
- Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
- TACAS-2013-FerraraMP #analysis #data access #policy #self
- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
- TACAS-2013-GodefroidY #analysis #source code
- Analysis of Boolean Programs (PG, MY), pp. 214–229.
- TACAS-2013-Lowe #analysis #contest
- CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
- TACAS-2013-VizelGS #analysis #reachability #using
- Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
- TACAS-2013-Wendler #analysis #contest
- CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
- CSMR-2013-BhattacharyaUNK #analysis #android #debugging #empirical #open source
- An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
- CSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
- Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
- CSMR-2013-JezekHB #analysis #compilation #library
- Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
- CSMR-2013-LehnertFR #impact analysis #rule-based
- Rule-Based Impact Analysis for Heterogeneous Software Artifacts (SL, QuaF, MR), pp. 209–218.
- CSMR-2013-Nagy #data-driven #static analysis
- Static Analysis of Data-Intensive Applications (CN), pp. 435–438.
- ICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
- ICPC-2013-PruijtKB #analysis #architecture #dependence #on the
- On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
- ICPC-2013-SteidlHJ #analysis #quality #source code
- Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
- ICSM-2013-AnandEKSBK #abstraction #analysis #bytecode #framework #memory management #stack
- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
- ICSM-2013-Beck #analysis #multi
- Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
- ICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support
- srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
- ICSM-2013-MartinezDM #abstract syntax tree #analysis #automation
- Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
- ICSM-2013-OsmanCP #algorithm #analysis #diagrams #machine learning
- An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
- ICSM-2013-SahaRS #analysis #evolution #named
- gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
- ICSM-2013-TianLS #analysis #debugging #multi #named #predict
- DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
- ICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics
- Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
- ICSM-2013-YukselS #analysis #automation #case study #classification
- Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
- MSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
- MSR-2013-DemeyerMWL #analysis #exclamation
- Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
- MSR-2013-FuLLDZX #analysis #behaviour #comprehension
- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
- MSR-2013-VasquezDP #analysis #development #mobile #stack overflow #using
- An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
- SCAM-2013-BiallasOCH #analysis #named #pointer
- PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
- SCAM-2013-FabryRJ #analysis #source code
- Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
- SCAM-2013-MuskeBS #bibliography #clustering #reduction #static analysis
- Review efforts reduction by partitioning of static analysis warnings (TBM, AB, TS), pp. 106–115.
- SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
- SCAM-2013-SvajlenkoRD #analysis #generative #named #similarity #tool support
- ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
- WCRE-2013-ClearyGVSSP #analysis #interactive #memory management #multi
- Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
- WCRE-2013-FryW #clustering #fault #maintenance #static analysis
- Clustering static analysis defect reports to reduce maintenance costs (ZPF, WW), pp. 282–291.
- WCRE-2013-SaeidiHKJ #analysis #legacy #modelling #named #tool support
- Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
- PEPM-2013-SunCZ #analysis #constraints #locality #source code
- Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
- PLDI-2013-KastrinisS #analysis #context-sensitive grammar #hybrid #points-to
- Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
- PLDI-2013-SankaranarayananCG #probability #source code #static analysis
- Static analysis for probabilistic programs: inferring whole program properties from finitely many paths (SS, AC, SG), pp. 447–458.
- PLDI-2013-SchaferSDT #analysis
- Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
- PLDI-2013-ZhangLYS #algorithm #alias #analysis #performance
- Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
- PLDI-2013-ZhangNY #abstraction #analysis #data flow #parametricity
- Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
- SAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification
- Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
- SAS-2013-DragoiES #analysis #data type
- Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
- SAS-2013-Goubault #abstract interpretation #source code #static analysis
- Static Analysis by Abstract Interpretation of Numerical Programs and Systems, and FLUCTUAT (EG), pp. 1–3.
- SAS-2013-Sankaranarayanan #static analysis
- Static Analysis in the Continuously Changing World (SS), pp. 4–5.
- SAS-2013-WhiteM #algebra #analysis #memory management #optimisation #using
- Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
- STOC-2013-HardtR #analysis #worst-case
- Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
- STOC-2013-KwokLLGT #algorithm #analysis #clustering #difference #higher-order
- Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
- CIAA-2013-DreyfusHK #analysis #approximate #reachability
- Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
- ICALP-v1-2013-DeDS #algorithm #analysis #difference #fourier #geometry #robust
- A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
- ICALP-v2-2013-HartungNNS #analysis #complexity #graph
- A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
- ICALP-v2-2013-PetricekOM #named #static analysis
- Coeffects: Unified Static Analysis of Context-Dependence (TP, DAO, AM), pp. 385–397.
- LATA-2013-FernauHV #analysis #automaton #multi #problem
- A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
- IFM-2013-GiachinoGLLW #analysis #concurrent #theory and practice
- Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
- IFM-2013-Song00LD #analysis #divide and conquer #reachability
- Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
- SEFM-2013-TranST #composition #static analysis #transaction
- Compositional Static Analysis for Implicit Join Synchronization in a Transactional Setting (TMTT, MS, HT), pp. 212–228.
- SFM-2013-GratieIP #analysis #biology
- ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
- SFM-2013-KopfR #analysis #automation #data flow
- Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
- GT-VMT-2013-MaximovaEE #analysis #graph transformation
- Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
- CHI-2013-AlperBRIF #analysis #comparison #graph
- Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
- CHI-2013-BrownML #analysis #mobile #video
- iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
- CHI-2013-GoyalLF #analysis #visualisation
- Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
- CHI-2013-HarpsteadMA #data analysis #education #game studies #learning
- In search of learning: facilitating data analysis in educational games (EH, BAM, VA), pp. 79–88.
- CHI-2013-VellosoBG #analysis #modelling #named
- MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
- CHI-2013-WalshFYD #analysis #design #framework
- FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
- CHI-2013-WangBK #analysis #facebook #gender #topic
- Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
- CSCW-2013-AlmuhimediWLSA #analysis #scalability #twitter
- Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
- CSCW-2013-Hautasaari #analysis #process #quote #wiki
- “Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
- CSCW-2013-Robert #analysis #multi
- A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
- CSCW-2013-SmithQC #analysis #identification #using
- Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
- DHM-SET-2013-ChiLC #analysis
- The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
- DHM-SET-2013-HungCSC #analysis #case study #comparative #education #effectiveness #women
- A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
- DUXU-CXC-2013-AsanoY #analysis #design
- Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
- DUXU-CXC-2013-CarvalhoSNM #analysis #comparative #game studies #interactive #usability
- Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
- DUXU-NTE-2013-BarrosSFCC #analysis #artificial reality #people
- Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
- DUXU-NTE-2013-Danylak #analysis #gesture #human-computer #interactive
- Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
- DUXU-NTE-2013-Gyoda #ad hoc #analysis #communication #evaluation #network #performance
- Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
- DUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability #using
- Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
- DUXU-PMT-2013-KohnoYSN #analysis #approach #design
- Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
- DUXU-PMT-2013-ZhangD #analysis #interactive
- User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
- DUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation
- Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
- DUXU-WM-2013-Kim13a #analysis #query
- Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
- HCI-III-2013-IteyaMK #analysis #using #visual notation
- Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
- HCI-III-2013-KimKAPW #analysis #artificial reality #social
- Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
- HCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow
- Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
- HCI-IMT-2013-Farhadi-NiakiEA #analysis #design #gesture #usability
- Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
- HCI-IMT-2013-SakataKN #analysis #collaboration #communication #scalability
- Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
- HCI-IMT-2013-SrivastavaT #analysis #realtime #using
- Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
- HCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
- HCI-UC-2013-TajimaIK #analysis
- Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
- HIMI-D-2013-KobayashiYA #analysis #behaviour
- Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
- HIMI-D-2013-KotaniKSA #analysis #development #memory management #using
- Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
- HIMI-D-2013-SusukiTOM #analysis #behaviour
- Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
- HIMI-HSM-2013-ChiangWCH #analysis #performance #smarttech
- An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
- HIMI-HSM-2013-HerronV #analysis #bibliography
- Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
- HIMI-HSM-2013-LeeJ #analysis #simulation #using
- Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
- HIMI-HSM-2013-Noda #analysis #industrial #monitoring #performance #statistics
- Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
- HIMI-LCCB-2013-AntolosLLV #analysis #using
- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
- HIMI-LCCB-2013-KuritaKWS #analysis
- A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
- HIMI-LCCB-2013-YajimaHY #analysis #communication #design
- Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
- OCSC-2013-Abascal-MenaLZ #analysis #behaviour #mining #twitter
- User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
- OCSC-2013-AdnanHAT #analysis #behaviour #eye tracking #network #online #social
- Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
- OCSC-2013-YamauchiHN #analysis #source code #twitter
- Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
- VISSOFT-2013-KarranTD #analysis #named #thread #visual notation
- SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
- AdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
- HILT-2013-CarterFHHT #analysis #named
- SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
- HILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability #using
- Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
- CAiSE-2013-BeheshtiBN #ad hoc #analysis #aspect-oriented #process
- Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
- CAiSE-2013-PapottiPSCP #analysis #code generation #modelling
- A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
- EDOC-2013-TranZ #analysis #approach #architecture #verification
- Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
- ICEIS-J-2013-BouneffaA13a #approach #graph grammar #impact analysis #ontology
- The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
- ICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
- An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
- ICEIS-J-2013-RothPS13a #analysis #twitter
- Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
- ICEIS-v1-2013-BentayebK #adaptation #analysis #constraints #semantics
- Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
- ICEIS-v1-2013-ChiuFW #analysis #collaboration #integration #performance #social
- An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
- ICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear #using
- Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
- ICEIS-v1-2013-ZaamouneBPB #analysis #approach #multi #relational
- A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
- ICEIS-v2-2013-CuzzocreaF #analysis #comparative #exclamation #metamodelling #power of #state of the art
- Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
- ICEIS-v2-2013-SampaioM #analysis
- Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
- ICEIS-v2-2013-SuB #analysis #composition #data flow #graph #web #web service
- Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
- ICEIS-v3-2013-AndargoliBK #analysis
- Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
- ICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #using #web
- Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
- ICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
- CIKM-2013-ArdonBMRSTT #analysis #topic #twitter
- Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
- CIKM-2013-FangHZ #analysis #bibliography #sentiment
- Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
- CIKM-2013-KellerMWB #adaptation #analysis #flexibility
- Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
- CIKM-2013-SubbianAS #analysis #mining #social
- Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
- ECIR-2013-ChenC #analysis #multi #network #topic #using
- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
- ECIR-2013-HuiGHL #analysis #keyword
- Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
- ECIR-2013-NarangNMSD #analysis #evolution #microblog #social #topic
- Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
- ECIR-2013-PicaultR #analysis #interactive #multi #named #social
- SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
- ICML-c1-2013-AvronBTZ #analysis #canonical #correlation #performance #reduction
- Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
- ICML-c1-2013-HanL13a #analysis #component
- Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
- ICML-c1-2013-LivniLSNSG #analysis #component
- Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
- ICML-c1-2013-ZhangC #analysis #linear
- Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
- ICML-c2-2013-ChangKKZ #analysis #canonical #correlation #independence #kernel
- Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
- ICML-c2-2013-Goerg #analysis #component
- Forecastable Component Analysis (GMG), pp. 64–72.
- ICML-c3-2013-AndrewABL #analysis #canonical #correlation
- Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
- ICML-c3-2013-BaktashmotlaghHBLS #analysis #classification #video
- Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
- ICML-c3-2013-Kuleshov #algorithm #analysis #component #performance
- Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
- KDD-2013-CaiQ #analysis #linear #on the #rank
- On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
- KDD-2013-ChenTTY #analysis #kernel #modelling #performance
- Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
- KDD-2013-DavidsonGCW #analysis #network
- Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
- KDD-2013-KermanyMBNM #analysis #framework
- Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
- KDD-2013-MaiyaTLR #analysis #documentation
- Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
- KDD-2013-SunXY #analysis #component #robust
- Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
- KDD-2013-WangLLWWC #analysis #named #twitter
- SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
- KDD-2013-Wright #data analysis #learning #optimisation
- Optimization in learning and data analysis (SJW), p. 3.
- KDD-2013-ZhuYGM #analysis #modelling #scalability #topic
- Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
- KDIR-KMIS-2013-Gonzalez-BrambilaJG #analysis #database #research
- Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
- KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using
- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
- KDIR-KMIS-2013-LlavoriLGNAS #analysis #framework #named #sentiment #towards
- i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
- KDIR-KMIS-2013-OliveiraCL #analysis #concept
- Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
- KDIR-KMIS-2013-PapulaVH #analysis #enterprise #network #process
- Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
- KDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process
- An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
- MLDM-2013-NikovskiWESSMT #data analysis #detection
- Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
- MLDM-2013-SentzH #analysis
- Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
- MLDM-2013-YasojimaFBOS #analysis #case study #generative #power management
- Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
- RecSys-2013-ChowJKS #data analysis #difference #recommendation
- Differential data analysis for recommender systems (RC, HJ, BPK, GS), pp. 323–326.
- RecSys-2013-DoerfelJ #analysis #evaluation #recommendation
- An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
- SEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
- Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
- SEKE-2013-ChaoY #analysis #order #reachability #scalability
- A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
- SEKE-2013-HansenM #analysis #ecosystem #network #towards
- Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
- SEKE-2013-JanesMSS #analysis #problem #programming #requirements
- Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (S) (AJ, SM, AS, GS), pp. 226–231.
- SEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
- SEKE-2013-NishiuraMWH #analysis #mutation testing #testing
- Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
- SEKE-2013-SantosBC #analysis #education #game studies #modelling #programming #semantics
- A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
- SEKE-2013-WangWMX #analysis #how #performance
- How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (S) (YW, JW, JM, BX), pp. 537–541.
- SEKE-2013-WangZLBCT #analysis #modelling #non-functional #object-oriented #requirements
- Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (S) (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
- SEKE-2013-WeiX #analysis #e-commerce #effectiveness #evaluation
- A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
- SIGIR-2013-AnH #analysis #information retrieval #probability #semantics
- Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
- SIGIR-2013-ChaBHC #analysis #modelling #network #social #topic
- Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
- SIGIR-2013-GippMBLN #analysis #detection
- Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
- SIGIR-2013-GolbusA #analysis #framework #information retrieval
- A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
- SIGIR-2013-PappasP #analysis #collaboration #sentiment
- Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
- SIGIR-2013-SonKP #analysis #locality #recommendation #semantics
- A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
- AMT-2013-AgirreES #architecture #automation #development #impact analysis #migration #modelling
- Automatic Impact Analysis of Software Architecture Migration on Model Driven Software Development (JAA, LE, GS), pp. 52–61.
- MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- MoDELS-2013-SaadB #analysis #data flow
- Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
- MoDELS-2013-StorrleF #analysis #physics #towards #visual notation
- Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
- MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- MoDELS-2013-SaadB #analysis #data flow
- Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
- MoDELS-2013-StorrleF #analysis #physics #towards #visual notation
- Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
- ECOOP-2013-AliL #named #program analysis
- Averroes: Whole-Program Analysis without the Whole Program (KA, OL), pp. 378–400.
- ECOOP-2013-AnsaloniKZBBT #composition #java #program analysis #tool support #virtual machine
- Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine (DA, SK, YZ, LB, WB, PT), pp. 352–377.
- Onward-2013-Repenning #interactive #program analysis #programming
- Conversational programming: exploring interactive program analysis (AR), pp. 63–74.
- Onward-2013-RossoJ #analysis #concept #design #git #what
- What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
- Onward-2013-ValleeWZFK #modelling #problem #reasoning #security
- Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
- OOPSLA-2013-BhattacharyaGN #detection #program analysis
- Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
- OOPSLA-2013-ChongDKKQ #abstraction #analysis #gpu #invariant #kernel
- Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
- OOPSLA-2013-MeyerovichR #analysis #empirical #programming language
- Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
- OOPSLA-2013-SmaragdakisBK #analysis #points-to #preprocessor
- Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
- OOPSLA-2013-TetaliLMM #named #static analysis
- MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
- GPCE-2013-MarekKZBBTASS #framework #java #named #program analysis #robust
- ShadowVM: robust and comprehensive dynamic program analysis for the java platform (LM, SK, YZ, LB, WB, PT, DA, AS, AS), pp. 105–114.
- LOPSTR-2013-AlbertGG #analysis #approach
- A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
- LOPSTR-2013-LiqatKSGLGHE #analysis #energy #modelling #source code
- Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
- PPDP-2013-MontenegroPS #analysis #functional #regular expression #using
- Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
- QAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread
- Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
- PADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi #using
- A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
- RE-2013-BreauxR #analysis #formal method #multi #privacy #requirements #specification
- Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
- RE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements
- Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
- RE-2013-NistalaK #analysis #approach #consistency #requirements #validation
- An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
- REFSQ-2013-BonBGALTBFGATA #analysis #case study #requirements
- Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
- REFSQ-2013-BreauxG #analysis #requirements #specification #traceability #using
- Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
- SAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving #safety
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
- SAC-2013-AbeniM #analysis #interactive
- Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
- SAC-2013-CameronSNMM #analysis #component #performance #realtime #rule-based
- Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
- SAC-2013-ChenLWW #abstraction #source code #static analysis
- Static analysis of list-manipulating programs via bit-vectors and numerical abstractions (LC, RL, XW, JW), pp. 1204–1210.
- SAC-2013-DelahayeKS #c #dynamic analysis #source code #specification
- Common specification language for static and dynamic analysis of C programs (MD, NK, JS), pp. 1230–1235.
- SAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
- An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
- SAC-2013-HogenboomBFBJK #analysis #sentiment
- Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
- SAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
- SAC-2013-KalyanC #analysis #navigation #using
- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
- SAC-2013-KoPH #analysis #design #realtime #video
- Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
- SAC-2013-MeloAOAMB #analysis #approach #concept #visual notation
- A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
- SAC-2013-PayetDKV #analysis #execution #scalability
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
- SAC-2013-SenatoreP #collaboration #concept analysis #fuzzy #navigation
- Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis (SS, GP), pp. 920–926.
- SAC-2013-TsukudaOYIT #analysis #coordination
- Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
- SAC-2013-VeeraragavanBMVNM #analysis #comprehension #distributed #experience #interactive #metric #multi #quality
- Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
- SAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech
- A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
- SAC-2013-ZhongM #analysis #empirical #game studies
- Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
- ESEC-FSE-2013-ClaretRNGB #analysis #data flow #using
- Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
- ESEC-FSE-2013-JiangZLSHGS #analysis #reliability #runtime
- System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
- ESEC-FSE-2013-KimMKBSBd #combinator #configuration management #dynamic analysis #lightweight #named #testing
- SPLat: lightweight dynamic analysis for reducing combinatorics in testing configurable systems (CHPK, DM, SK, DSB, SS, PB, Md), pp. 257–267.
- ESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability
- Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
- ESEC-FSE-2013-KumarN #static analysis #tool support
- The economics of static analysis tools (RK, AVN), pp. 707–710.
- ESEC-FSE-2013-LiebigRKADL #analysis #scalability
- Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
- ESEC-FSE-2013-MadsenLF #framework #javascript #library #static analysis
- Practical static analysis of JavaScript applications in the presence of frameworks and libraries (MM, BL, MF), pp. 499–509.
- ESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical
- An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
- ESEC-FSE-2013-SenKBG #dynamic analysis #framework #javascript #named
- Jalangi: a selective record-replay and dynamic analysis framework for JavaScript (KS, SK, TGB, SG), pp. 488–498.
- ESEC-FSE-2013-SenKBG13a #dynamic analysis #framework #javascript #named #testing
- Jalangi: a tool framework for concolic testing, selective record-replay, and dynamic analysis of JavaScript (KS, SK, TGB, SG), pp. 615–618.
- ESEC-FSE-2013-WangZCZZ #javascript #program analysis
- Extracting URLs from JavaScript via program analysis (QW, JZ, YC, YZ, JZ), pp. 627–630.
- ESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault
- Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
- ESEC-FSE-2013-ZhengZG #analysis #named #string #web
- Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
- ICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
- ICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
- Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
- ICSE-2013-CarrenoW #analysis #approach #evolution #requirements
- Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
- ICSE-2013-FilieriPV #analysis #reliability
- Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
- ICSE-2013-HaoLHG #energy #mobile #program analysis #using
- Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
- ICSE-2013-Johnson04a #comprehension #program analysis
- Novice understanding of program analysis tool notifications (BJ), pp. 1432–1434.
- ICSE-2013-JohnsonSMB #debugging #developer #question #static analysis #tool support #why
- Why don’t software developers use static analysis tools to find bugs? (BJ, YS, ERMH, RWB), pp. 672–681.
- ICSE-2013-Le #analysis
- Segmented symbolic analysis (WL), pp. 212–221.
- ICSE-2013-Muslu #analysis #development #maintenance
- Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
- ICSE-2013-NguyenQRC #analysis #named #program repair #semantics
- SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
- ICSE-2013-SchwankeXC #analysis #architecture #quality
- Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
- ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
- ICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using
- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
- ICSE-2013-ZhengZ #detection #execution #static analysis #web
- Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
- LDTA-J-2009-SoderbergEHM #abstract syntax tree #analysis #syntax
- Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
- SLE-2013-WachsmuthKVGV #analysis #incremental #independence
- A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
- PLEASE-2013-HuangYKHU #analysis #domain-specific language #mining #repository #towards
- Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
- SPLC-2013-EichelbergerS #analysis #modelling #variability
- A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
- SPLC-2013-KoziolekGGDS #analysis #case study #experience #identification #reuse
- Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
- SPLC-2013-McGregor #analysis #ecosystem #modelling #tutorial
- Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
- CC-2013-KastrinisS #analysis #effectiveness #exception #java #performance #points-to
- Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
- CC-2013-LuSXX #analysis #incremental #points-to
- An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
- CC-2013-SiegelS #analysis #named
- FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
- CGO-2013-JeonGT #named #performance #program analysis
- Skadu: Efficient vector shadow memories for poly-scopic program analysis (DJ, SG, MBT), p. 12.
- CGO-2013-KruijfS #analysis #code generation #evaluation #implementation
- Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
- CGO-2013-LaiS #analysis #bound #optimisation #performance
- Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
- CGO-2013-PienaarH #javascript #memory management #named #static analysis
- JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
- ISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
- LCTES-2013-HuberPP #analysis #control flow #graph #using
- Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
- LCTES-2013-MorenoFH #analysis #debugging #embedded
- Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
- PLOS-2013-BurtsevMER #analysis #named #performance #streaming
- Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
- PPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management
- Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
- PPoPP-2013-YukiFRS #analysis #array #data flow #source code
- Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
- SOSP-2013-HuangBRLKL #analysis #facebook
- An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
- CADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #protocol #symmetry #unification
- Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
- CAV-2013-ChakarovS #probability #program analysis
- Probabilistic Program Analysis with Martingales (AC, SS), pp. 511–526.
- CAV-2013-FarzanK #bound #named #parallel #static analysis
- Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
- CAV-2013-HolikLRSV #analysis #automation #automaton
- Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
- CAV-2013-MeierSCB #analysis #protocol #proving #security
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
- CAV-2013-Sankur #analysis #automaton #named #robust
- Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
- ICLP-J-2013-LiangK #analysis #logic programming #scalability #source code
- A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
- ICLP-J-2013-MaLWRL #analysis #approach #declarative #distributed #execution #specification
- A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
- ICST-2013-CarrozzaCNPR #analysis #industrial #predict
- Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
- ICST-2013-GargantiniGM #analysis #automation #named #robust
- AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
- ICST-2013-ShuSHP #analysis #dependence #framework #named
- JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
- ISSTA-2013-Ghaith #analysis #performance #testing #transaction
- Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
- ISSTA-2013-HillsKV #empirical #perspective #php #static analysis
- An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
- ISSTA-2013-HowarGR #analysis #generative #hybrid #interface #learning
- Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
- ISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement
- Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
- ISSTA-2013-WeiR #analysis #javascript
- Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
- LICS-2013-ChaudhuriSV #analysis
- Regular Real Analysis (SC, SS, MYV), pp. 509–518.
- RTA-2013-BauLNW #analysis #term rewriting #termination
- Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
- TAP-2013-GogollaBC #analysis #benchmark #metric #ocl #tool support #uml
- Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
- VMCAI-2013-DAntoniV #static analysis #string
- Static Analysis of String Encoders and Decoders (LD, MV), pp. 209–228.
- VMCAI-2013-SamantaDC #analysis #robust
- Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
- VMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support #using
- Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
- CBSE-2012-BenesBCO #analysis #component #development #model checking #probability #reliability
- Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
- CBSE-2012-Carlson #analysis #component #embedded
- Timing analysis of component-based embedded systems (JC), pp. 151–156.
- WICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
- WICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling
- Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
- WICSA-ECSA-2012-SuYZ #analysis #architecture #component #semantics
- Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
- WICSA-ECSA-2012-TauschPA #analysis #domain-specific language #named #traceability
- TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
- ASE-2012-AlmorsyGI #analysis #automation #using
- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
- ASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to #using
- Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
- ASE-2012-Shang0X #analysis #experience #incremental #performance #points-to #precise #summary
- Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
- ASE-2012-TamrawiNNN #analysis #named #refactoring
- SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
- ASE-2012-XiaoTFHM #analysis #privacy
- User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
- CASE-2012-ChenF #analysis #rule-based
- Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
- CASE-2012-ChenZAB #analysis #approach #performance #realtime
- Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
- CASE-2012-ChoiFN #analysis #assembly
- Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
- CASE-2012-CostantinoDEFS #analysis #evaluation #fuzzy #novel #performance
- A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
- CASE-2012-HoerningSWS #analysis #robust #simulation #tool support
- Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
- CASE-2012-Kim #analysis #fuzzy #robust
- Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
- CASE-2012-LinKH #analysis #functional #modelling
- Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
- CASE-2012-LiuJCLX #analysis #canonical #correlation #fault #identification #linear #research
- Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
- CASE-2012-QiaoWZ #analysis #clustering #petri net #scheduling #tool support
- Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
- CASE-2012-ShinPKA #analysis #linear
- Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
- CASE-2012-WangHDS #agile #analysis #protocol #simulation #using
- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
- CASE-2012-YumKK #analysis #bibliography #perspective
- Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
- DAC-2012-AgostaBP #analysis
- A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
- DAC-2012-ChungJ #analysis #functional #performance
- Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
- DAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics
- Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
- DAC-2012-JungPL #3d #reliability
- Chip/package co-analysis of thermo-mechanical stress and reliability in TSV-based 3D ICs (MJ, DZP, SKL), pp. 317–326.
- DAC-2012-KumarBKV #analysis #predict #source code #using
- Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
- DAC-2012-LoS #analysis #execution #monitoring #parallel #runtime #worst-case
- Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
- DAC-2012-MeirR #analysis #biology #named #network #performance #using
- BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
- DAC-2012-RajendranPSK #analysis #logic #obfuscation #security
- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
- DAC-2012-RoyC #analysis #predict
- Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
- DAC-2012-UkhovBEP #analysis #embedded #multi #optimisation #reliability
- Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
- DAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
- PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
- DAC-2012-ZhaoSL #3d #analysis
- Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
- DAC-2012-ZolotovSHFVXLV #analysis #statistics
- Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
- DATE-2012-BesteT #analysis #robust #standard
- Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
- DATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support
- State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
- DATE-2012-CaiHMM #analysis #fault #memory management #metric
- Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
- DATE-2012-ChangCM #analysis
- RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
- DATE-2012-Chaturvedi #static analysis
- Static analysis of asynchronous clock domain crossings (SC), pp. 1122–1125.
- DATE-2012-JafariJL #analysis #scheduling #worst-case
- Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
- DATE-2012-KnothJS #analysis #modelling
- Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
- DATE-2012-LiH #analysis #logic #named #performance #reliability
- RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
- DATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
- A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
- DATE-2012-LiuTW #analysis #approach #graph #parallel #statistics
- Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
- DATE-2012-MaricauJG #analysis #learning #multi #reliability #using
- Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
- DATE-2012-MarinhoNPP #analysis #float #scheduling
- Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
- DATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid #protocol
- Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
- DATE-2012-MengC #3d #analysis #energy #performance #runtime
- Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
- DATE-2012-MiryalaCMP #analysis #network
- IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
- DATE-2012-NeogyR #analysis #design #injection
- Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
- DATE-2012-OzTKT #analysis #parallel #thread #trade-off
- Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
- DATE-2012-PerinTBM #analysis #implementation
- Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
- DATE-2012-PiscitelliP #analysis #design #hybrid
- Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
- DATE-2012-QuintonEBY #analysis #challenge #probability #roadmap
- Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
- DATE-2012-QuintonHE #analysis #formal method #realtime
- Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
- DATE-2012-RahimiBG #analysis
- Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
- DATE-2012-RajendranPSK #analysis #encryption #fault #logic #perspective
- Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
- DATE-2012-RoxEG #analysis #design #network #using
- Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
- DATE-2012-SchrijenL #analysis #comparative
- Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
- DATE-2012-TangZBM #analysis #correlation #modelling #statistics
- Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
- DATE-2012-ThieleE #analysis #data flow #graph #optimisation #performance
- Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
- DATE-2012-TsaiLL #analysis #configuration management #design
- Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
- DATE-2012-XuLHRHT #analysis #power management
- Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
- DATE-2012-ZhangPM #3d #analysis #grid #power management
- Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
- DATE-2012-ZimmermannBR #analysis #multi #power management
- Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
- DATE-2012-ZohnerKSH #analysis
- Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
- DocEng-2012-JunediGL #analysis #independence #revisited #xml
- XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
- DRR-2012-ChazalonC #analysis #documentation #interactive #performance
- Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
- HT-2012-AisoposPTV #analysis #comparative #microblog #sentiment
- Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
- HT-2012-KlienS #analysis #network
- Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
- HT-2012-NakajimaZIN #analysis #detection #scalability
- Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
- PODS-2012-LetelierPPS #optimisation #query #semantics #static analysis #web
- Static analysis and optimization of semantic web queries (AL, JP, RP, SS), pp. 89–100.
- PODS-2012-Mahoney #approximate #data analysis #scalability
- Approximate computation and implicit regularization for very large-scale data analysis (MWM), pp. 143–154.
- SIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance #using
- Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
- SIGMOD-2012-MohanTSSC #data analysis #named #privacy
- GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
- SIGMOD-2012-YangZMWX #analysis #difference #privacy
- Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
- VLDB-2012-AlsubaieeAABBBCGHKLOPVW #analysis #big data #data transformation #named #open source
- ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
- VLDB-2012-DalviMP #analysis #web
- An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
- VLDB-2012-DasTADY #analysis #framework #what
- Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
- VLDB-2012-GawadeK #analysis #execution #framework #interactive #named #query #visual notation
- Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
- VLDB-2012-LetelierPPS #analysis #named
- SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
- VLDB-2012-RoyDMSW #analysis
- Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
- VLDB-2012-Shim #algorithm #big data #data analysis #pipes and filters
- MapReduce Algorithms for Big Data Analysis (KS), pp. 2016–2017.
- VLDB-2012-SunHYY #analysis #approach #mining #network
- Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
- VLDB-2012-XuLGC #analysis #big data #clustering #in the cloud #interactive #named #visual notation
- CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
- VLDB-2012-ZhangZXYW #analysis #difference #functional #privacy
- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
- VLDB-2013-ZhaoT12 #analysis #network #scalability #social #visual notation
- Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
- ITiCSE-2012-BrownPSE #analysis #complexity #generative #named
- JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
- TACAS-2012-BouajjaniE #analysis #bound #message passing #source code
- Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
- TACAS-2012-DSilvaHKT #analysis #bound #learning
- Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
- TACAS-2012-FehnkerGHMPT #analysis #automation #using
- Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
- TACAS-2012-FriedmannL #analysis #automaton
- Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
- TACAS-2012-LoweW #analysis #contest
- CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
- TACAS-2012-ShvedMM #analysis #contest
- Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
- TACAS-2012-WangTGLS #analysis #formal method
- Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
- WRLA-2012-FadlisyahOA #analysis #formal method #modelling
- Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, EÁ), pp. 139–161.
- WRLA-2012-HillsKV #program analysis #rascal
- Program Analysis Scenarios in Rascal (MH, PK, JJV), pp. 10–30.
- WRLA-2012-WirsingEMM #analysis #architecture #design #maude
- Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
- CSMR-2012-Dovgalyuk #debugging #dynamic analysis #execution #multi
- Deterministic Replay of System’s Execution with Multi-target QEMU Simulator for Dynamic Analysis and Reverse Debugging (PD), pp. 553–556.
- CSMR-2012-GauthierM #case study #concept analysis #data access #modelling
- Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
- CSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict #using
- Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
- CSMR-2012-HashimotoM #analysis #fine-grained #mining
- Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
- CSMR-2012-HoraADBCVM #analysis #debugging #visual notation
- Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
- CSMR-2012-JaszSBOG #impact analysis #using
- Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
- CSMR-2012-KazatoHOMHS #concept analysis #feature model #multi
- Feature Location for Multi-Layer System Based on Formal Concept Analysis (HK, SH, SO, SM, TH, MS), pp. 429–434.
- CSMR-2012-KimKKB #analysis #database
- Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
- CSMR-2012-LamkanfiD #analysis #debugging
- Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
- CSMR-2012-PerezDGM #analysis #ecosystem #named
- SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
- CSMR-2012-TerceiroMCC #analysis #complexity #comprehension #evolution
- Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
- ICPC-2012-TenevD #analysis
- Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
- ICSM-2012-BauerHHJC #analysis #framework #incremental #quality #scalability
- A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
- ICSM-2012-BavotaQOLB #analysis #empirical #maintenance #smell #testing
- An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
- ICSM-2012-ChaikalisMC #analysis #evolution #named #network
- SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
- ICSM-2012-HindleBZN #analysis #developer #implementation #question #requirements #topic
- Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
- ICSM-2012-KimuraHIK #dynamic analysis #refactoring
- Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
- ICSM-2012-Pollock #analysis #challenge #natural language
- Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
- ICSM-2012-QuAR #impact analysis #testing #using
- Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
- ICSM-2012-RaemaekersDV #analysis #library
- Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
- ICSM-2012-RungtaPB #behaviour #evolution #impact analysis
- A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
- ICSM-2012-Wilkerson #impact analysis #taxonomy
- A software change impact analysis taxonomy (JWW), pp. 625–628.
- ICSM-2012-YazdanshenasM #component #fine-grained #impact analysis #product line
- Fine-grained change impact analysis for component-based product families (ARY, LM), pp. 119–128.
- MSR-2012-GigerPG #analysis #empirical #predict
- Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
- MSR-2012-GuanaRHS #analysis #android #architecture #multi
- Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
- MSR-2012-HarmanJZ #analysis #mining
- App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
- MSR-2012-RotellaC #analysis #bibliography
- Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
- SCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using
- Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
- SCAM-2012-GutzmannLL #analysis #framework #points-to
- Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
- SCAM-2012-KargenS #analysis #comprehension #data flow #named
- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
- SCAM-2012-LazarescuL #analysis #c #dependence #parallel #source code
- Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
- SCAM-2012-MayerS #analysis #refactoring
- Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
- SCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using
- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
- SCAM-2012-Xie #analysis #testing
- Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
- SCAM-2012-ZollerS #java #named
- AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
- WCRE-2012-ClearySCSP #analysis #assembly #named
- ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
- WCRE-2012-HanZFHWS #analysis #android #comprehension #debugging #topic
- Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
- WCRE-2012-JanaN #detection #dynamic analysis #precise #using
- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
- WCRE-2012-Kinder #obfuscation #static analysis #towards
- Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
- WCRE-2012-SteidlHJ #analysis #network #recommendation #using
- Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
- PEPM-2012-AlbertCPR #analysis #incremental #resource management
- Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
- PLDI-2012-BenzHH #float #problem #program analysis
- A dynamic program analysis to find floating-point accuracy problems (FB, AH, SH), pp. 453–462.
- PLDI-2012-ChiwKRSS #analysis #domain-specific language #image #named #parallel #visualisation
- Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
- PLDI-2012-HolewinskiRRFPRS #analysis
- Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
- PLDI-2012-KruijfSJ #compilation #design #static analysis
- Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
- PLDI-2012-LeeCFN #hybrid #named #program analysis
- Chimera: hybrid program analysis for determinism (DL, PMC, JF, SN), pp. 463–474.
- PLDI-2012-WuTHCY #analysis #parallel #precise #source code
- Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
- SAS-2012-Alonso-BlasG #approach #cost analysis #on the
- On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
- SAS-2012-CalvertM #analysis #calculus #control flow
- Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
- SAS-2012-GoubaultPV #composition #static analysis
- Modular Static Analysis with Zonotopes (EG, SP, FV), pp. 24–40.
- SAS-2012-HenryMM #abstract interpretation #algorithm #analysis #evaluation
- Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
- SAS-2012-HoweK #analysis #parametricity #using
- Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
- SAS-2012-KhedkerMR #analysis #pointer
- Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
- SAS-2012-Ledesma-GarzaR #analysis #functional #higher-order #reachability #source code
- Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
- SAS-2012-LeePMH #analysis #parallel #performance
- Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
- SAS-2012-MadhavanRV #analysis #composition #higher-order #source code
- Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
- STOC-2012-BrandtIKK #analysis
- An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
- STOC-2012-BrunschR #analysis #multi #optimisation
- Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
- STOC-2012-ChanP #analysis #bound #fourier #network
- Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
- FLOPS-2012-TobitaTK #analysis #higher-order #model checking
- Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
- LATA-2012-NikolicS #analysis #array
- Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
- FM-2012-BeekMS #analysis #named #variability
- VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
- FM-2012-MinamideM #analysis #html #parsing #reachability #specification #testing
- Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
- FM-2012-NguyenSLDL #analysis
- Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
- FM-2012-OwreSS #analysis #automation #cyber-physical
- Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
- IFM-2012-BorgerCG #analysis #framework #web
- Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
- IFM-2012-KazemeyniJOB #analysis #modelling #network #probability
- MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
- IFM-2012-ZhangNN #model checking #revisited #static analysis
- Model Checking as Static Analysis: Revisited (FZ, FN, HRN), pp. 99–112.
- SEFM-2012-AyraultBDP #analysis #dependence #ml
- ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
- SEFM-2012-CuoqKKPSY #analysis #named #perspective
- Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
- SFM-2012-Becker #analysis #model transformation #non-functional
- Model Transformations in Non-functional Analysis (SB), pp. 263–289.
- SFM-2012-CortellessaMT #analysis #modelling #performance
- Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
- ICFP-2012-EarlSMH #analysis #automaton #higher-order #source code
- Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
- ICFP-2012-SimoesVFJH #analysis #automation #functional #lazy evaluation #memory management #source code
- Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
- IFL-2012-Fluet #analysis #control flow #system f
- A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
- GRAPHITE-2012-BeckmannFKM #analysis #graph
- A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
- CHI-2012-BaurBB #analysis #component #music #scalability
- Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
- CHI-2012-BrechtEBG #analysis #network #social
- Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
- CHI-2012-ChuangRMH #analysis #design #modelling #trust #visualisation
- Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
- CHI-2012-DixonFW #analysis #interface #using #visual notation
- A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
- CHI-2012-FolstadLH #analysis #bibliography #evaluation #usability
- Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
- CHI-2012-KapteinR #analysis #statistics
- Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
- CHI-2012-MustafaLM #analysis #visual notation
- EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
- CHI-2012-WallnerK #analysis #approach #visualisation
- A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
- CHI-2012-WillettHA #crowdsourcing #data analysis #social
- Strategies for crowdsourcing social data analysis (WW, JH, MA), pp. 227–236.
- CHI-2012-ZiemkiewiczGL #analysis #graph #visualisation
- Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
- CSCW-2012-BorgeGSC #analysis #process
- Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
- CSCW-2012-EhrlichC #analysis #communication #development #distributed #multi #performance
- All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
- CSCW-2012-HarboeMIH #collaboration #data analysis #diagrams
- Computer support for collaborative data analysis: augmenting paper affinity diagrams (GH, JM, II, EMH), pp. 1179–1182.
- CSCW-2012-KeeganGC #analysis #collaboration #editing #multi #network #statistics #wiki
- Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
- CSCW-2012-McDonaldGZ #analysis #prototype #social #type system
- Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
- CSCW-2012-NguyenF #analysis #how
- How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
- HILT-2012-LiSRM #analysis #protocol #realtime #scheduling
- Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
- CAiSE-2012-ZawawyKMM #analysis #logic #markov #network #using
- Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
- EDOC-2012-BinzLNS #analysis #enterprise #graph transformation #segmentation
- Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
- EDOC-2012-BurattinMAS #analysis #declarative #process
- Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
- EDOC-2012-WangWART #analysis #composition #ecosystem #modelling
- Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
- ICEIS-J-2012-AmarGMHLN12a #automation #concept analysis
- Finding Semi-Automatically a Greatest Common Model Thanks to Formal Concept Analysis (BA, AOG, AM, MH, TL, CN), pp. 72–91.
- ICEIS-J-2012-GeJG #analysis #recommendation
- Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
- ICEIS-v1-2012-AmarGMHLN #concept analysis #using
- Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
- ICEIS-v2-2012-ChenIAPGLMW #enterprise #impact analysis #scalability
- Change Impact Analysis for Large-scale Enterprise Systems (WC, AI, AA, JP, CG, ML, TSEM, AW), pp. 359–368.
- ICEIS-v2-2012-FonteBCGH #evaluation #program analysis #using
- Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
- ICEIS-v2-2012-PolasikGWKPT #analysis #mobile #process
- Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
- ICEIS-v2-2012-SemenovV #analysis #architecture #social #social media
- Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
- ICEIS-v3-2012-BauerEFH #analysis #consistency #process
- Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
- ICEIS-v3-2012-BonacinHRPB #analysis #aspect-oriented #challenge #problem #social
- Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
- ICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi #using
- Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
- CIKM-2012-AmatiAG #analysis #microblog
- Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
- CIKM-2012-AshkanC #analysis #behaviour #modelling
- Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
- CIKM-2012-DengSZ #analysis #documentation #performance #scalability
- Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
- CIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
- Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
- CIKM-2012-EldardiryN #analysis #classification #graph #how #predict
- An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
- CIKM-2012-HuHXLUZ #analysis #mining
- Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
- CIKM-2012-JatowtT #analysis #scalability
- Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
- CIKM-2012-JatowtT12a #analysis #comparative #readability #wiki
- Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
- CIKM-2012-Jin #analysis #multi #process #profiling
- User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
- CIKM-2012-KazaiCYT #analysis #fault #information retrieval
- An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
- CIKM-2012-LeelanupabZJ #analysis #cumulative #parametricity
- A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
- CIKM-2012-LiuW #analysis #on the #semantics
- On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
- CIKM-2012-LiuZG #analysis #ranking
- Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
- CIKM-2012-RahmanBH #algorithm #analysis #approximate #graph #named #scalability
- GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
- CIKM-2012-YueJHH #analysis #collaboration #query #web
- Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
- ECIR-2012-AlbakourKNASFR #analysis #query #web
- Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
- ECIR-2012-Bloom #analysis #graph
- Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
- ECIR-2012-KarimzadehganZ #analysis #axiom #information retrieval
- Axiomatic Analysis of Translation Language Model for Information Retrieval (MK, CZ), pp. 268–280.
- ECIR-2012-KarlgrenSOEH #analysis #sentiment
- Usefulness of Sentiment Analysis (JK, MS, FO, FE, OH), pp. 426–435.
- ECIR-2012-ZucconAZW #analysis #retrieval #using
- Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
- ICML-2012-ChenCRCC #analysis #linear
- Communications Inspired Linear Discriminant Analysis (MC, WRC, MRDR, LC, ARC), p. 196.
- ICML-2012-KalaitzisL #analysis #component
- Residual Components Analysis (AAK, NDL), p. 73.
- ICML-2012-MairalY #analysis #complexity
- Complexity Analysis of the Lasso Regularization Path (JM, BY), p. 238.
- ICML-2012-McAfeeO #code generation #network #static analysis
- Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
- ICML-2012-MerchanteGG #analysis #approach #linear #performance
- An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
- ICML-2012-PachauriCS #analysis #problem
- Incorporating Domain Knowledge in Matching Problems via Harmonic Analysis (DP, MDC, VS), p. 112.
- ICML-2012-VogtR #analysis
- A Complete Analysis of the l_1, p Group-Lasso (JEV, VR), p. 143.
- ICML-2012-XuYQ #composition #data analysis #infinity #modelling #multi #parametricity
- Infinite Tucker Decomposition: Nonparametric Bayesian Models for Multiway Data Analysis (ZX, FY, AQ), p. 218.
- ICML-2012-YgerBGR #adaptation #analysis #canonical #correlation #matrix
- Adaptive Canonical Correlation Analysis Based On Matrix Manifolds (FY, MB, GG, AR), p. 43.
- ICML-2012-YuS #analysis #kernel
- Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
- ICPR-2012-Abdel-HakimE #analysis #component #named #online #performance #robust
- FRPCA: Fast Robust Principal Component Analysis for online observations (AEAH, MES), pp. 413–416.
- ICPR-2012-AbouelenienY #analysis #fault #named #performance
- SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
- ICPR-2012-AiDHC #analysis #component #feature model #independence #multi
- Multiple feature selection and fusion based on generalized N-dimensional independent component analysis (DA, GD, XHH, YWC), pp. 971–974.
- ICPR-2012-AjmeraD #analysis #detection #word
- Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
- ICPR-2012-BenJY #analysis #automation #clustering #fuzzy
- Automatic fuzzy clustering based on mistake analysis (SB, ZJ, JY), pp. 2914–2917.
- ICPR-2012-CantoniOFP #analysis
- Structural analysis of protein Secondary Structure by GHT (VC, OO, AF, AP), pp. 1767–1770.
- ICPR-2012-ChenHCHC #analysis #using
- Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
- ICPR-2012-ChenYY #analysis #null #recognition #scalability
- Large margin null space discriminant analysis with applications to face recognition (XC, JY, WY), pp. 1679–1682.
- ICPR-2012-ElnakibNCPGE #3d #analysis #quantifier #using
- Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
- ICPR-2012-ErYAK #analysis #modelling
- Traffic accident risk analysis based on relation of Common Route Models (UE, SY, OA, MEK), pp. 2561–2564.
- ICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi #using
- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
- ICPR-2012-GhoshC #analysis #automation #classification
- Feature analysis for automatic classification of HEp-2 florescence patterns : Computer-Aided Diagnosis of Auto-immune diseases (SG, VC), pp. 174–177.
- ICPR-2012-GuiST #analysis #estimation #parametricity
- Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
- ICPR-2012-HuangA #analysis #detection #perspective
- Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
- ICPR-2012-HuangL #analysis #automation #component #detection #independence
- Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
- ICPR-2012-Iwata #analysis #optimisation
- Placing landmarks suitably for shape analysis by optimization (KI), pp. 2359–2362.
- ICPR-2012-JoshiDGBP #analysis #classification
- Neural-net classification for spatio-temporal descriptor based depression analysis (JJ, AD, RG, MB, GP), pp. 2634–2638.
- ICPR-2012-KimuraSKS #analysis #component #design
- Designing various component analysis at will (AK, HS, HK, MS), pp. 2959–2962.
- ICPR-2012-KorffFKSBPS #analysis #image #library #recognition
- Compound color recognition via image analysis on high-throughput compound libraries (MvK, JF, AK, JS, GB, OP, TS), pp. 1289–1293.
- ICPR-2012-KostopoulouZMV #2d #analysis #image
- 2D-GE image analysis focusing on elimination of spurious spots (EK, EZ, DM, AV), pp. 1627–1630.
- ICPR-2012-KrawczykS #analysis #classification #effectiveness #multi
- Effective multiple classifier systems for breast thermogram analysis (BK, GS), pp. 3345–3348.
- ICPR-2012-LeiLL #analysis #feature model #linear #performance #recognition
- Efficient feature selection for linear discriminant analysis and its application to face recognition (ZL, SL, SZL), pp. 1136–1139.
- ICPR-2012-LiuF #analysis #kernel #multi
- Multiple kernel discriminant analysis (XZL, GCF), pp. 1691–1694.
- ICPR-2012-LiuL #analysis #detection #learning #multi
- Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
- ICPR-2012-LuuSBS #adaptation #analysis #multi
- Compressed Submanifold Multifactor Analysis with adaptive factor structures (KL, MS, TDB, CYS), pp. 2715–2718.
- ICPR-2012-MoriyamaAS #analysis #using
- Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
- ICPR-2012-MoyouP #analysis
- Shape analysis on the hypersphere of wavelet densities (MM, AMP), pp. 2091–2094.
- ICPR-2012-Noh #analysis #classification #learning #metric #nearest neighbour
- χ2 Metric learning for nearest neighbor classification and its analysis (SN), pp. 991–995.
- ICPR-2012-Ohtsuka #analysis #detection
- Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
- ICPR-2012-PangHYQW #analysis #classification #learning
- Theoretical analysis of learning local anchors for classification (JP, QH, BY, LQ, DW), pp. 1803–1806.
- ICPR-2012-ParisHG #analysis #categorisation #image #towards
- Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
- ICPR-2012-RingJKE #analysis #classification #complexity #design #embedded #performance
- Software-based performance and complexity analysis for the design of embedded classification systems (MR, UJ, PK, BE), pp. 2266–2269.
- ICPR-2012-SantosFTRGPF #analysis #classification #correlation #image #multi
- Descriptor correlation analysis for remote sensing image multi-scale classification (JAdS, FAF, RdST, AR, PHG, SPF, AXF), pp. 3078–3081.
- ICPR-2012-SchaeferD #analysis #multi
- Multi-dimensional local binary pattern descriptors for improved texture analysis (GS, NPD), pp. 2500–2503.
- ICPR-2012-ShaoS #analysis #distance #reduction
- Fractional-step max-min distance analysis for dimension reduction (GS, NS), pp. 396–400.
- ICPR-2012-ShenMZ #analysis #graph #learning #online
- Unsupervised online learning trajectory analysis based on weighted directed graph (YS, ZM, JZ), pp. 1306–1309.
- ICPR-2012-StammD #analysis #documentation
- Searching attentive tasks with document analysis evidences and Dempster-Shafer theory (KS, AD), pp. 529–532.
- ICPR-2012-SuWF #analysis #canonical #correlation #evaluation #generative
- Evaluation of canonical correlation analysis: A Correlation Generation Model (YS, SW, YF), pp. 1751–1754.
- ICPR-2012-TangZKC #analysis #forensics #image #visualisation
- Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
- ICPR-2012-TawariT #analysis
- Audio-visual data association for face expression analysis (AT, MMT), pp. 1120–1123.
- ICPR-2012-WangGFC #analysis #segmentation
- Curvature-driven volumetric segmentation of binary shapes: An application to snow microstructure analysis (XW, LG, FF, DC), pp. 742–745.
- ICPR-2012-WangSCPZ #analysis #component #feature model #named
- STPCA: Sparse tensor Principal Component Analysis for feature extraction (SW, MS, YHC, EPP, CZ), pp. 2278–2281.
- ICPR-2012-WilkinsonO #analysis #documentation
- Mask-edge connectivity: Theory, computation, and application to historical document analysis (MHFW, JO), pp. 1334–1337.
- ICPR-2012-YokotaHKW #analysis #estimation #image
- Estimation of earthquake ground motion by image analysis of sliding objects taken with a fixed camera (AY, TH, HK, TW), pp. 784–787.
- ICPR-2012-ZhangLC #analysis #detection #multi #novel
- A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
- KDD-2012-KangPHF #algorithm #analysis #named #scalability
- GigaTensor: scaling tensor analysis up by 100 times — algorithms and discoveries (UK, EEP, AH, CF), pp. 316–324.
- KDD-2012-LiuSZFNW #data analysis #named #visualisation
- AssocExplorer: an association rule visualization system for exploratory data analysis (GL, AS, HZ, MF, SKN, LW), pp. 1536–1539.
- KDD-2012-MiaoGMYTAS #analysis #documentation
- Latent association analysis of document pairs (GM, ZG, LEM, XY, ST, NA, JS), pp. 1415–1423.
- KDD-2012-SongCWWYD #analysis #behaviour
- Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
- KDD-2012-TangWYHZYGHXLU #analysis #mining #named #topic
- PatentMiner: topic-driven patent analysis and mining (JT, BW, YY, PH, YZ, XY, BG, MH, PX, WL, AKU), pp. 1366–1374.
- KDD-2012-Ueda #data analysis #relational
- Bayesian relational data analysis (NU), p. 815.
- KDD-2012-YuanWTNY #analysis #learning #multi
- Multi-source learning for joint analysis of incomplete multi-modality neuroimaging data (LY, YW, PMT, VAN, JY), pp. 1149–1157.
- KDD-2012-YuZSWWQZ #analysis #data mining #in the cloud #mining #named #network #social
- BC-PDM: data mining, social network analysis and text mining system based on cloud computing (LY, JZ, WCS, BW, BW, LQ, BRZ), pp. 1496–1499.
- KDD-2012-ZhaoDWX #analysis #named #sentiment #twitter
- MoodLens: an emoticon-based sentiment analysis system for chinese tweets (JZ, LD, JW, KX), pp. 1528–1531.
- KDD-2012-ZhouQM #behaviour #data analysis #social #social media
- Social media data analysis for revealing collective behaviors (AZ, WQ, HM), p. 1402.
- KDIR-2012-BressoGDNS #3d #concept analysis #learning #relational
- Formal Concept Analysis for the Interpretation of Relational Learning Applied on 3D Protein-binding Sites (EB, RG, MDD, AN, MST), pp. 111–120.
- KDIR-2012-FukumotoMM #analysis #collaboration #recommendation #sentiment
- Collaborative Filtering based on Sentiment Analysis of Guest Reviews for Hotel Recommendation (FF, CM, SM), pp. 193–198.
- KDIR-2012-Machado #analysis #image #retrieval
- Factor Analysis and the Retrieval of Medical Images Depicting Structures with Similar Shapes (AMCM), pp. 175–180.
- KDIR-2012-MountassirBB #analysis #problem #semistructured data #sentiment #set
- Addressing the Problem of Unbalanced Data Sets in Sentiment Analysis (AM, HB, IB), pp. 306–311.
- KDIR-2012-SpiegelA #analysis #distance #invariant
- An Order-invariant Time Series Distance Measure — Position on Recent Developments in Time Series Analysis (SS, SA), pp. 264–268.
- KDIR-2012-UddinAH #analysis #network #social
- New Directions in the Analysis of Social Network Dynamics (MSU, SRA, LH), pp. 269–274.
- KEOD-2012-HlomaniS #analysis #framework #towards #workflow
- Towards an Ontology-driven Framework for Workflow Analysis (HH, DAS), pp. 405–410.
- KEOD-2012-LinharesD #analysis #functional #geometry
- Geometric Knowledge Analysis based in Part Functional Descriptions (JCL, AD), pp. 307–313.
- KMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #scalability #tool support #using
- Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
- KMIS-2012-PanTG #analysis #component
- A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
- KR-2012-CohnRS #analysis #representation #video
- Thinking Inside the Box: A Comprehensive Spatial Representation for Video Analysis (AGC, JR, MS).
- MLDM-2012-KalpakisYHMSSS #analysis #permutation #predict #using
- Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
- MLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining #using
- A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
- MLDM-2012-StaroszczykOM #analysis #comparative #feature model #recognition
- Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
- SEKE-2012-ChenCZS #analysis #approach #integration
- A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
- SEKE-2012-DingM #analysis #fuzzy #modelling
- Modeling and Analysis of Switched Fuzzy Systems (ZD, JM), pp. 135–138.
- SEKE-2012-DuttaUA #analysis #approach #automation #semantics #verification
- Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
- SEKE-2012-JangidPE #analysis #mobile #predict #sentiment #using
- A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
- SEKE-2012-LiuMLS #analysis #non-functional #specification
- Risk-driven Non-functional Requirement Analysis and Specification (YL, ZM, HL, WS), pp. 55–60.
- SEKE-2012-LiuZSH #analysis #architecture #modelling #named
- SAMAT — A Tool for Software Architecture Modeling and Analysis (SL, RZ, ZS, XH), pp. 352–358.
- SEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification #using
- Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
- SEKE-2012-ShinKKJR #configuration management #dependence #impact analysis #using
- Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
- SEKE-2012-SunLTZ #impact analysis #testing #using
- Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
- SEKE-2012-VegiFCOB #analysis #named
- DC2AP: A Dublin Core Application Profile to Analysis Patterns (LFdMV, JLF, GLdSC, AdPO, JLB), pp. 511–516.
- SEKE-2012-WangL #analysis #approach #modelling #petri net #workflow
- Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
- SEKE-2012-ZhangLS #graph #impact analysis #mining
- Mining Call Graph for Change Impact Analysis (QZ, BL, XS), pp. 7–12.
- SIGIR-2012-ChaC #analysis #modelling #topic #using
- Social-network analysis using topic models (YC, JC), pp. 565–574.
- SIGIR-2012-ChinS #analysis
- Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
- SIGIR-2012-NunzioS #classification #data analysis #naive bayes #visual notation
- A visual tool for bayesian data analysis: the impact of smoothing on naive bayes text classifiers (GMDN, AS), p. 1002.
- SIGIR-2012-YangLLR #analysis #graph #twitter
- Finding interesting posts in Twitter based on retweet graph analysis (MCY, JTL, SWL, HCR), pp. 1073–1074.
- MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- MoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
- Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
- MoDELS-2012-WilliamsBPP #analysis #modelling
- Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
- MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- MoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
- Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
- MoDELS-2012-WilliamsBPP #analysis #modelling
- Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
- ECOOP-2012-DeD #analysis #java #pointer #scalability
- Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
- ECOOP-2012-DohertyH #framework #matlab #named #static analysis
- McSAF: A Static Analysis Framework for MATLAB (JD, LJH), pp. 132–155.
- ECOOP-2012-KarimDGS #analysis #framework
- An Analysis of the Mozilla Jetpack Extension Framework (RK, MD, VG, CcS), pp. 333–355.
- ECOOP-2012-MorandatHOV #data analysis #design
- Evaluating the Design of the R Language — Objects and Functions for Data Analysis (FM, BH, LO, JV), pp. 104–131.
- ECOOP-2012-SridharanDCST #analysis #correlation #javascript #points-to
- Correlation Tracking for Points-To Analysis of JavaScript (MS, JD, SC, MS, FT), pp. 435–458.
- OOPSLA-2012-BaoZZ #nondeterminism #program analysis
- White box sampling in uncertain data processing enabled by program analysis (TB, YZ, XZ), pp. 897–914.
- OOPSLA-2012-MusluBHEN #analysis #development #ide #recommendation
- Speculative analysis of integrated development environment recommendations (KM, YB, RH, MDE, DN), pp. 669–682.
- OOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation #using
- Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
- LOPSTR-2012-ChristiansenHLP #data analysis #declarative #pipes and filters
- A Declarative Pipeline Language for Complex Data Analysis (HC, CTH, OTL, MP), pp. 17–34.
- LOPSTR-2012-MantelS #analysis #data flow #dependence
- Types vs. PDGs in Information Flow Analysis (HM, HS), pp. 106–121.
- LOPSTR-2012-Zinn #program analysis #reasoning
- Program Analysis and Manipulation to Reproduce Learners’ Erroneous Reasoning (CZ), pp. 228–243.
- QAPL-2012-GazeauMP #analysis #float #robust #source code
- A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
- POPL-2012-BouajjaniE #analysis #parallel #recursion #source code
- Analysis of recursively parallel programs (AB, ME), pp. 203–214.
- RE-2012-Alexandrova #analysis #development #legacy #requirements
- Business requirements analysis and development for legacy system replacement projects in government organizations (AA), pp. 337–340.
- RE-2012-CailliauL #analysis #framework #probability
- A probabilistic framework for goal-oriented risk analysis (AC, AvL), pp. 201–210.
- RE-2012-LutzLLKMSBH #analysis #product line #requirements
- Requirements analysis for a product family of DNA nanodevices (RRL, JHL, JIL, THK, DM, DMS, TB, ERH), pp. 211–220.
- REFSQ-2012-BruniFST #analysis #automation #multimodal #perspective #requirements #research
- Automatic Analysis of Multimodal Requirements: A Research Preview (EB, AF, NS, GT), pp. 218–224.
- REFSQ-2012-Radlinski #analysis #empirical #quality #requirements
- Empirical Analysis of the Impact of Requirements Engineering on Software Quality (LR), pp. 232–238.
- REFSQ-2012-RaspotnigO #analysis #case study #diagrams #sequence chart
- Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams (CR, ALO), pp. 117–131.
- REFSQ-2012-WangLWZW #approach #dependence #impact analysis #simulation
- A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
- SAC-2012-BalduzziZBKL #analysis #security
- A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
- SAC-2012-ChebaroKGJ #dynamic analysis #slicing #verification
- Program slicing enhances a verification technique combining static and dynamic analysis (OC, NK, AG, JJ), pp. 1284–1291.
- SAC-2012-DasguptaK #analysis #precise #using
- Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
- SAC-2012-DestefanisTCM #analysis #anti #java #scalability
- An analysis of anti-micro-patterns effects on fault-proneness in large Java systems (GD, RT, GC, MM), pp. 1251–1253.
- SAC-2012-DragoB #analysis #architecture #design #graph #manycore #named
- DAG3: a tool for design and analysis of applications for multicore architectures (MLD, JB), pp. 1159–1164.
- SAC-2012-GomesP #analysis #interactive #social
- A media-based social interactions analysis procedure (AKG, MdGCP), pp. 1018–1024.
- SAC-2012-KhucSRR #analysis #distributed #scalability #sentiment #towards #twitter
- Towards building large-scale distributed systems for twitter sentiment analysis (VNK, CS, RR, JR), pp. 459–464.
- SAC-2012-MengHO #algorithm #analysis #search-based
- Analysis of a triploid genetic algorithm over deceptive landscapes (LM, SH, CO), pp. 244–249.
- SAC-2012-NetoA #analysis #process
- Keeping decisions and rationale explicit in business process analysis (MSdSN, RMdA), pp. 1702–1708.
- SAC-2012-NunesARTCS #analysis #data type
- To be or not to be real: fractal analysis of data streams from a regional climate change model (SAN, AMHdÁ, LASR, AJMT, PPC, EPMdS), pp. 831–832.
- SAC-2012-SantosCSLB #analysis #heuristic #identification #modelling #process
- Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
- SAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
- A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
- SAC-2012-SchaadB #analysis #automation #named
- TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
- SAC-2012-ScholteRBK #analysis #empirical #validation #web
- An empirical analysis of input validation mechanisms in web applications and languages (TS, WKR, DB, EK), pp. 1419–1426.
- SAC-2012-SwainCNB #analysis #markov #performance #using
- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
- SAC-2012-ZanioliFC #information management #named #static analysis
- SAILS: static analysis of information leakage with sample (MZ, PF, AC), pp. 1308–1313.
- FSE-2012-AcharyaR #impact analysis #industrial #slicing
- Practical change impact analysis based on static program slicing for industrial software systems (MA, BR), p. 13.
- FSE-2012-BirdZ #analysis #branch
- Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
- FSE-2012-GanaiLG #analysis #concurrent #multi #named #source code #thread
- DTAM: dynamic taint analysis of multi-threaded programs for relevancy (MKG, DL, AG), p. 46.
- FSE-2012-RayWK #analysis #migration #named
- REPERTOIRE: a cross-system porting analysis tool for forked software projects (BR, CW, MK), p. 8.
- FSE-2012-VisserGD #constraints #named #program analysis #reuse
- Green: reducing, reusing and recycling constraints in program analysis (WV, JG, MBD), p. 58.
- FSE-2012-WangZXXM #analysis #automation #collaboration #hybrid #web
- Automating presentation changes in dynamic web applications via collaborative hybrid analysis (XW, LZ, TX, YX, HM), p. 16.
- FSE-2012-ZhangKK #evolution #fault #impact analysis #java #named #source code
- FaultTracer: a change impact and regression fault analysis tool for evolving Java programs (LZ, MK, SK), p. 40.
- ICSE-2012-AlkhalafBG #analysis #string #using #validation #verification
- Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
- ICSE-2012-BhattacharyaINF #analysis #evolution #graph #predict
- Graph-based analysis and prediction for software evolution (PB, MI, IN, MF), pp. 419–429.
- ICSE-2012-Camilli #analysis #in the cloud #petri net
- Petri nets state space analysis in the cloud (MC), pp. 1638–1640.
- ICSE-2012-EsteveKNPY #analysis #correctness #dependence #performance #safety
- Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
- ICSE-2012-GethersDKP #impact analysis
- Integrated impact analysis for managing software changes (MG, BD, HHK, DP), pp. 430–440.
- ICSE-2012-Ghardallou #analysis #invariant #termination #using
- Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
- ICSE-2012-Jaafar #analysis #evolution #on the #source code
- On the analysis of evolution of software artefacts and programs (FJ), pp. 1563–1566.
- ICSE-2012-Johnson #case study #question #static analysis #tool support #using #why
- A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
- ICSE-2012-MesbahM #analysis #automation #css #maintenance
- Automated analysis of CSS rules to support style maintenance (AM, SM), pp. 408–418.
- ICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial #using
- Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
- ICSE-2012-NguyenNDKS #analysis #developer #fault
- Inferring developer expertise through defect analysis (TTN, TNN, ED, TK, PS), pp. 1297–1300.
- ICSE-2012-Schulte #analysis #automation #industrial
- Ten years of automated code analysis at Microsoft (Invited industrial talk) (WS), p. 1001.
- ICSE-2012-ShahzadSL #analysis #lifecycle #scalability
- A large scale exploratory analysis of software vulnerability life cycles (MS, MZS, AXL), pp. 771–781.
- ICSE-2012-SunSPR #mining #static analysis
- Extending static analysis by mining project-specific rules (BS, GS, AP, BR), pp. 1054–1063.
- ICSE-2012-TamrawiNNN #analysis #evaluation #symbolic computation
- Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
- ICSE-2012-UddinDR #analysis #api #concept
- Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
- ICSE-2012-Vetro #automation #identification #static analysis #technical debt #using
- Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
- ICSE-2012-Yu #analysis #identification #using
- Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
- SLE-2012-KaminskiW #analysis #attribute grammar #composition
- Modular Well-Definedness Analysis for Attribute Grammars (TK, EVW), pp. 352–371.
- SLE-2012-KrishnanW #analysis #attribute grammar #higher-order #termination
- Termination Analysis for Higher-Order Attribute Grammars (LK, EVW), pp. 44–63.
- SLE-2012-Sloane #abstraction #analysis #attribute grammar #evaluation
- Profile-Based Abstraction and Analysis of Attribute Grammar Evaluation (AMS), pp. 24–43.
- PLEASE-2012-ShimbaraWKKO #testing
- Feature-analysis-based selection method for system configuration for system testing (DS, HW, SK, MK, HO), pp. 61–64.
- SPLC-2012-El-SharkawyDS #analysis #feature model #modelling
- From feature models to decision models and back again an analysis based on formal transformations (SES, SD, KS), pp. 126–135.
- SPLC-2012-OliveiraBN #analysis #debugging #product line
- Supporting the analysis of bug prevalence in software product lines with product genealogy (THBdO, MB, EYN), pp. 181–185.
- ASPLOS-2012-HongCSO #analysis #domain-specific language #graph #named #performance
- Green-Marl: a DSL for easy and efficient graph analysis (SH, HC, ES, KO), pp. 349–362.
- CC-2012-JimboreanMLC #framework #named #program analysis
- VMAD: An Advanced Dynamic Program Analysis and Instrumentation Framework (AJ, LM, VL, PC), pp. 220–239.
- CC-2012-MarronLB #analysis #paradigm #programming
- Programming Paradigm Driven Heap Analysis (MM, OL, AB), pp. 41–60.
- CC-2012-PuttaN #analysis #parallel #points-to
- Parallel Replication-Based Points-To Analysis (SP, RN), pp. 61–80.
- CC-2012-YangBMIGSSS #c++ #inheritance #program analysis
- Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis (JY, GB, NM, FI, AG, NS, SS, NS), pp. 144–164.
- CGO-2012-AnsaloniBHC #multi #program analysis
- Deferred methods: accelerating dynamic program analysis on multicores (DA, WB, AH, LYC), pp. 242–251.
- CGO-2012-MatosevicA #analysis #bottom-up #data access #performance #summary
- Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
- CGO-2012-ShangXX #analysis #on-demand #points-to
- On-demand dynamic summary-based points-to analysis (LS, XX, JX), pp. 264–274.
- ISMM-2012-Nasre #analysis #constraints #graph #performance #points-to
- Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
- LCTES-2012-FangLZLCZ #analysis #multi #predict
- Improving dynamic prediction accuracy through multi-level phase analysis (ZF, JL, WZ, YL, HC, BZ), pp. 89–98.
- LCTES-2012-SallenaveD #embedded #lightweight #static analysis
- Lightweight generics in embedded systems through static analysis (OS, RD), pp. 11–20.
- PPoPP-2012-CaniouDRCA #analysis #constraints #parallel #performance
- Performance analysis of parallel constraint-based local search (YC, DD, FR, PC, SA), pp. 337–338.
- PPoPP-2012-Mendez-LojoBP #analysis #gpu #implementation #points-to
- A GPU implementation of inclusion-based points-to analysis (MML, MB, KP), pp. 107–116.
- PPoPP-2012-SimDKV #analysis #framework #identification #performance
- A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
- PPoPP-2012-TzenakisPKPVN #analysis #dependence #named #parallel
- BDDT: : block-level dynamic dependence analysis for deterministic task-based parallelism (GT, AP, JK, PP, HV, DSN), pp. 301–302.
- CAV-2012-BogomolovFGLPW #analysis #distance #reachability
- A Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx (SB, GF, RG, HL, AP, MW), pp. 479–494.
- CAV-2012-HagueL #analysis #bound #parallel #source code #thread
- Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
- CAV-2012-HasuoS #hybrid #standard #static analysis
- Exercises in Nonstandard Static Analysis of Hybrid Systems (IH, KS), pp. 462–478.
- CAV-2012-LeeWY #algorithm #analysis #learning #termination
- Termination Analysis with Algorithmic Learning (WL, BYW, KY), pp. 88–104.
- CAV-2012-Venet #analysis #difference #invariant #linear #scalability
- The Gauge Domain: Scalable Analysis of Linear Inequality Invariants (AV), pp. 139–154.
- ICLP-2012-Hanus #analysis #lazy evaluation #nondeterminism
- Improving Lazy Non-Deterministic Computations by Demand Analysis (MH), pp. 130–143.
- ICST-2012-CunninghamHH #analysis #combinator #testing
- A System Analysis Study Comparing Reverse Engineered Combinatorial Testing to Expert Judgment (AMCJ, JDH, RJH), pp. 630–635.
- ICST-2012-DanH #analysis #comparison #float #mutation testing #semantics
- Semantic Mutation Analysis of Floating-Point Comparison (HD, RMH), pp. 290–299.
- ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- ICST-2012-GuoSC #analysis #clustering #testing
- Analysis of Test Clusters for Regression Testing (BG, MS, PC), p. 736.
- ICST-2012-JustKS #analysis #effectiveness #mutation testing #performance #question
- Do Redundant Mutants Affect the Effectiveness and Efficiency of Mutation Analysis? (RJ, GMK, FS), pp. 720–725.
- ICST-2012-Kannavara #source code #static analysis
- Securing Opensource Code via Static Analysis (RK), pp. 429–436.
- ICST-2012-MalikK #analysis #graph #using
- Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
- ICST-2012-MassicotteCNM #analysis #testing
- A Testing Model for Dynamic Malware Analysis Systems (FM, MC, HN, FM), pp. 826–833.
- ICST-2012-MizanF #analysis #automation #performance
- Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
- ICST-2012-PasareanuB #analysis #statechart
- Statechart Analysis with Symbolic PathFinder (CSP, DB), p. 772.
- ICST-2012-PonsiniMR #abstract interpretation #analysis #constraints #float #programming #source code
- Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
- ICST-2012-SiddiquiMK #analysis #constraints #data flow #lightweight #theorem proving
- Lightweight Data-Flow Analysis for Execution-Driven Constraint Solving (JHS, DM, SK), pp. 91–100.
- ICST-2012-VorobyovK #automation #constraints #generative #static analysis #testing #theorem proving
- Combining Static Analysis and Constraint Solving for Automatic Test Case Generation (KV, PK), pp. 915–920.
- ICST-2012-ZamanAH #analysis #empirical #performance #scalability
- A Large Scale Empirical Study on User-Centric Performance Analysis (SZ, BA, AEH), pp. 410–419.
- ICTSS-2012-Havelund #analysis
- Requirements-Driven Log Analysis (Extended Abstract) (KH), pp. 1–4.
- IJCAR-2012-FosterS #algebra #analysis #automation
- Automated Analysis of Regular Algebra (SF, GS), pp. 271–285.
- IJCAR-2012-NikolicS #analysis #reachability
- Reachability Analysis of Program Variables (DN, FS), pp. 423–438.
- ISSTA-2012-AlkhalafCFBOK #analysis #consistency #difference #named #nondeterminism #string #validation
- ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
- ISSTA-2012-SuiYX #analysis #detection #memory management #using
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- ISSTA-2012-TombF #analysis #consistency #detection #nondeterminism #reachability
- Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
- SAT-2012-KottlerZSK #analysis #named #satisfiability
- CoPAn: Exploring Recurring Patterns in Conflict Analysis of CDCL SAT Solvers — (Tool Presentation) (SK, CZ, PS, MK), pp. 449–455.
- TAP-2012-SulzmannZ #analysis #finite #linear #logic
- Constructive Finite Trace Analysis with Linear Temporal Logic (MS, AZ), pp. 132–148.
- VMCAI-2012-LeeLY #clustering #static analysis #statistics
- Sound Non-statistical Clustering of Static Analysis Alarms (WL, WL, KY), pp. 299–314.
- CBSE-2011-DistefanoFGM #analysis #composition #multi #reliability #workflow
- A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
- CBSE-2011-InoueH #analysis #component #data flow
- A method for data-flow analysis of business components (TI, SH), pp. 51–60.
- ECSA-2011-AdmodisastroK #analysis #approach #architecture #black box #development
- An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
- ECSA-2011-DiazPGW #architecture #impact analysis #product line
- Change Impact Analysis in Product-Line Architectures (JD, JP, JG, ALW), pp. 114–129.
- QoSA-ISARCS-2011-HofigD #analysis #execution
- Failure-dependent execution time analysis (KH, DD), pp. 115–122.
- WICSA-2011-BrownNOP #analysis #architecture #dependence #release planning
- Analysis and Management of Architectural Dependencies in Iterative Release Planning (NB, RLN, IO, MP), pp. 103–112.
- WICSA-2011-Dobrica #analysis #architecture #integration #modelling #quality
- Exploring Approaches of Integration Software Architecture Modeling with Quality Analysis Models (LD), pp. 113–122.
- WICSA-2011-GanesanLCJJZ #analysis #architecture #re-engineering
- Architecture Reconstruction and Analysis of Medical Device Software (DG, ML, RC, RPJ, PLJ, YZ), pp. 194–203.
- WICSA-2011-GhezziG #analysis #architecture #as a service #lightweight #named
- SOFAS: A Lightweight Architecture for Software Analysis as a Service (GG, HCG), pp. 93–102.
- WICSA-2011-MichalikW #impact analysis #product line #towards
- Towards a Solution for Change Impact Analysis of Software Product Line Products (BM, DW), pp. 290–293.
- WICSA-2011-PetrovBN #analysis #architecture #design #enterprise #multi
- The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
- ASE-2011-AlvesGJd #impact analysis #slicing #using
- Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
- ASE-2011-Dwyer #analysis #behaviour #testing
- Unifying testing and analysis through behavioral coverage (MBD), p. 2.
- ASE-2011-Ganai #analysis #precise #scalability
- Scalable and precise symbolic analysis for atomicity violations (MKG), pp. 123–132.
- ASE-2011-GanovKP #alloy #analysis #incremental #performance
- A case for alloy annotations for efficient incremental analysis via domain specific solvers (SRG, SK, DEP), pp. 464–467.
- ASE-2011-GethersKDP #adaptation #approach #impact analysis #source code
- An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
- ASE-2011-JustSK #analysis #compilation #java #mutation testing #named #performance
- MAJOR: An efficient and extensible tool for mutation analysis in a Java compiler (RJ, FS, GMK), pp. 612–615.
- ASE-2011-OsterSB #analysis #automation #requirements
- Automating analysis of qualitative preferences in goal-oriented requirements engineering (ZJO, GRS, SB), pp. 448–451.
- ASE-2011-OverbeyJ #analysis #difference #lightweight #refactoring #reuse #tool support
- Differential precondition checking: A lightweight, reusable analysis for refactoring tools (JLO, REJ), pp. 303–312.
- ASE-2011-PohlLP #algorithm #analysis #automation #comparison #feature model #modelling #performance
- A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models (RP, KL, KP), pp. 313–322.
- ASE-2011-SunL #concept analysis #using
- Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
- ASE-2011-ZurowskaD #analysis #modelling #named #uml
- SAUML: A tool for symbolic analysis of UML-RT models (KZ, JD), pp. 604–607.
- CASE-2011-BasileCC #analysis #automation
- A discrete event model for the control and analysis of complex automated warehouse systems (FB, PC, JC), pp. 201–207.
- CASE-2011-Gonzalez-CastoloL #analysis #fuzzy #nondeterminism
- State uncertainty analysis of Fuzzy Timed DES (JCGC, ELM), pp. 600–606.
- CASE-2011-JulvezMV #analysis #simulation #using
- Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
- CASE-2011-LeH #analysis #random
- Marginal analysis on binary pairwise Gibbs random fields (TL, CNH), pp. 316–321.
- CASE-2011-LemattreDFPS #analysis #architecture #design #reachability
- Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
- CASE-2011-QiaoWZ #analysis #clustering #modelling #tool support
- Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting (YQ, NW, MZ), pp. 90–95.
- CASE-2011-TalpasanuK #analysis #approach
- Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
- CASE-2011-WangLH #analysis #modelling
- Modeling and analysis of care delivery services within patient rooms (JW, JL, PKH), pp. 537–542.
- DAC-2011-BayrakRBSI #analysis #automation #towards
- A first step towards automatic application of power analysis countermeasures (AGB, FR, PB, FXS, PI), pp. 230–235.
- DAC-2011-ChenKCH #analysis #multi #reliability
- Reliability analysis and improvement for multi-level non-volatile memories with soft information (SLC, BRK, JNC, CTH), pp. 753–758.
- DAC-2011-CoptyKN #analysis #architecture #performance #statistics #transaction
- Transaction level statistical analysis for efficient micro-architectural power and performance studies (EC, GK, SN), pp. 351–356.
- DAC-2011-Fey #analysis #data flow #multi
- Orchestrated multi-level information flow analysis to understand SoCs (GF), pp. 284–285.
- DAC-2011-GongYH #analysis #monte carlo #orthogonal #performance #probability
- Fast non-monte-carlo transient noise analysis for high-precision analog/RF circuits by stochastic orthogonal polynomials (FG, HY, LH), pp. 298–303.
- DAC-2011-HaddadN #analysis #grid #power management #using
- Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
- DAC-2011-HaoTSS #analysis #bound #performance #process
- Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
- DAC-2011-HeRK #concept analysis #embedded #generative #testing
- Test-case generation for embedded simulink via formal concept analysis (NH, PR, DK), pp. 224–229.
- DAC-2011-HsuLFWHHY #analysis #design #manycore #modelling #named
- PowerDepot: integrating IP-based power modeling with ESL power analysis for multi-core SoC designs (CWH, JLL, SCF, CCW, SYH, WTH, JCY), pp. 47–52.
- DAC-2011-JungMPL #3d #analysis #optimisation #reliability
- TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC (MJ, JM, DZP, SKL), pp. 188–193.
- DAC-2011-KoseF #algorithm #analysis #information retrieval #locality #performance
- Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
- DAC-2011-KuoSR #analysis #performance #reachability #source code #using
- Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
- DAC-2011-LiuSCKKL #3d #analysis #optimisation
- Full-chip TSV-to-TSV coupling analysis and optimization in 3D IC (CL, TS, JC, JK, JK, SKL), pp. 783–788.
- DAC-2011-MillerBHDCB #analysis #testing #validation
- A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
- DAC-2011-OnaissiTLN #analysis #approach #performance
- A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
- DAC-2011-SunLT #analysis #approximate #grid #incremental #performance #power management
- Efficient incremental analysis of on-chip power grid via sparse approximation (PS, XL, MYT), pp. 676–681.
- DAC-2011-ThieleSYB #analysis #embedded #multi #synthesis
- Thermal-aware system analysis and software synthesis for embedded multi-processors (LT, LS, HY, IB), pp. 268–273.
- DAC-2011-ToettcherCTW #analysis #constraints
- Biochemical oscillator sensitivity analysis in the presence of conservation constraints (JET, AC, BT, JW), pp. 806–811.
- DAC-2011-YounKH #analysis #convergence
- Global convergence analysis of mixed-signal systems (SY, JK, MH), pp. 498–503.
- DATE-2011-AndalamRG #analysis #source code
- Pruning infeasible paths for tight WCRT analysis of synchronous programs (SA, PSR, AG), pp. 204–209.
- DATE-2011-BiKVSM #analysis #performance #statistics
- Fast statistical analysis of RC nets subject to manufacturing variabilities (YB, KJvdK, JFV, LMS, NvdM), pp. 31–37.
- DATE-2011-BoghratiS #analysis #grid #performance #power management #random
- A scaled random walk solver for fast power grid analysis (BB, SSS), pp. 38–43.
- DATE-2011-BonannoBS #analysis #energy #modelling #monitoring #optimisation #tool support
- Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
- DATE-2011-BoosNSHHGKS #analysis
- Strategies for initial sizing and operating point analysis of analog circuits (VB, JN, MS, SH, SH, HG, DK, RS), pp. 1672–1674.
- DATE-2011-ChenGSS #analysis #performance
- Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
- DATE-2011-ChenO #analysis #fault #image #statistics
- Diagnosing scan chain timing faults through statistical feature analysis of scan images (MC, AO), pp. 185–190.
- DATE-2011-ErbP #analysis #performance
- A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
- DATE-2011-GielenMW #analysis #reliability
- Analog circuit reliability in sub-32 nanometer CMOS: Analysis and mitigation (GGEG, EM, PHNDW), pp. 1474–1479.
- DATE-2011-HanJS #analysis
- Clause simplification through dominator analysis (HH, HJ, FS), pp. 143–148.
- DATE-2011-KimYLAJ #3d #analysis #embedded #mobile #performance
- A quantitative analysis of performance benefits of 3D die stacking on mobile and embedded SoC (DK, SY, SL, JHA, HJ), pp. 1333–1338.
- DATE-2011-KobayashiH #analysis #correlation #power management
- An LOCV-based static timing analysis considering spatial correlations of power supply variations (SK, KH), pp. 559–562.
- DATE-2011-KozhikkottuVRD #analysis #named #performance #variability
- VESPA: Variability emulation for System-on-Chip performance analysis (VJK, RV, AR, SD), pp. 2–7.
- DATE-2011-LiuV #analysis #generative #performance #source code #validation
- Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
- DATE-2011-MaricauG #analysis #probability #reliability
- Stochastic circuit reliability analysis (EM, GGEG), pp. 1285–1290.
- DATE-2011-MerrettAWZRMRLFA #analysis #modelling #monte carlo #performance #statistics #variability
- Modelling circuit performance variations due to statistical variability: Monte Carlo static timing analysis (MM, PA, YW, MZ, DR, CM, SR, ZL, SBF, AA), pp. 1537–1540.
- DATE-2011-PerathonerLT #analysis #component #performance
- Composing heterogeneous components for system-wide performance analysis (SP, KL, LT), pp. 842–847.
- DATE-2011-RaiYBCT #analysis #realtime #worst-case
- Worst-case temperature analysis for real-time systems (DR, HY, IB, JJC, LT), pp. 631–636.
- DATE-2011-RossiTSM #analysis #fault #memory management #performance #reliability
- Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
- DATE-2011-StattelmannBR #analysis #manycore #performance #simulation
- Fast and accurate resource conflict simulation for performance analysis of multi-core systems (SS, OB, WR), pp. 210–215.
- DATE-2011-TsukiyamaF #algorithm #analysis #statistics
- An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
- DATE-2011-VatajeluF #analysis #in memory #memory management #robust
- Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
- DATE-2011-WuM #analysis #optimisation
- Aging-aware timing analysis and optimization considering path sensitization (KCW, DM), pp. 1572–1577.
- DocEng-2011-BeelL #analysis #mindmap
- An exploratory analysis of mind maps (JB, SL), pp. 81–84.
- DRR-2011-LamiroyLKH #analysis #documentation #how #research #resource management
- How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
- DRR-2011-SiddiqiKV #analysis #identification
- Feature relevance analysis for writer identification (IS, KK, NV), pp. 1–10.
- HT-2011-TakahashiOYIOT #analysis #using #wiki
- Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
- ICDAR-2011-AbediF #analysis #documentation #image #locality #string #using
- Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
- ICDAR-2011-AbedWM #analysis #bibliography #contest #documentation #perspective #recognition
- International Conference on Document Analysis and Recognition (ICDAR 2011) — Competitions Overview (HEA, LW, VM), pp. 1437–1443.
- ICDAR-2011-AhmedLWD #analysis #architecture #automation
- Improved Automatic Analysis of Architectural Floor Plans (SA, ML, MW, AD), pp. 864–869.
- ICDAR-2011-AntonacopoulosCPP #analysis #contest #documentation #layout
- Historical Document Layout Analysis Competition (AA, CC, CP, SP), pp. 1516–1520.
- ICDAR-2011-BaechlerI #analysis #layout #multi #using
- Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
- ICDAR-2011-BakerSSS #analysis #documentation
- Comparing Approaches to Mathematical Document Analysis from PDF (JBB, APS, VS, MS), pp. 463–467.
- ICDAR-2011-BukhariSB11a #analysis #documentation #image #layout #performance
- High Performance Layout Analysis of Arabic and Urdu Document Images (SSB, FS, TMB), pp. 1275–1279.
- ICDAR-2011-ChattopadhyaySSR #analysis #corpus
- Creation and Analysis of a Corpus of Text Rich Indian TV Videos (TC, SS, AS, NR), pp. 849–853.
- ICDAR-2011-ChazalonCL #analysis #documentation #interactive #performance
- Iterative Analysis of Pages in Document Collections for Efficient User Interaction (JC, BC, AL), pp. 503–507.
- ICDAR-2011-ClausnerPA11a #analysis #documentation #evaluation #layout #performance
- Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
- ICDAR-2011-DiemKS #analysis #classification #documentation #layout
- Text Classification and Document Layout Analysis of Paper Fragments (MD, FK, RS), pp. 854–858.
- ICDAR-2011-GalballyFMP #analysis #quality
- Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
- ICDAR-2011-GarzSD #analysis #layout #using
- Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
- ICDAR-2011-KokawaBOWK #analysis #automation #classification #fault
- An Impact of OCR Errors on Automated Classification of OCR Japanese Texts with Parts-of-Speech Analysis (AK, LSPB, WO, TW, FK), pp. 543–547.
- ICDAR-2011-KurbielKE #analysis #component #independence #novel #preprocessor
- A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
- ICDAR-2011-LamiroyL #analysis #architecture #benchmark #documentation #metric
- An Open Architecture for End-to-End Document Analysis Benchmarking (BL, DPL), pp. 42–47.
- ICDAR-2011-LamiroyLS #algorithm #analysis #contest #documentation
- Document Analysis Algorithm Contributions in End-to-End Applications: Report on the ICDAR 2011 Contest (BL, DPL, TS), pp. 1521–1525.
- ICDAR-2011-LazzaraLGJMC #analysis #documentation #framework #image
- The SCRIBO Module of the Olena Platform: A Free Software Framework for Document Image Analysis (GL, RL, TG, YJ, JM, ACL), pp. 252–258.
- ICDAR-2011-MalleronE #analysis #approach #documentation
- A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
- ICDAR-2011-XuYWL #analysis #using
- Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
- SIGMOD-2011-CastellanosDHGDLZS #analysis #framework #named #social
- LCI: a social channel analysis platform for live customer intelligence (MC, UD, MH, RG, MD, YL, LZ, MS), pp. 1049–1058.
- SIGMOD-2011-FlaounasATSNBC #analysis #monitoring #named
- NOAM: news outlets analysis and monitoring system (INF, OA, MT, TS, FN, TDB, NC), pp. 1275–1278.
- SIGMOD-2011-HanPLKY #analysis #graph #performance
- iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
- SIGMOD-2011-KanagalLD #analysis #database #evaluation #probability #query #robust
- Sensitivity analysis and explanations for robust query evaluation in probabilistic databases (BK, JL, AD), pp. 841–852.
- SIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence #using
- E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
- SIGMOD-2011-WeningerDFHHJKKLMSTWY #analysis #named #network
- WINACS: construction and analysis of web-based computer science information networks (TW, MD, FF, JMH, JH, TJJ, SK, HK, ZL, DM, YS, NET, CW, XY), pp. 1255–1258.
- VLDB-2011-BeyerEGBEKOS #data analysis #named #scalability #scripting language #semistructured data
- Jaql: A Scripting Language for Large Scale Semistructured Data Analysis (KSB, VE, RG, AB, MYE, CCK, FÖ, EJS), pp. 1272–1283.
- VLDB-2011-BudakAA #analysis #network #online #social
- Structural Trend Analysis for Online Social Networks (CB, DA, AEA), pp. 646–656.
- VLDB-2011-HerodotouB #cost analysis #optimisation #pipes and filters #profiling #source code
- Profiling, What-if Analysis, and Cost-based Optimization of MapReduce Programs (HH, SB), pp. 1111–1122.
- VLDB-2011-HuiKS #analysis #documentation #named #xml
- HIWAS: Enabling Technology for Analysis of Clinical Data in XML Documents (JH, SEK, PS), pp. 1260–1271.
- VLDB-2011-KarwaRSY #analysis #graph
- Private Analysis of Graph Structure (VK, SR, AS, GY), pp. 1146–1157.
- CSEET-2011-LuLL #analysis #using
- Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
- CSEET-2011-TsukamotoTNM #analysis #motivation #programming
- Analysis of the motivation of learners in the in-house training of programming in Japanese ICT industries (HT, YT, HN, KiM), pp. 121–128.
- ITiCSE-2011-Hijon-NeiraV #analysis #interactive
- Merlin-Mo, an interactions analysis system for Moodle (RHN, JÁVI), p. 340.
- ITiCSE-2011-KleinKT #analysis #assessment #automation #semantics #using
- Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
- ESOP-2011-ChenMWC #analysis #linear
- Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
- ESOP-2011-DeDN #analysis #data flow #source code
- Dataflow Analysis for Datarace-Free Programs (AD, DD, RN), pp. 196–215.
- ESOP-2011-GuhaSK #analysis #type system #using
- Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
- ESOP-2011-Mine #c #embedded #fault #parallel #runtime #source code #static analysis
- Static Analysis of Run-Time Errors in Embedded Critical Parallel C Programs (AM), pp. 398–418.
- ESOP-2011-SotinJ #analysis #interprocedural #pointer #precise #stack
- Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
- FASE-2011-BendispostoL #analysis #automation
- Automatic Flow Analysis for Event-B (JB, ML), pp. 50–64.
- FASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #using #visual notation
- On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
- FASE-2011-TkachukR #analysis #automation #generative #web
- Automated Driver Generation for Analysis of Web Applications (OT, SPR), pp. 326–340.
- FoSSaCS-2011-JaubertR #analysis #automaton #robust
- Quantitative Robustness Analysis of Flat Timed Automata (RJ, PAR), pp. 229–244.
- TACAS-2011-GaravelLMS #analysis #distributed #process
- CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes (HG, FL, RM, WS), pp. 372–387.
- TACAS-2011-Holzmann #design #development #reliability
- Reliable Software Development: Analysis-Aware Design (GJH), pp. 1–2.
- TACAS-2011-SeshiaK #analysis #named #tool support
- GameTime: A Toolkit for Timing Analysis of Software (SAS, JK), pp. 388–392.
- TACAS-2011-TsitovichSWK #analysis #summary #termination
- Loop Summarization and Termination Analysis (AT, NS, CMW, DK), pp. 81–95.
- ICPC-J-2009-HsuH11 #analysis #comparison #estimation #relational
- Comparison of weighted grey relational analysis for software effort estimation (CJH, CYH), pp. 165–200.
- SCAM-J-2009-DesharnaisAS11 #analysis #identification #metric
- Identification and analysis of attributes and base measures within ISO 9126 (JMD, AA, WS), pp. 447–460.
- CSMR-2011-KohlKPDM #analysis #maintenance #multi #using
- Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
- ICPC-2011-Ali #analysis #automation #named #retrieval #trust
- Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
- ICPC-2011-HassaineBGHA #impact analysis
- Change Impact Analysis: An Earthquake Metaphor (SH, FB, YGG, SH, GA), pp. 209–210.
- ICPC-2011-Sharafi #analysis #architecture #visualisation
- A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
- ICSM-2011-DamG #automation #impact analysis
- Automated change impact analysis for agent systems (HKD, AG), pp. 33–42.
- ICSM-2011-PirzadehHS #analysis #execution #mining
- Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
- ICSM-2011-SnipesRM #analysis
- Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
- ICSM-2011-TorresTPWY #analysis #evolution #named #visual notation
- Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
- MSR-2011-HindleEGM #analysis #automation #maintenance #process #topic
- Automated topic naming to support cross-project analysis of software maintenance activities (AH, NAE, MWG, JM), pp. 163–172.
- MSR-2011-SadowskiLLZW #algorithm #analysis #empirical
- An empirical analysis of the FixCache algorithm (CS, CL, ZL, XZ, EJWJ), pp. 219–222.
- MSR-2011-WangBD #analysis #debugging #eclipse
- System compatibility analysis of Eclipse and Netbeans based on bug data (XOW, EB, PTD), pp. 230–233.
- SCAM-2011-Gold #analysis #music #programming #source code
- Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
- SCAM-2011-Keul #analysis
- Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
- SCAM-2011-Larson #program analysis #set
- Program Analysis Too Loopy? Set the Loops Aside (EL), pp. 15–24.
- SCAM-2011-PavluSK #alias #analysis #comparison #graph #precise #set
- Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
- SCAM-2011-SfayhiS #analysis #interactive #visualisation #what
- What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
- WCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
- Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
- WCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
- WCRE-2011-SeppMS #precise #relational #static analysis
- Precise Static Analysis of Binaries by Extracting Relational Information (AS, BM, AS), pp. 357–366.
- PEPM-J-2007-MollerS11 #graph #program analysis #xml
- XML graphs in program analysis (AM, MIS), pp. 492–515.
- PEPM-2011-Rinard #bound #probability #program analysis #program transformation #source code
- Probabilistic accuracy bounds for perforated programs: a new foundation for program analysis and transformation (MCR), pp. 79–80.
- PLDI-2011-BouajjaniDES #analysis #interprocedural #on the #source code
- On inter-procedural analysis of programs with lists and data (AB, CD, CE, MS), pp. 578–589.
- SAS-2011-BlackshearCSS #analysis #precise
- The Flow-Insensitive Precision of Andersen’s Analysis in Practice (SB, BYEC, SS, MS), pp. 60–76.
- SAS-2011-FlexederPS #analysis #assembly
- Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
- SAS-2011-MadhavanRV #abstract interpretation #analysis
- Purity Analysis: An Abstract Interpretation Formulation (RM, GR, KV), pp. 7–24.
- SAS-2011-MightH #abstract interpretation #concurrent #higher-order #product line #source code #static analysis
- A Family of Abstract Interpretations for Static Analysis of Concurrent Higher-Order Programs (MM, DVH), pp. 180–197.
- SAS-2011-Mitchell #program analysis #security #web
- Program Analysis for Web Security (JCM), p. 4.
- SAS-2011-NoriR #machine learning #program analysis
- Program Analysis and Machine Learning: A Win-Win Deal (AVN, SKR), pp. 2–3.
- SAS-2011-ZulegerGSV #abstraction #analysis #bound #imperative #source code
- Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
- ICALP-v1-2011-BodlaenderJK #analysis #combinator #kernel #preprocessor
- Preprocessing for Treewidth: A Combinatorial Analysis through Kernelization (HLB, BMPJ, SK), pp. 437–448.
- ICALP-v1-2011-BorosEFGMM #analysis #approximate #game studies #probability
- Stochastic Mean Payoff Games: Smoothed Analysis and Approximation Schemes (EB, KME, MF, VG, KM, BM), pp. 147–158.
- ICALP-v2-2011-BrazdilKKV #analysis #bound #probability #recursion #runtime #source code
- Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
- FM-2011-BarringerH #analysis #domain-specific language #named #scala
- TraceContract: A Scala DSL for Trace Analysis (HB, KH), pp. 57–72.
- SEFM-2011-EggersRNF #analysis #hybrid #satisfiability
- Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
- SEFM-2011-ErnstSR #analysis #empirical #interactive #proving #theorem proving #verification
- Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving (GE, GS, WR), pp. 188–203.
- SEFM-2011-FadlisyahOA #analysis #formal method #hybrid #modelling #object-oriented
- Object-Oriented Formal Modeling and Analysis of Interacting Hybrid Systems in HI-Maude (MF, PCÖ, EÁ), pp. 415–430.
- SEFM-2011-ParrinoGGF #analysis #bound #data flow #satisfiability #verification
- A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
- SEFM-2011-Pedercini11a #analysis #development #policy
- Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
- CEFP-2011-TothB #erlang #static analysis
- Static Analysis of Complex Software Systems Implemented in Erlang (MT, IB), pp. 440–498.
- ICFP-2011-VardoulakisS #analysis #automaton
- Pushdown flow analysis of first-class control (DV, OS), pp. 69–80.
- AGTIVE-2011-GalvaoZRWA #analysis #graph #knowledge-based
- Knowledge-Based Graph Exploration Analysis (IG, EZ, AR, LW, MA), pp. 105–120.
- CHI-2011-Bargas-AvilaH #analysis #challenge #empirical #experience #novel #user interface
- Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
- CHI-2011-BaumerT #analysis #distributed #process #video
- Comparing activity theory with distributed cognition for video analysis: beyond “kicking the tires” (EPSB, BT), pp. 133–142.
- CHI-2011-BragdonNLH #analysis #design #gesture #mobile
- Experimental analysis of touch-screen gesture designs in mobile environments (AB, EN, YL, KH), pp. 403–412.
- CHI-2011-FourneyMT #analysis #interactive #query #usability
- Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
- CHI-2011-GillVPJ #analysis #privacy #taxonomy
- Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
- CHI-2011-MaLD #analysis #perspective
- Perceptual analysis of talking avatar head movements: a quantitative perspective (XM, BHL, ZD), pp. 2699–2702.
- CHI-2011-WillettHHA #analysis #collaboration #named #visual notation
- CommentSpace: structured support for collaborative visual analysis (WW, JH, JMH, MA), pp. 3131–3140.
- CSCW-2011-BardramD #analysis #process
- Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
- DHM-2011-BenderiusMWW #analysis #modelling #optimisation #simulation
- A Simulation Environment for Analysis and Optimization of Driver Models (OB, GM, KW, MW), pp. 453–462.
- DHM-2011-MarlerKJ #analysis #predict
- Optimization-Based Posture Prediction for Analysis of Box Lifting Tasks (TM, LK, RJ), pp. 151–160.
- DHM-2011-SixiangCIL #3d #analysis #modelling #parametricity
- 3D Parametric Body Model Based on Chinese Female Anhtropometric Analysis (PS, CKC, WHI, AL), pp. 22–29.
- DHM-2011-TangwenF #analysis #architecture #cumulative #learning #polymorphism
- Polymorphic Cumulative Learning in Integrated Cognitive Architectures for Analysis of Pilot-Aircraft Dynamic Environment (TY, SF), pp. 409–416.
- DHM-2011-WelkePRJ #analysis #how #modelling #validation #what
- What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
- DUXU-v1-2011-HuangW #analysis #gesture #interactive #mobile #usability
- Usability Analysis in Gesture Operation of Interactive E-Books on Mobile Devices (CHH, CMW), pp. 573–582.
- DUXU-v1-2011-Schmid #analysis #development #feedback #learning
- Development of an Augmented Feedback Application to Support Motor Learning after Stroke: Requirement Analysis (SS), pp. 305–314.
- DUXU-v1-2011-YeratziotisSVN #analysis
- Analysis of Emergent Use for Wellbeing Service Innovation (AY, CS, JV, MN), pp. 332–341.
- DUXU-v2-2011-Hsu11b #analysis #design
- Analysis of Causal Relationships between Blog Design Criteria (CCH), pp. 13–19.
- DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
- DUXU-v2-2011-Nakata #analysis #clustering #monitoring #usability
- Clustering Analysis to Evaluate Usability of Work-Flow Systems and to Monitor Proficiency of Workers (TN), pp. 487–496.
- DUXU-v2-2011-PohlmeyerB #analysis
- A Conjoint Analysis of Attributes Affecting the Likelihood of Technology Use (AEP, LTMB), pp. 303–312.
- DUXU-v2-2011-WynnS #data analysis #low cost #video
- Motivating Change and Reducing Cost with the Discount Video Data Analysis Technique (JW, JDS), pp. 321–328.
- HCD-2011-ChoiPJP #analysis #research #smarttech #state of the art
- Scientometric Analysis of Research in Smart Clothing: State of the Art and Future Direction (KC, HP, ESJ, SP), pp. 500–508.
- HCD-2011-WangL11a #analysis #behaviour #design #evaluation
- Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
- HCI-DDA-2011-CharfiEKM #analysis #automation #evaluation #human-computer #interactive #network #towards
- Towards an Automatic Analysis of Interaction Data for HCI Evaluation Application to a Transport Network Supervision System (SC, HE, CK, FM), pp. 175–184.
- HCI-DDA-2011-InoueAN #analysis #modelling
- Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work (SI, HA, KN), pp. 341–350.
- HCI-DDA-2011-KaelberM #analysis
- From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications (CK, CM), pp. 258–267.
- HCI-ITE-2011-AbeOO #analysis #detection #image
- Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
- HCI-ITE-2011-BarbuceanuADR #analysis #artificial reality #interactive #user interface
- Attentive User Interface for Interaction within Virtual Reality Environments Based on Gaze Analysis (FB, CA, MD, ZR), pp. 204–213.
- HCI-ITE-2011-HsiaoJ #analysis #named #user interface
- TiMBA — Tangible User Interface for Model Building and Analysis (CPH, BRJ), pp. 43–52.
- HCI-ITE-2011-InoueIFHIM #analysis
- Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues (MI, TI, NF, RH, TI, HM), pp. 259–267.
- HCI-MIIE-2011-KimHJHMJ #analysis #behaviour #using #video
- Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
- HCI-UA-2011-LeeKJ #analysis #fault
- Control Error Analysis of Computerized Operational Environment in Nuclear Power Plants (SJL, JK, SCJ), pp. 360–367.
- HCI-UA-2011-RhiuRJY #analysis
- Analysis of Customer Satisfaction on the Stiffness of Outside Panels of Passenger Cars (IR, TR, BJ, MHY), pp. 257–265.
- HCI-UA-2011-YangCS #analysis #learning #recognition
- Facial Expression Recognition for Learning Status Analysis (MTY, YJC, YCS), pp. 131–138.
- HCI-UA-2011-YoshimiMIKOT #analysis #database
- Construction and Analysis of Database on Outer Cases of Medicines (HY, HM, AI, MK, MO, FT), pp. 226–231.
- HIMI-v1-2011-JeonKLW #analysis #security #smarttech
- A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
- HIMI-v1-2011-JeonLW #analysis
- Analysis of Content Filtering Software (WJ, YL, DW), pp. 548–557.
- HIMI-v1-2011-OhoriSNI #analysis
- Construction of a Model for Discriminating between Electroencephalographic Patterns at the Time of Incorrect Inputs Based on Sensitivity Spectrum Analysis (RO, DS, YN, SI), pp. 618–626.
- HIMI-v1-2011-Pavel #analysis #authentication #case study #protocol
- Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
- HIMI-v1-2011-TakahashiSHNIHKWK #analysis #process
- Basic Study of Analysis of Human Brain Activities during Car Driving (NT, SS, YH, HN, HI, NH, SK, EW, SK), pp. 627–635.
- HIMI-v1-2011-VogelZO #analysis
- Constructing Phylogenetic Trees Based on Intra-group Analysis of Human Mitochondrial DNA (IV, FZ, PO), pp. 165–169.
- HIMI-v2-2011-ItouOM #analysis #chat #word
- Analysis on Relationship between Smiley and Emotional Word Included in Chat Text (JI, TO, JM), pp. 141–146.
- HIMI-v2-2011-KwackKC #analysis #mobile
- Economic Analysis of SON-Enabled Mobile WiMAX (SK, JK, JC), pp. 268–277.
- HIMI-v2-2011-Otsuka #analysis #behaviour #comprehension #multimodal #people
- Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
- HIMI-v2-2011-SagaTKTM #analysis #comparison #using
- Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
- IDGD-2011-GaoQ #analysis #distributed #simulation
- Analysis of the Applied Pattern of Distributed Computing Used in Simulation (SfG, HQ), pp. 152–158.
- IDGD-2011-RigbyD #analysis #design #network #on the
- On the Design of Organizational Network Analysis Software (JR, HD), pp. 550–555.
- IDGD-2011-YuSZ #analysis
- Driving Distraction Analysis by ECG Signals: An Entropy Analysis (LY, XS, KZ), pp. 258–264.
- VISSOFT-2011-BeckTD #analysis #design #visual notation
- A visual analysis and design tool for planning software reengineerings (MB, JT, JD), pp. 1–8.
- AdaEurope-2011-CoqR #ada #analysis #modelling #quality #source code
- The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
- AdaEurope-2011-MedinaC #ada #analysis #design #distributed #modelling #realtime #uml
- Model-Based Analysis and Design of Real-Time Distributed Systems with Ada and the UML Profile for MARTE (JLM, ÁGC), pp. 89–102.
- SIGAda-2011-AbrahamCP #ada #analysis #quality
- Improving quality of Ada software with range analysis (JA, JC, CP), pp. 7–8.
- SIGAda-2011-AbrahamCP11a #ada #analysis #quality
- Improving quality of Ada software with range analysis (JA, JC, CP), pp. 69–74.
- SIGAda-2011-GaudelSPRDL #ada #analysis #design pattern #pattern matching #pattern recognition #performance #recognition
- An Ada design pattern recognition tool for AADL performance analysis (VG, FS, AP, SR, PD, JL), pp. 61–68.
- CAiSE-2011-KabicherR #analysis #process
- Human-Centered Process Engineering Based on Content Analysis and Process View Aggregation (SK, SRM), pp. 467–481.
- CAiSE-2011-MoserWHB #analysis #automation #categorisation #empirical #requirements #semantics
- Requirements Management with Semantic Technology: An Empirical Study on Automated Requirements Categorization and Conflict Analysis (TM, DW, MH, SB), pp. 3–17.
- CAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
- EDOC-2011-AdriansyahDA #consistency #cost analysis #using
- Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
- EDOC-2011-Bellamy-McIntyreLW #analysis #authentication #enterprise #modelling
- OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
- EDOC-2011-MelleriHM #analysis #modelling #standard #xml
- Comparing Information Models in XML-based e-Business Standards — A Quantitative Analysis (IM, KH, JM), pp. 225–234.
- ICEIS-J-2011-ChangS11a #analysis #mobile #process #research #simulation
- Research on Grid-Based Mobile Business Process and Analysis on Process Simulation (DC, LS), pp. 349–361.
- ICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system #using
- A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
- ICEIS-J-2011-PereiraB11a #analysis #evaluation #lens #social
- Seeing Social Software Analysis and Evaluation through the Lenses of Culture (RP, MCCB), pp. 374–387.
- ICEIS-J-2011-PhillisK #analysis #approach
- A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
- ICEIS-v1-2011-ChenZ #analysis #bound
- Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
- ICEIS-v1-2011-NiknafsSRR #analysis #comparative #predict
- Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
- ICEIS-v1-2011-WangWH #data analysis #implementation
- Research and Implementation of Campus Card Data Analysis System (FW, FW, LH), pp. 515–518.
- ICEIS-v1-2011-WeiY #analysis #behaviour #game studies #metric #security
- Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
- ICEIS-v2-2011-CanoCSF #analysis #architecture #integration #multi #process #segmentation
- Multisensory Architecture for Intelligent Surveillance Systems — Integration of Segmentation, Tracking and Activity Analysis (FAC, JCC, JSC, AFC), pp. 157–162.
- ICEIS-v2-2011-LivaniPR #analysis
- Decision Support System for Cost-benefit Analysis in Service Provision (EL, EP, GR), pp. 198–203.
- ICEIS-v2-2011-Pang #analysis #quality
- Analysis of Remote Quality Inspection System for Construction Projects (JP), pp. 341–344.
- ICEIS-v2-2011-TianZX #analysis #case study #network #social #using
- Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
- ICEIS-v2-2011-WangJ #analysis #empirical
- An Empirical Analysis of Beijing Public Transport Users’ Satisfaction Level (HW, LJ), pp. 384–388.
- ICEIS-v3-2011-Li11e #analysis #quality
- Construction and Analysis of Service Quality Model for Beijing Urban Mass Transit (WL), pp. 541–543.
- ICEIS-v3-2011-NiZY #analysis #uml
- Analysis of Requirement Capture based on UML (TN, ZZ, YY), pp. 313–317.
- ICEIS-v3-2011-QuG #analysis #identification #outsourcing #risk management
- The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
- ICEIS-v3-2011-ShenYZT #analysis #documentation #security
- Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
- ICEIS-v3-2011-TangX #analysis #communication #modelling #network
- Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure (ST, YX), pp. 184–189.
- ICEIS-v3-2011-Zhao #analysis #contest #industrial
- The Competitive Strategy Analysis of Express Industry based on Time-based Competition (JZ), pp. 502–506.
- ICEIS-v3-2011-ZhouL #analysis #metric
- A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
- ICEIS-v3-2011-ZongYTS #analysis #research #visual notation
- Visual Analysis of Research on Acceptance of Information Technology (QJZ, QJY, LyT, HZS), pp. 415–420.
- ICEIS-v4-2011-CuiYZ #analysis #empirical #industrial #social
- An Empirical Analysis of the Relationship between Social Consumption Demand Factors and the Cultural Industry in China (LC, HY, HZ), pp. 606–610.
- ICEIS-v4-2011-FarwickABRVH #analysis #architecture #automation #bibliography #enterprise #maintenance #requirements
- Requirements for Automated Enterprise Architecture Model Maintenance — A Requirements Analysis based on a Literature Review and an Exploratory Survey (MF, BA, RB, SR, KV, IH), pp. 325–337.
- ICEIS-v4-2011-Feng11a #analysis #enterprise
- Factorial Analysis to Measure Developing Ability of Listed Retail Enterprises (YF), pp. 553–556.
- ICEIS-v4-2011-Huang #analysis #empirical #industrial #statistics
- Which is Better Innovative Investment — An Empirical Analysis of Statistics from Chinese Industrial Undertakings (ZH), pp. 617–628.
- ICEIS-v4-2011-ShiL #analysis
- Analysis of the Economic Benefit of Used Batteries based on Reverse Logistics (XS, ZL), pp. 736–742.
- ICEIS-v4-2011-SunL #analysis #industrial
- Brief Analysis on Profits Allocation of IOT Industry Chain (QS, XL), pp. 165–169.
- ICEIS-v4-2011-XiongLL #analysis #industrial
- The Analysis of the Internet-of-things Industrial Chain based on Hypercycle Theory (QX, XL, YL), pp. 513–517.
- ICEIS-v4-2011-YangR #analysis #e-commerce
- Cost Earnings Analysis on Aquatic Product e-Commerce (ZY, SR), pp. 111–115.
- CIKM-2011-BespalovBQS #analysis #classification #n-gram #sentiment
- Sentiment classification based on supervised latent n-gram analysis (DB, BB, YQ, AS), pp. 375–382.
- CIKM-2011-CachedaCFF #algorithm #analysis #dataset #nearest neighbour
- Improving k-nearest neighbors algorithms: practical application of dataset analysis (FC, VC, DF, VF), pp. 2253–2256.
- CIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
- A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
- CIKM-2011-GottronAS #analysis #semantics
- Insights into explicit semantic analysis (TG, MA, BS), pp. 1961–1964.
- CIKM-2011-GuoZGS #analysis #aspect-oriented #multi #sentiment
- Domain customization for aspect-oriented opinion analysis with multi-level latent sentiment clues (HG, HZ, ZG, ZS), pp. 2493–2496.
- CIKM-2011-HeerschopGHFKJ #analysis #using
- Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
- CIKM-2011-HsuC #analysis #component #independence #privacy
- Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
- CIKM-2011-KimKFL #analysis
- Spectral analysis of a blogosphere (SWK, KNK, CF, JHL), pp. 2145–2148.
- CIKM-2011-LiBS #analysis #named #network #online #social #towards
- CASINO: towards conformity-aware social influence analysis in online social networks (HL, SSB, AS), pp. 1007–1012.
- CIKM-2011-VirgilioM #calculus #data analysis #using
- RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
- CIKM-2011-WangWLZZ #analysis #approach #classification #graph #hashtag #sentiment #topic #twitter
- Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
- CIKM-2011-YinHD #analysis #microblog #predict
- Structural link analysis and prediction in microblogs (DY, LH, BDD), pp. 1163–1168.
- ECIR-2011-Carrillo-de-AlbornozPGD #analysis #bibliography #mining #rating #sentiment
- A Joint Model of Feature Mining and Sentiment Analysis for Product Review Rating (JCdA, LP, PG, AD), pp. 55–66.
- ECIR-2011-KimC #analysis #web
- An Analysis of Time-Instability in Web Search Results (JK, VRC), pp. 466–478.
- ECIR-2011-NunzioLM #analysis #multi
- Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
- ECIR-2011-Rehurek #analysis #semantics
- Subspace Tracking for Latent Semantic Analysis (RR), pp. 289–300.
- ECIR-2011-ZucconAR #analysis
- Back to the Roots: Mean-Variance Analysis of Relevance Estimations (GZ, LA, KvR), pp. 716–720.
- ICML-2011-ChenPSDC #analysis #learning #process
- The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning (BC, GP, GS, DBD, LC), pp. 361–368.
- ICML-2011-GhavamzadehLMH #analysis
- Finite-Sample Analysis of Lasso-TD (MG, AL, RM, MWH), pp. 1177–1184.
- KDD-2011-ChenDWSNL #analysis #process
- Activity analysis based on low sample rate smart meters (FC, JD, BW, SS, MRN, CTL), pp. 240–248.
- KDD-2011-GuerraVMA #analysis #approach #bias #realtime #sentiment
- From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
- KDD-2011-Norton #analysis #power of
- The power of analysis and data (DN), p. 784.
- KDD-2011-Norvig #data analysis #internet
- Internet scale data analysis (PN), p. 2.
- KDD-2011-SinkovitsCSTRWB #analysis #data-driven #performance
- Data intensive analysis on the gordon high performance data and compute system (RSS, PC, SS, MT, PR, NW, NB), pp. 747–748.
- KDD-2011-TanLTJZL #analysis #network #sentiment #social
- User-level sentiment analysis incorporating social networks (CT, LL, JT, LJ, MZ, PL), pp. 1397–1405.
- KDD-2011-WangBB #analysis #component #matrix #multi
- Common component analysis for multiple covariance matrices (HW, AB, DB), pp. 956–964.
- KDD-2011-WangLZ #analysis #keyword #rating
- Latent aspect rating analysis without aspect keyword supervision (HW, YL, CZ), pp. 618–626.
- KDIR-2011-BallesterosFDHG #analysis #dependence #using
- Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
- KDIR-2011-CostantiniFP #analysis #framework #natural language #representation
- A Framework for Structured Knowledge Extraction and Representation from Natural Language through Deep Sentence Analysis (SC, NF, AP), pp. 282–287.
- KDIR-2011-OlegA #analysis #approach #clustering
- Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
- KDIR-2011-RavulaCL #dynamic analysis #using
- Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
- KDIR-2011-SethCRSB #analysis #query #similarity
- A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
- KEOD-2011-GoczylaWWZ #analysis #framework
- Analysis of Mapping within S-module Framework (KG, AW, WW, TZ), pp. 267–272.
- KEOD-2011-PinchukINDBP #analysis #distributed #semantics #visual notation
- Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
- KEOD-2011-SeppalaN #analysis #modelling
- Contextual Analysis and Modeling of Personal Wellness (AS, PN), pp. 202–207.
- KMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism #using
- A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
- KMIS-2011-SchauerZM #analysis #collaboration #enterprise #open source #tool support
- A Feature-based Analysis of Open Source Tools for Enterprise 2.0 — Open Source Tools for Team Collaboration in SMEs (BS, MZ, RM), pp. 57–66.
- MLDM-2011-AdolfHHCH #analysis #grid #power management
- Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
- MLDM-2011-JiangMY #analysis #sentiment #topic
- Topic Sentiment Change Analysis (YJ, WM, CTY), pp. 443–457.
- MLDM-2011-MohebzadaRR #analysis #constraints #generative
- Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
- MLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics #using
- A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
- RecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment #using
- Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
- RecSys-2011-LeeL #analysis #behaviour #music #recommendation
- My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
- SEKE-2011-AlmeidaMA #analysis #execution #process #using
- Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
- SEKE-2011-BadriT #analysis #control flow #dependence #empirical #testing
- Empirical Analysis for Investigating the Effect of Control Flow Dependencies on Testability of Classes (MB, FT), pp. 475–480.
- SEKE-2011-ChangSWSP #analysis #component #design #social
- Design of Component-based Slow Intelligence Systems and Application to Social Influence Analysis (SKC, YS, YW, CCS, TCP), pp. 9–16.
- SEKE-2011-ChenHS #adaptation #analysis #modelling #process #towards #validation
- Towards Modeling and Validating Analysis Processes for Software Adaptation (XC, GH, LS), pp. 547–552.
- SEKE-2011-DoranTFG #analysis #architecture #nondeterminism #parametricity #reliability
- Architecture-based Reliability Analysis With Uncertain Parameters (DD, MT, LF, SSG), pp. 629–634.
- SEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability #using
- Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
- SEKE-2011-GaoGMTBK #analysis #complexity #component #configuration management #modelling #testing
- Testing Configurable Component-Based Software — Configuration Test Modeling and Complexity Analysis (JG, JG, AM, CT, XB, DCK), pp. 495–502.
- SEKE-2011-GuedesV #analysis #case study #metamodelling #multi #requirements #uml #validation
- Applying and Validating a UML Metamodel for the Requirements Analysis in Multi-Agent Systems: The AME-A Case Study (GTAG, RMV), pp. 746–751.
- SEKE-2011-GuoC #analysis #comparison #ontology #tool support #visualisation
- A Comparison and Analysis of Some Ontology Visualization Tools (SSG, CWC), pp. 357–362.
- SEKE-2011-JuniorGM #analysis #architecture #product line #trade-off
- A Meta-Process to Support Trade-Off Analysis in Software Product Line Architecture (EAdOJ, IMdSG, JCM), pp. 687–692.
- SEKE-2011-LiuL #analysis #parallel #petri net #pointer #thread
- Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
- SEKE-2011-MoserWHB #analysis #automation #detection #empirical #requirements #semantics
- Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
- SEKE-2011-SanfordWX #analysis #modelling #security #using
- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
- SEKE-2011-WuXKP #analysis #data mining #debugging #mining #named #reliability
- BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports (LW, BX, GEK, RJP), pp. 95–100.
- SIGIR-2011-BelloginCC #analysis #hybrid #network #recommendation #self #social
- Self-adjusting hybrid recommenders based on social network analysis (AB, PC, IC), pp. 1147–1148.
- SIGIR-2011-Campos #analysis #query #using #web
- Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
- SIGIR-2011-FangSSKM #analysis #query
- Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
- SIGIR-2011-KotovBWDT #analysis #modelling
- Modeling and analysis of cross-session search tasks (AK, PNB, RWW, STD, JT), pp. 5–14.
- SIGIR-2011-Shokouhi #analysis #detection #query
- Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
- SIGIR-2011-SilvaGVMF #analysis #effectiveness #self #sentiment
- Effective sentiment stream analysis with self-augmenting training and demand-driven projection (ISS, JG, AV, WMJ, RF), pp. 475–484.
- SIGIR-2011-WangA #analysis #semantics
- Temporal latent semantic analysis for collaboratively generated content: preliminary results (YW, EA), pp. 1145–1146.
- SIGIR-2011-WeerkampBKMBR #analysis #people
- People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
- SIGIR-2011-WeiHL #analysis #framework #recommendation #semantics
- A unified framework for recommendations based on quaternary semantic analysis (WC, WH, MLL), pp. 1023–1032.
- SIGIR-2011-YangYD #analysis #network #predict
- Award prediction with temporal citation network analysis (ZY, DY, BDD), pp. 1203–1204.
- SIGIR-2011-YinHXD #analysis #microblog
- Link formation analysis in microblogs (DY, LH, XX, BDD), pp. 1235–1236.
- SIGIR-2011-Zhai #analysis #modelling #statistics #topic
- Beyond search: statistical topic models for text analysis (CZ), pp. 3–4.
- BX-2011-Hermann #analysis #graph grammar #model transformation
- Analysis of Model Transformations based on TGGs (FH), p. 52.
- ECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements #using
- Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
- ICMT-2011-AmstelB #analysis #maintenance #model transformation
- Model Transformation Analysis: Staying Ahead of the Maintenance Nightmare (MvA, MvdB), pp. 108–122.
- ICMT-2011-LepperT #analysis #optimisation #performance #visitor
- Optimization of Visitor Performance by Reflection-Based Analysis (ML, BTyW), pp. 15–30.
- MoDELS-2011-MaozRR #analysis #configuration management #consistency #diagrams #semantics
- Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
- MoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
- CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
- MoDELS-2011-MaozRR #analysis #configuration management #consistency #diagrams #semantics
- Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
- MoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
- CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
- ECOOP-2011-PrabhuMBIG #analysis #c++ #exception #interprocedural
- Interprocedural Exception Analysis for C++ (PP, NM, GB, FI, AG), pp. 583–608.
- OOPSLA-2011-DohertyHR #analysis #matlab
- Kind analysis for MATLAB (JD, LJH, SR), pp. 99–118.
- OOPSLA-2011-LiSD #analysis #concurrent #detection #named
- SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
- OOPSLA-2011-MadhavanK #analysis #approximate #null #verification
- Null dereference verification via over-approximated weakest pre-conditions analysis (RM, RK), pp. 1033–1052.
- OOPSLA-2011-SeweMSB #analysis #benchmark #design #java #metric #scala #virtual machine
- Da capo con scala: design and analysis of a scala benchmark suite for the java virtual machine (AS, MM, AS, WB), pp. 657–676.
- OOPSLA-2011-SridharanAPGTB #analysis #named #web
- F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
- TOOLS-EUROPE-2011-CianconeFDMG #analysis #component #modelling #named #performance #reliability
- KlaperSuite: An Integrated Model-Driven Environment for Reliability and Performance Analysis of Component-Based Systems (AC, AF, MLD, RM, VG), pp. 99–114.
- GPCE-2011-HannousseDA #component #composition #interactive #modelling #static analysis
- Static analysis of aspect interaction and composition in component models (AH, RD, GA), pp. 43–52.
- LOPSTR-2011-Gallagher #analysis #logic programming #source code #using
- Analysis of Logic Programs Using Regular Tree Languages — (Extended Abstract) (JPG), pp. 1–3.
- LOPSTR-2011-PilozziS #analysis #self #termination #using
- Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
- LOPSTR-2011-StroderESGF #analysis #complexity #linear #prolog #semantics #termination
- A Linear Operational Semantics for Termination and Complexity Analysis of ISO Prolog (TS, FE, PSK, JG, CF), pp. 237–252.
- PPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
- PPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification #using
- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
- QAPL-2011-AssouramouD #analysis #hybrid #probability
- Analysis of Non-Linear Probabilistic Hybrid Systems (JA, JD), pp. 104–119.
- QAPL-2011-LeitnerFischerL #analysis #modelling #named #quantum #safety #uml
- QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
- PADL-2011-ChristakisS #detection #fault #message passing #static analysis #using
- Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
- POPL-2011-ChoiAYT #multi #source code #static analysis
- Static analysis of multi-staged programs via unstaging translation (WC, BA, KY, MT), pp. 81–92.
- POPL-2011-CousotCL #analysis #array #automation #parametricity #scalability #segmentation
- A parametric segmentation functor for fully automatic and scalable array content analysis (PC, RC, FL), pp. 105–118.
- POPL-2011-HoffmannAH #analysis #multi
- Multivariate amortized resource analysis (JH, KA, MH), pp. 357–370.
- POPL-2011-LhotakC #analysis #performance #points-to
- Points-to analysis with efficient strong updates (OL, KCAC), pp. 3–16.
- POPL-2011-PrabhuRMH #analysis #named
- EigenCFA: accelerating flow analysis with GPUs (TP, SR, MM, MWH), pp. 511–522.
- POPL-2011-PrountzosMPM #analysis #graph #optimisation #parallel #source code
- A shape analysis for optimizing parallel graph programs (DP, RM, KP, KSM), pp. 159–172.
- POPL-2011-SchwarzSVLM #protocol #source code #static analysis
- Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol (MDS, HS, VV, PL, MMO), pp. 93–104.
- RE-2011-CoteHSH #analysis #named #problem #requirements #uml
- UML4PF — A tool for problem-oriented requirements analysis (IC, MH, HS, DH), pp. 349–350.
- RE-2011-DekhtyarDHHCK #analysis #on the #performance #requirements #statistics
- On human analyst performance in assisted requirements tracing: Statistical analysis (AD, OD, JH, JHH, DC, WKK), pp. 111–120.
- RE-2011-KomssiKTLD #analysis #perspective #process
- Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
- RE-2011-UbayashiKHT #analysis #bound #embedded
- A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
- RE-2011-WeverM #analysis #effectiveness #question #what
- What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
- SAC-2011-ClaycombS #analysis #authentication #formal method #ubiquitous
- Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
- SAC-2011-ClevenWW #analysis #design #performance #problem #process
- Process performance management: illuminating design issues through a systematic problem analysis (AC, RW, FW), pp. 280–286.
- SAC-2011-DingZ #analysis #forensics
- Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
- SAC-2011-ElahiY #analysis #heuristic #metric #requirements #trade-off
- Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
- SAC-2011-GomiI #analysis
- A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
- SAC-2011-GutzmannLL #analysis #points-to
- Feedback-driven points-to analysis (TG, JL, WL), pp. 1341–1342.
- SAC-2011-HaBKBJ #analysis #network #perspective #social
- Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
- SAC-2011-HuangK #ad hoc #analysis #performance
- Performance analysis of IEEE 802.11 ad hoc based broadcast (YHH, CYK), pp. 72–73.
- SAC-2011-LammelPS #analysis #java #open source #scalability
- Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
- SAC-2011-LanLSH #algorithm #analysis #case study #classification #comparative #image
- A comparative study and analysis on K-view based algorithms for image texture classification (YL, HL, ES, CCH), pp. 859–860.
- SAC-2011-LiuCJ #aspect-oriented #impact analysis #object-oriented #source code
- Change impact analysis for object-oriented programs evolved to aspect-oriented programs (CHL, SLC, WLJ), pp. 59–65.
- SAC-2011-LiuZ11a #analysis #distance #performance #stack #worst-case
- Stack distance based worst-case instruction cache performance analysis (YL, WZ), pp. 723–728.
- SAC-2011-LuKNB #analysis #approach #embedded #realtime #simulation #statistics #validation
- A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systems (YL, JK, TN, IB), pp. 711–716.
- SAC-2011-MagalhaesS #analysis #performance
- Root-cause analysis of performance anomalies in web-based applications (JPM, LMS), pp. 209–216.
- SAC-2011-ManyD #analysis #evaluation #fault tolerance #scheduling
- Fault tolerance evaluation and schedulability analysis (FM, DD), pp. 729–734.
- SAC-2011-SinhaTKWG #analysis #mobile #resource management
- Resource-aware ECG analysis on mobile devices (AS, HT, SK, ABW, MMG), pp. 1012–1013.
- SAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
- Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
- SAC-2011-VarelaABM #analysis #aspect-oriented #product line #requirements
- Aspect-oriented analysis for software product lines requirements engineering (PV, JA, ISB, AMDM), pp. 667–674.
- SAC-2011-YamamotoT #analysis #named #web
- ImageAlert: credibility analysis of text-image pairs on the web (YY, KT), pp. 1724–1731.
- SAC-2011-Zhang #analysis #constraints #geometry #graph #problem
- Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
- ESEC-FSE-2011-JensenMM #api #html #javascript #modelling #static analysis #web
- Modeling the HTML DOM and browser API in static analysis of JavaScript web applications (SHJ, MM, AM), pp. 59–69.
- ESEC-FSE-2011-LiCK #analysis #performance #points-to #using
- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
- ESEC-FSE-2011-MeneelyRW #analysis #empirical #quality
- Does adding manpower also affect quality?: an empirical, longitudinal analysis (AM, PR, LW), pp. 81–90.
- ESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability #using
- Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
- GTTSE-2011-CleveNH #database #program analysis #reverse engineering
- Dynamic Program Analysis for Database Reverse Engineering (AC, NN, JLH), pp. 297–321.
- GTTSE-2011-Fuhrer #ide #static analysis
- Leveraging Static Analysis in an IDE (RMF), pp. 101–158.
- ICSE-2011-AcharyaR #impact analysis #industrial #slicing
- Practical change impact analysis based on static program slicing for industrial software systems (MA, BR), pp. 746–755.
- ICSE-2011-AdlerBRSSUZ #analysis #scalability #test coverage
- Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
- ICSE-2011-BoddenSSOM #static analysis
- Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders (EB, AS, JS, HO, MM), pp. 241–250.
- ICSE-2011-CataldoH #analysis #development #empirical #feature model #integration
- Factors leading to integration failures in global feature-oriented development: an empirical analysis (MC, JDH), pp. 161–170.
- ICSE-2011-Goeritzer #impact analysis #industrial #using
- Using impact analysis in industry (RG), pp. 1155–1157.
- ICSE-2011-LiuZ #program analysis
- Program analysis: from qualitative analysis to quantitative analysis (SL, JZ), pp. 956–959.
- ICSE-2011-Malik #analysis #graph #using
- Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
- ICSE-2011-NearMKJ #analysis #dependence #evaluation #lightweight
- A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
- ICSE-2011-PirzadehH #analysis #behaviour #framework
- A software behaviour analysis framework based on the human perception systems (HP, AHL), pp. 948–951.
- ICSE-2011-RamasubbuCBH #analysis #configuration management #multi #quality
- Configuring global software teams: a multi-company analysis of project productivity, quality, and profits (NR, MC, RKB, JDH), pp. 261–270.
- ICSE-2011-SchmerlGDBC #analysis #case study #design #framework #named
- SORASCS: a case study in soa-based platform design for socio-cultural analysis (BRS, DG, VD, MWB, KMC), pp. 643–652.
- ICSE-2011-SumnerBZP #analysis #nondeterminism #performance
- Coalescing executions for fast uncertainty analysis (WNS, TB, XZ, SP), pp. 581–590.
- ICSE-2011-XiaoZZ #analysis #data type
- Tracking data structures for postmortem analysis (XX, JZ, CZ), pp. 896–899.
- ICSE-2011-Xue #analysis #automation #legacy #product line #re-engineering #variability
- Reengineering legacy software products into software product line based on automatic variability analysis (YX), pp. 1114–1117.
- LDTA-2011-GiegerichS #analysis #compilation
- Yield grammar analysis in the Bellman’s GAP compiler (RG, GS), p. 7.
- SLE-2011-HillsKV #named #program analysis #rascal
- RLSRunner: Linking Rascal with K for Program Analysis (MH, PK, JJV), pp. 344–353.
- SLE-2011-KlintLP #analysis #towards #visualisation
- Towards a One-Stop-Shop for Analysis, Transformation and Visualization of Software (PK, BL, AvdP), pp. 1–18.
- PLEASE-2011-ChastekDM #analysis #variability
- Commonality and variability analysis for resource constrained organizations (GJC, PD, JDM), pp. 31–34.
- ASPLOS-2011-ChipounovKC #analysis #framework #multi #named
- S2E: a platform for in-vivo multi-path analysis of software systems (VC, VK, GC), pp. 265–278.
- CC-2011-JoynerBS #analysis #array #bound
- Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
- CC-2011-NaeemL #alias #analysis #performance #set #summary #using
- Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
- CC-2011-RimsadP #analysis #source code
- Tainted Flow Analysis on e-SSA-Form Programs (AR, Md, FMQP), pp. 124–143.
- CC-2011-RodriguezL #analysis #data flow #parallel
- Actor-Based Parallel Dataflow Analysis (JR, OL), pp. 179–197.
- CC-2011-SunZC #analysis #java #points-to #probability
- Probabilistic Points-to Analysis for Java (QS, JZ, YC), pp. 62–81.
- CGO-2011-GreathouseLAB #analysis #data flow #distributed #scalability
- Highly scalable distributed dataflow analysis (JLG, CL, TMA, VB), pp. 277–288.
- CGO-2011-HardekopfL #analysis #pointer
- Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
- CGO-2011-LiuM #analysis #locality #problem #using
- Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
- CGO-2011-NasreG #analysis #constraints #evaluation #performance #points-to
- Prioritizing constraint evaluation for efficient points-to analysis (RN, RG), pp. 267–276.
- HPCA-2011-LeeSNY #analysis #order
- Offline symbolic analysis to infer Total Store Order (DL, MS, SN, ZY), pp. 357–358.
- HPCA-2011-ZhangO #analysis #architecture #gpu #performance
- A quantitative performance analysis model for GPU architectures (YZ, JDO), pp. 382–393.
- HPDC-2011-MinhW #analysis #parallel #performance #towards
- Towards a profound analysis of bags-of-tasks in parallel systems and their performance impact (TNM, LW), pp. 111–122.
- LCTES-2011-AlbertAGZ #analysis #parallel
- Task-level analysis for a language with async/finish parallelism (EA, PA, SG, DZ), pp. 21–30.
- LCTES-2011-AlthausAN #analysis #parametricity #performance #precise
- Precise and efficient parametric path analysis (EA, SA, RN), pp. 141–150.
- LCTES-2011-Cullmann #analysis #novel #persistent #theory and practice
- Cache persistence analysis: a novel approachtheory and practice (CC), pp. 121–130.
- LCTES-2011-GamatieG #design #embedded #multi #performance #source code #static analysis
- Static analysis of synchronous programs in signal for efficient design of multi-clocked embedded systems (AG, LG), pp. 71–80.
- PPoPP-2011-DonaldsonKR #analysis #automation #named
- SCRATCH: a tool for automatic analysis of dma races (AFD, DK, PR), pp. 311–312.
- SOSP-2011-ChenSGK #analysis #design #enterprise #multi
- Design implications for enterprise storage systems via multi-dimensional trace analysis (YC, KS, GRG, RHK), pp. 43–56.
- CADE-2011-AlbertiAR #analysis #automation #named #policy #security
- ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
- CADE-2011-FredriksonCJ #algorithm #analysis #approximate #behaviour #complexity
- Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
- CADE-2011-NoschinskiEG #analysis #complexity #dependence #framework #term rewriting
- A Dependency Pair Framework for Innermost Complexity Analysis of Term Rewrite Systems (LN, FE, JG), pp. 422–438.
- CADE-2011-PayetS #android #source code #static analysis
- Static Analysis of Android Programs (ÉP, FS), pp. 439–445.
- CAV-2011-AtigBP #analysis
- Getting Rid of Store-Buffers in TSO Analysis (MFA, AB, GP), pp. 99–115.
- CAV-2011-BabicRS #analysis #automaton
- Malware Analysis with Tree Automata Inference (DB, DR, DS), pp. 116–131.
- CAV-2011-BardinHLLTV #analysis #framework
- The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
- CAV-2011-BrazdilKK #analysis #bound #performance #probability #source code
- Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
- CAV-2011-BrumleyJAS #analysis #framework #named
- BAP: A Binary Analysis Platform (DB, IJ, TA, EJS), pp. 463–469.
- CAV-2011-ChatterjeeHJS #algorithm #analysis #automaton #markov #process
- Symbolic Algorithms for Qualitative Analysis of Markov Decision Processes with Büchi Objectives (KC, MH, MJ, NS), pp. 260–276.
- CAV-2011-CookKV #program analysis #verification
- Temporal Property Verification as a Program Analysis Task (BC, EK, MYV), pp. 333–348.
- CAV-2011-GaneshKAGHE #analysis #detection #named #string #testing
- HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
- CAV-2011-Lahiri #analysis #composition #smt
- SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
- CAV-2011-LeeYP #data type #program analysis
- Program Analysis for Overlaid Data Structures (OL, HY, RP), pp. 592–608.
- CSL-2011-Aschieri #analysis
- Transfinite Update Procedures for Predicative Systems of Analysis (FA), pp. 20–34.
- ICLP-2011-ChristiansenHLP #analysis #network #sequence
- Bayesian Annotation Networks for Complex Sequence Analysis (HC, CTH, OTL, MP), pp. 220–230.
- ICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination #using
- SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
- ICLP-J-2011-VoetsS #analysis #integer #logic programming #source code
- Non-termination analysis of logic programs with integer arithmetics (DV, DDS), pp. 521–536.
- ICST-2011-CzerwonkaDNTT #analysis #case study #experience #named #predict
- CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice — Experiences from Windows (JC, RD, NN, AT, AT), pp. 357–366.
- ICST-2011-EldhHP #analysis #design #testing
- Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
- ICST-2011-TsankovJOS #dynamic analysis #execution
- Execution Hijacking: Improving Dynamic Analysis by Flying off Course (PT, WJ, AO, SS), pp. 200–209.
- ISSTA-2011-BalasubramanianPWKL #analysis #modelling #multi #named #statechart
- Polyglot: modeling and analysis for multiple Statechart formalisms (DB, CSP, MWW, GK, MRL), pp. 45–55.
- ISSTA-2011-GuoE #automation #data analysis #persistent #using
- Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
- ISSTA-2011-McGillDS #analysis #concept #modelling #scalability
- Scalable analysis of conceptual data models (MJM, LKD, REKS), pp. 56–66.
- ISSTA-2011-TateishiPT #analysis #higher-order #logic #monad #string
- Path- and index-sensitive string analysis based on monadic second-order logic (TT, MP, OT), pp. 166–176.
- ISSTA-2011-XiaoZ #analysis #encoding #geometry #java #performance #points-to
- Geometric encoding: forging the high performance context sensitive points-to analysis for Java (XX, CZ), pp. 188–198.
- ISSTA-2011-YanXR #alias #analysis #java
- Demand-driven context-sensitive alias analysis for Java (DY, G(X, AR), pp. 155–165.
- ISSTA-2011-YasmeenG #analysis #automation #framework
- Automated framework for formal operator task analysis (AY, ELG), pp. 78–88.
- LICS-2011-Marion #analysis #complexity #type system
- A Type System for Complexity Flow Analysis (JYM), pp. 123–132.
- RTA-2011-FalkeKS #analysis #c #compilation #source code #termination #using
- Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
- TAP-2011-ChebaroKGJ #analysis #c #debugging #generative #slicing #testing
- The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
- VMCAI-2011-AlbertGM #cost analysis #precise
- More Precise Yet Widely Applicable Cost Analysis (EA, SG, ANM), pp. 38–53.
- VMCAI-2011-DonaldsonHK #lightweight #static analysis
- Strengthening Induction-Based Race Checking with Lightweight Static Analysis (AFD, LH, DK), pp. 169–183.
- VMCAI-2011-GawlitzaLMSW #analysis #concurrent #process #reachability #source code
- Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation (TMG, PL, MMO, HS, AW), pp. 199–213.
- VMCAI-2011-GoubaultP #finite #precise #static analysis
- Static Analysis of Finite Precision Computations (EG, SP), pp. 232–247.
- VMCAI-2011-HooimeijerV #algorithm #analysis #automaton #evaluation #string
- An Evaluation of Automata Algorithms for String Analysis (PH, MV), pp. 248–262.
- VMCAI-2011-KimC #abstract interpretation #analysis #string
- String Analysis as an Abstract Interpretation (SWK, KMC), pp. 294–308.
- VMCAI-2011-OhBY #locality
- Access Analysis-Based Tight Localization of Abstract Memories (HO, LB, KY), pp. 356–370.
- VMCAI-2011-SiegelG #analysis #formal method #message passing
- Formal Analysis of Message Passing — (Invited Talk) (SFS, GG), pp. 2–18.
- CBSE-2010-FilieriGGM #analysis #component #multi #reliability
- Reliability Analysis of Component-Based Systems with Multiple Failure Modes (AF, CG, VG, RM), pp. 1–20.
- ECSA-2010-KiwelekarJ #analysis #architecture #generative #ontology
- Ontological Analysis for Generating Baseline Architectural Descriptions (AWK, RKJ), pp. 417–424.
- ECSA-2010-KiwelekarJ10a #architecture #communication #concept analysis #identification
- Identifying Architectural Connectors through Formal Concept Analysis of Communication Primitives (AWK, RKJ), pp. 515–518.
- ASE-2010-FattoriPMM #analysis
- Dynamic and transparent analysis of commodity production systems (AF, RP, LM, MM), pp. 417–426.
- ASE-2010-IvanovOSV #analysis #behaviour #embedded #modelling #set #tool support
- REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
- ASE-2010-Letarte #analysis #graph #interprocedural #model checking #precise #representation
- Model checking graph representation of precise boolean inter-procedural flow analysis (DL), pp. 511–516.
- ASE-2010-LiangWWWXM #automation #effectiveness #set #static analysis
- Automatic construction of an effective training set for prioritizing static analysis warnings (GL, LW, QW, QW, TX, HM), pp. 93–102.
- CASE-2010-AhnM #analysis #behaviour #clustering #modelling #tool support
- Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
- CASE-2010-AshrafTANBT #analysis #array
- Structural and microfluidic analysis of MEMS based out-of-plane hollow silicon microneedle array for drug delivery (MWA, ST, NA, AN, ELB, AT), pp. 258–262.
- CASE-2010-CaiM #analysis #approach #hybrid #industrial #process
- Dwell-time approach to stability analysis for hybrid control systems: Application to an industrial refrigeration process (CC, SM), pp. 728–733.
- CASE-2010-ChenWZZF #analysis #performance #process #towards
- Towards performance analysis of wheel loading process in automotive manufacturing (HC, JW, BZ, GZ, TAF), pp. 234–239.
- CASE-2010-DhupatiKRR #analysis #detection #novel #speech #using #validation
- A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
- CASE-2010-GuoZW #analysis
- Directed motion of an atomic scale engine and stability analysis (YG, WZ, ZW), pp. 545–550.
- CASE-2010-HuSF #analysis #biology #using
- Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
- CASE-2010-IshiiONTOTM #analysis #image #using
- Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
- CASE-2010-LiH #analysis #framework #modelling #problem
- Modeling and analysis of hospital emergency department: An analytical framework and problem formulation (JL, PKH), pp. 897–902.
- CASE-2010-PintoKK #analysis #modelling #probability
- A model-based end-to-end toolchain for the probabilistic analysis of complex systems (AP, SK, SK), pp. 994–1000.
- CASE-2010-RodriguezBMRW #analysis #assembly #detection
- Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
- CASE-2010-SouzaPC #analysis #distributed #implementation #network #predict
- Distributed model predictive control applied to urban traffic networks: Implementation, experimentation, and analysis (FAdS, VBP, EC), pp. 399–405.
- CASE-2010-TahersimaSRN #analysis
- Thermal analysis of an HVAC system with TRV controlled hydronic radiator (FT, JS, HR, PGN), pp. 756–761.
- CASE-2010-Zhang #analysis #design #exponential
- Kanban-controlled exponential production lines: Analysis and design (LZ), pp. 445–450.
- CASE-2010-ZhangWPTCPJ #analysis
- Micro-thermal-fluid transient analysis and active control for two-phase microelectronics cooling (TZ, JTW, YP, TT, JYC, RP, MKJ), pp. 750–755.
- DAC-2010-DadgourHSB #analysis #design #energy #logic #using
- Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
- DAC-2010-FengZ #analysis #grid #parallel #power management #robust
- Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis (ZF, ZZ), pp. 661–666.
- DAC-2010-FonsecaDBGPVB #analysis #reliability #simulation #statistics
- A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
- DAC-2010-GaoYWY #analysis #correlation #estimation #performance #statistics
- Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
- DAC-2010-GlassLHT #analysis #reliability #scalability #towards
- Towards scalable system-level reliability analysis (MG, ML, CH, JT), pp. 234–239.
- DAC-2010-HorowitzJLLLM #analysis #equivalence #modelling
- Fortifying analog models with equivalence checking and coverage analysis (MH, MJ, FL, SL, BL, JM), pp. 425–430.
- DAC-2010-HsuLML #analysis #flexibility
- Static timing analysis for flexible TFT circuits (CHH, CL, EHM, JCML), pp. 799–802.
- DAC-2010-JuHRC #analysis #multi #source code
- Timing analysis of esterel programs on general-purpose multiprocessors (LJ, BKH, AR, SC), pp. 48–51.
- DAC-2010-LiuYT #algorithm #analysis #performance #robust #scalability
- A robust periodic arnoldi shooting algorithm for efficient analysis of large-scale RF/MM ICs (XL, HY, SXDT), pp. 573–578.
- DAC-2010-Miskov-ZivanovM #analysis #formal method #modelling #reasoning #reliability
- Formal modeling and reasoning for reliability analysis (NMZ, DM), pp. 531–536.
- DAC-2010-ObergHITSK #analysis #data flow
- Theoretical analysis of gate level information flow tracking (JO, WH, AI, MT, TS, RK), pp. 244–247.
- DAC-2010-SchranzhoferPCTC #analysis #manycore #modelling #resource management #worst-case
- Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
- DAC-2010-ShenTX #algorithm #analysis #correlation #linear #power management #statistics
- A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
- DAC-2010-SilvaPS #analysis #modelling #parametricity
- Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
- DAC-2010-TangZBM #analysis #simulation #statistics
- RDE-based transistor-level gate simulation for statistical static timing analysis (QT, AZ, MB, NvdM), pp. 787–792.
- DAC-2010-XieNXZLWYWL #analysis #fault
- Crosstalk noise and bit error rate analysis for optical network-on-chip (YX, MN, JX, WZ, QL, XW, YY, XW, WL), pp. 657–660.
- DAC-2010-YangALLP #3d #analysis #layout #optimisation
- TSV stress aware timing analysis with applications to 3D-IC layout optimization (JSY, KA, YJL, SKL, DZP), pp. 803–806.
- DAC-2010-YoonCPC #analysis #comparative #multi #network #physics
- Virtual channels vs. multiple physical networks: a comparative analysis (YJY, NC, MP, LPC), pp. 162–165.
- DAC-2010-ZengYFL #analysis #network #optimisation #power management #trade-off
- Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation (ZZ, XY, ZF, PL), pp. 831–836.
- DAC-2010-ZhangLH #analysis
- Separatrices in high-dimensional state space: system-theoretical tangent computation and application to SRAM dynamic stability analysis (YZ, PL, GMH), pp. 567–572.
- DAC-2010-ZuberDM #analysis #approach #statistics
- A holistic approach for statistical SRAM analysis (PZ, PD, MM), pp. 717–722.
- DATE-2010-BauerSF #analysis #network #worst-case
- Worst-case end-to-end delay analysis of an avionics AFDX network (HB, JLS, CF), pp. 1220–1224.
- DATE-2010-CastrillonVSSCLAM #analysis
- Trace-based KPN composability analysis for mapping simultaneous applications to MPSoC platforms (JC, RV, AS, WS, JC, RL, GA, HM), pp. 753–758.
- DATE-2010-ChanHBBC #analysis #named #network
- PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks (JC, GH, AB, KB, LPC), pp. 691–696.
- DATE-2010-ChenDS #algorithm #analysis
- Properties of and improvements to time-domain dynamic thermal analysis algorithms (XC, RPD, LS), pp. 1165–1170.
- DATE-2010-ChouYCDK #case study #design #nondeterminism #scalability
- Finding reset nondeterminism in RTL designs — scalable X-analysis methodology and case study (HZC, HY, KHC, DD, SYK), pp. 1494–1499.
- DATE-2010-DietrichEH #analysis #statistics #using
- Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
- DATE-2010-GuglielmoFP #analysis
- Vacuity analysis for property qualification by mutation of checkers (LDG, FF, GP), pp. 478–483.
- DATE-2010-HatamiP #analysis #component #library #performance #representation #robust #using
- Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
- DATE-2010-JaffariA10a #analysis #correlation #performance #variability
- Correlation controlled sampling for efficient variability analysis of analog circuits (JJ, MA), pp. 1305–1308.
- DATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics #using
- Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
- DATE-2010-KlobedanzKT0 #analysis #case study #development #modelling
- Timing modeling and analysis for AUTOSAR-based software development — a case study (KK, CK, AT, WM), pp. 642–645.
- DATE-2010-LakshmananBR #analysis
- Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems (KL, GB, RR), pp. 331–334.
- DATE-2010-LarsenLNP #analysis #realtime #synthesis #using
- Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
- DATE-2010-LiSBNO #analysis #implementation
- Power Variance Analysis breaks a masked ASIC implementation of AES (YL, KS, LB, DN, KO), pp. 1059–1064.
- DATE-2010-LomneDMTR #analysis #difference #preprocessor #statistics
- Differential Power Analysis enhancement with statistical preprocessing (VL, AD, PM, LT, MR), pp. 1301–1304.
- DATE-2010-LuckenbillLHMH #algorithm #analysis #fault #logic #named #reliability
- RALF: Reliability Analysis for Logic Faults — An exact algorithm and its applications (SBL, JYL, YH, RM, LH), pp. 783–788.
- DATE-2010-PellizzoniSCCT #analysis #manycore #memory management
- Worst case delay analysis for memory interference in multicore systems (RP, AS, JJC, MC, LT), pp. 741–746.
- DATE-2010-QaziTDSC #analysis #performance #reduction
- Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
- DATE-2010-RitheGWDGBC #analysis #logic #statistics
- Non-linear Operating Point Statistical Analysis for Local Variations in logic timing at low voltage (RR, JG, AW, SD, GG, DB, AC), pp. 965–968.
- DATE-2010-SchlieckerNE #analysis #bound #multi #performance
- Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
- DATE-2010-TraubSKB #network
- Scenario extraction for a refined timing-analysis of automotive network topologies (MT, TS, OK, JB), pp. 81–86.
- DATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis #using
- GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
- DATE-2010-WieckowskiSBCIPA #analysis #black box
- A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
- DATE-2010-ZuberMDZJ #analysis #statistics
- Statistical SRAM analysis for yield enhancement (PZ, MM, PD, KvdZ, JHJ), pp. 57–62.
- DocEng-2010-AutexierM #documentation #impact analysis #semantics
- Semantics-based change impact analysis for heterogeneous collections of documents (SA, NM), pp. 97–106.
- DocEng-2010-TerradesTSRVJ #analysis #documentation #interactive #layout
- Interactive layout analysis and transcription systems for historic handwritten documents (ORT, AHT, NS, VR, EV, AJ), pp. 219–222.
- DRR-2010-BallKSN #analysis #documentation #using
- Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
- HT-2010-CartledgeN #analysis #graph
- Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
- HT-2010-MitzlaffBSH #analysis #network
- Visit me, click me, be my friend: an analysis of evidence networks of user relationships in BibSonomy (FM, DB, GS, AH), pp. 265–270.
- SIGMOD-2010-Brown #analysis #array #bibliography #scalability
- Overview of sciDB: large scale array storage, processing and analysis (PGB), pp. 963–968.
- SIGMOD-2010-HanSYY #analysis #approach #database #mining #network
- Mining knowledge from databases: an information network analysis approach (JH, YS, XY, PSY), pp. 1251–1252.
- VLDB-2010-AlexandrovBEHHKMNW #data analysis #parallel
- Massively Parallel Data Analysis with PACTs on Nephele (AA, DB, SE, MH, FH, OK, VM, EN, DW), pp. 1625–1628.
- VLDB-2010-BotanDDHMT #analysis #execution #named #semantics
- SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
- VLDB-2010-HaasJAXPJ #analysis #database #named
- MCDB-R: Risk Analysis in the Database (SA, RJ, LLP, FX, CMJ, PJH), pp. 782–793.
- VLDB-2010-MelnikGLRSTV #analysis #dataset #interactive #named
- Dremel: Interactive Analysis of Web-Scale Datasets (SM, AG, JJL, GR, SS, MT, TV), pp. 330–339.
- VLDB-2010-SrivastavaGGJSSSY #data analysis #realtime
- Enabling Real Time Data Analysis (DS, LG, RG, TJ, JS, VS, OS, JY), pp. 1–2.
- CSEET-2010-UsmanKHI #analysis
- Pedagogical and Structural Analysis of SE Courses (MU, JIK, MH, NI), pp. 136–143.
- ITiCSE-2010-Mirolo #analysis #learning #multi #recursion #student
- Learning (through) recursion: a multidimensional analysis of the competences achieved by CS1 students (CM), pp. 160–164.
- ITiCSE-2010-SekiyaMY #analysis #education
- Analysis of computer science related curriculum on LDA and Isomap (TS, YM, KY), pp. 48–52.
- ESOP-2010-AdjeGG #invariant #policy #static analysis
- Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
- ESOP-2010-Atkey #analysis #logic
- Amortised Resource Analysis with Separation Logic (RA), pp. 85–103.
- ESOP-2010-HoffmannH #analysis #polynomial
- Amortized Resource Analysis with Polynomial Potential (JH, MH), pp. 287–306.
- ESOP-2010-VardoulakisS #analysis #approach #control flow #named
- CFA2: A Context-Free Approach to Control-Flow Analysis (DV, OS), pp. 570–589.
- FASE-2010-BerardinelliCM #analysis #mobile #modelling #performance
- Performance Modeling and Analysis of Context-Aware Mobile Software Systems (LB, VC, ADM), pp. 353–367.
- FASE-2010-BeyerHTZ #analysis #refinement
- Shape Refinement through Explicit Heap Analysis (DB, TAH, GT, DZ), pp. 263–277.
- FASE-2010-EhrigERBP #analysis #formal method #self #verification
- Formal Analysis and Verification of Self-Healing Systems (HE, CE, OR, AB, PP), pp. 139–153.
- FoSSaCS-2010-HeussnerLMS #analysis #automaton #communication #reachability
- Reachability Analysis of Communicating Pushdown Systems (AH, JL, AM, GS), pp. 267–281.
- FoSSaCS-2010-NielsonN #logic #model checking #static analysis
- Model Checking Is Static Analysis of Modal Logic (FN, HRN), pp. 191–205.
- FoSSaCS-2010-WiesZH #analysis #bound #process
- Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
- TACAS-2010-Aderhold #analysis #automation #higher-order #recursion #source code #termination
- Automated Termination Analysis for Programs with Second-Order Recursion (MA), pp. 221–235.
- TACAS-2010-DonaldsonKR #analysis #automation #manycore #memory management
- Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
- TACAS-2010-WangLGG #analysis
- Trace-Based Symbolic Analysis for Atomicity Violations (CW, RL, MKG, AG), pp. 328–342.
- TACAS-2010-YuAB #analysis #named #php #string
- Stranger: An Automata-Based String Analysis Tool for PHP (FY, MA, TB), pp. 154–157.
- WRLA-2010-KatelmanKM #analysis #concurrent #semantics
- Concurrent Rewriting Semantics and Analysis of Asynchronous Digital Circuits (MK, SK, JM), pp. 140–156.
- CSMR-2010-Koschke #analysis #incremental
- Incremental Reflexion Analysis (RK), pp. 1–10.
- CSMR-2010-LiuM #analysis #case study #data flow
- Static Information Flow Analysis with Handling of Implicit Flows and a Study on Effects of Implicit Flows vs Explicit Flows (YL, AM), pp. 146–155.
- CSMR-2010-MaiaBFG #hybrid #impact analysis #object-oriented
- The Hybrid Technique for Object-Oriented Software Change Impact Analysis (MCOM, RAB, JCAdF, DDSG), pp. 252–255.
- CSMR-2010-MalikJAHFH #analysis #automation #comparison #enterprise #performance #scalability #testing
- Automatic Comparison of Load Tests to Support the Performance Analysis of Large Enterprise Systems (HM, ZMJ, BA, AEH, PF, GH), pp. 222–231.
- CSMR-2010-TothNJBF #impact analysis #named
- CIASYS — Change Impact Analysis at System Level (GT, CN, JJ, ÁB, LJF), pp. 198–201.
- ICPC-2010-OlszakJ #analysis #java #named
- Featureous: A Tool for Feature-Centric Analysis of Java Software (AO, BNJ), pp. 44–45.
- ICPC-2010-RatiuH #program analysis #web
- Utilizing Web Search Engines for Program Analysis (DR, LH), pp. 94–103.
- ICSM-2010-AryaniPH #analysis #case study #co-evolution #enterprise
- Domain-based change propagation analysis: An enterprise system case study (AA, IDP, MH), pp. 1–9.
- ICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
- Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
- ICSM-2010-Cleve #data-driven #evolution #program analysis #program transformation
- Program analysis and transformation for data-intensive system evolution (AC), pp. 1–6.
- ICSM-2010-FisherDBR #analysis #context-sensitive grammar
- Exploring the impact of context sensitivity on blended analysis (MFI, BD, SB, BGR), pp. 1–10.
- ICSM-2010-Letarte #interprocedural #model checking #performance #static analysis
- Conversion of fast inter-procedural static analysis to model checking (DL), pp. 1–2.
- ICSM-2010-LuciaDGR #design pattern #detection #dynamic analysis #eclipse #plugin
- An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis (ADL, VD, CG, MR), pp. 1–6.
- ICSM-2010-ParandeK #analysis #dependence #open source
- A longitudinal analysis of the dependency concentration in smaller modules for open-source software products (MAP, GK), pp. 1–5.
- ICSM-2010-PerinGN #analysis #enterprise #java #transaction
- Recovery and analysis of transaction scope from scattered information in Java Enterprise Applications (FP, TG, ON), pp. 1–10.
- ICSM-2010-ZawawyKM #analysis
- Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
- MSR-2010-ColacoMFH #analysis #developer
- OSS developers context-specific Preferred Representational systems: A initial Neurolinguistic text analysis of the Apache mailing list (MCJ, MGM, MF, PHdS), pp. 126–129.
- PASTE-2010-AyewahP #analysis #null
- Null dereference analysis in practice (NA, WP), pp. 65–72.
- PASTE-2010-CalmanZ #analysis #induction #information retrieval #interprocedural
- Interprocedural induction variable analysis based on interprocedural SSA form IR (SC, JZ), pp. 37–44.
- PASTE-2010-FlanaganF #concurrent #dynamic analysis #framework #source code
- The RoadRunner dynamic analysis framework for concurrent programs (CF, SNF), pp. 1–8.
- PASTE-2010-HaC #communication #concurrent #dynamic analysis
- Opportunities for concurrent dynamic analysis with explicit inter-core communication (JH, SPC), pp. 17–20.
- SCAM-2010-GrantC #analysis #concept #source code
- Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
- SCAM-2010-Harman #analysis #source code #why
- Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
- SCAM-2010-KesterMB #concurrent #debugging #how #question #static analysis
- How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
- SCAM-2010-LuoHDQ #concurrent #debugging #effectiveness #java #static analysis
- Effective Static Analysis to Find Concurrency Bugs in Java (ZDL, LH, RD, YQ), pp. 135–144.
- WCRE-2010-Boughanmi #analysis #multi
- Multi-Language and Heterogeneously-licensed Software Analysis (FB), pp. 293–296.
- WCRE-2010-GanesanLRWLT #analysis #architecture
- Architectural Analysis of Systems Based on the Publisher-Subscriber Style (DG, ML, LR, RW, VL, TT), pp. 173–182.
- WCRE-2010-Guerrouj #analysis #automation #concept #identifier #source code
- Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
- WCRE-2010-KagdiGPC #concept #impact analysis #source code
- Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code (HHK, MG, DP, MLC), pp. 119–128.
- WCRE-2010-MilanovaL #comprehension #concurrent #java #source code #static analysis
- Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs (AM, YL), pp. 45–54.
- WCRE-2010-PerscheidSHGH #analysis #behaviour #online #runtime
- Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
- PEPM-2010-LakhotiaBSM #analysis #bytecode #obfuscation
- Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
- PLDI-2010-MightSH #functional #object-oriented #program analysis
- Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis (MM, YS, DVH), pp. 305–315.
- PLDI-2010-RichardsLBV #analysis #behaviour #javascript #source code
- An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
- SAS-2010-AlbertAGPD #analysis #approach
- From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis (EA, PA, SG, GP, DVRD), pp. 100–116.
- SAS-2010-AmatoPS #abstract domain #analysis #component
- Deriving Numerical Abstract Domains via Principal Component Analysis (GA, MP, FS), pp. 134–150.
- SAS-2010-CheriniRB #analysis #data type
- A Shape Analysis for Non-linear Data Structures (RC, LR, JOB), pp. 201–217.
- SAS-2010-DilligDA #constraints #online #scalability #source code #static analysis
- Small Formulas for Large Programs: On-Line Constraint Simplification in Scalable Static Analysis (ID, TD, AA), pp. 236–252.
- SAS-2010-FarzanK #analysis #composition #concurrent #source code
- Compositional Bitvector Analysis for Concurrent Programs with Nested Locks (AF, ZK), pp. 253–270.
- SAS-2010-JensenMT #analysis #interprocedural #lazy evaluation
- Interprocedural Analysis with Lazy Propagation (SHJ, AM, PT), pp. 320–339.
- SAS-2010-Lesens #question #static analysis #using #why
- Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
- SAS-2010-NasreG #analysis #equation #linear #points-to
- Points-to Analysis as a System of Linear Equations (RN, RG), pp. 422–438.
- STOC-2010-KawamuraC #analysis #complexity
- Complexity theory for operators in analysis (AK, SAC), pp. 495–502.
- FLOPS-2010-AvanziniM #analysis #complexity #graph grammar
- Complexity Analysis by Graph Rewriting (MA, GM), pp. 257–271.
- FLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis #using
- Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
- LATA-2010-Casadio #analysis
- Agreement and Cliticization in Italian: A Pregroup Analysis (CC), pp. 166–177.
- LATA-2010-MarschallR #algorithm #analysis #automaton #pattern matching #probability
- Exact Analysis of Horspool’s and Sunday’s Pattern Matching Algorithms with Probabilistic Arithmetic Automata (TM, SR), pp. 439–450.
- LATA-2010-Muscholl #analysis #automaton #communication
- Analysis of Communicating Automata (AM), pp. 50–57.
- IFM-2010-AutexierL #c #impact analysis #source code #verification
- Adding Change Impact Analysis to the Formal Verification of C Programs (SA, CL), pp. 59–73.
- IFM-2010-MarronePV #analysis #dependence #inheritance #multi
- Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
- SEFM-2010-KokashKV #analysis #modelling #visual notation
- Time and Data-Aware Analysis of Graphical Service Models in Reo (NK, CK, EPdV), pp. 125–134.
- SEFM-2010-MassinkLBH #algebra #analysis #approach #process #scalability
- A Scalable Fluid Flow Process Algebraic Approach to Emergency Egress Analysis (MM, DL, AB, MDH), pp. 169–180.
- SEFM-2010-Powell #analysis #behaviour #modelling #scalability
- Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
- SFM-2010-PierroHW #probability #program analysis #semantics
- Probabilistic Semantics and Program Analysis (ADP, CH, HW), pp. 1–42.
- ICFP-2010-HoldermansH #analysis #higher-order #polymorphism
- Polyvariant flow analysis with higher-ranked polymorphic types and higher-order effect operators (SH, JH), pp. 63–74.
- GT-VMT-2010-HermannCEK #analysis #equivalence #graph #performance #permutation #petri net
- Efficient Analysis of Permutation Equivalence of Graph Derivations Based on Petri Nets (FH, AC, HE, BK).
- ICGT-2010-HermannEOG #analysis #behaviour #formal method #functional #graph grammar #model transformation
- Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars (FH, HE, FO, UG), pp. 155–170.
- ICGT-2010-Modica #analysis #communication #formal method #modelling #petri net
- Formal Modeling and Analysis of Communication Platforms Like Skype Based on Petri Net Transformation Systems (TM), pp. 400–402.
- CHI-2010-FreirePSG #analysis #interface #multi #named #network #visualisation
- ManyNets: an interface for multiple network analysis and visualization (MF, CP, BS, JG), pp. 213–222.
- CHI-2010-KapteinNM #analysis #consistency
- Powerful and consistent analysis of likert-type ratingscales (MCK, CN, PM), pp. 2391–2394.
- CHI-2010-PancieraPET #analysis #behaviour #lifecycle
- Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
- CHI-2010-ShengHKCD #analysis #effectiveness
- Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
- CHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order #using
- An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
- CSCW-2010-BalakrishnanFKK #analysis #collaboration #information management #visualisation
- Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
- CSCW-2010-ScholandTP #analysis #network #social
- Social language network analysis (AJS, YRT, JWP), pp. 23–26.
- SOFTVIS-2010-AdamoliH #analysis #framework #named #performance #visualisation
- Trevis: a context tree visualization & analysis framework and its use for classifying performance failure reports (AA, MH), pp. 73–82.
- SOFTVIS-2010-BeckD10a #analysis #automation #distributed #towards #visualisation
- Towards automated analysis and visualization of distributed software systems (MB, JD), pp. 213–214.
- SOFTVIS-2010-KerrenJ #3d #analysis #diagrams #interactive #metric #roadmap
- 3D kiviat diagrams for the interactive analysis of software metric trends (AK, IJ), pp. 203–204.
- SIGAda-2010-JemliR #compilation #problem #static analysis #using
- A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
- CAiSE-2010-RamdoyalCH #analysis #concept #database #interactive #reverse engineering #user interface
- Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis (RR, AC, JLH), pp. 332–347.
- CAiSE-2010-SchonenbergJSA #analysis #simulation
- Business Trend Analysis by Simulation (HS, JJ, NS, WMPvdA), pp. 515–529.
- CAiSE-2010-StalhaneSB #analysis #case study #diagrams #safety #sequence chart
- Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
- EDOC-2010-NarmanBKJ #analysis #hybrid #modelling #probability #quality #relational
- Hybrid Probabilistic Relational Models for System Quality Analysis (PN, MB, JK, PJ), pp. 57–66.
- ICEIS-AIDSS-2010-CuzzocreaFP #abstraction #analysis #collaboration #effectiveness #flexibility #mining #process
- Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
- ICEIS-AIDSS-2010-HusterB #analysis #evolution #industrial #ontology #visual notation
- Visual Trend Analysis — Ontology Evolution Support for the Trend Related Industry Sector (JH, AB), pp. 46–53.
- ICEIS-DISI-2010-CaronD #analysis #case study
- What-if Analysis in OLAP — With a Case Study in Supermarket Sales Data (EC, HD), pp. 208–213.
- ICEIS-HCI-2010-FerrazS #analysis #multi #named
- GlobeOLAP — Improving the Geospatial Realism in Multidimensional Analysis Environment (VRTF, MTPS), pp. 99–107.
- ICEIS-ISAS-2010-HulstijnG #analysis
- Risk Analysis for Inter-organizational Controls (JH, JG), pp. 314–320.
- ICEIS-ISAS-2010-IizukaIT #analysis #approach #effectiveness #process #re-engineering
- Analysis of Effective Approach for Business Process re-Engineering — From the Perspective of Organizational Factors (KI, YI, KT), pp. 384–389.
- ICEIS-ISAS-2010-SetiawanS #analysis #process
- Socialization of Work Practice through Business Process Analysis (MAS, SWS), pp. 165–170.
- CIKM-2010-AjiWAG #analysis #modelling #using
- Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
- CIKM-2010-GuanXZGY #analysis #classification #documentation #performance #reduction
- Fast dimension reduction for document classification based on imprecise spectrum analysis (HG, BX, JZ, MG, TY), pp. 1753–1756.
- CIKM-2010-GuoZGZS #analysis #mining #named
- OpinionIt: a text mining system for cross-lingual opinion analysis (HG, HZ, ZG, XZ, ZS), pp. 1199–1208.
- CIKM-2010-KaytoueANK #concept analysis
- Embedding tolerance relations in formal concept analysis: an application in information fusion (MK, ZA, AN, SOK), pp. 1689–1692.
- CIKM-2010-MadaniY #analysis #topic
- Discovery of numerous specific topics via term co-occurrence analysis (OM, JY), pp. 1841–1844.
- CIKM-2010-ShenWL #analysis #multi #summary #topic
- Topic aspect analysis for multi-document summarization (CS, DW, TL), pp. 1545–1548.
- CIKM-2010-XueCS #analysis #modelling #using
- Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
- CIKM-2010-YangZ #analysis #multi
- Language pyramid and multi-scale text analysis (SHY, HZ), pp. 639–648.
- ECIR-2010-BierigCGB #data analysis #evaluation #framework #information retrieval #interactive #modelling
- A Data Analysis and Modelling Framework for the Evaluation of Interactive Information Retrieval (RB, MJC, JG, NJB), pp. 673–674.
- ECIR-2010-UdupaK #analysis #canonical #correlation #equivalence #using
- Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
- ICML-2010-BoureauPL #analysis #recognition #visual notation
- A Theoretical Analysis of Feature Pooling in Visual Recognition (YLB, JP, YL), pp. 111–118.
- ICML-2010-DillonBL #analysis #generative #learning
- Asymptotic Analysis of Generative Semi-Supervised Learning (JVD, KB, GL), pp. 295–302.
- ICML-2010-LazaricGM #algorithm #analysis #classification #policy
- Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
- ICML-2010-LazaricGM10a #analysis
- Finite-Sample Analysis of LSTD (AL, MG, RM), pp. 615–622.
- ICML-2010-LiuNLL #analysis #graph #learning #relational
- Learning Temporal Causal Graphs for Relational Time-Series Analysis (YL, ANM, ACL, YL), pp. 687–694.
- ICML-2010-LizotteBM #analysis #learning #multi #performance #random
- Efficient Reinforcement Learning with Multiple Reward Functions for Randomized Controlled Trial Analysis (DJL, MHB, SAM), pp. 695–702.
- ICML-2010-TingHJ #analysis #convergence #graph
- An Analysis of the Convergence of Graph Laplacians (DT, LH, MIJ), pp. 1079–1086.
- ICML-2010-WangZ #analysis
- A New Analysis of Co-Training (WW, ZHZ), pp. 1135–1142.
- ICPR-2010-BoussellaaZABA #analysis #documentation #image #segmentation
- Unsupervised Block Covering Analysis for Text-Line Segmentation of Arabic Ancient Handwritten Document Images (WB, AZ, HEA, AB, AMA), pp. 1929–1932.
- ICPR-2010-ChenSZCL #analysis #image
- Color Image Analysis by Quaternion Zernike Moments (BC, HS, HZ, GC, LL), pp. 625–628.
- ICPR-2010-DonoserKB #analysis
- Object Tracking by Structure Tensor Analysis (MD, SK, HB), pp. 2600–2603.
- ICPR-2010-DuboisPM #adaptation #analysis #component #composition #using
- Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
- ICPR-2010-ElnakibECS #analysis #corpus
- Dyslexia Diagnostics by Centerline-Based Shape Analysis of the Corpus Callosum (AE, AEB, MC, AES), pp. 261–264.
- ICPR-2010-FengY #analysis
- Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
- ICPR-2010-Feschet #analysis #composition #geometry #multi #parametricity
- Multiscale Analysis from 1D Parametric Geometric Decomposition of Shapes (FF), pp. 2102–2105.
- ICPR-2010-GarciaMS #analysis #performance
- Theoretical Analysis of a Performance Measure for Imbalanced Data (VG, RAM, JSS), pp. 617–620.
- ICPR-2010-GilPT #adaptation #analysis #integration #visual notation
- Analysis and Adaptation of Integration Time in PMD Camera for Visual Servoing (PG, JP, FT), pp. 311–315.
- ICPR-2010-IbrahimKKG #analysis #online #using #verification
- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
- ICPR-2010-JagerPCC #3d #analysis #using
- Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
- ICPR-2010-Jean #analysis
- Local Optical Operators for Subpixel Scene Analysis (YDJ), pp. 3448–3451.
- ICPR-2010-JingLYBY #analysis #kernel
- Kernel Uncorrelated Adjacent-class Discriminant Analysis (XYJ, SL, YFY, LSB, JY), pp. 706–709.
- ICPR-2010-JirachawengHLYA #analysis #modelling
- Residual Analysis for Fingerprint Orientation Modeling (SJ, ZH, JL, WYY, VA), pp. 1196–1199.
- ICPR-2010-KasiviswanathanBS #analysis #documentation #top-down
- Top Down Analysis of Line Structure in Handwritten Documents (HK, GRB, SNS), pp. 2025–2028.
- ICPR-2010-KhushabaEAAM #analysis #fuzzy #locality #orthogonal
- Orthogonal Locality Sensitive Fuzzy Discriminant Analysis in Sleep-Stage Scoring (RNK, RE, AA, AAA, SM), pp. 165–168.
- ICPR-2010-LiP10a #analysis #classification #monitoring #realtime
- Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
- ICPR-2010-LiZXCG #analysis #documentation #multi #sentiment
- Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
- ICPR-2010-MaalejADSB #3d #analysis #recognition
- Local 3D Shape Analysis for Facial Expression Recognition (AM, BBA, MD, AS, SB), pp. 4129–4132.
- ICPR-2010-MakiharaY #analysis #clustering
- Cluster-Pairwise Discriminant Analysis (YM, YY), pp. 577–580.
- ICPR-2010-MarcialisRT #analysis #detection
- Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
- ICPR-2010-MaTW #analysis #random #using
- Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
- ICPR-2010-Meunier #analysis #assurance #automation #documentation #logic #quality
- Automated Quality Assurance for Document Logical Analysis (JLM), pp. 253–256.
- ICPR-2010-OGorman #analysis #latency #speech
- Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
- ICPR-2010-OReillyP #analysis #prototype #statistics
- Prototype-Based Methodology for the Statistical Analysis of Local Features in Stereotypical Handwriting Tasks (CO, RP), pp. 1864–1867.
- ICPR-2010-PaclikLLD #analysis #classification #optimisation
- ROC Analysis and Cost-Sensitive Optimization for Hierarchical Classifiers (PP, CL, TL, RPWD), pp. 2977–2980.
- ICPR-2010-PaivaJT #analysis #image #using
- Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
- ICPR-2010-PapadopoulosMKS #analysis #approach #image #learning #semantics #statistics
- A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
- ICPR-2010-ParkY #analysis #approach #game studies #network #social
- Social Network Approach to Analysis of Soccer Game (KJP, AY), pp. 3935–3938.
- ICPR-2010-PetersenK #analysis #estimation #modelling #process #statistics
- Statistical Analysis of Kalman Filters by Conversion to Gauss-Helmert Models with Applications to Process Noise Estimation (AP, RK), pp. 2386–2389.
- ICPR-2010-PletschacherA #analysis #framework
- The PAGE (Page Analysis and Ground-Truth Elements) Format Framework (SP, AA), pp. 257–260.
- ICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
- Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
- ICPR-2010-RahimBBP #analysis #sequence
- Pelvic Organs Dynamic Feature Analysis for MRI Sequence Discrimination (MR, MEB, RB, NP), pp. 2496–2499.
- ICPR-2010-RomeroTV #analysis #corpus #image
- Computer Assisted Transcription of Text Images: Results on the GERMANA Corpus and Analysis of Improvements Needed for Practical Use (VR, AHT, EV), pp. 2017–2020.
- ICPR-2010-SafayaniS #analysis #multi #recognition
- Heteroscedastic Multilinear Discriminant Analysis for Face Recognition (MS, MTMS), pp. 4287–4290.
- ICPR-2010-SagheerNHS #analysis #component #novel #word
- A Novel Handwritten Urdu Word Spotting Based on Connected Components Analysis (MWS, NN, CLH, CYS), pp. 2013–2016.
- ICPR-2010-SaidLF #2d #analysis #multi
- Multiscale Analysis of Digital Segments by Intersection of 2D Digital Lines (MS, JOL, FF), pp. 4097–4100.
- ICPR-2010-SakarK #analysis #canonical #correlation #feature model #hybrid
- A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
- ICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
- Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
- ICPR-2010-SertelCLSG #analysis #approach #detection #image
- An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
- ICPR-2010-SethiC #analysis #motivation #probability #process #video
- A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
- ICPR-2010-SfikasHN #analysis #clustering #multi #using
- Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
- ICPR-2010-SmithW #analysis
- A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
- ICPR-2010-SrikrishnanC #analysis #linear #using
- Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
- ICPR-2010-TawariT #analysis #speech
- Speech Emotion Analysis in Noisy Real-World Environment (AT, MMT), pp. 4605–4608.
- ICPR-2010-TosunWSRM #analysis #component #image #independence
- Joint Independent Component Analysis of Brain Perfusion and Structural Magnetic Resonance Images in Dementia (DT, MW, NS, HJR, BLM), pp. 2720–2723.
- ICPR-2010-UchidaL #analysis #recognition
- Analysis of Local Features for Handwritten Character Recognition (SU, ML), pp. 1945–1948.
- ICPR-2010-VuYESHAY #analysis
- Color Analysis for Segmenting Digestive Organs in VCE (HV, YY, TE, MS, KH, TA, KY), pp. 2468–2471.
- ICPR-2010-WangHL #analysis #incremental
- Boosting Incremental Semi-supervised Discriminant Analysis for Tracking (HW, XH, CLL), pp. 2748–2751.
- ICPR-2010-WangWDTLG #analysis #interactive #video #web
- Interactive Web Video Advertising with Context Analysis and Search (BW, JW, LYD, QT, HL, WG), pp. 3252–3255.
- ICPR-2010-WeissFM #3d #analysis #image #multi
- Multiresolution Analysis of 3D Images Based on Discrete Distortion (KW, LDF, MMM), pp. 4093–4096.
- ICPR-2010-WilliamsTSB #analysis #multi #verification
- Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
- ICPR-2010-YangGG #analysis #locality #recognition
- Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
- ICPR-2010-YangSZ #analysis #multi #recognition #using
- Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
- ICPR-2010-ZhangGA #analysis #linear
- An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
- ICPR-2010-ZhangK #analysis #bound
- Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
- ICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
- KDD-2010-DurrantK #analysis #classification #linear
- Compressed fisher linear discriminant analysis: classification of randomly projected data (RJD, AK), pp. 1119–1128.
- KDD-2010-MarchRG #algorithm #analysis #performance
- Fast euclidean minimum spanning tree: algorithm, analysis, and applications (WBM, PR, AGG), pp. 603–612.
- KDD-2010-WangLZ #analysis #approach #bibliography #rating
- Latent aspect rating analysis on review text data: a rating regression approach (HW, YL, CZ), pp. 783–792.
- KDIR-2010-AchaKV #analysis #data mining #mining #modelling
- Tactical Analysis Modeling through Data Mining — Pattern Discovery in Racket Sports (ATA, WAK, JKV), pp. 176–181.
- KDIR-2010-CarulloB #analysis #machine learning #mining #web
- Machine Learning and Link Analysis for Web Content Mining (MC, EB), pp. 156–161.
- KDIR-2010-Codina-FilbaN #analysis #behaviour #internet #query #web
- Collective Behaviour in Internet — Tendency Analysis of the Frequency of User Web Queries (JCF, DFN), pp. 168–175.
- KDIR-2010-Diday #data analysis
- Extracting Knowledge from Complex Data by Symbolic Data Analysis (ED), pp. 5–6.
- KDIR-2010-OzekiKT #analysis #multi #network
- Multi-modal Analysis of Complex Network — Point Stimulus Response Depending on Its Location in the Network (TO, TK, YT), pp. 226–231.
- KEOD-2010-EynardMM #analysis #on the #ontology
- On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
- KMIS-2010-BrockV #analysis #data flow #semantics #using
- A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
- KMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation #using
- Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
- KMIS-2010-ScheibmayerIB #analysis #approach #framework #process
- A Framework to Measure the Impact of Knowledge Process Supporting Technologies — An Integrated Approach for a Technology-oriented Business Benefit Analysis (MS, AI, MB), pp. 253–259.
- KMIS-2010-WiilGM #analysis #information management #network
- CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
- RecSys-2010-BerkovskyF #analysis #recommendation
- Group-based recipe recommendations: analysis of data aggregation strategies (SB, JF), pp. 111–118.
- RecSys-2010-MelloAZ #impact analysis #learning #rating
- Active learning driven by rating impact analysis (CERdM, MAA, GZ), pp. 341–344.
- SEKE-2010-AlhassanCB #analysis #fault #network #people #social
- Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
- SEKE-2010-CunhaCNAM #analysis #debugging #visual notation
- A Visual Bug Report Analysis and Search Tool (CEAdC, YCC, PAdMSN, ESdA, SRdLM), pp. 742–747.
- SEKE-2010-El-Attar #analysis #case study #precise #robust #security
- Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
- SEKE-2010-IbrahimWEF #analysis #development #off the shelf
- Conflict Analysis in Commercial Off-The-Shelf (COTS) Based Development (HI, TW, AE, BHF), pp. 686–691.
- SEKE-2010-JuniorLAMW #impact analysis #learning #multi #using
- Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
- SEKE-2010-LuG #analysis #architecture #concurrent #performance #thread #web
- Performance Analysis of a Web Server with Dynamic Thread Pool Architecture (JL, SSG), pp. 99–105.
- SEKE-2010-SarkarCCB #analysis #framework #object-oriented #requirements
- Business-Object Oriented Requirements Analysis Framework for Data Warehouses (AS, SC, NC, SB), pp. 34–37.
- SEKE-2010-ThovexT #analysis #approach #modelling #multi #network #semantics #social
- Dynamic and semantic social networks analysis: a new model based on a multidisciplinary approach (CT, FT), pp. 548–552.
- SEKE-2010-VilaMF #adaptation #analysis #qvt #strict #using
- Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
- SEKE-2010-WangHW #analysis #petri net #process
- A Hierarchical Timed Coloured Petri Nets for BPMN-based Process Analysis (CHW, PSH, FJW), pp. 417–420.
- SEKE-2010-WangPACC #analysis #automation #process
- An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
- SIGIR-2010-LiuWD #analysis #behaviour #comprehension #web
- Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
- SIGIR-2010-LiuYHA #adaptation #analysis #performance #predict #sentiment
- S-PLASA+: adaptive sentiment analysis with application to sales performance prediction (YL, XY, XH, AA), pp. 873–874.
- SIGIR-2010-LiZM #analysis #process
- Exploring desktop resources based on user activity analysis (YL, XZ, XM), p. 700.
- SIGIR-2010-MuhrKG #analysis #clustering
- Analysis of structural relationships for hierarchical cluster labeling (MM, RK, MG), pp. 178–185.
- SIGIR-2010-TorresHS #analysis #information retrieval #query
- Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
- SIGIR-2010-WangZ #analysis #effectiveness #information retrieval #metric #on the #optimisation #statistics
- On statistical analysis and optimization of information retrieval effectiveness metrics (JW, JZ), pp. 226–233.
- ECMFA-2010-ColomboKL #analysis #case study #modelling #problem #requirements
- Requirements Analysis and Modeling with Problem Frames and SysML: A Case Study (PC, FK, LL), pp. 74–89.
- MoDELS-v1-2010-SchwarzlP #analysis #consistency #modelling #uml
- Static- and Dynamic Consistency Analysis of UML State Chart Models (CS, BP), pp. 151–165.
- OOPSLA-2010-AltmanAFM #analysis #performance #source code
- Performance analysis of idle programs (ERA, MA, SF, NM), pp. 739–753.
- OOPSLA-2010-Mendez-LojoMP #analysis #parallel #points-to
- Parallel inclusion-based points-to analysis (MML, AM, KP), pp. 428–443.
- OOPSLA-2010-OssherBSAACDVFK #analysis #architecture #challenge #concept #flexibility #modelling #research #tool support
- Flexible modeling tools for pre-requirements analysis: conceptual architecture and research challenges (HO, RKEB, IS, DA, AAT, MC, MD, JdV, AF, SK), pp. 848–864.
- OOPSLA-2010-RinardHMS #analysis #comprehension #statistics
- Patterns and statistical analysis for understanding reduced resource computing (MCR, HH, SM, SS), pp. 806–821.
- GPCE-2010-SinceroTLS #analysis #performance #variability
- Efficient extraction and analysis of preprocessor-based variability (JS, RT, DL, WSP), pp. 33–42.
- GPCE-2010-TanterMBA #aspect-oriented #composition #dynamic analysis
- Composition of dynamic analysis aspects (ÉT, PM, WB, DA), pp. 113–122.
- LOPSTR-2010-SchumannCL #analysis #synthesis
- Analysis of Air Traffic Track Data with the AutoBayes Synthesis System (JS, KC, AL), pp. 21–36.
- LOPSTR-2010-StroderSG #analysis #dependence #logic programming #source code #termination
- Dependency Triples for Improving Termination Analysis of Logic Programs with Cut (TS, PSK, JG), pp. 184–199.
- LOPSTR-2010-VoetsS #analysis #logic programming #source code #using
- Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
- PPDP-2010-TekleL #analysis #complexity #datalog #performance #precise #query
- Precise complexity analysis for efficient datalog queries (KTT, YAL), pp. 35–44.
- QAPL-2010-GuedemannO #analysis #modelling #probability #safety
- Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
- QAPL-2010-StefanekHB #analysis #parallel #performance
- A new tool for the performance analysis of massively parallel computer systems (AS, RAH, JTB), pp. 159–181.
- POPL-2010-ChaudhuriGL #analysis #source code
- Continuity analysis of programs (SC, SG, RL), pp. 57–70.
- POPL-2010-GodefroidNRT #composition #power of #program analysis
- Compositional may-must program analysis: unleashing the power of alternation (PG, AVN, SKR, ST), pp. 43–56.
- POPL-2010-HarrisSIG #program analysis #satisfiability #source code
- Program analysis via satisfiability modulo path programs (WRH, SS, FI, AG), pp. 71–82.
- RE-2010-Al-EmranPR #analysis #release planning #robust
- Decision Support for Product Release Planning Based on Robustness Analysis (AAE, DP, GR), pp. 157–166.
- RE-2010-FrickerG #analysis #case study #comparison #requirements
- Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study (SF, MG), pp. 167–176.
- RE-2010-LockerbieBMBE #analysis #concept #modelling #simulation #using
- Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
- RE-2010-SieglHG #analysis #modelling #requirements #testing
- Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
- RE-2010-SinhaPTN #analysis #automation #case study #natural language
- Extending Automated Analysis of Natural Language Use Cases to Other Languages (AS, AMP, HT, TN), pp. 364–369.
- RE-2010-Stanbridge #analysis #test coverage #testing #user interface #using
- Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
- RE-2010-YangRGWN #ambiguity #analysis #natural language #requirements
- Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (HY, ANDR, VG, AW, BN), pp. 25–34.
- SAC-PL-J-2008-BussBSE10 #analysis #debugging #novel #pointer
- A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
- SAC-2010-BayerKK #analysis #performance
- Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
- SAC-2010-BelohlavekV #concept analysis #constraints
- Background knowledge in formal concept analysis: constraints via closure operators (RB, VV), pp. 1113–1114.
- SAC-2010-CappelliCGL #analysis #requirements #security
- Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
- SAC-2010-ChakrabartiCGM #analysis #linear #privacy
- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
- SAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited #using
- Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
- SAC-2010-ClaycombS #analysis #framework #security
- A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
- SAC-2010-DongD #analysis #probability
- Analysis of collision probability in unsaturated situation (QD, WD), pp. 772–777.
- SAC-2010-GravinoTS #analysis #comprehension #empirical #modelling #source code
- An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
- SAC-2010-GuermaziHH #analysis #classification #image #using #web
- Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
- SAC-2010-HansenS #analysis #implementation #optimisation #reachability
- Reachability analysis of GSPDIs: theory, optimization, and implementation (HAH, GS), pp. 2511–2516.
- SAC-2010-KhakpourKSJ #adaptation #analysis #formal method #self
- Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
- SAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability #using
- Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
- SAC-2010-MassinkHL #analysis #behaviour #scalability
- Scalable analysis of collective behaviour in smart service systems (MM, MDH, DL), pp. 1173–1180.
- SAC-2010-PopeeaC #analysis #debugging #proving #safety
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
- SAC-2010-StoffelSKK #analysis #documentation #using #visual notation
- Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
- SAC-2010-ZhangZ #analysis #canonical #correlation #random
- Canonical random correlation analysis (JZ, DZ), pp. 1111–1112.
- FSE-2010-CossetteW #adaptation #analysis #dependence #lightweight #named #sketching
- DSketch: lightweight, adaptable dependency analysis (BC, RJW), pp. 297–306.
- FSE-2010-DeAntoniMTRBMGRS #execution #named
- RT-simex: retro-analysis of execution traces (JD, FM, FT, GR, JPB, CM, LG, LR, NS), pp. 377–378.
- FSE-2010-HalleB #analysis #interactive #message passing #using
- Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
- FSE-2010-JoshiNSG #detection #dynamic analysis #effectiveness
- An effective dynamic analysis for detecting generalized deadlocks (PJ, MN, KS, DG), pp. 327–336.
- FSE-2010-LiCK #analysis #detection #effectiveness
- Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
- FSE-2010-LitvakDBRS #analysis #dependence
- Field-sensitive program dependence analysis (SL, ND, RB, NR, MS), pp. 287–296.
- FSE-2010-MyersS #dynamic analysis #ide #user interface #using
- Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
- FSE-2010-SinhaW #concurrent #program analysis #staged
- Staged concurrent program analysis (NS, CW), pp. 47–56.
- ICSE-2010-Bodden #analysis #hybrid #performance #type system
- Efficient hybrid typestate analysis by determining continuation-equivalent states (EB), pp. 5–14.
- ICSE-2010-CalikliBA #analysis #bias #developer #education #experience
- An analysis of the effects of company culture, education and experience on confirmation bias levels of software developers and testers (GÇ, ABB, BA), pp. 187–190.
- ICSE-2010-CeccarelliCCP #approach #impact analysis
- An eclectic approach for change impact analysis (MC, LC, GC, MDP), pp. 163–166.
- ICSE-2010-Erdogmus #analysis #effectiveness #re-engineering
- Cost effectiveness analysis in software engineering (HE), pp. 479–480.
- ICSE-2010-Filho #impact analysis
- Change impact analysis from business rules (AOF), pp. 353–354.
- ICSE-2010-Ghezzi #analysis #named
- SOFAS: software analysis services (GG), pp. 381–384.
- ICSE-2010-HumayunBFLA #analysis #bibliography #development #education #empirical #quality
- An empirical analysis of team review approaches for teaching quality software development (AH, WB, GAF, FL, RA), pp. 567–575.
- ICSE-2010-LiebigALKS #analysis #product line #variability
- An analysis of the variability in forty preprocessor-based software product lines (JL, SA, CL, CK, MS), pp. 105–114.
- ICSE-2010-LimQF10a #analysis #crowdsourcing #named #network #power of #social
- StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis (SLL, DQ, AF), pp. 239–242.
- ICSE-2010-Ma #analysis #constraints #testing #theorem proving
- Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
- ICSE-2010-Malik #analysis
- A methodology to support load test analysis (HM), pp. 421–424.
- ICSE-2010-Nagappan #analysis #execution
- Analysis of execution log files (MN), pp. 409–412.
- ICSE-2010-Popescu #component #impact analysis
- Impact analysis for event-based components and systems (DP), pp. 401–404.
- ICSE-2010-Popescu10a #component #impact analysis #named
- Helios: impact analysis for event-based components and systems (DP), pp. 531–532.
- ICSE-2010-SridharanN #data analysis #re-engineering
- Bayesian methods for data analysis in software engineering (MS, ASN), pp. 477–478.
- LDTA-2009-DennisJW10 #algorithm #analysis #automation #memory management #named
- SLAMM — Automating Memory Analysis for Numerical Algorithms (JMD, ERJ, WMW), pp. 89–104.
- LDTA-2010-CruzHP #analysis #named #online #verification
- GamaSlicer: an online laboratory for program verification and analysis (DCdC, PRH, JSP), p. 3.
- SLE-2010-FavreGLP #analysis #empirical
- Empirical Language Analysis in Software Linguistics (JMF, DG, RL, EP), pp. 316–326.
- SLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
- Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
- SPLC-2010-FurtadoSR #analysis #game studies #product line
- Streamlining Domain Analysis for Digital Games Product Lines (AWBF, ALMS, GLR), pp. 316–330.
- ASPLOS-2010-GoodsteinVCGKM #adaptation #analysis #data flow #monitoring #parallel
- Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring (MLG, EV, SC, PBG, MAK, TCM), pp. 257–270.
- CC-2010-JiangZTS #analysis #distance #locality #multi #question #reuse
- Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors? (YJ, EZZ, KT, XS), pp. 264–282.
- CC-2010-LogozzoV #abstract interpretation #agile #analysis #javascript #named #optimisation
- RATA: Rapid Atomic Type Analysis by Abstract Interpretation — Application to JavaScript Optimization (FL, HV), pp. 66–83.
- CGO-2010-LindermanHDMN #analysis #automation #optimisation #precise #towards
- Towards program optimization through automated analysis of numerical precision (MDL, MH, DLD, THYM, GPN), pp. 230–237.
- CGO-2010-PatilPSLC #analysis #framework #named #parallel #source code
- PinPlay: a framework for deterministic replay and reproducible analysis of parallel programs (HP, CP, MS, GL, JC), pp. 2–11.
- CGO-2010-PriceV #analysis #scalability
- Large program trace analysis and compression with ZDDs (GDP, MV), pp. 32–41.
- CGO-2010-YuXHFZ #analysis #pointer #scalability
- Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
- HPDC-2010-DunlavySS #analysis #modelling #named #scalability
- ParaText: scalable text modeling and analysis (DMD, TMS, ETS), pp. 344–347.
- HPDC-2010-SonmezYAIE #analysis #clustering #multi #performance #scheduling #workflow
- Performance analysis of dynamic workflow scheduling in multicluster grids (OOS, NY, SA, AI, DHJE), pp. 49–60.
- LCTES-2010-AltmeyerMR #analysis #bound
- Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
- LCTES-2010-BiehlCT #analysis #development #embedded #modelling #safety
- Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
- LCTES-2010-ForoozannejadHHG #analysis #streaming
- Look into details: the benefits of fine-grain streaming buffer analysis (MHF, MH, TLH, SG), pp. 27–36.
- LCTES-2010-LiXLZ #analysis #approximate #architecture #memory management
- Analysis and approximation for bank selection instruction minimization on partitioned memory architecture (ML, CJX, TL, YZ), pp. 1–8.
- LCTES-2010-PerathonerRTLR #analysis #modelling #performance
- Modeling structured event streams in system level performance analysis (SP, TR, LT, KL, JR), pp. 37–46.
- LCTES-2010-SchlicklingP #analysis #automation #modelling
- Semi-automatic derivation of timing models for WCET analysis (MS, MP), pp. 67–76.
- OSDI-2010-AttariyanF #analysis #automation #data flow #information management
- Automating Configuration Troubleshooting with Dynamic Information Flow Analysis (MA, JF), pp. 237–250.
- OSDI-2010-Boyd-WickizerCMPKMZ #analysis #linux #scalability
- An Analysis of Linux Scalability to Many Cores (SBW, ATC, YM, AP, MFK, RM, NZ), pp. 1–16.
- PPoPP-2010-Chakrabarti #abstraction #analysis #effectiveness #performance #source code
- New abstractions for effective performance analysis of STM programs (DRC), pp. 333–334.
- PPoPP-2010-RomeinBMN #analysis #implementation #performance
- The LOFAR correlator: implementation and performance analysis (JWR, PCB, JDM, RvN), pp. 169–178.
- CAV-2010-AlbarghouthiGWC #analysis #symbolic computation
- Abstract Analysis of Symbolic Executions (AA, AG, OW, MC), pp. 495–510.
- CAV-2010-BloemCGHKRSS #analysis #named #requirements #synthesis
- RATSY — A New Requirements Analysis Tool with Synthesis (RB, AC, KG, GH, RK, MR, VS, RS), pp. 425–429.
- CAV-2010-KroeningSTW #analysis #composition #invariant #termination
- Termination Analysis with Compositional Transition Invariants (DK, NS, AT, CMW), pp. 89–103.
- CAV-2010-KunduGW #analysis #concurrent #named #testing
- Contessa: Concurrency Testing Augmented with Symbolic Analysis (SK, MKG, CW), pp. 127–131.
- CAV-2010-LiXBL #analysis #automaton #hardware #performance #reachability
- Efficient Reachability Analysis of Büchi Pushdown Systems for Hardware/Software Co-verification (JL, FX, TB, VL), pp. 339–353.
- ICLP-2010-Dandois10 #logic programming #program analysis #source code
- Program analysis for code duplication in logic programs (CD), pp. 241–247.
- ICLP-2010-Demeyer10 #concurrent #declarative #program analysis #programming
- Program Analysis to Support Concurrent Programming in Declarative Languages (RD), pp. 248–254.
- ICLP-2010-Zwirchmayr10 #analysis
- Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
- ICLP-J-2010-Schneider-KampGSST #analysis #automation #logic programming #source code #termination
- Automated termination analysis for logic programs with cut (PSK, JG, TS, AS, RT), pp. 365–381.
- ICST-2010-KimSGSHN #analysis #automation #debugging #identification
- Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
- ICTSS-2010-DelamareMBT #aspect-oriented #impact analysis #named #testing #weaving
- Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases (RD, FM, BB, YLT), pp. 250–265.
- IJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
- ISSTA-2010-ArcuriIB #analysis #effectiveness #formal method #predict #random testing #testing
- Formal analysis of the effectiveness and predictability of random testing (AA, MZZI, LCB), pp. 219–230.
- ISSTA-2010-GaleottiRPF #analysis #bound #invariant #performance #verification
- Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
- ISSTA-2010-GodefroidK #float #memory management #program analysis #proving #safety
- Proving memory safety of floating-point computations by combining static and dynamic program analysis (PG, JK), pp. 1–12.
- ISSTA-2010-Jiang #analysis #automation #testing
- Automated analysis of load testing results (ZMJ), pp. 143–146.
- ISSTA-2010-TangBLS #analysis #float #statistics
- Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
- RTA-2010-HillsR #approach #composition #logic #program analysis #semantics
- A Rewriting Logic Semantics Approach to Modular Program Analysis (MH, GR), pp. 151–160.
- RTA-2010-OttoBEG #analysis #automation #bytecode #java #term rewriting #termination
- Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
- RTA-2010-ZanklK #analysis #complexity #composition
- Modular Complexity Analysis via Relative Complexity (HZ, MK), pp. 385–400.
- TAP-2010-Blanchette #algebra #analysis #data type #induction #recursion #relational
- Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions (JCB), pp. 117–134.
- TAP-2010-BousquetL #analysis #evaluation #mutation testing #process #proving
- Proof Process Evaluation with Mutation Analysis (LdB, ML), pp. 55–60.
- TAP-2010-ChebaroKGJ #c #debugging #generative #static analysis #testing
- Combining Static Analysis and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 94–100.
- VMCAI-2010-Esparza #analysis #probability #process
- Analysis of Systems with Stochastic Process Creation (JE), p. 1.
- VMCAI-2010-KreikerSV #analysis #c #low level
- Shape Analysis of Low-Level C with Overlapping Structures (JK, HS, VV), pp. 214–230.
- VMCAI-2010-MarronMSK #analysis #set
- Shape Analysis with Reference Set Relations (MM, RM, DS, DK), pp. 247–262.
- VMCAI-2010-Might #analysis #pointer
- Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
- VMCAI-2010-PerrelleH #analysis #array #permutation
- An Analysis of Permutations in Arrays (VP, NH), pp. 279–294.
- VMCAI-2010-WilhelmABGHRWW #analysis #realtime
- Static Timing Analysis for Hard Real-Time Systems (RW, SA, CB, DG, JH, JR, BW, SW), pp. 3–22.
- ASE-2009-Balagtas-FernandezH #analysis #framework #mobile #usability
- A Methodology and Framework to Simplify Usability Analysis of Mobile Applications (FTBF, HH), pp. 520–524.
- ASE-2009-DeshmukhES #analysis #concurrent #library
- Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients (JVD, EAE, SS), pp. 480–491.
- ASE-2009-GonzalezCD #analysis #automation #implementation #workflow
- Automating the Implementation of Analysis Concerns in Workflow Applications (OG, RC, DD), pp. 585–589.
- ASE-2009-SaekiHK #analysis #requirements
- A Tool for Attributed Goal-Oriented Requirements Analysis (MS, SH, HK), pp. 674–676.
- ASE-2009-WongC #analysis #dependence #logic #modelling #performance
- Improving the Efficiency of Dependency Analysis in Logical Decision Models (SW, YC), pp. 173–184.
- CASE-2009-DotoliFMSU #analysis #petri net
- The impact of ICT on an Intermodal Transportation System: an analysis by Petri Nets (MD, MPF, AMM, GS, WU), pp. 513–518.
- CASE-2009-HeraguCKM #analysis #network #retrieval
- Analysis of autonomous vehicle storage and retrieval system by open queueing network (SSH, XC, AK, CJM), pp. 455–459.
- CASE-2009-KumarWKSS #analysis #fuzzy #predict #using #variability
- A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
- CASE-2009-LiZF #analysis
- Analysis of two-loop closed production systems (NL, LZ, WF), pp. 460–465.
- CASE-2009-RamakrishnanR #analysis #linear
- Delay-dependent stability analysis of linear system with additive time-varying delays (KR, GR), pp. 122–126.
- DAC-2009-AyalaAB #analysis #data flow
- Thermal-aware data flow analysis (JLA, DA, PB), pp. 613–614.
- DAC-2009-CallegariWB #analysis #ranking
- Speedpath analysis based on hypothesis pruning and ranking (NC, LCW, PB), pp. 346–351.
- DAC-2009-GlassLTBC #analysis #architecture #design #encoding #hybrid #network
- Designing heterogeneous ECU networks via compact architecture encoding and hybrid timing analysis (MG, ML, JT, UDB, SC), pp. 43–46.
- DAC-2009-JuHCR #analysis #source code
- Context-sensitive timing analysis of Esterel programs (LJ, BKH, SC, AR), pp. 870–873.
- DAC-2009-KamhiNTW #analysis #architecture #named #statistics #transaction
- MAGENTA: transaction-based statistical micro-architectural root-cause analysis (GK, AN, AT, AW), pp. 639–643.
- DAC-2009-LinB #analysis #process
- Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
- DAC-2009-LingVFA #analysis #effectiveness
- A moment-based effective characterization waveform for static timing analysis (DDL, CV, PF, SA), pp. 19–24.
- DAC-2009-LuSZZYZ #analysis #process #reliability #statistics
- Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
- DAC-2009-MutluLMC #analysis #approach #parametricity
- A parametric approach for handling local variation effects in timing analysis (AAM, JL, RM, MC), pp. 126–129.
- DAC-2009-ShiCHMTHW #analysis #gpu #grid #network #performance #power management
- GPU friendly fast Poisson solver for structured power grid network analysis (JS, YC, WH, LM, SXDT, PHH, XW), pp. 178–183.
- DAC-2009-TakahashiYT #analysis #statistics
- A Gaussian mixture model for statistical timing analysis (ST, YY, ST), pp. 110–115.
- DAC-2009-VeetilSBSR #analysis #dependence #performance
- Efficient smart sampling based full-chip leakage analysis for intra-die variation considering state dependence (VV, DS, DB, SS, SR), pp. 154–159.
- DAC-2009-WalravensVD #analysis #modelling #named #performance
- ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
- DAC-2009-WangYLP #analysis #parametricity
- SRAM parametric failure analysis (JW, SY, XL, LTP), pp. 496–501.
- DAC-2009-YeLCC #analysis #layout #process #variability
- Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
- DATE-2009-BartoliniRB #analysis #quality #scalability #visual notation
- Visual quality analysis for dynamic backlight scaling in LCD systems (AB, MR, LB), pp. 1428–1433.
- DATE-2009-BellasiFS #analysis #modelling #multi #power management #predict
- Predictive models for multimedia applications power consumption based on use-case and OS level analysis (PB, WF, DS), pp. 1446–1451.
- DATE-2009-ChakrabortyGRP #analysis #optimisation
- Analysis and optimization of NBTI induced clock skew in gated clock trees (AC, GG, AR, DZP), pp. 296–299.
- DATE-2009-GargM #3d #analysis #process #variability
- System-level process variability analysis and mitigation for 3D MPSoCs (SG, DM), pp. 604–609.
- DATE-2009-HolcombLS #analysis #design #fault
- Design as you see FIT: System-level soft error analysis of sequential circuits (DEH, WL, SAS), pp. 785–790.
- DATE-2009-IzosimovPPEP #analysis #embedded #fault tolerance #optimisation
- Analysis and optimization of fault-tolerant embedded systems with hardened processors (VI, IP, PP, PE, ZP), pp. 682–687.
- DATE-2009-KuhneGD #analysis #comprehension #design
- Property analysis and design understanding (UK, DG, RD), pp. 1246–1249.
- DATE-2009-LeeS #fault #static analysis
- Static analysis to mitigate soft errors in register files (JL, AS), pp. 1367–1372.
- DATE-2009-LiCSSS #analysis #on the #statistics
- On hierarchical statistical static timing analysis (BL, NC, MS, WS, US), pp. 1320–1325.
- DATE-2009-NegreanSE #analysis #multi
- Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources (MN, SS, RE), pp. 524–529.
- DATE-2009-RistauLAF #analysis #parallel
- Dimensioning heterogeneous MPSoCs via parallelism analysis (BR, TL, OA, GF), pp. 554–557.
- DATE-2009-SreedharK #analysis #on the
- On linewidth-based yield analysis for nanometer lithography (AS, SK), pp. 381–386.
- DATE-2009-TannirK #analysis #using
- Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
- DATE-2009-ViehlPBR #analysis #performance #scheduling
- White box performance analysis considering static non-preemptive software scheduling (AV, MP, OB, WR), pp. 513–518.
- DATE-2009-YangNV #automation #data analysis #debugging
- Automated data analysis solutions to silicon debug (YSY, NN, AGV), pp. 982–987.
- DocEng-2009-BarcenasGL #analysis #constraints #on the #query
- On the analysis of queries with counting constraints (EB, PG, NL), pp. 21–24.
- DocEng-2009-GeorgHCPI #analysis #documentation
- From rhetorical structures to document structure: shallow pragmatic analysis for document engineering (GG, HH, MC, HP, MI), pp. 185–192.
- DocEng-2009-Hassan #analysis #documentation
- Object-level document analysis of PDF files (TH), pp. 47–55.
- DocEng-2009-JoshiL #analysis #documentation #image #natural language #using #web
- Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
- DRR-2009-Ding #analysis #documentation #image #recognition #research #topic
- Advanced topics in character recognition and document analysis: Research works in Intelligent Image & Document Research Lab, Tsinghua University (XD), pp. 1–10.
- DRR-2009-TaghvaC #analysis #bound #documentation #using
- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
- DRR-2009-YouAADT #analysis #retrieval
- Figure content analysis for improved biomedical article retrieval (DY, EA, SA, DDF, GRT), pp. 1–10.
- HT-2009-RosenC #analysis #network #social
- Social network analysis in virtual environments (DR, MC), pp. 317–322.
- HT-2009-ToppanoR #analysis #design #hypermedia
- Semiotic design and analysis of hypermedia (ET, VR), pp. 367–368.
- HT-2009-WangC #analysis #web
- Use noisy link analysis to improve web search (YW, JC), pp. 377–378.
- ICDAR-2009-AntonacopoulosBPP #analysis #dataset #documentation #evaluation #layout #performance
- A Realistic Dataset for Performance Evaluation of Document Layout Analysis (AA, DB, CP, SP), pp. 296–300.
- ICDAR-2009-ChaudhuryJTSSM #analysis #image #pipes and filters
- Google Newspaper Search — Image Processing and Analysis Pipeline (KC, AJ, ST, VS, SS, SM), pp. 621–625.
- ICDAR-2009-CollFL #analysis #documentation
- Graphological Analysis of Handwritten Text Documents for Human Resources Recruitment (RC, AF, JL), pp. 1081–1085.
- ICDAR-2009-FerilliBEB #analysis #layout
- A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
- ICDAR-2009-Franke #analysis #forensics #reliability
- Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
- ICDAR-2009-GaoTLTC #analysis #clustering #documentation
- Analysis of Book Documents’ Table of Content Based on Clustering (LG, ZT, XL, XT, YC), pp. 911–915.
- ICDAR-2009-HeLS #analysis #linear #metric #novel #recognition
- A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis (CLH, LL, CYS), pp. 451–455.
- ICDAR-2009-HendersonL #analysis #image
- Raster Map Image Analysis (TCH, TL), pp. 376–380.
- ICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition #using
- Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
- ICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
- ICDAR-2009-IndermuhleLB #analysis #documentation
- Combining Alignment Results for Historical Handwritten Document Analysis (EI, ML, HB), pp. 1186–1190.
- ICDAR-2009-Long #analysis #architecture
- An RDF-Based Blackboard Architecture for Improving Table Analysis (VL), pp. 916–920.
- ICDAR-2009-LoprestiZHT #analysis #documentation
- Document Analysis Support for the Manual Auditing of Elections (DPL, XZ, XH, GT), pp. 733–737.
- ICDAR-2009-MalleronEEDR #analysis #documentation #layout
- Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis (VM, VE, HE, SDC, PR), pp. 1001–1005.
- ICDAR-2009-SchullerSRK #analysis #bibliography #estimation #online #quote
- “The Godfather” vs. “Chaos”: Comparing Linguistic Analysis Based on On-line Knowledge Sources and Bags-of-N-Grams for Movie Review Valence Estimation (BWS, JS, GR, TK), pp. 858–862.
- ICDAR-2009-SchulzEGAAD #analysis
- Seizing the Treasure: Transferring Knowledge in Invoice Analysis (FS, ME, MG, BA, SA, AD), pp. 848–852.
- ICDAR-2009-Silva #analysis #documentation #learning #markov #modelling
- Learning Rich Hidden Markov Models in Document Analysis: Table Location (ACeS), pp. 843–847.
- ICDAR-2009-Smith #analysis #detection #hybrid #layout
- Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
- SIGMOD-2009-ChaudhuriNS #profiling #static analysis #using
- Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
- SIGMOD-2009-ChenKM #analysis #multi
- Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
- SIGMOD-2009-Heer #data analysis #social
- Voyagers and voyeurs: supporting social data analysis (JH), pp. 971–972.
- SIGMOD-2009-McSherry #data analysis #framework #privacy #query
- Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
- SIGMOD-2009-PavloPRADMS #comparison #data analysis #scalability
- A comparison of approaches to large-scale data analysis (AP, EP, AR, DJA, DJD, SM, MS), pp. 165–178.
- SIGMOD-2009-SunLDC #analysis #detection #workflow
- Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
- VLDB-2009-BenediktC #analysis #independence #xml
- Schema-Based Independence Analysis for XML Updates (MB, JC), pp. 61–72.
- VLDB-2009-CohenDDHW #analysis #big data
- MAD Skills: New Analysis Practices for Big Data (JC, BD, MD, JMH, CW), pp. 1481–1492.
- VLDB-2009-DaiGBBL #analysis #interactive #named
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
- VLDB-2009-HeerH #data analysis #social #visualisation
- Data visualization & social data analysis (JH, JMH), pp. 1656–1657.
- VLDB-2009-SchnaitterPG #analysis #design #interactive #modelling #physics
- Index Interactions in Physical Design Tuning: Modeling, Analysis, and Applications (KS, NP, LG), pp. 1234–1245.
- VLDB-2009-SunLNDC #analysis #detection #named #workflow
- WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
- VLDB-2009-WuXMH #analysis #multi
- Promotion Analysis in Multi-Dimensional Space (TW, DX, QM, JH), pp. 109–120.
- ITiCSE-2009-BlasGMB #analysis #automation #composition #using
- Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
- ITiCSE-2009-Mirolo #analysis #modelling #problem #recursion
- Mental models of recursive computations vs. recursive analysis in the problem domain (CM), p. 397.
- ITiCSE-2009-RosslingK09a #analysis #performance
- A system for integral efficiency analysis of sustainable technologies (GR, YK), p. 395.
- ESOP-2009-Campbell #analysis #data type #memory management #using
- Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
- FASE-2009-AlTurkiDYCI #analysis #specification
- Formal Specification and Analysis of Timing Properties in Software Systems (MA, DD, DY, AC, HI), pp. 262–277.
- FASE-2009-ChenWYS #detection #named #static analysis
- HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
- FASE-2009-ClarkGT #analysis #scalability
- Scalable Analysis of Scalable Systems (AC, SG, MT), pp. 1–17.
- FoSSaCS-2009-KuhnrichSSK #analysis #data flow #infinity #interprocedural
- Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains (MK, SS, JS, SK), pp. 440–455.
- TACAS-2009-AtigBQ #analysis #bound #concurrent #source code #thread
- Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
- TACAS-2009-BjornerTV #analysis #source code #string
- Path Feasibility Analysis for String-Manipulating Programs (NB, NT, AV), pp. 307–321.
- TACAS-2009-GofmanLSZYS #analysis #data access #named #policy
- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
- TACAS-2009-NoriRTT #static analysis #testing
- The YogiProject: Software Property Checking via Static Analysis and Testing (AVN, SKR, ST, AVT), pp. 178–181.
- TACAS-2009-OrzanWW #equation #static analysis
- Static Analysis Techniques for Parameterised Boolean Equation Systems (SO, WW, TACW), pp. 230–245.
- TACAS-2009-YuBI #analysis #string #verification
- Symbolic String Verification: Combining String Analysis and Size Analysis (FY, TB, OHI), pp. 322–336.
- CSMR-2009-BurenR #analysis #architecture #maintenance #using
- Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
- CSMR-2009-EkstedtFJLSUB #analysis #architecture #enterprise #maintenance
- A Tool for Enterprise Architecture Analysis of Maintainability (ME, UF, PJ, RL, TS, JU, MB), pp. 327–328.
- CSMR-2009-JoshiJ #concept analysis
- Concept Analysis for Class Cohesion (PJ, RKJ), pp. 237–240.
- CSMR-2009-Laitila #analysis #comprehension #named
- SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
- CSMR-2009-NagyM #analysis #fault #security
- Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
- CSMR-2009-PatelHR #clustering #dependence #dynamic analysis #using
- Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
- ICPC-2009-FigueiredoSSGWN #analysis #design
- Crosscutting patterns and design stability: An exploratory analysis (EF, BCdS, CS, AFG, JW, DJN), pp. 138–147.
- ICPC-2009-ForwardLB #analysis #comprehension
- Improving program comprehension by enhancing program constructs: An analysis of the Umple language (AF, TCL, DB), pp. 311–312.
- ICPC-2009-GrantC #analysis
- Vector space analysis of software clones (SG, JRC), pp. 233–237.
- ICPC-2009-LiuM #static analysis
- Practical static analysis for inference of security-related program properties (YL, AM), pp. 50–59.
- ICPC-2009-PetrenkoR #impact analysis #precise
- Variable granularity for improving precision of impact analysis (MP, VR), pp. 10–19.
- ICPC-2009-PopescuGM #analysis #dependence #precise
- Enabling more precise dependency analysis in event-based systems (DP, JG, NM), pp. 305–306.
- ICPC-2009-ZhangDH #aspectj #impact analysis #tool support #visualisation
- Impact analysis and visualization toolkit for static crosscutting in AspectJ (DZ, EDE, LJH), pp. 60–69.
- ICSM-2009-HindleGH #analysis #developer #topic #what
- What’s hot and what’s not: Windowed developer topic analysis (AH, MWG, RCH), pp. 339–348.
- ICSM-2009-JiangHHF #analysis #automation #performance #testing
- Automated performance analysis of load tests (ZMJ, AEH, GH, PF), pp. 125–134.
- ICSM-2009-Li #analysis #dependence #identification #using
- Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
- ICSM-2009-LiGMMMGC #analysis #component #fault #multi #pervasive #scalability
- Analysis of pervasive multiple-component defects in a large software system (ZL, MG, SSM, NHM, AVM, DG, EC), pp. 265–273.
- ICSM-2009-LuciaOT #analysis #empirical #traceability
- The role of the coverage analysis during IR-based traceability recovery: A controlled experiment (ADL, RO, GT), pp. 371–380.
- ICSM-2009-Roy #analysis #detection
- Detection and analysis of near-miss software clones (CKR), pp. 447–450.
- ICSM-2009-VasaLBN #analysis #comparative #evolution #using
- Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
- ICSM-2009-WenzelKKK #3d #analysis #evolution #visualisation
- Evolution analysis with animated and 3D-visualizations (SW, JK, UK, AK), pp. 475–478.
- ICSM-2009-Yoo #impact analysis #metric #performance #using
- Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
- MSR-2009-EnslenHPV #analysis #automation #identifier #mining #source code
- Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
- SCAM-2009-CanetCM #analysis #c #source code
- A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
- SCAM-2009-KlintSV #analysis #domain-specific language #named #rascal #source code
- RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
- SCAM-2009-QianZX #analysis #lazy evaluation
- Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
- WCRE-1999-BernardiL99a #analysis #identification #named #object-oriented
- ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis (MLB, GADL), pp. 319–320.
- WCRE-1999-CapobiancoLOPP99a #analysis #traceability #using
- Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
- WCRE-1999-Khomh99a #analysis #comprehension #design #named #quality
- SQUAD: Software Quality Understanding through the Analysis of Design (FK), pp. 303–306.
- WCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics #using
- Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
- PEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
- Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
- PLDI-2009-GulwaniJK #analysis #bound #control flow #invariant #refinement
- Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
- PLDI-2009-HoffmanEJ #analysis #semantics
- Semantics-aware trace analysis (KJH, PE, SJ), pp. 453–464.
- PLDI-2009-JoshiPSN #detection #program analysis #random
- A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
- PLDI-2009-RavitchJAL #automation #generative #library #static analysis #using
- Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
- PLDI-2009-Rubio-GonzalezGLAA #analysis #fault #file system
- Error propagation analysis for file systems (CRG, HSG, BL, RHAD, ACAD), pp. 270–280.
- PLDI-2009-TallentMF #analysis #metric #performance
- Binary analysis for measurement and attribution of program performance (NRT, JMMC, MWF), pp. 441–452.
- PLDI-2009-TrippPFSW #analysis #effectiveness #named #web
- TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
- SAS-2009-DohKS #parsing #static analysis #string #using
- Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
- SAS-2009-GulavaniCRN #analysis #bottom-up
- Bottom-Up Shape Analysis (BSG, SC, GR, AVN), pp. 188–204.
- SAS-2009-JensenMT #analysis #javascript
- Type Analysis for JavaScript (SHJ, AM, PT), pp. 238–255.
- SAS-2009-SeidlV #analysis #concurrent #detection
- Region Analysis for Race Detection (HS, VV), pp. 171–187.
- SAS-2009-Simon #analysis #optimisation #pointer #similarity #using
- Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
- SAS-2009-SridharanF #analysis #complexity
- The Complexity of Andersen’s Analysis in Practice (MS, SJF), pp. 205–221.
- CIAA-J-2008-DixonES09 #analysis
- Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching (RD, ÖE, TS), pp. 597–612.
- CIAA-2009-Seidl #automaton #finite #program analysis
- Program Analysis through Finite Tree Automata (HS), p. 3.
- ICALP-v1-2009-BecchettiK #analysis #streaming
- Competitive Analysis of Aggregate Max in Windowed Streaming (LB, EK), pp. 156–170.
- ICALP-v2-2009-FinkelG #analysis
- Forward Analysis for WSTS, Part II: Complete WSTS (AF, JGL), pp. 188–199.
- ICALP-v2-2009-FriedrichSV #analysis #network
- Smoothed Analysis of Balancing Networks (TF, TS, DV), pp. 472–483.
- ICALP-v2-2009-Mosk-AoyamaR #analysis #performance #worst-case
- Worst-Case Efficiency Analysis of Queueing Disciplines (DMA, TR), pp. 546–557.
- FM-2009-AlbertAGP #analysis
- Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
- FM-2009-HeidarianSV #analysis #network #protocol
- Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
- FM-2009-JostLHSH #analysis #bound #using
- “Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
- FM-2009-SeidlVV #alias #analysis #linear #polynomial
- A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis (HS, VV, VV), pp. 644–659.
- FM-2009-WangKGG #analysis #concurrent #predict #source code
- Symbolic Predictive Analysis for Concurrent Programs (CW, SK, MKG, AG), pp. 256–272.
- IFM-2009-HasanAT #analysis #array #configuration management #fault #memory management #probability
- Formal Probabilistic Analysis of Stuck-at Faults in Reconfigurable Memory Arrays (OH, NA, ST), pp. 277–291.
- SEFM-2009-LienO #analysis #formal method #modelling #multi #protocol
- Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
- SEFM-2009-NgocO #analysis #fault #model checking
- Overflow and Roundoff Error Analysis via Model Checking (DTBN, MO), pp. 105–114.
- SEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing #using
- Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
- SEFM-2009-TruongTN #analysis #coordination #multi #using
- Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
- SFM-2009-AalstMSW #analysis #formal method #interactive
- Service Interaction: Patterns, Formalization, and Analysis (WMPvdA, AJM, CS, KW), pp. 42–88.
- SFM-2009-ClarkGT #analysis #using #web #web service
- Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
- CEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code #using
- Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
- ICFP-2009-CuoqSBBCCMPP #case study #experience #framework #ml #static analysis
- Experience report: OCaml for an industrial-strength static analysis framework (PC, JS, PB, RB, GC, LC, BM, VP, AP), pp. 281–286.
- ICFP-2009-MidtgaardJ #abstract interpretation #analysis #control flow
- Control-flow analysis of function calls and returns by abstract interpretation (JM, TPJ), pp. 287–298.
- CHI-2009-AlexanderCFGG #analysis #design #evaluation
- Revisiting read wear: analysis, design, and evaluation of a footprints scrollbar (JA, AC, SF, CG, SG), pp. 1665–1674.
- CHI-2009-BartneckH #analysis
- Scientometric analysis of the CHI proceedings (CB, JH), pp. 699–708.
- CHI-2009-DiakopoulosGE #analysis #named #online #quality #video
- Videolyzer: quality analysis of online informational video for bloggers and journalists (ND, SG, IAE), pp. 799–808.
- DHM-2009-DzaackU #analysis #modelling #multi #performance #safety
- Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
- DHM-2009-Godil #analysis
- Facial Shape Analysis and Sizing System (AG), pp. 29–35.
- HCD-2009-CaratozzoloMPZ #analysis
- Caring and Curing by Mixing Information and Emotions in Orphan Diseases Websites: A Twofold Analysis (MCC, EM, OP, MZ), pp. 661–670.
- HCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web
- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
- HCD-2009-KohNTTWH #analysis #why
- Why Taking Medicine Is a Chore — An Analysis of Routine and Contextual Factors in the Home (WKK, JN, OYT, ZT, AHYW, MGH), pp. 452–461.
- HCD-2009-KurosuH #analysis #behaviour #communication #development #research
- Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
- HCD-2009-LinO #analysis #information management
- The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
- HCD-2009-LokmanHNN #analysis #difference #evaluation
- Website Affective Evaluation: Analysis of Differences in Evaluations Result by Data Population (AML, AFH, NLMN, MN), pp. 643–652.
- HCD-2009-NakanoR #analysis #corpus #multimodal #usability
- Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
- HCD-2009-NieminenKRM #analysis #fine-grained #testing #towards #usability
- Towards Fine-Grained Usability Testing: New Methodological Directions with Conversation Analysis (MN, SK, SR, PM), pp. 879–887.
- HCD-2009-Stephane #analysis #behaviour #predict #simulation
- User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
- HCD-2009-WadaY #analysis
- The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
- HCI-AUII-2009-Cloud-BucknerSSYG #analysis #gender
- Expression of Personality through Avatars: Analysis of Effects of Gender and Race on Perceptions of Personality (JCB, MS, BS, BY, JJG), pp. 248–256.
- HCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous
- Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
- HCI-NIMT-2009-GastBRRWMR #analysis #gesture #human-computer #interactive
- Did I Get It Right: Head Gestures Analysis for Human-Machine Interactions (JG, AB, TR, GR, FW, CM, BR), pp. 170–177.
- HCI-NIMT-2009-MatsumotoUYM #analysis #interactive #ubiquitous #video
- Life with a Robot Companion: Video Analysis of 16-Days of Interaction with a Home Robot in a “Ubiquitous Home” Environment (NM, HU, TY, HM), pp. 341–350.
- HCI-NT-2009-Goschnick #analysis #design #interactive #programming
- People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems (SG), pp. 836–845.
- HCI-NT-2009-HoriguchiNSK #analysis #interactive
- Analysis of Breakdowns in Menu-Based Interaction Based on Information Scent Model (YH, HN, TS, YK), pp. 438–445.
- HCI-NT-2009-LangeWB #analysis #automation #evaluation #information management
- Automated Analysis of Eye-Tracking Data for the Evaluation of Driver Information Systems According to ISO/TS 15007-2: 2001 (CL, MW, HB), pp. 105–110.
- HCI-NT-2009-MatsudaUOM #analysis #eye tracking #multi
- An Analysis of Eye Movements during Browsing Multiple Search Results Pages (YM, HU, MO, KiM), pp. 121–130.
- HCI-VAD-2009-EssabbahOHM #analysis #approach #design #interactive
- A New Approach to Design an Interactive System for Molecular Analysis (ME, SO, JH, MM), pp. 713–722.
- HCI-VAD-2009-ParkHC #3d #analysis #experience #web
- The Experience of Presence in 3D Web Environment: An Analysis of Korean Second Life (SP, HSH, MC), pp. 387–395.
- HCI-VAD-2009-Yarlikas #analysis #automation
- A New Automatic Teller Machine (ATM) Proposal through the Analysis of ATMs of Three Banks (SY), pp. 641–650.
- HIMI-DIE-2009-BrangierDE #analysis #integration #library
- The 7 Basic Functions of a Digital Library — Analysis of Focus Groups about the Usefulness of a Thematic Digital Library on the History of European Integration (EB, JD, LE), pp. 345–354.
- HIMI-DIE-2009-HendersonS #analysis #documentation #empirical
- An Empirical Analysis of Personal Digital Document Structures (SH, AS), pp. 394–403.
- HIMI-DIE-2009-KumeS #analysis #using #web
- Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
- HIMI-DIE-2009-OcenasekS #analysis #metric #process #workflow
- A Model for Measurement and Analysis of the Workflow Processes (PO, MS), pp. 149–153.
- HIMI-DIE-2009-UgaiA #analysis #network #social #tool support
- Organization Diagnosis Tools Based on Social Network Analysis (TU, KA), pp. 181–189.
- HIMI-II-2009-FurukawaO #analysis
- A Proposal of Collection and Analysis System of Near Miss Incident in Nursing Duties (AF, YO), pp. 497–502.
- HIMI-II-2009-FurutaSKAKT #analysis #collaboration #communication
- Analysis of Team Communication and Collaboration in En-Route Air Traffic Control (KF, YS, TK, HA, DK, MT), pp. 758–765.
- HIMI-II-2009-KimuraONOT #analysis
- Analysis on Descriptions of Dosage Regimens in Package Inserts of Medicines (MK, KO, KN, MO, FT), pp. 539–548.
- HIMI-II-2009-NozawaK #analysis #comparison #realtime #reduction
- A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
- HIMI-II-2009-SagaTT #analysis #mining #named
- Loopo: Integrated Text Miner for FACT-Graph-Based Trend Analysis (RS, HT, KT), pp. 192–200.
- HIMI-II-2009-SpinilloPL #analysis #safety
- Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
- IDGD-2009-MarcusK #analysis #network #social
- Cross-Cultural Analysis of Social Network Services in Japan, Korea, and the USA (AM, NK), pp. 59–68.
- OCSC-2009-AoyagiFISSYS #analysis #collaboration
- A Discussion System for Knowledge Sharing and Collaborative Analysis of Incidents in Nuclear Power Plants (SA, HF, HI, HS, HS, HY, TS), pp. 3–12.
- OCSC-2009-PetersonS #analysis #network #social
- Analysis of Information Disclosure on a Social Networking Site (KP, KAS), pp. 256–264.
- OCSC-2009-TaylorT #analysis #game studies #multi #online
- A Content Analysis of Interviews with Players of Massively Multiplayer Online Role-Play Games (MMORPGs): Motivating Factors and the Impact on Relationships (JT, JT), pp. 613–621.
- OCSC-2009-ZhaoYGL #analysis #modelling #topic
- Propagation Modeling and Analysis of Incidental Topics in Blogosphere (LZ, RY, XG, ML), pp. 401–410.
- VISSOFT-2009-HassaineDSP #analysis #generative #maintenance #visualisation
- Generating visualization-based analysis scenarios from maintenance task descriptions (SH, KD, HAS, PP), pp. 41–44.
- AdaEurope-2009-BurnsWZ #ada #analysis #implementation #scheduling
- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 (AB, AJW, FZ), pp. 119–133.
- AdaEurope-2009-LasnierZPH #analysis #automation #code generation #modelling
- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
- AdaEurope-2009-MarrefB #analysis #worst-case
- Predicated Worst-Case Execution-Time Analysis (AM, GB), pp. 134–148.
- SIGAda-2009-Gluch #analysis #embedded #modelling
- Embedded systems engineering with the AADL: modeling & analysis (DPG), pp. 7–8.
- SIGAda-2009-Lathrop #ada #branch #dynamic analysis #predict
- Dynamic analysis of branch mispredictions in Ada (SML), pp. 79–84.
- CAiSE-2009-EspanaGP #analysis #communication #information management #requirements
- Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
- CAiSE-2009-GuermoucheG #analysis #web #web service
- Asynchronous Timed Web Service-Aware Choreography Analysis (NG, CG), pp. 364–378.
- CAiSE-2009-KaiyaTSSK #analysis #quality #requirements #using
- Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
- CAiSE-2009-LiuLYWH #analysis #constraints #using #verification #workflow
- ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
- EDOC-2009-NarmanJECK #analysis #architecture #enterprise
- Enterprise Architecture Analysis for Data Accuracy Assessments (PN, PJ, ME, MC, JK), pp. 24–33.
- ICEIS-AIDSS-2009-AlbusacCLVL #analysis #detection
- Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
- ICEIS-AIDSS-2009-ElzingaPVD #concept analysis #detection
- Detecting Domestic Violence — Showcasing a Knowledge Browser based on Formal Concept Analysis and Emergent Self Organizing Maps (PE, JP, SV, GD), pp. 11–18.
- ICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics #using
- Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
- ICEIS-DISI-2009-PoelmansR #analysis #evaluation #workflow
- Assessing Workflow Management Systems — A Quantitative Analysis of a Worfklow Evaluation Model (SP, HAR), pp. 183–189.
- ICEIS-ISAS-2009-BifflFHM #analysis #automation #evaluation #open source #process #tool support
- Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
- ICEIS-ISAS-2009-GruhnK #analysis #mobile #modelling #process
- Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
- ICEIS-ISAS-2009-LauITR #analysis #modelling #process
- Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models (JML, CI, LHT, MR), pp. 83–88.
- ICEIS-ISAS-2009-LeiteG #analysis #multi #process #requirements
- A Process for Multi-agent Domain and Application Engineering — The Domain Analysis and Application Requirements Engineering Phases (AL, RG), pp. 156–161.
- ICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process #using
- Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
- ICEIS-ISAS-2009-SunyaevKMK #analysis #health #security
- Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
- ICEIS-J-2009-ChangS #analysis #classification #performance
- Fast Unsupervised Classification for Handwritten Stroke Analysis (WDC, JS), pp. 918–927.
- ICEIS-J-2009-FritzscheML #analysis #concept #data mining #design #industrial #interactive #mining #quality
- Interactive Quality Analysis in the Automotive Industry: Concept and Design of an Interactive, Web-Based Data Mining Application (SF, MM, CL), pp. 402–414.
- ICEIS-J-2009-MartinoBBF #analysis #multi #tool support
- Integrating Google Earth within OLAP Tools for Multidimensional Exploration and Analysis of Spatial Data (SDM, SB, MB, FF), pp. 940–951.
- ICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network #using
- An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
- ICEIS-J-2009-NunesKNLC #analysis #approach #multi #product line
- A Domain Analysis Approach for Multi-agent Systems Product Lines (IN, UK, CN, CJPdL, EC), pp. 716–727.
- ICEIS-J-2009-SpahnW #analysis #development #information management #problem
- End-User Development for Individualized Information Management: Analysis of Problem Domains and Solution Approaches (MS, VW), pp. 843–857.
- ICEIS-J-2009-YamamotoIVCB #analysis #framework
- Actor Relationship Analysis for the i* Framework (SY, KI, JMV, KC, SJB), pp. 491–500.
- ICEIS-SAIC-2009-DronavajjalaNS #analysis #enterprise #identification #process #project management #relational
- Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
- ICEIS-SAIC-2009-PetersA #analysis #on the #trust
- On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
- CIKM-2009-ChenR #analysis #detection
- Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
- CIKM-2009-JiaYM #analysis #effectiveness #retrieval #sentiment
- The effect of negation on sentiment analysis and retrieval effectiveness (LJ, CTY, WM), pp. 1827–1830.
- CIKM-2009-KobayakawaKTOKT #analysis #classification #kernel #using
- Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
- CIKM-2009-LiBS #analysis #predict
- Blog cascade affinity: analysis and prediction (HL, SSB, AS), pp. 1117–1126.
- CIKM-2009-LinH #analysis #sentiment #topic
- Joint sentiment/topic model for sentiment analysis (CL, YH), pp. 375–384.
- CIKM-2009-LiuZPQCL #analysis #interactive #summary #topic #visual notation
- Interactive, topic-based visual text summarization and analysis (SL, MXZ, SP, WQ, WC, XL), pp. 543–552.
- CIKM-2009-LiuZY #analysis #collaboration #probability
- Probabilistic latent preference analysis for collaborative filtering (NNL, MZ, QY), pp. 759–766.
- CIKM-2009-MasadaFTHSO #analysis #optimisation #topic
- Dynamic hyperparameter optimization for bayesian topical trend analysis (TM, DF, AT, TH, YS, KO), pp. 1831–1834.
- CIKM-2009-MeiKKT #analysis #framework #sequence
- An analysis framework for search sequences (QM, KLK, RK, AT), pp. 1991–1994.
- CIKM-2009-MohammedFD #analysis
- Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
- CIKM-2009-ParkR #analysis #information retrieval #kernel #semantics #using
- Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
- CIKM-2009-SayeedSDHMR #analysis #documentation #metric #similarity
- Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
- CIKM-2009-Wan #analysis #multi #summary #topic
- Topic analysis for topic-focused multi-document summarization (XW), pp. 1609–1612.
- CIKM-2009-ZhuM #analysis #identification #multi
- Multidimensional political spectrum identification and analysis (LZ, PM), pp. 2045–2048.
- ECIR-2009-TanCWX #adaptation #analysis #naive bayes #sentiment
- Adapting Naive Bayes to Domain Adaptation for Sentiment Analysis (ST, XC, YW, HX), pp. 337–349.
- ECIR-2009-Wang #analysis #documentation #information retrieval #ranking
- Mean-Variance Analysis: A New Document Ranking Theory in Information Retrieval (JW0), pp. 4–16.
- ICML-2009-BaillyDR #analysis #component #grammar inference #problem
- Grammatical inference as a principal component analysis problem (RB, FD, LR), pp. 33–40.
- ICML-2009-CaiWH #consistency #data analysis #probability
- Probabilistic dyadic data analysis with local and global consistency (DC, XW, XH), pp. 105–112.
- ICML-2009-ChaudhuriKLS #analysis #canonical #clustering #correlation #multi
- Multi-view clustering via canonical correlation analysis (KC, SMK, KL, KS), pp. 129–136.
- ICML-2009-ChoS #analysis #learning #modelling
- Learning dictionaries of stable autoregressive models for audio scene analysis (YC, LKS), pp. 169–176.
- ICML-2009-GomesK #dynamic analysis #multi
- Dynamic analysis of multiagent Q-learning with ε-greedy exploration (ERG, RK), pp. 369–376.
- ICML-2009-LanLML #algorithm #analysis #ranking
- Generalization analysis of listwise learning-to-rank algorithms (YL, TYL, ZM, HL), pp. 577–584.
- ICML-2009-PaisleyC #analysis #parametricity #process
- Nonparametric factor analysis with beta process priors (JWP, LC), pp. 777–784.
- ICML-2009-Sutskever #analysis
- A simpler unified analysis of budget perceptrons (IS), pp. 985–992.
- KDD-2009-AsurP #analysis #approach #graph #interactive
- A viewpoint-based approach for interaction graph analysis (SA, SP), pp. 79–88.
- KDD-2009-BerlingerioPNG #data analysis #interactive #mining #workflow
- Temporal mining for interactive workflow data analysis (MB, FP, MN, FG), pp. 109–118.
- KDD-2009-ChuPBMPCZ #analysis #behaviour #case study #exclamation
- A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
- KDD-2009-HasanSGA #analysis #named #novel
- COA: finding novel patents through text analysis (MAH, WSS, TDG, AA), pp. 1175–1184.
- KDD-2009-MelvilleGL #analysis #classification #sentiment
- Sentiment analysis of blogs by combining lexical knowledge with text classification (PM, WG, RDL), pp. 1275–1284.
- KDD-2009-PandeyASMK #analysis #approach #clustering
- An association analysis approach to biclustering (GP, GA, MS, CLM, VK), pp. 677–686.
- KDD-2009-ScrippsTE #analysis #network #preprocessor
- Measuring the effects of preprocessing decisions and network forces in dynamic network analysis (JS, PNT, AHE), pp. 747–756.
- KDD-2009-TangSWY #analysis #network #scalability #social
- Social influence analysis in large-scale networks (JT, JS, CW, ZY), pp. 807–816.
- KEOD-2009-DolsakN #analysis #design #process
- Intelligent Analytical Aids in Design — Decision Support to Engineering Analysis Process (BD, MN), pp. 129–134.
- KEOD-2009-NovakD #design #process
- Intelligent Support to Analysis-based Design Improvement PROCESS — Propose: An Intelligent Consultative Advisory System (MN, BD), pp. 135–140.
- KMIS-2009-Bolisani #analysis #modelling #transaction
- Modelling Cognitive Transactions for Economic and Accounting Analysis (EB), pp. 242–247.
- KMIS-2009-BounhasS #analysis #approach #documentation #social
- A Social Approach for Document Analysis (IB, YS), pp. 95–102.
- KMIS-2009-BuchnerMN #analysis #concept #enterprise #open source #tool support
- A Concept and Service based Analysis of Commercial and Open Source Enterprise 2.0 Tools (TB, FM, CN), pp. 37–45.
- KMIS-2009-Kume #analysis #using #visual notation #web
- Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
- KMIS-2009-RadeschutzM #analysis #optimisation #process
- Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
- MLDM-2009-DereliogluGO #analysis #approach
- A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
- MLDM-2009-DuangsoithongW #analysis #classification
- Relevance and Redundancy Analysis for Ensemble Classifiers (RD, TW), pp. 206–220.
- RecSys-2009-CremonesiT #analysis #recommendation
- Analysis of cold-start recommendations in IPTV systems (PC, RT), pp. 233–236.
- RecSys-2009-TsatsouMKD #analysis #framework #personalisation #recommendation #semantics
- A semantic framework for personalized ad recommendation based on advanced textual analysis (DT, FM, IK, PCD), pp. 217–220.
- SEKE-2009-AtkinsonD #analysis #modelling #re-engineering #social
- Analysis of Agent Oriented Software Engineering Methodologies for Social Causal Models (MA, SD), pp. 157–163.
- SEKE-2009-ConejeroHJCR #analysis #composition #product line
- Early Analysis of Modularity in Software Product Lines (JMC, JH, EJ, PJC, RR), pp. 721–736.
- SEKE-2009-GarlanCSBC #analysis #architecture #using
- Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
- SEKE-2009-IlievaO #analysis #design #object-oriented #representation
- Nested NL Representation for OO Analysis and Design (MI, OO), pp. 49–54.
- SEKE-2009-JiCXZ #analysis #clustering #novel
- A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
- SEKE-2009-KocaguneliTBTC #analysis #fault #metric #named #predict
- Prest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool (EK, AT, ABB, BT, BC), pp. 637–642.
- SEKE-2009-LiuC #analysis #composition #data flow #testing #web #web service
- Data Flow Analysis and Testing for Web Service Compositions Based on WS-BPEL (CHL, SLC), pp. 306–311.
- SEKE-2009-LudwigTA #analysis #concept #database #deduction #performance #reasoning #semantics #web
- Performance Analysis of a Deductive Database with a Semantic Web Reasoning Engine: ConceptBase and Racer (SAL, CT, KA), pp. 688–693.
- SIGIR-2009-AlonsoM #analysis #e-commerce
- Relevance criteria for e-commerce: a crowdsourcing-based experimental analysis (OA, SM), pp. 760–761.
- SIGIR-2009-AshkanC #analysis
- Term-based commercial intent analysis (AA, CLAC), pp. 800–801.
- SIGIR-2009-Azzopardi #analysis #effectiveness #empirical #evaluation #query
- Query side evaluation: an empirical analysis of effectiveness and effort (LA), pp. 556–563.
- SIGIR-2009-Peng #analysis #equivalence #probability #semantics
- Equivalence between nonnegative tensor factorization and tensorial probabilistic latent semantic analysis (WP), pp. 668–669.
- SIGIR-2009-SakaiN #analysis #query #wiki
- Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
- SIGIR-2009-SakumaK #analysis #graph
- Link analysis for private weighted graphs (JS, SK), pp. 235–242.
- SIGIR-2009-TomsF #analysis #behaviour #predict
- Predicting stopping behaviour: a preliminary analysis (EGT, LF), pp. 750–751.
- ECMDA-FA-2009-AmeedeenBA #analysis #approach #modelling
- A Model Driven Approach to the Analysis of Timeliness Properties (MAA, BB, RA), pp. 221–236.
- ECMDA-FA-2009-KoudriCAS #analysis #design #process
- MoPCoM/MARTE Process Applied to a Cognitive Radio System Design and Analysis (AK, JC, DA, PS), pp. 277–288.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
- ECOOP-2009-XuRS #alias #analysis #points-to #scalability #using
- Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
- OOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime #using
- Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
- OOPSLA-2009-HaABM #concurrent #dynamic analysis #framework #hardware #manycore
- A concurrent dynamic analysis framework for multicore hardware (JH, MA, SMB, KSM), pp. 155–174.
- PPDP-2009-PhanJ #analysis #source code
- Path-sensitive region analysis for mercury programs (QP, GJ), pp. 161–170.
- PADL-2009-MaldeO #analysis #haskell #scalability #sequence #using
- Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
- PADL-2009-TranNPS #consistency #declarative #performance #specification #static analysis
- Improving Performance of Conformant Planners: Static Analysis of Declarative Planning Domain Specifications (DVT, HKN, EP, TCS), pp. 239–253.
- POPL-2009-CalcagnoDOY #analysis #composition
- Compositional shape analysis by means of bi-abduction (CC, DD, PWO, HY), pp. 289–300.
- POPL-2009-HardekopfL #analysis #pointer
- Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
- RE-2009-ClassenHH #analysis #feature model #workflow
- Analysis of Feature Configuration Workflows (AC, AH, PH), pp. 381–382.
- RE-2009-ElahiY #analysis #requirements #security #trade-off #trust
- Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
- RE-2009-GhanavatiAP #analysis #evaluation
- Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
- RE-2009-JuretaMF #analysis #multi #requirements #validation
- Analysis of Multi-Party Agreement in Requirements Validation (IJ, JM, SF), pp. 57–66.
- RE-2009-MussbacherGA #analysis #modelling
- Modeling and Analysis of URN Goals and Scenarios with jUCMNav (GM, SG, DA), pp. 383–384.
- SAC-2009-DaiMSZ #concept analysis #towards #using
- Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
- SAC-2009-FahmyRJ #analysis #distributed #realtime #transaction
- Response time analysis of software transactional memory-based distributed real-time systems (SFF, BR, EDJ), pp. 334–338.
- SAC-2009-GohKCC #analysis #performance #scalability #video
- Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
- SAC-2009-HijikataHON #algorithm #analysis #using
- HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
- SAC-2009-JangC #analysis #javascript #points-to
- Points-to analysis for JavaScript (DJ, KMC), pp. 1930–1937.
- SAC-2009-OliveiraLG #analysis #development #framework #usability
- Development of a biosignals framework for usability analysis (IO, RL, NG), pp. 156–157.
- SAC-2009-PassitoMM #analysis #network #protocol #using
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
- SAC-2009-PopovaS #analysis #constraints #modelling
- Constraint-based modelling and analysis of organisations (VP, AS), pp. 283–284.
- SAC-2009-SmileyHKD #analysis #architecture #evaluation #requirements
- Architectural requirements prioritization and analysis applied to software technology evaluation (KS, QH, EK, AD), pp. 397–398.
- ESEC-FSE-2009-ArbabMMKQ #analysis #coordination #modelling #named #performance
- Reo2MC: a tool chain for performance analysis of coordination models (FA, SM, YJM, MZK, HQ), pp. 287–288.
- ESEC-FSE-2009-CataldoN #analysis #empirical #maturity #on the #process #quality
- On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality (MC, SN), pp. 101–110.
- ESEC-FSE-2009-PaveseBU #analysis #behaviour #modelling #probability
- Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models (EP, VAB, SU), pp. 335–344.
- ICSE-2009-CalinescuK #analysis #using
- Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
- ICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering #using
- A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
- ICSE-2009-DagenaisR #analysis #api #evolution #named #recommendation
- SemDiff: Analysis and recommendation support for API evolution (BD, MPR), pp. 599–602.
- ICSE-2009-GeayPTRD #analysis #composition #precise #string
- Modular string-sensitive permission analysis with demand-driven precision (EG, MP, TT, BGR, JD), pp. 177–187.
- ICSE-2009-MarianiPP #analysis #automation #tool support
- A toolset for automated failure analysis (LM, FP, MP), pp. 563–566.
- ICSE-2009-NandaS #analysis #interprocedural #java
- Accurate Interprocedural Null-Dereference Analysis for Java (MGN, SS), pp. 133–143.
- ICSE-2009-RamasubbuB #analysis #empirical #maturity #process
- The impact of process choice in high maturity environments: An empirical analysis (NR, RKB), pp. 529–539.
- ICSE-2009-SentillesPNNPC #analysis #component #design #embedded #implementation #named
- Save-IDE — A tool for design, analysis and implementation of component-based embedded systems (SS, AP, DN, TN, PP, IC), pp. 607–610.
- ICSE-2009-WlokaRTR #analysis #development
- Safe-commit analysis to facilitate team software development (JW, BGR, FT, XR), pp. 507–517.
- ICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social #using
- Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
- LDTA-2008-Nilsson-NymanHME09 #analysis #declarative #java #source code
- Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
- SPLC-2009-KastnerARRBS #analysis #case study #on the #problem
- On the impact of the optional feature problem: analysis and case studies (CK, SA, SSuR, MR, DSB, GS), pp. 181–190.
- SPLC-2009-MendoncaWC #analysis #feature model #modelling #satisfiability
- SAT-based analysis of feature models is easy (MM, AW, KC), pp. 231–240.
- ASPLOS-2009-AleenC #analysis #commutative #parallel #program transformation
- Commutativity analysis for software parallelization: letting program transformations see the big picture (FA, NC), pp. 241–252.
- CC-2009-VasudevanTDE #analysis #concurrent #source code
- Compile-Time Analysis and Specialization of Clocks in Concurrent Programs (NV, OT, JD, SAE), pp. 48–62.
- CGO-2009-CordesFM #abstract interpretation #analysis #modelling #performance #precise #slicing
- A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models (PL, DC, HF, PM), pp. 136–146.
- CGO-2009-PereiraB #analysis #pointer
- Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
- ISMM-2009-AlbertGG #analysis #garbage collection
- Live heap space analysis for languages with garbage collection (EA, SG, MGZ), pp. 129–138.
- ISMM-2009-JumpM #analysis #metric
- Dynamic shape analysis via degree metrics (MJ, KSM), pp. 119–128.
- ISMM-2009-NaeemL #alias #analysis #performance #set #using
- Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
- ISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code
- Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
- ISMM-2009-Vengerov #analysis #garbage collection #modelling #optimisation #throughput
- Modeling, analysis and throughput optimization of a generational garbage collector (DV), pp. 1–9.
- PPoPP-2009-KejariwalC #analysis #concurrent #parallel #source code #thread
- Parallelization spectroscopy: analysis of thread-level parallelism in hpc programs (AK, CC), pp. 293–294.
- PPoPP-2009-TallentM #analysis #effectiveness #metric #parallel #performance #thread
- Effective performance measurement and analysis of multithreaded applications (NRT, JMMC), pp. 229–240.
- CADE-2009-FalkeK #analysis #approach #automation #imperative #source code #term rewriting #termination
- A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs (SF, DK), pp. 277–293.
- CADE-2009-SebastianiV #analysis #axiom #encoding #lightweight #logic
- Axiom Pinpointing in Lightweight Description Logics via Horn-SAT Encoding and Conflict Analysis (RS, MV), pp. 84–99.
- CADE-2009-SwiderskiPGFS #analysis #dependence #induction #proving #termination #theorem proving
- Termination Analysis by Dependency Pairs and Inductive Theorem Proving (SS, MP, JG, CF, PSK), pp. 322–338.
- CAV-2009-CernyA #analysis #automation #java
- Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
- CAV-2009-FarzanMS
- Meta-analysis for Atomicity Violations under Nested Locking (AF, PM, FS), pp. 248–262.
- CAV-2009-GuernicG #analysis #hybrid #reachability #using
- Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
- CAV-2009-Gulwani #analysis #bound #complexity #named
- SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
- CAV-2009-JeannetM #abstract domain #library #named #static analysis
- Apron: A Library of Numerical Abstract Domains for Static Analysis (BJ, AM), pp. 661–667.
- CSL-2009-AlurCW #algorithm #analysis #source code
- Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
- CSL-2009-HofmannR #analysis #performance
- Efficient Type-Checking for Amortised Heap-Space Analysis (MH, DR), pp. 317–331.
- ICLP-2009-ChristiansenL #analysis #modelling #optimisation #preprocessor #sequence
- Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis (HC, OTL), pp. 70–83.
- ICLP-2009-Have #analysis #biology #constraints #modelling #sequence #statistics
- Logic-Statistic Models with Constraints for Biological Sequence Analysis (CTH), pp. 549–550.
- ICLP-2009-Voets #analysis #logic programming #research #source code #summary
- Research Summary: Non-termination Analysis of Logic Programs (DV), pp. 553–554.
- ICLP-2009-VoetsS #analysis #approach #logic programming #source code
- A New Approach to Non-termination Analysis of Logic Programs (DV, DDS), pp. 220–234.
- ICST-2009-AngelettiGNPS #analysis #automation #generative #testing
- Automatic Test Generation for Coverage Analysis of ERTMS Software (DA, EG, MN, AP, SS), pp. 303–306.
- ICST-2009-HeckmanW #identification #process #static analysis
- A Model Building Process for Identifying Actionable Static Analysis Alerts (SSH, LAW), pp. 161–170.
- ICST-2009-WedyanAB #automation #detection #effectiveness #fault #predict #refactoring #static analysis #tool support
- The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction (FW, DA, JMB), pp. 141–150.
- ISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage #using
- Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
- ISSTA-2009-BravenboerS #analysis #exception #points-to
- Exception analysis and points-to analysis: better together (MB, YS), pp. 1–12.
- ISSTA-2009-HalfondAO #analysis #identification #interface #precise #testing #web
- Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
- ISSTA-2009-PecheurRB #analysis #formal method #testing
- A formal analysis of requirements-based testing (CP, FR, GB), pp. 47–56.
- LICS-2009-Ghica #game studies #hardware #program analysis #semantics #synthesis
- Applications of Game Semantics: From Program Analysis to Hardware Synthesis (DRG), pp. 17–26.
- LICS-2009-RougemontT #analysis #probability #process #statistics
- Statistic Analysis for Probabilistic Processes (MdR, MT), pp. 299–308.
- RTA-2009-TiuG #analysis #proving
- A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
- SAT-2009-Skvortsov #analysis
- A Theoretical Analysis of Search in GSAT (ESS), pp. 265–275.
- TestCom-FATES-2009-Szabados #analysis #scalability
- Structural Analysis of Large TTCN-3 Projects (KS), pp. 241–246.
- VMCAI-2009-AmjadB #analysis #automation #proving #towards
- Towards Automatic Stability Analysis for Rely-Guarantee Proofs (HA, RB), pp. 14–28.
- VMCAI-2009-Sagiv #analysis #thread
- Thread-Modular Shape Analysis (MS), p. 3.
- CBSE-2008-Tolosana-CalasanzRB #analysis #automation #performance #workflow
- Automating Performance Analysis from Taverna Workflows (RTC, OFR, JAB), pp. 1–15.
- ECSA-2008-LosavioMR #analysis #quality #standard #web #web service
- Web Services Domain Analysis Based on Quality Standards (FL, AM, RR), pp. 354–358.
- QoSA-2008-CortellessaPSV #analysis #architecture #framework #modelling #named #performance #uml
- MOSES: MOdeling Software and platform architEcture in UML 2 for Simulation-based performance analysis (VC, PP, RS, AV), pp. 86–102.
- QoSA-2008-JansenVAV #analysis #architecture
- Sharing the Architectural Knowledge of Quantitative Analysis (AJ, TdV, PA, MvV), pp. 220–234.
- QoSA-2008-MalletR #analysis #distributed #model transformation
- Style-Based Model Transformation for Early Extrafunctional Analysis of Distributed Systems (JM, SR), pp. 55–70.
- QoSA-2008-MorenoM #analysis #modelling #performance
- Model-Driven Performance Analysis (GAM, PM), pp. 135–151.
- WICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy
- Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
- WICSA-2008-MolesiniGCB #analysis #architecture #on the
- On the Quantitative Analysis of Architecture Stability in Aspectual Decompositions (AM, AFG, CvFGC, TVB), pp. 29–38.
- WICSA-2008-MucciniP #analysis #architecture #functional #simulation
- Simulating Software Architectures for Functional Analysis (HM, PP), pp. 289–292.
- ASE-2008-AdnanGDZ #analysis #clustering #component #design #interface #using
- Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
- ASE-2008-BeyerHT #precise #program analysis
- Program Analysis with Dynamic Precision Adjustment (DB, TAH, GT), pp. 29–38.
- ASE-2008-Frisby #analysis #tool support
- Unifying Analysis Tools with Rosetta (NF), pp. 505–508.
- ASE-2008-KollmannG #specification #static analysis #student
- A Specification Language for Static Analysis of Student Exercises (CK, MG), pp. 355–358.
- ASE-2008-MooreS #analysis #design #layout
- Combining the Analysis of Spatial Layout and Text to Support Design Exploration (JMM, FMSI), pp. 379–382.
- ASE-2008-Pinzger #analysis #automation #performance #web
- Automated Web Performance Analysis (MP), pp. 513–516.
- ASE-2008-RakamaricH #automation #axiom #static analysis #using
- Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
- ASE-2008-SchumannGPMB #analysis #parametricity #scalability #simulation #tool support
- Tool Support for Parametric Analysis of Large Software Simulation Systems (JS, KGB, CSP, TM, TB), pp. 497–498.
- ASE-2008-ZhangGC #analysis #automation #clustering #recommendation
- Automated Aspect Recommendation through Clustering-Based Fan-in Analysis (DZ, YG, XC), pp. 278–287.
- CASE-2008-EconomopoulosK #analysis
- Analysis of a simple CONWIP system with impatient customers (AAE, VSK), pp. 291–296.
- CASE-2008-FanKJAB #analysis #architecture #design
- Integrated fixture design and analysis system based on service-oriented architecture (LF, ASK, BNJ, SA, SHB), pp. 656–661.
- CASE-2008-GarciaJMM #analysis #distributed #effectiveness #modelling
- A procedure for modeling and analysis of service-oriented and distributed productive systems (JIG, FJ, RAGM, PEM), pp. 941–946.
- CASE-2008-HuangK #analysis #assembly #design #evaluation #multi #process
- Process capability sensitivity analysis for design evaluation of multi station assembly systems (WH, ZK), pp. 400–405.
- CASE-2008-LeeCAG #analysis #automation #evaluation #image #quality
- Color quantization and image analysis for automated fruit quality evaluation (DJL, YC, JKA, CRG), pp. 194–199.
- CASE-2008-LiuL #analysis #interactive #mobile
- Track-stair and vehicle-manipulator interaction analysis for tracked mobile manipulators climbing stairs (YL, GL), pp. 157–162.
- CASE-2008-MatsumotoUOI #analysis #empirical #process
- Business process analysis to obtain empirical lot sizing rule in printing process (SM, NU, KO, HI), pp. 591–596.
- CASE-2008-MitaniH #analysis #metric #symmetry #using
- Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
- CASE-2008-NieIYTOM #analysis #behaviour #performance #video
- High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
- CASE-2008-SunEHMMMBLM #analysis #automation #biology #integration #multi #user interface
- Integration of user interface, device control, data acquisition and analysis for automated multi-spectral imaging of single biological cells (CSS, JRE, MH, TWM, SKM, SM, LWB, MEL, DRM), pp. 1013–1018.
- CASE-2008-WangLABH #analysis #flexibility #quality
- Quality analysis in flexible manufacturing systems with batch productions (JW, JL, JA, SB, NH), pp. 460–465.
- DAC-2008-AhmadiZ #analysis #approach #hardware #optimisation
- Symbolic noise analysis approach to computational hardware optimization (AA, MZ), pp. 391–396.
- DAC-2008-FeldmannASSBG #analysis #modelling #multi
- Driver waveform computation for timing analysis with multiple voltage threshold driver models (PF, SA, DS, GS, RB, HG), pp. 425–428.
- DAC-2008-GandikotaBS #analysis #modelling #statistics
- Modeling crosstalk in statistical static timing analysis (RG, DB, DS), pp. 974–979.
- DAC-2008-GoelV #analysis #modelling #standard #statistics
- Statistical waveform and current source based standard cell models for accurate timing analysis (AG, SBKV), pp. 227–230.
- DAC-2008-GuzeyWLF #analysis #functional #testing
- Functional test selection based on unsupervised support vector analysis (OG, LCW, JRL, HF), pp. 262–267.
- DAC-2008-HeloueN #analysis #modelling
- Parameterized timing analysis with general delay models and arbitrary variation sources (KRH, FNN), pp. 403–408.
- DAC-2008-ImaiSNM #analysis #framework #parametricity #statistics
- Non-parametric statistical static timing analysis: an SSTA framework for arbitrary distribution (MI, TS, NN, KM), pp. 698–701.
- DAC-2008-KshirsagarEB #analysis #performance
- Analysis and implications of parasitic and screening effects on the high-frequency/RF performance of tunneling-carbon nanotube FETs (CK, MNEZ, KB), pp. 250–255.
- DAC-2008-KumarKS #analysis #framework
- A framework for block-based timing sensitivity analysis (SVK, CVK, SSS), pp. 688–693.
- DAC-2008-LiangM #analysis #execution #modelling #probability
- Cache modeling in probabilistic execution time analysis (YL, TM), pp. 319–324.
- DAC-2008-LiZY #analysis #verification
- Full-chip leakage analysis in nano-scale technologies: mechanisms, variation sources, and verification (TL, WZ, ZY), pp. 594–599.
- DAC-2008-MohalikRDRSPJ #analysis #embedded #latency #model checking #realtime
- Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts (SM, ACR, MGD, SR, PVS, PKP, SJ), pp. 296–299.
- DAC-2008-ParkM #analysis #debugging #locality #named
- IFRA: instruction footprint recording and analysis for post-silicon bug localization in processors (SBP, SM), pp. 373–378.
- DAC-2008-RajaVBG #analysis #modelling #performance
- Transistor level gate modeling for accurate and fast timing, noise, and power analysis (SR, FV, MRB, JG), pp. 456–461.
- DAC-2008-TamPB #analysis #automation #layout #locality #precise #using
- Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
- DAC-2008-VeetilSB #analysis #incremental #monte carlo #performance #statistics
- Efficient Monte Carlo based incremental statistical timing analysis (VV, DS, DB), pp. 676–681.
- DAC-2008-YeZP #analysis #equation #linear #multi
- Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
- DATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance
- An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
- DATE-2008-DubrovaTT #analysis #feedback #on the #synthesis
- On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers (ED, MT, HT), pp. 1286–1291.
- DATE-2008-ElmqvistN #analysis #component #incremental #tool support
- Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems (JE, SNT), pp. 921–927.
- DATE-2008-ErnstJSBC #analysis #formal method #optimisation #performance
- Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
- DATE-2008-FrankWESN #analysis #architecture #design #evaluation #standard #tool support
- Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
- DATE-2008-FrenkilCU #analysis #design #physics #power management
- Power Gating for Ultra-low Leakage: Physics, Design, and Analysis (JF, KC, KU).
- DATE-2008-GhamarianGBS #analysis #data flow #graph #parametricity #throughput
- Parametric Throughput Analysis of Synchronous Data Flow Graphs (AHG, MG, TB, SS), pp. 116–121.
- DATE-2008-GlassLRHT #analysis #network #optimisation #reliability
- Symbolic Reliability Analysis and Optimization of ECU Networks (MG, ML, FR, CH, JT), pp. 158–163.
- DATE-2008-GoelV #analysis #standard
- Current source based standard cell model for accurate signal integrity and timing analysis (AG, SBKV), pp. 574–579.
- DATE-2008-GouraryRUZMG #analysis #injection
- Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
- DATE-2008-HauslerPHHN #analysis #design
- Qalitative and Quantitative Analysis of IC Designs (SH, FP, KH, AH, WN), pp. 935–936.
- DATE-2008-Katoen #analysis #design #embedded #evaluation #modelling #roadmap
- Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
- DATE-2008-LiTM #analysis #grid #named #network #power management
- ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
- DATE-2008-Liu #analysis #probability #statistics
- Signal Probability Based Statistical Timing Analysis (BL), pp. 562–567.
- DATE-2008-RealCCDV #analysis #hardware
- Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis (DR, CC, JC, MD, FV), pp. 1274–1279.
- DATE-2008-Rimolo-DonadioSGKR #analysis #metric #optimisation
- Analysis and Optimization of the Recessed Probe Launch for High Frequency Measurements of PCB Interconnects (RRD, CS, XG, YHK, MBR), pp. 252–255.
- DATE-2008-ShiRWP #analysis #modelling #statistics
- Latch Modeling for Statistical Timing Analysis (SXS, AR, DW, DZP), pp. 1136–1141.
- DATE-2008-SilvaPS #analysis #performance #power management #representation
- Efficient Representation and Analysis of Power Grids (JMSS, JRP, LMS), pp. 420–425.
- DATE-2008-SinanogluM #analysis #composition #reduction #testing
- Analysis of The Test Data Volume Reduction Benefit of Modular SOC Testing (OS, EJM), pp. 182–187.
- DATE-2008-VersenSSD #analysis #locality
- Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
- DATE-2008-VinkBW #analysis #architecture #performance
- Performance Analysis of SoC Architectures Based on Latency-Rate Servers (JPV, KvB, PvdW), pp. 200–205.
- DATE-2008-VytyazHMM #analysis #constraints #design #similarity
- Periodic Steady-State Analysis Augmented with Design Equality Constraints (IV, PKH, UKM, KM), pp. 312–317.
- DATE-2008-WolffPBC #analysis #detection #problem #towards
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
- DATE-2008-ZengC #analysis #polynomial #random
- Deep Submicron Interconnect Timing Model with Quadratic Random Variable Analysis (JKZ, CPC), pp. 1091–1094.
- DATE-2008-ZhouPB #analysis #generative #metric #modelling #using
- Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
- DATE-2008-ZjajoG #analysis #fault #multi
- Diagnostic Analysis of Static Errors in Multi-Step Analog to Digital Converters (AZ, JPdG), pp. 74–79.
- DRR-2008-DejeanM #analysis
- Versatile page numbering analysis (HD, JLM), p. 68150.
- DRR-2008-FumeI #analysis #categorisation #clustering #documentation #modelling #semantics
- Model-based document categorization employing semantic pattern analysis and local structure clustering (KF, YI), p. 68150.
- DRR-2008-Lopresti #fault #impact analysis #recognition
- Measuring the impact of character recognition errors on downstream text analysis (DPL), p. 68150.
- HT-2008-Yalcin #analysis
- Writing on the blog: an assemblage analysis (STY), pp. 253–254.
- PODS-2008-AbiteboulSV #static analysis #xml
- Static analysis of active XML systems (SA, LS, VV), pp. 221–230.
- SIGMOD-2008-XiaoT #analysis #privacy #statistics
- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
- VLDB-2008-AntonellisGC #analysis #graph #query
- Simrank++: query rewriting through link analysis of the click graph (IA, HGM, CCC), pp. 408–421.
- VLDB-2008-BalminCCLOSV #analysis #named #xml
- SEDA: a system for search, exploration, discovery, and analysis of XML Data (AB, LSC, EC, QL, FÖ, SS, ZV), pp. 1408–1411.
- VLDB-2008-PoessN #analysis #challenge #energy #power management
- Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
- VLDB-2008-WeigelPRGC #analysis #collaboration #scalability #web
- Large-scale collaborative analysis and extraction of web data (FW, BP, MR, JG, MC), pp. 1476–1479.
- ITiCSE-2008-Hoo #data analysis #self
- Self-organized maps in scientific data analysis (JTSH), p. 372.
- ITiCSE-2008-KiesmullerB #algorithm #analysis #how #problem
- How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
- ITiCSE-2008-Leach #analysis #process
- Analysis of ABET accreditation as a software process (RJL), p. 356.
- FASE-2008-JurjensSY #analysis #automation #security #using
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- FASE-2008-LaraV #analysis #modelling
- Translating Model Simulators to Analysis Models (JdL, HV), pp. 77–92.
- FASE-2008-MohaGMD #algorithm #analysis #design #detection #fault
- A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
- FoSSaCS-2008-BouyerMR #analysis #automaton #robust
- Robust Analysis of Timed Automata via Channel Machines (PB, NM, PAR), pp. 157–171.
- TACAS-2008-BlancKS #analysis #modelling #named
- Scoot: A Tool for the Analysis of SystemC Models (NB, DK, NS), pp. 467–470.
- TACAS-2008-LalTKR #analysis #bound #concurrent #interprocedural #source code
- Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
- TACAS-2008-TorreMP #analysis #bound #concurrent #queue
- Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
- CSMR-2008-DAmbrosL #analysis #collaboration #evolution #flexibility #framework
- A Flexible Framework to Support Collaborative Software Evolution Analysis (MD, ML), pp. 3–12.
- CSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability #using
- Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
- CSMR-2008-KenmeiAP #analysis #open source #predict #scalability
- Trend Analysis and Issue Prediction in Large-Scale Open Source Systems (BK, GA, MDP), pp. 73–82.
- CSMR-2008-PapastefanatosAVV #analysis #database #evolution #named
- Hecataeus: A What-If Analysis Tool for Database Schema Evolution (GP, FA, YV, PV), pp. 326–328.
- ICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code #using
- CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
- ICPC-2008-RohatgiHR #approach #dynamic analysis
- An Approach for Mapping Features to Code Based on Static and Dynamic Analysis (AR, AHL, JR), pp. 236–241.
- ICSM-2008-DAmbros #analysis #dependence #evolution #fault
- Supporting software evolution analysis with historical dependencies and defect information (MD), pp. 412–415.
- ICSM-2008-Kamiya #analysis #identifier
- Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
- ICSM-2008-YangLLW #analysis #empirical #maintenance
- An empirical analysis on distribution patterns of software maintenance effort (YY, QL, ML, QW), pp. 456–459.
- ICSM-2008-ZhangBJAL #analysis #generative #visual notation
- Query-based filtering and graphical view generation for clone analysis (YZ, HAB, SJ, DA, ML), pp. 376–385.
- ICSM-2008-ZhangGLZ #aspectj #impact analysis #source code
- Change impact analysis for AspectJ programs (SZ, ZG, YL, JZ), pp. 87–96.
- ICSM-2008-Zhu #analysis #fault
- Goal trees and fault trees for root cause analysis (QZ), pp. 436–439.
- MSR-2008-LaymanNGBB #analysis #mining #visual notation
- Mining software effort data: preliminary analysis of visual studio team system data (LL, NN, SG, JB, AB), pp. 43–46.
- MSR-2008-YoshimuraNHK #analysis #approach #detection #named #product line #variability
- FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
- PASTE-2008-JashkiZB #impact analysis #performance #towards
- Towards a more efficient static software change impact analysis method (MAJ, RZ, EB), pp. 84–90.
- PASTE-2008-KhooFHS #static analysis #tool support
- Path projection for user-centered static analysis tools (YPK, JSF, MH, VS), pp. 57–63.
- PASTE-2008-LiuM #data flow #static analysis
- Static analysis for inference of explicit information flow (YL, AM), pp. 50–56.
- PASTE-2008-MarronMHSK #analysis #array #recursion
- Sharing analysis of arrays, collections, and recursive structures (MM, MML, MVH, DS, DK), pp. 43–49.
- PASTE-2008-ZaksP #compilation #program analysis #validation
- Program analysis for compiler validation (AZ, AP), pp. 1–7.
- SCAM-2008-Anderson #industrial #static analysis
- 90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
- SCAM-2008-BinkleyGHLM #analysis
- Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
- SCAM-2008-BoogerdM #analysis #data flow #on the #profiling
- On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
- SCAM-2008-FehnkerHRS #assembly #embedded #program analysis
- Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
- SCAM-2008-GiffhornH #analysis #java #precise #source code #using
- Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
- SCAM-2008-GondowKI #analysis #approach #automation #behaviour #c #named #preprocessor
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
- SCAM-2008-GorbovitskiTRSL #analysis #debugging #performance
- Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
- SCAM-2008-LundbergGL #analysis #performance #points-to #precise
- Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
- SCAM-2008-ScholzZC #analysis #dependence #graph #reachability
- User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
- SCAM-2008-StoneSB #analysis #automation #data flow #set
- Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
- SCAM-2008-SunZ #analysis #points-to
- Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
- SCAM-2008-WangZZ #automation #detection #model checking #program analysis
- Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
- WCRE-2008-CleveH #data-driven #dynamic analysis #reverse engineering #sql
- Dynamic Analysis of SQL Statements for Data-Intensive Applications Reverse Engineering (AC, JLH), pp. 192–196.
- WCRE-2008-GhanbariCA #analysis #aspectj #hybrid #java #query #source code
- A Hybrid Query Engine for the Structural Analysis of Java and AspectJ Programs (HG, CC, VA), pp. 133–137.
- WCRE-2008-GrantCS #analysis #automation #component #concept #independence #using
- Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
- WCRE-2008-HashimotoM #analysis #fine-grained #named
- Diff/TS: A Tool for Fine-Grained Structural Change Analysis (MH, AM), pp. 279–288.
- WCRE-2008-HayesAG #analysis #clustering #named
- PREREQIR: Recovering Pre-Requirements via Cluster Analysis (JHH, GA, YGG), pp. 165–174.
- WCRE-2008-JiangHH #analysis
- Analysis of Procedure Splitability (TJ, MH, YH), pp. 247–256.
- WCRE-2008-SobreiraM #analysis #comprehension #visual notation
- A Visual Trace Analysis Tool for Understanding Feature Scattering (VS, MdAM), pp. 337–338.
- PEPM-2008-PietrzakCPH #analysis #composition #prolog #source code #verification
- A practical type analysis for verification of modular prolog programs (PP, JC, GP, MVH), pp. 61–70.
- PLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code #using
- Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
- PLDI-2008-DilligDA #analysis #scalability
- Sound, complete and scalable path-sensitive analysis (ID, TD, AA), pp. 270–280.
- PLDI-2008-GulwaniSV #constraints #program analysis #theorem proving
- Program analysis as constraint solving (SG, SS, RV), pp. 281–292.
- PLDI-2008-Kahlon #alias #analysis #named #pointer #scalability
- Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
- PLDI-2008-WangXLGWZ #analysis #correlation #memory management
- Conditional correlation analysis for safe region-based memory management (XW, ZX, XL, ZG, XW, ZZ), pp. 45–55.
- SAS-2008-AlbertAGP #automation #bound #cost analysis
- Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis (EA, PA, SG, GP), pp. 221–237.
- SAS-2008-BalakrishnanSIWG #analysis #detection #named #refinement
- SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
- SAS-2008-BauerNNP #analysis #correlation #relational
- Relational Analysis of Correlation (JB, FN, HRN, HP), pp. 32–46.
- SAS-2008-ConwayDNB #analysis #fault #pointer #proving
- Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
- SAS-2008-HornM #analysis
- Flow Analysis, Linearity, and PTIME (DVH, HGM), pp. 255–269.
- SAS-2008-LammichM #analysis #concurrent #monitoring #source code #thread
- Conflict Analysis of Programs with Procedures, Dynamic Thread Creation, and Monitors (PL, MMO), pp. 205–220.
- SAS-2008-Liblit #debugging #static analysis
- Reflections on the Role of Static Analysis in Cooperative Bug Isolation (BL), pp. 18–31.
- SAS-2008-ManevichLSRB #analysis #composition #concurrent
- Heap Decomposition for Concurrent Shape Analysis (RM, TLA, MS, GR, JB), pp. 363–377.
- SAS-2008-MidtgaardJ #abstract interpretation #analysis #approach #control flow
- A Calculational Approach to Control-Flow Analysis by Abstract Interpretation (JM, TPJ), pp. 347–362.
- SAS-2008-Perdrix #abstract interpretation #analysis #quantum
- Quantum Entanglement Analysis Based on Abstract Interpretation (SP), pp. 270–282.
- SAS-2008-PrabhuS #analysis #array #java #pointer #using
- Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
- STOC-2008-ODonnell #analysis #topic
- Some topics in analysis of boolean functions (RO), pp. 569–578.
- FLOPS-2008-AvanziniM #analysis #complexity
- Complexity Analysis by Rewriting (MA, GM), pp. 130–146.
- FLOPS-2008-Kobayashi #program analysis #type system
- Substructural Type Systems for Program Analysis (NK), p. 14.
- FLOPS-2008-Yokouchi #algorithm #analysis #difference #lazy evaluation #strict
- Strictness Analysis Algorithms Based on an Inequality System for Lazy Types (HY), pp. 255–271.
- CIAA-2008-DixonES #analysis
- Automata-Theoretic Analysis of Bit-Split Languages for Packet Scanning (RD, ÖE, TS), pp. 141–150.
- DLT-2008-EsparzaKL #analysis #fixpoint
- Derivation Tree Analysis for Accelerated Fixed-Point Computation (JE, SK, ML), pp. 301–313.
- DLT-2008-KarhumakiS #analysis #theorem
- An Analysis and a Reproof of Hmelevskii’s Theorem (JK, AS), pp. 467–478.
- ICALP-B-2008-Canetti #analysis #composition #performance #security
- Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
- LATA-2008-RegnaultST #2d #analysis #automaton #on the #probability
- On the Analysis of “Simple” 2D Stochastic Cellular Automata (DR, NS, ET), pp. 452–463.
- FM-2008-GawlitzaS #analysis #game studies #precise
- Precise Interval Analysis vs. Parity Games (TG, HS), pp. 342–357.
- FM-2008-UzuncaovaK #analysis #constraints #declarative #modelling #performance
- Constraint Prioritization for Efficient Analysis of Declarative Models (EU, SK), pp. 310–325.
- FM-2008-ZaksP #compilation #named #program analysis #validation
- CoVaC: Compiler Validation by Program Analysis of the Cross-Product (AZ, AP), pp. 35–51.
- SEFM-2008-Ferrara #parallel #source code #static analysis #thread
- Static Analysis of the Determinism of Multithreaded Programs (PF), pp. 41–50.
- SEFM-2008-Spoto #analysis
- Nullness Analysis in Boolean Form (FS), pp. 21–30.
- SFM-2008-DegasperiG #analysis #modelling #probability
- Sensitivity Analysis of Stochastic Models of Bistable Biochemical Reactions (AD, SG), pp. 1–20.
- GT-VMT-2006-KonigK08 #analysis #graph transformation
- Augur 2 — A New Version of a Tool for the Analysis of Graph Transformation Systems (BK, VK), pp. 201–210.
- GT-VMT-2006-KovacsG08 #analysis #formal method #modelling #simulation #workflow
- Simulation and Formal Analysis of Workflow Models (MK, LG), pp. 221–230.
- GT-VMT-2008-BiermannM #analysis #configuration management #independence #rule-based
- Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets (EB, TM).
- GT-VMT-2008-BrielerM #ambiguity #analysis #diagrams #graph grammar #sketching #syntax
- Ambiguity Resolution for Sketched Diagrams by Syntax Analysis Based on Graph Grammars (FB, MM).
- ICGT-2008-EhrigP #analysis #formal method #graph #kernel #model transformation
- Formal Analysis of Model Transformations Based on Triple Graph Rules with Kernels (HE, UP), pp. 178–193.
- ICGT-2008-Hermann #analysis #process #workflow
- Process Construction and Analysis for Workflows Modelled by Adhesive HLR Systems with Application Conditions (FH), pp. 496–498.
- ICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network #using
- Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
- CHI-2008-AdarTD #analysis #scalability #web
- Large scale analysis of web revisitation patterns (EA, JT, STD), pp. 1197–1206.
- CHI-2008-GilbertKS #analysis #empirical #network #social #social media
- The network in the garden: an empirical analysis of social media in rural life (EG, KK, CS), pp. 1603–1612.
- CHI-2008-IsenbergTC #analysis #case study #visual notation
- An exploratory study of visual information analysis (PI, AT, MSTC), pp. 1217–1226.
- CHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #using #web
- AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
- CHI-2008-MiaskiewiczSK #analysis #identification #semantics
- A latent semantic analysis methodology for the identification and creation of personas (TM, TS, KAK), pp. 1501–1510.
- CHI-2008-OConnellC #analysis #interactive #metric #visualisation
- Metrics for measuring human interaction with interactive visualizations for information analysis (TAO, YYC), pp. 1493–1496.
- CHI-2008-PererS #case study #data analysis #statistics #visualisation
- Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis (AP, BS), pp. 265–274.
- CSCW-2008-SteptoeWMGRSRS #analysis #collaboration
- Eye-tracking for avatar eye-gaze and interactional analysis in immersive collaborative virtual environments (WS, RW, AM, EG, JR, PMS, DJR, AS), pp. 197–200.
- SOFTVIS-2008-DietrichYMJD #analysis #clustering #dependence #graph #java
- Cluster analysis of Java dependency graphs (JD, VY, CM, GJ, MD), pp. 91–94.
- SOFTVIS-2008-PichNR #analysis #dependence #graph #visual notation
- Visual analysis of importance and grouping in software dependency graphs (CP, LN, GGR), pp. 29–32.
- SOFTVIS-2008-Stasko #analysis #visualisation
- Visualization for information exploration and analysis: keynote presentation (JTS), pp. 7–8.
- AdaEurope-2008-FecheteKB #ada #framework #program analysis #source code
- A Framework for CFG-Based Static Program Analysis of Ada Programs (RF, GK, JB), pp. 130–143.
- AdaEurope-2008-Pettit #analysis #architecture #concurrent
- Increasing Confidence in Concurrent Software through Architectural Analysis (RGPI), pp. 199–210.
- SIGAda-2008-Safari-SharifabadiC #ada #comprehension #dynamic analysis #metric #quality #source code
- Dynamic analysis of Ada programs for comprehension and quality measurement (ESS, CC), pp. 15–38.
- CAiSE-2008-KongdenfhaBSC #analysis #interactive #named
- SpreadMash: A Spreadsheet-Based Interactive Browsing and Analysis Tool for Data Services (WK, BB, RSP, FC), pp. 343–358.
- CAiSE-2008-NiknafsR #analysis
- Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
- CAiSE-2008-SpiessNWMB #analysis #modelling #performance #process #simulation #ubiquitous
- Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems (PS, DKN, IW, IM, MB), pp. 579–582.
- CAiSE-2008-VaraSP #analysis #information management #modelling #process #requirements
- Business Process Modelling and Purpose Analysis for Requirements Analysis of Information Systems (JLdlV, JS, OP), pp. 213–227.
- EDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality #using
- Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
- EDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
- Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
- ICEIS-AIDSS-2008-SharpanskykhSB #analysis #modelling #safety
- Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
- ICEIS-AIDSS-2008-VolkelA #analysis #design #information management
- Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems (MV, AA), pp. 95–105.
- ICEIS-ISAS2-2008-AgostinhoMMABFRKRC #analysis #approach #aspect-oriented #requirements
- A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis (SA, AMDM, AM, JA, ISB, RF, RR, JK, RAR, PC), pp. 129–136.
- ICEIS-ISAS2-2008-BoukhebouzeAB #analysis #framework #modelling #named #process
- BP-FAMA: Business Process Framework for Agility of Modelling and Analysis (MB, YA, ANB), pp. 368–373.
- ICEIS-ISAS2-2008-BrockeSC #analysis #framework #process #re-engineering #specification #towards
- ECM Systems Analysis and Specification — Towards a Framework for Business Process Re-Engineering (JvB, AS, AC), pp. 345–350.
- ICEIS-ISAS2-2008-GustieneG #analysis #design
- Introducing Service-Orientation into System Analysis and Design (PG, RG), pp. 189–194.
- ICEIS-ISAS2-2008-HuberSK #analysis #framework #health #security
- Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
- ICEIS-ISAS2-2008-LeL #analysis #web
- Realizing Web Application Vulnerability Analysis via AVDL (HTL, PKKL), pp. 259–265.
- ICEIS-ISAS2-2008-MonteiroFBM #analysis #information management #mobile #towards
- An Analysis Pattern for Mobile Geographic Information Systems toward Municipal Urban Administration (BRM, JLF, JLB, WSM), pp. 311–318.
- ICEIS-ISAS2-2008-ParvathyVB #analysis #case study #comparative #correlation #documentation #traceability
- A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
- ICEIS-ISAS2-2008-SantosBBR #analysis #architecture #modelling #semantics
- A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
- ICEIS-ISAS2-2008-Venable #analysis #problem #requirements
- Improving Requirements Analysis — Rigourous Problem Analysis and Formulation with Coloured Cognitive Maps (JRV), pp. 466–470.
- ICEIS-SAIC-2008-Bachlechner #analysis #architecture #integration #semantics #web #web service
- Integration Architectures Based on Semantic Web Services: Fad or Model for the Future? — Findings of a Comprehensive SWOT Analysis (DB), pp. 45–52.
- CIKM-2008-AcharyyaG #analysis #product line
- A spam resistant family of concavo-convex ranks for link analysis (SA, JG), pp. 1505–1506.
- CIKM-2008-DashRMAL #analysis
- Dynamic faceted search for discovery-driven analysis (DD, JR, NM, AA, GML), pp. 3–12.
- CIKM-2008-ItoNHN #analysis #wiki
- Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
- CIKM-2008-NajorkC #analysis #effectiveness #performance
- Efficient and effective link analysis with precomputed salsa maps (MN, NC), pp. 53–62.
- CIKM-2008-NguyenS #analysis #correlation #dataset #performance
- Fast correlation analysis on time series datasets (PN, NS), pp. 787–796.
- ECIR-2008-HannahMO #analysis #graph
- Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
- ECIR-2008-LangWJLX #ad hoc #analysis #dependence #evaluation #retrieval
- An Evaluation and Analysis of Incorporating Term Dependency for Ad-Hoc Retrieval (HL, BW, GJFJ, JL, YX), pp. 602–606.
- ECIR-2008-MohdCR #analysis #comparison
- A Comparison of Named Entity Patterns from a User Analysis and a System Analysis (MM, FC, IR), pp. 679–683.
- ICML-2008-AnWSWCD #analysis #image #kernel #multi #process
- Hierarchical kernel stick-breaking process for multi-task image analysis (QA, CW, IS, EW, LC, DBD), pp. 17–24.
- ICML-2008-HamL #analysis #learning
- Grassmann discriminant analysis: a unifying view on subspace-based learning (JH, DDL), pp. 376–383.
- ICML-2008-LiangJ #analysis #generative #pseudo
- An asymptotic analysis of generative, discriminative, and pseudolikelihood estimators (PL, MIJ), pp. 584–591.
- ICML-2008-LuPV #analysis #component #multi
- Uncorrelated multilinear principal component analysis through successive variance maximization (HL, KNP, ANV), pp. 616–623.
- ICML-2008-MeloMR #analysis #approximate #learning
- An analysis of reinforcement learning with function approximation (FSM, SPM, MIR), pp. 664–671.
- ICML-2008-ParrLTPL #analysis #approximate #feature model #learning #linear #modelling
- An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
- ICML-2008-SalakhutdinovM #analysis #network #on the
- On the quantitative analysis of deep belief networks (RS, IM), pp. 872–879.
- ICML-2008-SunJY #analysis #canonical #correlation
- A least squares formulation for canonical correlation analysis (LS, SJ, JY), pp. 1024–1031.
- ICML-2008-WangM #analysis #using
- Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
- ICML-2008-WangYQZ #analysis #component #composition #feature model
- Dirichlet component analysis: feature extraction for compositional data (HYW, QY, HQ, HZ), pp. 1128–1135.
- ICML-2008-ZhangTK #analysis #approximate #fault #rank
- Improved Nyström low-rank approximation and error analysis (KZ, IWT, JTK), pp. 1232–1239.
- ICPR-2008-Boccignone #analysis #parametricity #video
- Nonparametric Bayesian attentive video analysis (GB), pp. 1–4.
- ICPR-2008-BridsonA #analysis #approach #evaluation #geometry #layout #performance
- A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
- ICPR-2008-ChoiGCC #analysis #independence #kernel
- Kernel oriented discriminant analysis for speaker-independent phoneme spaces (HC, RGO, SC, YC), pp. 1–4.
- ICPR-2008-ChoiMSH #analysis #using
- Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
- ICPR-2008-ChuangLL #analysis #process #representation
- Human activity analysis based on a torso-less representation (JHC, CWL, KHL), pp. 1–4.
- ICPR-2008-DingB #adaptation #analysis
- Adaptive Laplacian eigenfunctions as bases for regression analysis (LD, XB), pp. 1–4.
- ICPR-2008-El-BazCGMSVM #3d #analysis #matter
- Dyslexia diagnostics by 3D texture analysis of cerebral white matter gyrifications (AEB, MC, GLG, MM, AES, EV, RM), pp. 1–4.
- ICPR-2008-El-BazGFE #3d #analysis #approach #automation #detection #image #monitoring
- A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
- ICPR-2008-HardingE #2d #analysis #fourier #gesture #recognition
- The Fourier Analysis of 2DT movement with particular reference to hand gesture recognition (PRGH, TJE), pp. 1–4.
- ICPR-2008-HouLLCWY #analysis #modelling
- Fingerprint orientation analysis with topological modeling (ZH, JL, HKL, TPC, HLW, WYY), pp. 1–4.
- ICPR-2008-IhaddadeneD #analysis #realtime
- Real-time crowd motion analysis (NI, CD), pp. 1–4.
- ICPR-2008-KaholV #analysis #modelling #process #using
- Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
- ICPR-2008-KaiserH #analysis #detection
- Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
- ICPR-2008-KleberSGM #analysis #documentation
- Ancient document analysis based on text line extraction (FK, RS, MG, HM), pp. 1–4.
- ICPR-2008-LablackD #analysis #behaviour
- Analysis of human behaviour in front of a target scene (AL, CD), pp. 1–4.
- ICPR-2008-LiuS #analysis #correlation
- Recovering audio-to-video synchronization by audiovisual correlation analysis (YL, YS), pp. 1–4.
- ICPR-2008-LiZWH #analysis #clustering #multi
- Multiclass spectral clustering based on discriminant analysis (XL, ZZ, YW, WH), pp. 1–4.
- ICPR-2008-LuCC #analysis #image #multi #recognition
- Multilinear analysis based on image texture for face recognition (HL, HC, YWC), pp. 1–4.
- ICPR-2008-MorrisT #adaptation #analysis #process #video
- An adaptive scene description for activity analysis in surveillance video (BM, MMT), pp. 1–4.
- ICPR-2008-NedzvedABMD #analysis #image
- The structure analysis of ultra thin magnetic film images (AN, SA, AB, AM, WD), pp. 1–4.
- ICPR-2008-NohHL #analysis #invariant #recognition
- Regularized discriminant analysis for transformation-invariant object recognition (YKN, JH, DDL), pp. 1–5.
- ICPR-2008-OjansivuRH #analysis #invariant
- Rotation invariant local phase quantization for blur insensitive texture analysis (VO, ER, JH), pp. 1–4.
- ICPR-2008-PaclikLND #analysis #estimation #multi #using
- Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
- ICPR-2008-ParkCDK #analysis #clustering #linear
- Linear discriminant analysis for data with subcluster structure (HP, JC, BLD, JK), pp. 1–4.
- ICPR-2008-ParkSK #analysis
- Facial expression analysis with facial expression deformation (SP, JS, DK), pp. 1–4.
- ICPR-2008-SaitohMK #analysis #performance
- Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
- ICPR-2008-ShafaitBKB #analysis #layout #modelling #statistics #variability
- Background variability modeling for statistical layout analysis (FS, JvB, DK, TMB), pp. 1–4.
- ICPR-2008-ThomasRCB #analysis #comparative
- Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
- ICPR-2008-VillS #analysis #automation #classification
- Automated stroke ending analysis for drawing tool classification (MCV, RS), pp. 1–4.
- ICPR-2008-WangYY #analysis #fuzzy #recognition
- Fuzzy maximum scatter discriminant analysis and its application to face recognition (JW, WY, JY), pp. 1–4.
- ICPR-2008-XiaDG #analysis #invariant
- Locally invariant texture analysis from the topographic map (GSX, JD, YG), pp. 1–4.
- ICPR-2008-YangQ #analysis #component #detection #independence #network #using
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- ICPR-2008-ZengLH #analysis
- Analysis on two fishermethods and a synthesized discriminant projection (ZZ, CL, LH), pp. 1–4.
- KDD-2008-BoutsidisMD #analysis #component #feature model
- Unsupervised feature selection for principal components analysis (CB, MWM, PD), pp. 61–69.
- KDD-2008-GodboleR #analysis #automation #classification #industrial
- Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry (SG, SR), pp. 911–919.
- KDD-2008-GodboleR08a #analysis #automation #industrial
- An integrated system for automatic customer satisfaction analysis in the services industry (SG, SR), pp. 1073–1076.
- KDD-2008-GraepelH #data analysis #modelling #online #scalability
- Large scale data analysis and modelling in online services and advertising (TG, RH), p. 2.
- KDD-2008-KoenigsteinST #analysis #query #string #using
- Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
- KDD-2008-YuFRKRDL #analysis #privacy
- Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
- KDD-2008-ZengMLBM #analysis #predict #using
- Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
- KR-2008-Balbiani #analysis #reasoning #representation #standard
- Time Representation and Temporal Reasoning from the Perspective of Non-Standard Analysis (PB), pp. 695–704.
- RecSys-2008-Domingues #adaptation #analysis #framework #independence #monitoring #web
- An independent platform for the monitoring, analysis and adaptation of web sites (MAD), pp. 299–302.
- RecSys-2008-LakiotakiTM #analysis #multi #named #recommendation
- UTA-Rec: a recommender system based on multiple criteria analysis (KL, ST, NFM), pp. 219–226.
- RecSys-2008-WuWC #analysis #automation #incremental #probability #recommendation #semantics
- Incremental probabilistic latent semantic analysis for automatic question recommendation (HW, YW, XC), pp. 99–106.
- SEKE-2008-AltahatET #analysis #detection #diagrams #graph transformation #interactive #uml
- Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
- SEKE-2008-DrumondGS #analysis #information management #semantics #similarity #web
- A Similarity Analysis Model for Semantic Web Information Filtering Applications (LD, RG, FS), pp. 638–642.
- SEKE-2008-DuZR #concept analysis #release planning #using
- Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
- SEKE-2008-EmerVJ #analysis #database #relational #testing
- Testing Relational Database Schemas with Alternative Instance Analysis (MCFPE, SRV, MJ), pp. 357–362.
- SEKE-2008-GaoKF #analysis #complexity #modelling #testing
- Model-based Test Complexity Analysis for Software Installation Testing (JG, KK, TF), pp. 631–637.
- SEKE-2008-HuS #design pattern #detection #dynamic analysis #java #source code
- Dynamic Analysis and Design Pattern Detection in Java Programs (LH, KS), pp. 842–846.
- SEKE-2008-LiuCH #analysis #named
- PSPCAT: A PSP Data Collection and Analysis Tool (CHL, SLC, YCH), pp. 33–37.
- SEKE-2008-MatalongaG #analysis #fault
- Linking Return on Training Investment with Defects Causal Analysis (SM, TSFG), pp. 42–47.
- SEKE-2008-ParveenATMF #analysis #detection #probability #towards
- Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
- SEKE-2008-Shaffer #domain model #security #source code #static analysis #verification
- A Security Domain Model for Static Analysis and Verification of Software Programs (ABS), pp. 673–678.
- SEKE-2008-WuC #analysis #data transformation
- A Wed-based data Management and Analysis System for CO2 Capture (YW, CWC), pp. 857–860.
- SIGIR-2008-JiangA #analysis #categorisation
- Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
- SIGIR-2008-PengL #analysis #evolution #topic #using
- Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
- SIGIR-2008-WangLZD #analysis #matrix #multi #semantics #summary #symmetry
- Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization (DW, TL, SZ, CHQD), pp. 307–314.
- SIGIR-2008-WanY #analysis #clustering #multi #summary #using
- Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
- SIGIR-2008-XuZL #analysis #image #named #novel #semantics #web
- WISA: a novel web image semantic analysis system (HX, XZ, LL), pp. 777–778.
- ECMDA-FA-2008-FritzscheGFSKB #analysis #modelling #performance #towards
- Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
- ECMDA-FA-2008-WaheedIM #action semantics #analysis #data flow #execution #modelling #semantics #uml
- Data Flow Analysis of UML Action Semantics for Executable Models (TW, MZZI, ZIM), pp. 79–93.
- MoDELS-2008-BernardiMP #analysis #dependence
- Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
- MoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- MoDELS-2008-NugrohoFC #analysis #empirical #fault #modelling #uml
- Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
- MoDELS-2008-ShoushaBL #algorithm #analysis #concurrent #search-based #uml
- A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
- MoDELS-2008-TawhidP #analysis #development #modelling #performance #product line
- Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
- MoDELS-2008-YuFR #modelling #static analysis #uml
- Scenario-Based Static Analysis of UML Class Models (LY, RBF, IR), pp. 234–248.
- MoDELS-2008-BernardiMP #analysis #dependence
- Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
- MoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- MoDELS-2008-NugrohoFC #analysis #empirical #fault #modelling #uml
- Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
- MoDELS-2008-ShoushaBL #algorithm #analysis #concurrent #search-based #uml
- A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
- MoDELS-2008-TawhidP #analysis #development #modelling #performance #product line
- Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
- MoDELS-2008-YuFR #modelling #static analysis #uml
- Scenario-Based Static Analysis of UML Class Models (LY, RBF, IR), pp. 234–248.
- ECOOP-2008-HessellundS #analysis
- Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
- OOPSLA-2008-DagenaisH #java #source code #static analysis
- Enabling static analysis for partial java programs (BD, LJH), pp. 313–328.
- OOPSLA-2008-GopinathanR #analysis #protocol #runtime
- Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
- OOPSLA-2008-KawachiyaOO #analysis #java #memory management #reduction #string
- Analysis and reduction of memory inefficiencies in Java strings (KK, KO, TO), pp. 385–402.
- OOPSLA-2008-NaeemL #analysis #multi
- Typestate-like analysis of multiple interacting objects (NAN, OL), pp. 347–366.
- OOPSLA-2008-ShankarAB #dynamic analysis #lightweight #named
- Jolt: lightweight dynamic analysis and removal of object churn (AS, MA, RB), pp. 127–142.
- LOPSTR-2008-BandaG #analysis #hybrid #linear
- Analysis of Linear Hybrid Systems in CLP (GB, JPG), pp. 55–70.
- LOPSTR-2008-LeuschelLOST #csp #specification #static analysis
- The MEB and CEB Static Analysis for CSP Specifications (ML, ML, JO, JS, ST), pp. 103–118.
- PPDP-2008-Hanus #analysis #functional #logic programming #source code
- Call pattern analysis for functional logic programs (MH), pp. 67–78.
- QAPL-2008-PierroSW #abstract interpretation #analysis #precise #probability #relational
- Relational Analysis and Precision via Probabilistic Abstract Interpretation (ADP, PS, HW), pp. 23–42.
- PADL-2008-EshkevariAC #analysis #aspect-oriented #comprehension #declarative #dependence #reasoning #source code
- Comprehension and Dependency Analysis of Aspect-Oriented Programs through Declarative Reasoning (LME, VA, CC), pp. 35–52.
- POPL-2008-ChangR #analysis #induction #relational
- Relational inductive shape analysis (BYEC, XR), pp. 247–260.
- POPL-2008-Danielsson #analysis #complexity #data type #functional #lightweight
- Lightweight semiformal time complexity analysis for purely functional data structures (NAD), pp. 133–144.
- POPL-2008-McMillan #heuristic #program analysis
- Relevance heuristics for program analysis (KLM), pp. 145–146.
- POPL-2008-ZhengR #alias #analysis #c
- Demand-driven alias analysis for C (XZ, RR), pp. 197–208.
- RE-2008-FeatherHMU #analysis #deployment #requirements #using
- Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
- RE-2008-FinkelsteinHMRZ #analysis #requirements
- “Fairness Analysis” in Requirements Assignments (AF, MH, SAM, JR, YZ), pp. 115–124.
- RE-2008-GlorioPMT #analysis #eclipse #named #plugin
- DaWaRA: An Eclipse Plugin for Usingi* on Data Warehouse Requirement Analysis (OG, JP, JNM, JT), pp. 317–318.
- RE-2008-TanabeUAYKS #analysis #requirements
- Supporting Requirements Change Management in Goal Oriented Analysis (DT, KU, KA, TY, HK, MS), pp. 3–12.
- SAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving #using
- Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
- SAC-2008-AlbertAGPZ #bytecode #cost analysis #java
- Removing useless variables in cost analysis of Java bytecode (EA, PA, SG, GP, DZ), pp. 368–375.
- SAC-2008-AmatoCCMTVGLGM #analysis #detection
- A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
- SAC-2008-AraujoSF #algebra #analysis #process
- HIV drug resistance analysis tool based on process algebra (LVdA, ECS, JEF), pp. 1358–1363.
- SAC-2008-AvolaC #analysis #image
- Encephalic NMR image analysis by textural interpretation (DA, LC), pp. 1338–1342.
- SAC-2008-BallabrigaCS #analysis #approach
- An improved approach for set-associative instruction cache partial analysis (CB, HC, PS), pp. 360–367.
- SAC-2008-BaveraB #analysis #bytecode #data flow #policy #type system
- Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
- SAC-2008-BelohlavekV #concept analysis #dependence
- Adding background knowledge to formal concept analysis via attribute dependency formulas (RB, VV), pp. 938–943.
- SAC-2008-BussBSE #analysis #flexibility #graph #pointer #using
- Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
- SAC-2008-CernuzziZ #analysis #comparative #evaluation
- Profile based comparative analysis for AOSE methodologies evaluation (LC, FZ), pp. 60–65.
- SAC-2008-ChenXN #analysis #detection #fault #specification
- A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
- SAC-2008-CorreaIZF #analysis #image #mobile #using
- Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
- SAC-2008-CostaNFC #analysis #assessment #parametricity
- Parametric cepstral analysis for pathological voice assessment (SCC, BGAN, JMF, SC), pp. 1410–1414.
- SAC-2008-Denner-Broser #algorithm #analysis #problem #using
- An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
- SAC-2008-GarciaH #analysis #functional #metric #using
- Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
- SAC-2008-KaiyaSOKK #analysis #quality #requirements #towards
- Toward quality requirements analysis based on domain specific quality spectrum (HK, TS, AO, NK, KK), pp. 596–601.
- SAC-2008-OliveiraMWS #analysis #locality
- Brain registration and subtraction — improved localization for SPECT analysis (B.R.A.S.I.L.): a computer-aided diagnosis in epilepsy tool kit (LFdO, PMdAM, LWA, ACS), pp. 1390–1394.
- SAC-2008-Papadopoulos #analysis #retrieval #semantics
- Trajectory retrieval with latent semantic analysis (ANP), pp. 1089–1094.
- SAC-2008-Schneider #analysis #hybrid #reachability
- Reachability analysis of generalized polygonal hybrid systems (GS), pp. 327–332.
- SAC-2008-SilvaDSSM #analysis #automation #component #segmentation
- Automated segmentation and volumetric analysis of brain components on MR imaging (MPS, JRD, FLS, ASdS, DCMS), pp. 1422–1423.
- SAC-2008-TakasuA #analysis #documentation #information management #layout #probability
- Information extraction from scanned documents by stochastic page layout analysis (AT, KA), pp. 447–448.
- SAC-2008-WendtGSWNM #analysis #mobile #optimisation #smarttech
- System level power profile analysis and optimization for smart cards and mobile devices (MW, MG, CS, RW, UN, AM), pp. 1884–1888.
- FSE-2008-JiangS #analysis #effectiveness #testing
- Profile-guided program simplification for effective testing and analysis (LJ, ZS), pp. 48–58.
- FSE-2008-MeneelyWSO #analysis #developer #network #predict #social
- Predicting failures with developer networks and social network analysis (AM, LW, WS, JAO), pp. 13–23.
- ICSE-2008-ChenSR #analysis #java #named #predict #runtime
- jPredictor: a predictive runtime analysis tool for java (FC, TFS, GR), pp. 221–230.
- ICSE-2008-JurjensSB #analysis #mobile #modelling #security
- Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
- ICSE-2008-MauleER #database #impact analysis
- Impact analysis of database schema changes (AM, WE, DSR), pp. 451–460.
- ICSE-2008-MoserPS #analysis #comparative #fault #metric #performance #predict
- A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
- ICSE-2008-ReichertKSMH #analysis #network #protocol
- A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
- ICSE-2008-RuthruffPMER #approach #predict #static analysis
- Predicting accurate and actionable static analysis warnings: an experimental approach (JRR, JP, JDM, SGE, GR), pp. 341–350.
- ICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict #using
- Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
- ATEM-J-2006-MiguelBSA #analysis #development #integration #modelling #safety
- Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
- SLE-2008-HageK #analysis #library #named
- Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
- SLE-2008-MoodyH #analysis #diagrams #effectiveness #syntax #uml #visual notation
- Evaluating the Visual Syntax of UML: An Analysis of the Cognitive Effectiveness of the UMLFamily of Diagrams (DLM, JvH), pp. 16–34.
- SPLC-2008-AlvesSBRSRPR #analysis #case study #information retrieval
- An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
- SPLC-2008-HarhurinH #analysis
- Service-Oriented Commonality Analysis Across Existing Systems (AH, JH), pp. 255–264.
- SPLC-2008-NiuE #analysis #clustering #functional #on-demand #product line #requirements
- On-Demand Cluster Analysis for Product Line Functional Requirements (NN, SME), pp. 87–96.
- ASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
- CC-2008-KhedkerK #analysis #data flow #interprocedural #performance #precise #string
- Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
- CC-2008-LogozzoF #analysis #bytecode #on the #source code
- On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
- CC-2008-MarronHKS #analysis #graph #modelling #performance
- Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models (MM, MVH, DK, DS), pp. 245–259.
- CC-2008-RepsB #analysis #bytecode
- Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
- CC-2008-RountevSX #analysis #data flow #ide #library #object-oriented #scalability
- IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries (AR, MS, G(X), pp. 53–68.
- CGO-2008-Griesemer #data analysis #design #parallel
- Parallelism by design: data analysis with sawzall (RG), p. 3.
- CGO-2008-ThakurG #analysis #data flow
- Comprehensive path-sensitive data-flow analysis (AVT, RG), pp. 55–63.
- CGO-2008-ZhaoCW #analysis #manycore #named #pipes and filters #profiling
- Pipa: pipelined profiling and analysis on multi-core systems (QZ, IC, WFW), pp. 185–194.
- CGO-2008-ZhuangKSC #analysis #difference #framework #named #performance #virtual machine
- Perfdiff: a framework for performance difference analysis in a virtual machine environment (XZ, SK, MJS, JDC), pp. 4–13.
- HPCA-2008-KimGWB #analysis #performance #using
- System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
- LCTES-2008-AnandL #analysis #embedded #robust #scheduling
- Robust and sustainable schedulability analysis of embedded software (MA, IL), pp. 61–70.
- LCTES-2008-ReinekeG #analysis #policy
- Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
- PPoPP-2008-ChandraSSB #analysis #data type #distributed #locality #type inference
- Type inference for locality analysis of distributed data structures (SC, VAS, VS, RB), pp. 11–22.
- PPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling #using
- Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
- PPoPP-2008-WangYFDWJ #analysis #automation #source code
- Automated application-level checkpointing based on live-variable analysis in MPI programs (PW, XY, HF, YD, ZW, JJ), pp. 273–274.
- CAV-2008-BackesLMP #abstraction #analysis #protocol #security
- The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
- CAV-2008-BerdineLMRS #analysis #concurrent #quantifier #thread
- Thread Quantification for Concurrent Shape Analysis (JB, TLA, RM, GR, SS), pp. 399–413.
- CAV-2008-Cremers #analysis #protocol #security #verification
- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
- CAV-2008-GulavaniG #abstract domain #abstraction #analysis
- A Numerical Abstract Domain Based on Expression Abstraction and Max Operator with Application in Timing Analysis (BSG, SG), pp. 370–384.
- CAV-2008-GulwaniT #analysis #approach #constraints #hybrid
- Constraint-Based Approach for Analysis of Hybrid Systems (SG, AT), pp. 190–203.
- CAV-2008-HolzerSTV #dynamic analysis #generative #metric #named #testing
- FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement (AH, CS, MT, HV), pp. 209–213.
- CAV-2008-KimJRSPKS #analysis #random #simulation
- Application of Formal Word-Level Analysis to Constrained Random Simulation (HK, HJ, KR, PS, JP, RPK, FS), pp. 487–490.
- CAV-2008-KinderV #framework #named #static analysis
- Jakstab: A Static Analysis Platform for Binaries (JK, HV), pp. 423–427.
- CAV-2008-LalR #analysis #bound #concurrent
- Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
- CAV-2008-YangLBCCDO #analysis #scalability
- Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
- ICLP-2008-Lassen #analysis #sequence
- Biosequence Analysis in PRISM (OTL), pp. 809–810.
- ICLP-2008-PilozziS #analysis #revisited #termination
- Termination Analysis of CHR Revisited (PP, DDS), pp. 501–515.
- ICLP-2008-SchulteS #bound #dynamic analysis
- Dynamic Analysis of Bounds Versus Domain Propagation (CS, PJS), pp. 332–346.
- ICLP-2008-Vidal #analysis #effectiveness #partial evaluation #predict
- Trace Analysis for Predicting the Effectiveness of Partial Evaluation (GV), pp. 790–794.
- ICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented #using
- A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
- ICST-2008-SherriffW #composition #empirical #impact analysis #using
- Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
- IJCAR-2008-AvanziniMS #analysis #automation #complexity
- Automated Implicit Computational Complexity Analysis (System Description) (MA, GM, AS), pp. 132–138.
- IJCAR-2008-HirokawaM #analysis #automation #complexity #dependence
- Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
- ISSTA-2008-DoR #analysis #modelling #testing #using
- Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
- ISSTA-2008-DorLLSW #enterprise #impact analysis #slicing
- Customization change impact analysis for erp professionals via program slicing (ND, TLA, SL, MS, DW), pp. 97–108.
- ISSTA-2008-LoginovYCFRN #analysis #safety #verification
- Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
- ISSTA-2008-XuR #analysis #points-to #scalability
- Merging equivalent contexts for scalable heap-cloning-based context-sensitive points-to analysis (G(X, AR), pp. 225–236.
- LICS-2008-Kahlon #abstraction #analysis #approach #concurrent #data flow #source code
- Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs (VK), pp. 181–192.
- SAT-2008-AudemardBHJS #analysis #framework
- A Generalized Framework for Conflict Analysis (GA, LB, YH, SJ, LS), pp. 21–27.
- TAP-2008-DunetsSR #analysis #bound #data type #relational
- Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
- TAP-2008-Ferrara #abstract interpretation #memory management #static analysis
- Static Analysis Via Abstract Interpretation of the Happens-Before Memory Model (PF), pp. 116–133.
- TestCom-FATES-2008-GrozLPS #analysis #composition #reachability #testing #verification
- Modular System Verification by Inference, Testing and Reachability Analysis (RG, KL, AP, MS), pp. 216–233.
- TestCom-FATES-2008-WangH #analysis #concurrent #generative #realtime #testing
- Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis (FW, GDH), pp. 234–249.
- VMCAI-2008-GroceJ #dynamic analysis #model checking
- Extending Model Checking with Dynamic Analysis (AG, RJ), pp. 142–156.
- VMCAI-2008-Mendez-LojoH #analysis #precise #set #source code
- Precise Set Sharing Analysis for Java-Style Programs (MML, MVH), pp. 172–187.
- VMCAI-2008-Pistoia #program analysis #programming language #security
- Program Analysis and Programming Languages for Security (MP), p. 7.
- ECSA-2007-Zalewski #analysis #architecture #development #scalability
- Beyond ATAM: Architecture Analysis in the Development of Large Scale Software Systems (AZ), pp. 92–105.
- WICSA-2007-Apte #analysis #distributed #performance
- Performance Analysis of Distributed Software Systems: Approaches Based on Queueing Theory (VA), p. 39.
- WICSA-2007-Florentz #analysis #architecture #evaluation #optimisation #representation
- Inside Architecture Evaluation: Analysis and Representation of Optimization Potential (BF), p. 3.
- WICSA-2007-SangwanH #analysis #architecture #design #object-oriented
- Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
- ASE-2007-ArtziKGE #analysis
- Combined static and dynamic mutability analysis (SA, AK, DG, MDE), pp. 104–113.
- ASE-2007-DwyerP #cost analysis #dynamic analysis #static analysis #type system
- Residual dynamic typestate analysis exploiting static analysis: results to reformulate and reduce the cost of dynamic analysis (MBD, RP), pp. 124–133.
- ASE-2007-ShiriHR #analysis #feature model #interactive #maintenance #perspective
- Feature interaction analysis: a maintenance perspective (MS, JH, JR), pp. 437–440.
- ASE-2007-ZaraketAK #program analysis
- Sequential circuits for program analysis (FAZ, AA, SK), pp. 114–123.
- CASE-2007-BogdanKFD #analysis #design #fuzzy
- Fuzzy Arithmetic-based Stability Analysis and Design of Fuzzy Controller (SB, ZK, IF, ID), pp. 968–973.
- CASE-2007-BraunP #analysis
- Analysis of the Effects of Truncation on the EWMA Observer (MWB, NSP), pp. 472–477.
- CASE-2007-ChandrashekarN #analysis #coordination #network
- A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
- CASE-2007-LiW #analysis #approach #reliability
- An Importance Sampling Based Approach for Reliability Analysis (FL, TW), pp. 956–961.
- CASE-2007-MitaniYH #analysis #using
- Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
- CASE-2007-PanH #analysis
- Diagnosability Analysis and Sensor Selection in Discrete-Event Systems with Permanent Failures (JP, SHZ), pp. 869–874.
- CASE-2007-SunFSFCD #analysis #bibliography #paradigm
- Decision Paradigms in the Semiconductor Supply Chain: A Survey and Analysis (YS, ALF, DLS, JWF, TEC, BMD), pp. 106–110.
- CASE-2007-WangL #analysis #approximate #modelling #reliability
- Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models (CW, JL), pp. 398–403.
- CASE-2007-YiDZ0 #analysis #clustering #linear #throughput #tool support
- Throughput Analysis of Linear Cluster Tools (JY, SD, MTZ, PvdM), pp. 1063–1068.
- CASE-2007-YooG #analysis #network #process
- Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
- DAC-2007-AmbroseRP #analysis #injection #named #random
- RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
- DAC-2007-BurnsKMBTD #analysis #comparative #design #statistics
- Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
- DAC-2007-ChengXH #analysis #statistics
- Non-Linear Statistical Static Timing Analysis for Non-Gaussian Variation Sources (LC, JX, LH), pp. 250–255.
- DAC-2007-DadgourB #analysis #design #hybrid #power management
- Design and Analysis of Hybrid NEMS-CMOS Circuits for Ultra Low-Power Applications (HFD, KB), pp. 306–311.
- DAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics #using
- Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
- DAC-2007-GandikotaCBSB #analysis #set
- Top-k Aggressors Sets in Delay Noise Analysis (RG, KC, DB, DS, MRB), pp. 174–179.
- DAC-2007-GhodratLR #analysis #estimation #hybrid #using
- Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
- DAC-2007-HagiescuBCSGR #analysis #network #performance
- Performance Analysis of FlexRay-based ECU Networks (AH, UDB, SC, PS, PVVG, SR), pp. 284–289.
- DAC-2007-HariziHOB #analysis #modelling #performance
- Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
- DAC-2007-HuangTKC #analysis #case study #flexibility #reliability
- Reliability Analysis for Flexible Electronics: Case Study of Integrated a-Si: H TFT Scan Driver (TCH, HYT, CPK, KTC), pp. 966–969.
- DAC-2007-KirnerS #analysis #execution #modelling #worst-case
- Modeling the Function Cache for Worst-Case Execution Time Analysis (RK, MS), pp. 471–476.
- DAC-2007-LiY #analysis #power management #statistics
- Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage (TL, ZY), pp. 99–102.
- DAC-2007-Natale #analysis #challenge
- Virtual Platforms and Timing Analysis: Status, Challenges and Future Directions (MDN), pp. 551–555.
- DAC-2007-PimentelP #analysis
- Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application (JRP, JP), pp. 290–293.
- DAC-2007-RamalingamSNOP #analysis #composition #modelling #using
- Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
- DAC-2007-SeokHSB #analysis #design #optimisation
- Analysis and Optimization of Sleep Modes in Subthreshold Circuit Design (MS, SH, DS, DB), pp. 694–699.
- DAC-2007-SinghalBSLNC #analysis #modelling #simulation
- Modeling and Analysis of Non-Rectangular Gate for Post-Lithography Circuit Simulation (RS, AB, ARS, FL, SRN, YC), pp. 823–828.
- DAC-2007-SundaresanM #analysis #distributed
- An Analysis of Timing Violations Due to Spatially Distributed Thermal Effects in Global Wires (KS, NRM), pp. 515–520.
- DAC-2007-VenkataramaniBCG #analysis
- Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
- DAC-2007-YuDFL #analysis #framework #nondeterminism #process #statistics
- A Framework for Accounting for Process Model Uncertainty in Statistical Static Timing Analysis (GY, WD, ZF, PL), pp. 829–834.
- DATE-2007-0004XJ #analysis #novel #statistics
- A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
- DATE-2007-AarajRRJ #analysis #energy #execution #framework
- Energy and execution time analysis of a software-based trusted platform module (NA, AR, SR, NKJ), pp. 1128–1133.
- DATE-2007-BauerPT #analysis #hybrid #modelling
- Tool-support for the analysis of hybrid systems and models (AB, MP, MT), pp. 924–929.
- DATE-2007-BondarevCW #analysis #component #design #embedded #named #performance #tool support
- CARAT: a toolkit for design and performance analysis of component-based embedded systems (ERVB, MRVC, PHNdW), pp. 1024–1029.
- DATE-2007-BorremansLWR #analysis #multi #using
- Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
- DATE-2007-BronckersSPVR #analysis #interactive #simulation #verification
- Interactive presentation: Simulation methodology and experimental verification for the analysis of substrate noise on LC-VCO’s (SB, CS, GVdP, GV, YR), pp. 1520–1525.
- DATE-2007-ChenZLC #analysis #performance #statistics
- Fast statistical circuit analysis with finite-point based transistor model (MC, WZ, FL, YC), pp. 1391–1396.
- DATE-2007-ChoudhuryM #analysis #logic #reliability #scalability
- Accurate and scalable reliability analysis of logic circuits (MRC, KM), pp. 1454–1459.
- DATE-2007-DasM #analysis
- Sensitivity analysis for fault-analysis and tolerance in RF front-end circuitry (TD, PRM), pp. 1277–1282.
- DATE-2007-DuboisMAWLW #analysis #embedded #quality
- Test quality analysis and improvement for an embedded asynchronous FIFO (TD, EJM, MA, PW, EL, CW), pp. 859–864.
- DATE-2007-ErdoganO #analysis #using
- An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
- DATE-2007-GargM #analysis #design #interactive #multi #process #throughput
- Interactive presentation: System-level process variation driven throughput analysis for single and multiple voltage-frequency island designs (SG, DM), pp. 403–408.
- DATE-2007-HuangT #analysis #correlation #multi #performance #using
- Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
- DATE-2007-JuCR #analysis #scheduling
- Accounting for cache-related preemption delay in dynamic priority schedulability analysis (LJ, SC, AR), pp. 1623–1628.
- DATE-2007-LasbouyguesWAM #analysis
- Temperature and voltage aware timing analysis: application to voltage drops (BL, RW, NA, PM), pp. 1012–1017.
- DATE-2007-Miskov-ZivanovM #analysis #fault
- Soft error rate analysis for sequential circuits (NMZ, DM), pp. 1436–1441.
- DATE-2007-NardiTNAGLS #analysis #design #statistics
- Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
- DATE-2007-NeyGLPVB #analysis #fault
- Slow write driver faults in 65nm SRAM technology: analysis and March test solution (AN, PG, CL, SP, AV, MB), pp. 528–533.
- DATE-2007-OgrasM #analysis #modelling #performance
- Analytical router modeling for networks-on-chip performance analysis (ÜYO, RM), pp. 1096–1101.
- DATE-2007-PanC #analysis #component #fault #framework #quality #reliability
- A framework for system reliability analysis considering both system error tolerance and component test quality (SJ(RP, KTC), pp. 1581–1586.
- DATE-2007-SchlieckerSE #analysis #composition #data flow #graph #integration #performance
- Performance analysis of complex systems by integration of dataflow graphs and compositional performance analysis (SS, SS, RE), pp. 273–278.
- DATE-2007-TadesseSLBG #analysis #modelling #satisfiability #using
- Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
- DATE-2007-TannirK #analysis #performance
- Efficient nonlinear distortion analysis of RF circuits (DT, RK), pp. 255–260.
- DATE-2007-TiwaryP #analysis #named
- WAVSTAN: waveform based variational static timing analysis (SKT, JRP), pp. 1000–1005.
- DATE-2007-XuRC #analysis #interactive #pipes and filters #power management
- Interactive presentation: Analysis of power consumption and BER of flip-flop based interconnect pipelining (JX, AR, MHC), pp. 1218–1223.
- DATE-2007-ZhangOSFKB #analysis #approach #named #parametricity #process
- CMCal: an accurate analytical approach for the analysis of process variations with non-gaussian parameters and nonlinear functions (MZ, MO, DS, MF, HK, EB), pp. 243–248.
- DocEng-2007-ZouLT #analysis #approach #html #markov
- Structure and content analysis for html medical articles: a hidden markov model approach (JZ, DXL, GRT), pp. 199–201.
- DRR-2007-ZouLT #analysis #layout #online
- Online medical journal article layout analysis (JZ, DXL, GRT).
- HT-2007-HalveyK #analysis #online #video
- Analysis of online video search and sharing (MH, MTK), pp. 217–226.
- ICDAR-2007-AntonacopoulosB #analysis #framework #layout #performance
- Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
- ICDAR-2007-BelaidRF #analysis #data transformation #documentation #image #representation #xml
- XML Data Representation in Document Image Analysis (AB, YR, IF), pp. 78–82.
- ICDAR-2007-BoussellaaZTAB #analysis #documentation #named #preprocessor
- PRAAD: Preprocessing and Analysis Tool for Arabic Ancient Documents (WB, AZ, BT, AMA, AB), pp. 1058–1062.
- ICDAR-2007-BulacuKSZ #analysis #documentation #layout
- Layout Analysis of Handwritten Historical Documents for Searching the Archive of the Cabinet of the Dutch Queen (MB, RvK, LS, TvdZ), pp. 357–361.
- ICDAR-2007-GazzahA #analysis #identification #using
- Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
- ICDAR-2007-HerouxBAT #analysis #automation #comprehension #documentation #generative #image
- Automatic Ground-truth Generation for Document Image Analysis and Understanding (PH, EB, SA, ÉT), pp. 476–480.
- ICDAR-2007-HiranoOOY #analysis #documentation #information management #layout
- Text and Layout Information Extraction from Document Files of Various Formats Based on the Analysis of Page Description Language (TH, YO, YO, FY), pp. 262–266.
- ICDAR-2007-KoklaPK #analysis #image
- Ink Discrimination Based on Co-occurrence Analysis of Visible and Infrared Images (VK, AP, VK), pp. 1148–1152.
- ICDAR-2007-KwonP #analysis #implementation #recognition
- Implementation of Content Analysis System for Recognition of Journals_ Table of Contents (YBK, JP), pp. 1018–1022.
- ICDAR-2007-LemaitreGP #2d #analysis #approach #layout #markov
- Preliminary experiments in layout analysis of handwritten letters based on textural and spatial information and a 2D Markovian approach (ML, EG, FJP), pp. 1023–1027.
- ICDAR-2007-MinagawaFTF #analysis #image #layout #logic
- Logical Structure Analysis for Form Images with Arbitrary Layout by Belief Propagation (AM, YF, HT, KF), pp. 714–718.
- ICDAR-2007-SekiFNSM #analysis #documentation #information management #using
- Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
- ICDAR-2007-Silva #analysis #documentation #metric #performance
- New Metrics for Evaluating Performance in Document Analysis Tasks_Application to the Table Case (ACeS), pp. 481–485.
- ICDAR-2007-SmirnovaW #analysis #aspect-oriented
- Aspects of Mathematical Expression Analysis in Arabic Handwriting (ESS, SMW), pp. 1183–1187.
- ICDAR-2007-TerradesTV #analysis #bibliography #documentation
- A Review of Shape Descriptors for Document Analysis (ORT, ST, EV), pp. 227–231.
- SIGMOD-2007-RusuD #analysis #sketching #statistics
- Statistical analysis of sketch estimators (FR, AD), pp. 187–198.
- SIGMOD-2007-StahlbergML #analysis #database #forensics #privacy
- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
- VLDB-2007-BansalK #analysis #named #online
- BlogScope: A System for Online Analysis of High Volume Text Streams (NB, NK), pp. 1410–1413.
- VLDB-2007-ParreiraMBCW #analysis #community #social
- P2P Authority Analysis for Social Communities (JXP, SM, MB, TC, GW), pp. 1398–1401.
- VLDB-2007-PossNW #analysis #why
- Why You Should Run TPC-DS: A Workload Analysis (MP, RON, DW), pp. 1138–1149.
- CSEET-2007-SobelC #analysis #design #formal method
- Supporting the Formal Analysis of Software Designs (AEKS, SC), pp. 123–132.
- CSEET-2007-Staron #analysis #learning #student #using
- Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
- CSEET-2007-TakemuraNHM #analysis #education #motivation #programming
- Analysis of the Relation between the Teaching Materials and Motivation in Programming Education (YT, HN, KLH, KiM), pp. 317–326.
- ITiCSE-2007-Bower #analysis #concept #independence #online
- Independent, synchronous and asynchronous an analysis of approaches to online concept formation (MB), pp. 141–145.
- WRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #using #verification
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
- WRLA-2006-KatelmanM07 #analysis #co-evolution #design #hardware #semantics
- A Rewriting Semantics for ABEL with Applications to Hardware/Software Co-Design and Analysis (MK, JM), pp. 47–60.
- ESOP-2007-AlbertAGPZ #bytecode #cost analysis #java
- Cost Analysis of Java Bytecode (EA, PA, SG, GP, DZ), pp. 157–172.
- ESOP-2007-GaubertGTZ #policy #relational #static analysis
- Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
- ESOP-2007-GulwaniT #analysis #interprocedural #summary
- Computing Procedure Summaries for Interprocedural Analysis (SG, AT), pp. 253–267.
- ESOP-2007-RinetzkyPRSY #analysis #composition #encapsulation #source code
- Modular Shape Analysis for Dynamically Encapsulated Programs (NR, APH, GR, MS, EY), pp. 220–236.
- ESOP-2007-SuenagaK #analysis #calculus #concurrent #type system
- Type-Based Analysis of Deadlock for a Concurrent Calculus with Interrupts (KS, NK), pp. 490–504.
- ESOP-2007-Versari #analysis #calculus #comparative
- A Core Calculus for a Comparative Analysis of Bio-inspired Calculi (CV), pp. 411–425.
- FASE-2007-CortellessaMI #analysis #framework #non-functional #performance #reliability
- Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework (VC, ADM, PI), pp. 57–71.
- FASE-2007-EdwardsMM #architecture #distributed #dynamic analysis
- Scenario-Driven Dynamic Analysis of Distributed Architectures (GE, SM, NM), pp. 125–139.
- FoSSaCS-2007-BartolettiDFZ #analysis #resource management
- Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
- FoSSaCS-2007-HagueO #analysis #automaton #higher-order
- Symbolic Backwards-Reachability Analysis for Higher-Order Pushdown Systems (MH, CHLO), pp. 213–227.
- TACAS-2007-AnandOH #analysis #execution #program transformation #symbolic computation
- Type-Dependence Analysis and Program Transformation for Symbolic Execution (SA, AO, MJH), pp. 117–133.
- TACAS-2007-BlomCLOPPDW #analysis #case study #distributed
- Distributed Analysis with µCRL: A Compendium of Case Studies (SB, JRC, BL, SO, JP, JvdP, MTD, AW), pp. 683–689.
- TACAS-2007-CortierKS #analysis #automation #security
- Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
- TACAS-2007-FarzanM #analysis #concurrent #data flow #source code
- Causal Dataflow Analysis for Concurrent Programs (AF, PM), pp. 102–116.
- TACAS-2007-FriasPM #alloy #analysis #specification #verification
- Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
- TACAS-2007-ManevichBCRS #analysis #composition #graph
- Shape Analysis by Graph Decomposition (RM, JB, BC, GR, MS), pp. 3–18.
- CSMR-2007-Boogerd #evolution #program analysis #reliability
- Supporting Reliable Software Evolution through Program Analysis (CB), pp. 341–344.
- CSMR-2007-LoeschP #concept analysis #product line #using #variability
- Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
- CSMR-2007-Staiger #source code #static analysis #user interface #visual notation
- Static Analysis of Programs with Graphical User Interface (SS), pp. 252–264.
- CSMR-2007-Stoermer #analysis #architecture #quality #re-engineering
- Software Quality Attribute Analysis by Architecture Reconstruction (SQUA3RE) (CS), pp. 361–364.
- ICPC-2007-PoshyvanykM #concept analysis #information retrieval #source code
- Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code (DP, AM), pp. 37–48.
- ICPC-2007-ZhangI #analysis #fault
- Error Report Driven Post-Mortem Analysis (YZ, SPI), pp. 208–220.
- ICSM-2007-BrandBS #analysis #debugging #detection
- Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
- ICSM-2007-Bruntink #analysis #legacy
- Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems (MB), pp. 499–500.
- ICSM-2007-CapraFM #analysis #empirical #maintenance #open source
- The Economics of Open Source Software: An Empirical Analysis of Maintenance Costs (EC, CF, FM), pp. 395–404.
- ICSM-2007-Chaabane #analysis #detection
- Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
- ICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing #using
- Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
- ICSM-2007-DongG #analysis #dependence #object-oriented
- System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
- ICSM-2007-LuccaFT #classification #concept analysis #using #web
- Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
- ICSM-2007-McMasterM #analysis #detection #fault #probability #reduction #testing
- Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
- MSR-2007-HerraizGR07a #analysis #eclipse #using
- Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
- MSR-2007-LivieriHMI #analysis #evolution #kernel #linux #using
- Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
- MSR-2007-MorisakiMMTM #data analysis #fault #mining
- Defect Data Analysis Based on Extended Association Rule Mining (SM, AM, TM, HT, KiM), p. 3.
- MSR-2007-RigbyH #analysis #developer #what
- What Can OSS Mailing Lists Tell Us? A Preliminary Psychometric Text Analysis of the Apache Developer Mailing List (PCR, AEH), p. 23.
- PASTE-2007-AyewahPMPZ #fault #static analysis
- Evaluating static analysis defect warnings on production software (NA, WP, JDM, JP, YZ), pp. 1–8.
- PASTE-2007-Brown #analysis #composition #integration #named
- AWE: improving software analysis through modular integration of static and dynamic analyses (REB), pp. 69–74.
- PASTE-2007-FosterHP #quality #static analysis
- Improving software quality with static analysis (JSF, MWH, WP), pp. 83–84.
- PASTE-2007-LeS #analysis #detection
- Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
- PASTE-2007-MarronSHK #analysis #library
- Heap analysis in the presence of collection libraries (MM, DS, MVH, DK), pp. 31–36.
- PASTE-2007-Milanova #analysis #java #points-to
- Light context-sensitive points-to analysis for java (AM), pp. 25–30.
- PASTE-2007-PollockVSHFM #natural language #program analysis
- Introducing natural language program analysis (LLP, KVS, DCS, EH, ZPF, KM), pp. 15–16.
- PASTE-2007-QianXM #alias #analysis #data flow #dependence
- Interstatement must aliases for data dependence analysis of heap locations (JQ, BX, HM), pp. 17–24.
- PASTE-2007-ShepherdPV #case study #natural language #program analysis #reverse engineering
- Case study: supplementing program analysis with natural language analysis to improve a reverse engineering task (DCS, LLP, KVS), pp. 49–54.
- PASTE-2007-XuPV #analysis #java #source code
- Dynamic purity analysis for java programs (HX, CJFP, CV), pp. 75–82.
- SCAM-2007-GutzmannLL #analysis #points-to #towards
- Towards Path-Sensitive Points-to Analysis (TG, JL, WL), pp. 59–68.
- SCAM-2007-Marinescu #analysis #design #enterprise #named
- DATES: Design Analysis Tool for Enterprise Systems (CM), pp. 157–158.
- SCAM-2007-MoorVHAEOST #analysis #source code
- Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
- WCRE-2007-Cornelissen #architecture #dynamic analysis #re-engineering
- Dynamic Analysis Techniques for the Reconstruction of Architectural Views (BC), pp. 281–284.
- PEPM-2007-MollerS #graph #program analysis #xml
- XML graphs in program analysis (AM, MIS), pp. 1–10.
- PLDI-2007-CheremPR #analysis #detection #memory management #using
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- PLDI-2007-GenevesLS #performance #static analysis #xml
- Efficient static analysis of XML paths and types (PG, NL, AS), pp. 342–351.
- PLDI-2007-GotsmanBCS #analysis #thread
- Thread-modular shape analysis (AG, JB, BC, MS), pp. 266–277.
- PLDI-2007-GuoVA #analysis #induction #recursion #synthesis
- Shape analysis with inductive recursion synthesis (BG, NV, DIA), pp. 256–265.
- PLDI-2007-HardekopfL #analysis #performance #pointer
- The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
- PLDI-2007-LattnerLA #analysis #points-to
- Making context-sensitive points-to analysis with heap cloning practical for the real world (CL, AL, VSA), pp. 278–289.
- PLDI-2007-NarayanasamyWTEC #analysis #automation
- Automatically classifying benign and harmful data racesallusing replay analysis (SN, ZW, JT, AE, BC), pp. 22–31.
- PLDI-2007-WassermannS #analysis #injection #precise #web
- Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
- SAS-2007-BauerW #abstraction #communication #static analysis
- Static Analysis of Dynamic Communication Systems by Partner Abstraction (JB, RW), pp. 249–264.
- SAS-2007-CalcagnoDOY #analysis
- Footprint Analysis: A Shape Analysis That Discovers Preconditions (CC, DD, PWO, HY), pp. 402–418.
- SAS-2007-ChangRN #analysis #invariant
- Shape Analysis with Structural Invariant Checkers (BYEC, XR, GCN), pp. 384–401.
- SAS-2007-GopanR #static analysis
- Guided Static Analysis (DG, TWR), pp. 349–365.
- SAS-2007-HardekopfL #analysis #equivalence #pointer
- Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
- SAS-2007-KamilY #analysis #distributed #pointer #source code
- Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
- SAS-2007-LerouxS #analysis #data flow
- Accelerated Data-Flow Analysis (JL, GS), pp. 184–199.
- SAS-2007-MagillBCC #analysis
- Arithmetic Strengthening for Shape Analysis (SM, JB, EMC, BC), pp. 419–436.
- SAS-2007-Mycroft #analysis #design #evolution #hardware #motivation #programming language
- Programming Language Design and Analysis Motivated by Hardware Evolution (AM), pp. 18–33.
- SAS-2007-PayetS #analysis #bytecode #java
- Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
- SAS-2007-SankaranarayananIG #program analysis #using
- Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
- STOC-2007-BorgsCDR #analysis
- First to market is not everything: an analysis of preferential attachment with fitness (CB, JTC, CD, SR), pp. 135–144.
- STOC-2007-NissimRS #data analysis
- Smooth sensitivity and sampling in private data analysis (KN, SR, AS), pp. 75–84.
- IFM-2007-KongOF #algebra #analysis #formal method
- Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System (WK, KO, KF), pp. 393–412.
- IFM-2007-PostK #linux #static analysis #verification
- Integrated Static Analysis for Linux Device Driver Verification (HP, WK), pp. 518–537.
- SFM-2007-GribaudoT #analysis #modelling #performance
- Fluid Models in Performance Analysis (MG, MT), pp. 271–317.
- ICFP-2007-HageHM #analysis
- A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
- ICFP-2007-HornM #analysis #complexity #control flow #precise
- Relating complexity and precision in control flow analysis (DVH, HGM), pp. 85–96.
- ICFP-2007-Sereni #analysis #functional #graph #higher-order #source code #termination
- Termination analysis and call graph construction for higher-order functional programs (DS), pp. 71–84.
- ILC-2007-GencerGT #analysis #lisp #named #network #social
- CL-SNA: social network analysis with Lisp (MG, CG, VST), p. 17.
- ILC-2007-Harmon #analysis #lisp #tool support
- Computational tools for the analysis of spatial patterns of gene expression in Common Lisp (CLH), p. 18.
- AGTIVE-2007-BauerDTW #analysis #constraints #ocl #synthesis #verification
- Verification and Synthesis of OCL Constraints Via Topology Analysis (JB, WD, TT, BW), pp. 361–376.
- AGTIVE-2007-ErmelE #analysis #configuration management #simulation #visualisation
- Visualization, Simulation and Analysis of Reconfigurable Systems (CE, KE), pp. 265–280.
- CHI-2007-GuimbretiereDH #analysis #interactive #named
- ExperiScope: an analysis tool for interaction data (FG, MD, KH), pp. 1333–1342.
- CHI-2007-HornbaekL #correlation #metric #usability
- Meta-analysis of correlations among usability measures (KH, ELCL), pp. 617–626.
- CHI-2007-IqbalH #analysis #case study
- Disruption and recovery of computing tasks: field study, analysis, and directions (STI, EH), pp. 677–686.
- CHI-2007-KunoSKYYK #analysis #interactive
- Museum guide robot based on sociological interaction analysis (YK, KS, MK, KY, AY, HK), pp. 1191–1194.
- CHI-2007-YeeBR #case study #experience #user interface
- A meta-analysis of the impact of the inclusion and realism of human-like faces on user experiences in interfaces (NY, JNB, KR), pp. 1–10.
- DHM-2007-Godil #analysis #representation
- Advanced Human Body and Head Shape Representation and Analysis (AG), pp. 92–100.
- DHM-2007-HaoJZZ #3d #analysis #finite
- A Finite Element 3D Model of in Vivo Human Knee Joint Based on MRI for the Tibiofemoral Joint Contact Analysis (ZH, DJ, YZ, JZ), pp. 616–622.
- DHM-2007-HuWWJJZCZ #analysis #component #finite
- Finite Element Analysis of a Six-Component Force Sensor for the Trans-Femoral Prosthesis (XH, RW, FW, DJ, XJ, JZ, FC, SZ), pp. 633–639.
- DHM-2007-JiangSZLL #analysis
- Shape Analysis of Human Brain with Cognitive Disorders (TJ, FS, WZ, SL, XL), pp. 409–414.
- DHM-2007-MariasDSZGMMT #analysis #information management #modelling #multi #validation
- Multi-level Analysis and Information Extraction Considerations for Validating 4D Models of Human Function (KM, DDD, GSS, FZ, ECG, TM, TGM, IGT), pp. 703–709.
- DHM-2007-MeulenS #analysis #named
- Ramsis — The Leading Cad Tool for Ergonomic Analysis of Vehicles (PvdM, AS), pp. 1008–1017.
- DHM-2007-NiuLS #3d #analysis #bibliography #comparison #perspective
- Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
- DHM-2007-TianDM #analysis #design #interactive
- Effecting Validity of Ergonomics Analysis During Virtual Interactive Design (RT, VGD, JM), pp. 988–997.
- DHM-2007-WertherMR #analysis #petri net #process #simulation
- Colored Petri Net Based Formal Airport Control Model for Simulation and Analysis of Airport Control Processes (BW, CM, MR), pp. 1027–1036.
- DHM-2007-YangWZJW #analysis
- Redundant Muscular Force Analysis of Human Lower Limbs During Rising from a Squat (YY, RW, MZ, DJ, FW), pp. 259–267.
- DHM-2007-YangWZJW07a #analysis
- Optimal Control and Synergic Pattern Analysis of Upper Limb Reaching-Grasping Movements (YY, RW, MZ, DJ, FW), pp. 268–275.
- DHM-2007-ZhangZPY #analysis #linear #multi
- Estimating Mental Fatigue Based on Multichannel Linear Descriptors Analysis (CZ, CZ, XmP, XY), pp. 521–529.
- HCI-AS-2007-ChoiLU #analysis #internet #user interface
- Analysis of Internet Users’ Interests Based on Windows GUI Messages (JC, GL, YU), pp. 881–888.
- HCI-AS-2007-HeHDZM #analysis #bibliography #design #optimisation #reliability
- A Review of Possibilistic Approaches to Reliability Analysis and Optimization in Engineering Design (LPH, HZH, LD, XDZ, QM), pp. 1075–1084.
- HCI-AS-2007-HosonoGIT #analysis
- ATM Advertisement and Financial Preferences with Sensory Analysis (NH, SG, HI, YT), pp. 42–47.
- HCI-AS-2007-KimuraTHTAOT #analysis #approach #using
- The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
- HCI-AS-2007-Song #analysis #complexity #segmentation #visual notation #web
- Analysis of Web Page Complexity Through Visual Segmentation (GS), pp. 114–123.
- HCI-AS-2007-YiJ #analysis #approach #online #protocol
- The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
- HCI-IDU-2007-AnastassovaMB #analysis #design #evaluation #prototype
- Prototype Evaluation and User-Needs Analysis in the Early Design of Emerging Technologies (MA, CM, JMB), pp. 383–392.
- HCI-IDU-2007-Cox #analysis #usability
- Task Analysis, Usability and Engagement (DC), pp. 1072–1081.
- HCI-IDU-2007-HuangLC #analysis #usability
- The Practices of Usability Analysis to Wireless Facility Controller for Conference Room (DHH, YZL, WKC), pp. 490–498.
- HCI-IDU-2007-HwangS #detection #problem #usability #what
- What Makes Evaluators to Find More Usability Problems?: A Meta-analysis for Individual Detection Rates (WH, GS), pp. 499–507.
- HCI-IDU-2007-Karjalainen #analysis #why
- Why It Is Difficult to Use a Simple Device: An Analysis of a Room Thermostat (SK), pp. 544–548.
- HCI-IDU-2007-Nguyen-Ngoc #analysis #design #process
- Activity Theoretical Analysis and Design Model for Web-Based Experimentation (AVNN), pp. 204–213.
- HCI-IDU-2007-YinC #analysis #automation #metric #speech #towards
- Towards Automatic Cognitive Load Measurement from Speech Analysis (BY, FC), pp. 1011–1020.
- HCI-IPT-2007-CowellHBFBJDJF #analysis #framework #validation
- Construction and Validation of a Neurophysio-technological Framework for Imagery Analysis (AJC, KSH, CB, SF, AB, DJ, GD, RJ, RF), pp. 1096–1105.
- HCI-IPT-2007-NishimuraRDCSPDD #analysis #functional
- Functional Brain Imaging for Analysis of Reading Effort for Computer-Generated Text (EMN, EDR, BAD, JPC, JS, DP, THD, JHD), pp. 1183–1192.
- HCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics #using
- Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
- HCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting #using
- Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
- HCI-MIE-2007-JenkinsCCS #analysis #interactive
- Analysis of User Interaction with Service Oriented Chatbot Systems (MCJ, RC, SJC, DS), pp. 76–83.
- HCI-MIE-2007-KimLRHH #analysis #design #network #performance #quality #speech
- Performance Analysis of Perceptual Speech Quality and Modules Design for Management over IP Network (JK, HWL, WR, SHH, MH), pp. 84–93.
- HIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online #using
- Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
- HIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
- A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
- HIMI-IIE-2007-MaungK #data analysis #web
- Web Application for Data Analysis by Means of Evidential Dominance (ZAHM, YK), pp. 749–758.
- HIMI-IIE-2007-ParkZ #analysis #distributed
- Requirement Analysis of the Portal Site Serving Distributed Climate Data for e-Science (TP, LZ), pp. 450–456.
- HIMI-IIE-2007-SatoA #analysis #behaviour
- Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
- HIMI-IIE-2007-TaguchiAT #analysis
- Information on the Causal Relationship Between Store kaizen and Store Features That Attract Customers by Covariance Structural Analysis (YT, YA, TT), pp. 973–982.
- HIMI-IIE-2007-ZhangC #analysis #behaviour #collaboration
- A Communicative Behaviour Analysis of Art-Technology Collaboration (YZ, LC), pp. 212–221.
- HIMI-IIE-2007-ZhangYIS #analysis #case study #development #energy
- A Study on Analysis Support System of Energy and Environmental System for Sustainable Development Based on MFM and GIS (QZ, HY, HI, HS), pp. 1148–1157.
- HIMI-MTT-2007-BalasuriyaMWO #analysis #ubiquitous
- Kansei Analysis for Robotic Motions in Ubiquitous Environments (JCB, CAM, KW, MO), pp. 804–813.
- HIMI-MTT-2007-KieliszewskiCBLH #analysis #identification #visualisation
- A Visualization Solution for the Analysis and Identification of Workforce Expertise (CAK, JC, AB, AL, TH), pp. 317–326.
- HIMI-MTT-2007-KumeM #analysis #web
- Construction of Web Application for Cusp Surface Analysis (YK, ZAHM), pp. 669–676.
- HIMI-MTT-2007-LeeLKC #analysis #correlation #human-computer #mobile
- Correlation Analysis of Available Bandwidth Estimators for Mobile HCI (DL, CL, JK, JWC), pp. 687–696.
- HIMI-MTT-2007-LehtoPPL #analysis
- Text Analysis of Consumer Reviews: The Case of Virtual Travel Firms (XL, JKP, OP, MRL), pp. 490–499.
- HIMI-MTT-2007-LinL #analysis #automation
- A Bayesian Methodology for Semi-automated Task Analysis (SCL, MRL), pp. 697–704.
- HIMI-MTT-2007-NakayasuNH #analysis #communication #metric #performance
- Measurement and Analysis of Performance of Human Perception for Information Communication Technology (HN, MN, HH), pp. 126–135.
- HIMI-MTT-2007-OrimoKMT #analysis #evaluation #recommendation
- Analysis and Evaluation of Recommendation Systems (EO, HK, TM, AT), pp. 144–152.
- HIMI-MTT-2007-ShinyashikiMHKUN #analysis #embedded
- A Suggestion for Analysis of Unexpected Obstacles in Embedded System (YS, TM, MH, KK, NU, TN), pp. 755–768.
- HIMI-MTT-2007-YonemuraYTO #analysis #communication #visual notation
- Communication Analysis of Visual Support System That Uses Line Drawing Expression (SY, TY, YT, JO), pp. 359–365.
- OCSC-2007-CetinVF #analysis #development #distributed #human-computer
- An Analysis of Involvement of HCI Experts in Distributed Software Development: Practical Issues (GÇ, DV, SF), pp. 32–40.
- OCSC-2007-DayF #analysis #community #concept #named #network #research
- CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
- VISSOFT-2007-BohnerGHM #analysis #source code #uml #using #visual notation #visualisation
- Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
- VISSOFT-2007-KienleMM #analysis #challenge #dependence
- Dependencies Analysis of Azureus with Rigi: Tool Demo Challenge (HMK, HAM, JM), pp. 159–160.
- VISSOFT-2007-LangelierD #analysis #using #visual notation
- Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
- AdaEurope-2007-PanunzioV #analysis #metamodelling #modelling #process
- A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis (MP, TV), pp. 128–141.
- SIGAda-2007-Black #static analysis
- Static analysis summit II (PEB), pp. 101–107.
- SIGAda-2007-Dewar #compilation #static analysis
- The compiler as a static analysis tool (RBKD), pp. 83–88.
- SIGAda-2007-SinghoffP #analysis #modelling
- AADL modeling and analysis of hierarchical schedulers (FS, AP), pp. 41–50.
- EDOC-2007-BaudryNT #analysis #modelling #requirements
- Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
- EDOC-2007-GruhnK #analysis #automation #framework #mobile
- An Analysis Framework for Mobile Workforce Automation (VG, AK), pp. 193–201.
- EDOC-2007-JohnsonJSU #analysis #architecture #enterprise
- A Tool for Enterprise Architecture Analysis (PJ, EJ, TS, JU), pp. 142–156.
- EDOC-2007-NarmanJN #analysis #architecture #enterprise #framework #quality
- Enterprise Architecture: A Framework Supporting System Quality Analysis (PN, PJ, LN), pp. 130–141.
- ICEIS-AIDSS-2007-Aalst #analysis #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-AIDSS-2007-BecksH #analysis #industrial #mining
- Trend Analysis Based on Explorative Data and Text Mining: A Decision Support System for the European Home Textile Industry (AB, JH), pp. 253–258.
- ICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #approach #design #identification #information management
- Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
- ICEIS-AIDSS-2007-SohniusJME #analysis #approach #assessment #design #performance #simulation
- An Approach for Assessing Design Systems: Design System Simulation and Analysis for Performance Assessment (RS, EJ, WEM, VE), pp. 231–236.
- ICEIS-DISI-2007-Aalst #analysis #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-DISI-2007-MatiasM #data analysis #interactive
- Revisiting the olap interaction to cope with spatial data and spatial data analysis (RM, JMP), pp. 157–163.
- ICEIS-EIS-2007-Aalst #analysis #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-EIS-2007-HuangZZ #analysis #approach #process #workflow
- A New Approach for Workflow Process Delta Analysis Based on SYN-NET (XQH, WZ, SZ), pp. 480–488.
- ICEIS-EIS-2007-MarquesRFRAAM #analysis #aspect-oriented
- Aspect-Oriented Analysis Applied to the Space Domain (AM, RR, RF, RAR, SA, JA, AMDM), pp. 71–79.
- ICEIS-HCI-2007-Aalst #analysis #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-HCI-2007-Godet-BarRDJ #analysis #human-computer
- Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
- ICEIS-J-2007-Aalst07a #analysis #challenge #process
- Challenges in Business Process Analysis (WMPvdA), pp. 27–42.
- ICEIS-SAIC-2007-Aalst #analysis #mining #process #roadmap #verification
- Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
- ICEIS-SAIC-2007-KirikovaSGO #abstraction #analysis #flexibility #process
- Analysis of Business Process Flexibility at Different Levels of Abstraction (MK, RS, JG, JO), pp. 389–396.
- CIKM-2007-FortunaRM #analysis #classification #network #social
- Improving the classification of newsgroup messages through social network analysis (BF, EMR, NMF), pp. 877–880.
- CIKM-2007-JurczykA #analysis #community #using
- Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
- CIKM-2007-RaoCFB #analysis #network #peer-to-peer
- Optimal proactive caching in peer-to-peer network: analysis and application (WR, LC, AWCF, YB), pp. 663–672.
- CIKM-2007-TanWTC #analysis #novel #problem #sentiment
- A novel scheme for domain-transfer problem in the context of sentiment analysis (ST, GW, HT, XC), pp. 979–982.
- CIKM-2007-YangQZGL #analysis #graph #using #web
- Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
- CIKM-2007-ZhangYGY #adaptation #analysis #correlation #representation
- Boolean representation based data-adaptive correlation analysis over time series streams (TZ, DY, YG, GY), pp. 203–212.
- ECIR-2007-MeenaP #analysis #sentiment #using
- Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
- ICML-2007-BusseOB #analysis #clustering #rank
- Cluster analysis of heterogeneous rank data (LMB, PO, JMB), pp. 113–120.
- ICML-2007-CazzantiG #analysis #similarity
- Local similarity discriminant analysis (LC, MRG), pp. 137–144.
- ICML-2007-dAspremontBG #analysis #component
- Full regularization path for sparse principal component analysis (Ad, FRB, LEG), pp. 177–184.
- ICML-2007-DingL #adaptation #analysis #clustering #reduction #using
- Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
- ICML-2007-DollarRB #algorithm #analysis #learning
- Non-isometric manifold learning: analysis and an algorithm (PD, VR, SJB), pp. 241–248.
- ICML-2007-MaLTK #analysis #correlation #similarity
- Discriminant analysis in correlation similarity measure space (YM, SL, ET, MK), pp. 577–584.
- ICML-2007-Ye #analysis #linear
- Least squares linear discriminant analysis (JY), pp. 1087–1093.
- ICML-2007-ZhangC #analysis #component #independence
- Nonlinear independent component analysis with minimal nonlinear distortion (KZ, LC), pp. 1127–1134.
- KDD-2007-CastanoWCST #analysis
- On-board analysis of uncalibrated data for a spacecraft at mars (RC, KW, SAC, TMS, BT), pp. 922–930.
- KDD-2007-ChiZSTT #analysis #community
- Structural and temporal analysis of the blogosphere through community factorization (YC, SZ, XS, JT, BLT), pp. 163–172.
- KDD-2007-JanssensGM #analysis #clustering #hybrid #mining
- Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis (FALJ, WG, BDM), pp. 360–369.
- KDD-2007-MoserGE #analysis #clustering #specification
- Joint cluster analysis of attribute and relationship data withouta-priori specification of the number of clusters (FM, RG, ME), pp. 510–519.
- KDD-2007-PandeySGGK #case study #interactive #network #predict
- Association analysis-based transformations for protein interaction networks: a function prediction case study (GP, MS, RG, TG, VK), pp. 540–549.
- KDD-2007-Sandler #analysis #modelling #probability
- Hierarchical mixture models: a probabilistic analysis (MS), pp. 580–589.
- KDD-2007-WangPM #analysis #component
- Generalized component analysis for text with heterogeneous attributes (XW, CP, AM), pp. 794–803.
- KDD-2007-WuWCX #analysis #composition
- Local decomposition for rare class analysis (JW, HX, PW, JC), pp. 814–823.
- KDD-2007-YeJC #analysis #kernel #learning #matrix #polynomial #programming
- Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming (JY, SJ, JC), pp. 854–863.
- MLDM-2007-GrimH #analysis #category theory #clustering
- Minimum Information Loss Cluster Analysis for Categorical Data (JG, JH), pp. 233–247.
- SEKE-2007-GaoTHCCF #analysis #modelling #testing #towards
- Toward Modeling and Analysis for Software Installation Testing (JZG, ST, CPH, YC, AC, TF), pp. 111–116.
- SEKE-2007-KanaskarSR #analysis #approach #detection #using
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- SEKE-2007-ShiN #component #java #named #security #static analysis
- SAFES: A Static Analysis for Field Security in Java Components (AS, GN), pp. 302–307.
- SEKE-2007-TagliatiJR #analysis #evolution
- Requirement Analysis Evolution through Patterns (LVT, RJ, GR), pp. 197–202.
- SEKE-2007-VandalGG #analysis #middleware #performance
- Performance Analysis of the Active Object Pattern in Middleware (PJV, SSG, ASG), pp. 730–735.
- SEKE-2007-VasileB #cost analysis #multi
- Cost-based Analysis of Multiple Counter-Examples (FV, SB), pp. 33–38.
- SEKE-2007-ZhangHLM #cost analysis #deployment
- Pattern-based J2EE Application Deployment with Cost Analysis (NZ, GH, LL, HM), pp. 462–466.
- SIGIR-2007-AzzopardiRB #analysis #query #topic #using
- Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
- SIGIR-2007-BozzonCFN #analysis #modelling #query #web
- Lexical analysis for modeling web query reformulation (AB, PAC, CSF, WN), pp. 739–740.
- SIGIR-2007-FernandezL #analysis #detection #using
- Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
- SIGIR-2007-Fujii #analysis #retrieval
- Enhancing patent retrieval by citation analysis (AF), pp. 793–794.
- SIGIR-2007-JurczykA #analysis #ranking
- Hits on question answer portals: exploration of link analysis for author ranking (PJ, EA), pp. 845–846.
- SIGIR-2007-MizzaroR #analysis #evaluation #information retrieval #network
- Hits hits TREC: exploring IR evaluation results with network analysis (SM, SR), pp. 479–486.
- SIGIR-2007-NguyenJYF #analysis #peer-to-peer #query
- An analysis of peer-to-peer file-sharing system queries (LTN, DJ, WGY, OF), pp. 855–856.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-KonradGC #analysis #incremental #modelling #process
- i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
- MoDELS-2007-WeilMNDB #analysis #automation #design #modelling #semantics
- Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-KonradGC #analysis #incremental #modelling #process
- i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
- MoDELS-2007-WeilMNDB #analysis #automation #design #modelling #semantics
- Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
- ECOOP-2007-BoddenHL #monitoring #performance #program analysis #runtime #staged
- A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring (EB, LJH, OL), pp. 525–549.
- OOPSLA-2007-ElkarabliehKVM #named #performance #static analysis
- Starc: static analysis for efficient repair of complex data (BE, SK, DV, KSM), pp. 387–404.
- OOPSLA-2007-TanM #analysis #c #java #named
- Ilea: inter-language analysis across java and c (GT, GM), pp. 39–56.
- TOOLS-EUROPE-2007-SteimannM #analysis #design #interface #towards
- Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
- LOPSTR-2007-Mendez-LojoNH #analysis #approach #flexibility #object-oriented #source code
- A Flexible, (C)LP-Based Approach to the Analysis of Object-Oriented Programs (MML, JAN, MVH), pp. 154–168.
- LOPSTR-2007-NguyenGSS #analysis #dependence #graph #logic programming #source code #termination
- Termination Analysis of Logic Programs Based on Dependency Graphs (MTN, JG, PSK, DDS), pp. 8–22.
- PPDP-2007-BentonF #declarative #implementation #interactive #program analysis #prototype #scalability
- Interactive, scalable, declarative program analysis: from prototype to implementation (WCB, CNF), pp. 13–24.
- PPDP-2007-HristovaTL #analysis #performance #policy #trust
- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
- PPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis #using
- Detecting defects in Erlang programs using static analysis (KFS), p. 37.
- QAPL-2007-PierroHW #analysis #data flow #on the #probability
- On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
- PADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #using #verification
- Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
- PADL-2007-MeraLPCH #execution #profiling #static analysis
- Combining Static Analysis and Profiling for Estimating Execution Times (EM, PLG, GP, MC, MVH), pp. 140–154.
- POPL-2007-JhalaM #analysis #interprocedural #source code
- Interprocedural analysis of asynchronous programs (RJ, RM), pp. 339–350.
- POPL-2007-KahlonG #analysis #automaton #on the
- On the analysis of interacting pushdown systems (VK, AG), pp. 303–314.
- POPL-2007-Might #analysis #higher-order #source code
- Logic-flow analysis of higher-order programs (MM), pp. 185–198.
- POPL-2007-WiedermannC #persistent #query #static analysis
- Extracting queries by static analysis of transparent persistence (BW, WRC), pp. 199–210.
- RE-2007-MetzgerHPSS #analysis #automation #documentation #formal method #product line #variability
- Disambiguating the Documentation of Variability in Software Product Lines: A Separation of Concerns, Formalization and Automated Analysis (AM, PH, KP, PYS, GS), pp. 243–253.
- REFSQ-2007-GuelfiP #analysis #approach #flexibility #product line #requirements
- A Flexible Requirements Analysis Approach for Software Product Lines (NG, GP), pp. 78–92.
- REFSQ-2007-RegnellHB #analysis #mobile #non-functional #performance #quality #requirements
- A Quality Performance Model for Cost-Benefit Analysis of Non-functional Requirements Applied to the Mobile Handset Domain (BR, MH, RBS), pp. 277–291.
- SAC-2007-DistanteRC #analysis #framework #modelling #process #web
- Modeling business processes in web applications: an analysis framework (DD, GR, GC), pp. 1677–1682.
- SAC-2007-HwangPJ #analysis #implementation #performance
- An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix (SYH, HJP, KSJ), pp. 1545–1551.
- SAC-2007-KassabL #analysis #effectiveness #personalisation #towards
- Towards a synthetic analysis of user’s information need for more effective personalized filtering services (RK, JCL), pp. 852–859.
- SAC-2007-Liebrock #analysis #integration #re-engineering
- Integration of well posedness analysis in software engineering (LML), pp. 1479–1483.
- SAC-2007-LiebrockMBPCSU #analysis #design #forensics #set
- A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
- SAC-2007-PloegerS #analysis #automation #documentation #verification
- Analysis and verification of an automatic document feeder (BP, LJS), pp. 1499–1505.
- SAC-2007-Varma #program analysis #program transformation #recognition
- Generalizing recognition of an individual dialect in program analysis and transformation (PV), pp. 1432–1439.
- SAC-2007-YangWK #analysis #modelling #partial order
- General dominant relationship analysis based on partial order models (ZY, BW, MK), pp. 470–474.
- SAC-2007-ZengWN #analysis #classification
- Text classification based on partial least square analysis (XQZ, MWW, JYN), pp. 834–838.
- ESEC-FSE-2007-Coman #analysis #automation #developer #low level #using
- An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
- ESEC-FSE-2007-Diep #analysis
- Analysis of a deployed software (MD), pp. 595–598.
- ESEC-FSE-2007-DubocRW #analysis #framework #scalability
- A framework for characterization and analysis of software system scalability (LD, DSR, TW), pp. 375–384.
- ESEC-FSE-2007-KumarSCP #analysis #design #framework #optimisation #realtime #statistics
- A profile-driven statistical analysis framework for the design optimization of soft real-time applications (TK, JS, RC, SP), pp. 529–532.
- ESEC-FSE-2007-LarssonME #analysis #integration #statistics
- Product integration improvement based on analysis of build statistics (SL, PM, FE), pp. 505–508.
- ESEC-FSE-2007-RamasubbuB #analysis #development #distributed #empirical #performance
- Globally distributed software development project performance: an empirical analysis (NR, RKB), pp. 125–134.
- ESEC-FSE-2007-SherriffHLW #identification #static analysis #using
- Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
- ESEC-FSE-2007-YuBP #analysis #automation #ocl
- Automated size analysis for OCL (FY, TB, EP), pp. 331–340.
- GTTSE-2007-WykM #analysis #composition #java
- Adding Dimension Analysis to Java as a Composable Language Extension (EVW, YM), pp. 442–456.
- ICSE-2007-DwyerKE #adaptation #online #program analysis
- Adaptive Online Program Analysis (MBD, AK, SGE), pp. 220–229.
- ICSE-2007-FuR #analysis #architecture #exception #java
- Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications (CF, BGR), pp. 230–239.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- ICSE-2007-Jones #analysis #case study #design #implementation #re-engineering
- Bringing the Systems Analysis and Design Course into 21^st Century: A Case Study in Implementing Modern Software Engineering Principles (CGJ), pp. 744–747.
- ICSE-2007-LivieriHMI #analysis #distributed #open source #source code #using #visualisation
- Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
- ICSE-2007-RajapakseJ #analysis #trade-off #using #web
- Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
- ICSE-2007-ZaraketAK #analysis #relational
- Sequential Circuits for Relational Analysis (FAZ, AA, SK), pp. 13–22.
- SPLC-2007-Jensen #analysis #case study #development #experience #multi #product line
- Experiences with Product Line Development of Multi-Discipline Analysis Software at Overwatch Textron Systems (PJ), pp. 35–43.
- SPLC-2007-SchirmeierS #analysis #framework #product line
- Tailoring Infrastructure Software Product Lines by Static Application Analysis (HS, OS), pp. 255–260.
- CC-2007-CheremR #analysis #lightweight #summary
- A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
- CC-2007-FalconerKIMFB #analysis #declarative #framework #optimisation
- A Declarative Framework for Analysis and Optimization (HF, PHJK, DMI, MRM, TF, OB), pp. 218–232.
- CC-2007-ScholzB #analysis #composition #data flow #framework #using
- A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
- CGO-2007-KotzmannM #analysis #optimisation #runtime
- Run-Time Support for Optimizations Based on Escape Analysis (TK, HM), pp. 49–60.
- COCV-2007-GallardoJM #analysis #data flow #on the fly #verification
- On-the-Fly Data Flow Analysis Based on Verification Technology (MdMG, CJ, PM), pp. 33–48.
- HPDC-2007-LeeS #analysis #performance #precise
- Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
- ISMM-2007-AlbertGG #analysis #bytecode #java
- Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
- LCTES-2007-CoffmanHMW #analysis #parametricity
- Generalizing parametric timing analysis (JC, CAH, FM, DBW), pp. 152–154.
- LCTES-2007-Kastner #abstract interpretation #analysis #execution #worst-case
- Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
- LCTES-2007-YanZ #analysis
- WCET analysis of instruction caches with prefetching (JY, WZ), pp. 175–184.
- PPoPP-2007-AgarwalBSS #analysis #source code
- May-happen-in-parallel analysis of X10 programs (SA, RB, VS, RKS), pp. 183–193.
- PPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread #using
- Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
- SOSP-2007-SuAF #analysis #configuration management #named #operating system
- AutoBash: improving configuration management with operating system causality analysis (YYS, MA, JF), pp. 237–250.
- AMOST-2007-ChenPU #analysis #dependence #generative #modelling #testing #using
- Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
- CADE-2007-TiwariG #logic #program analysis #proving #theorem proving #using
- Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
- CAV-2007-BerdineCCDOWY #analysis #data type
- Shape Analysis for Composite Data Structures (JB, CC, BC, DD, PWO, TW, HY), pp. 178–192.
- CAV-2007-BeyerHT #configuration management #convergence #model checking #program analysis #verification
- Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis (DB, TAH, GT), pp. 504–518.
- CAV-2007-BloemCPRT #analysis #formal method #named #requirements
- RAT: A Tool for the Formal Analysis of Requirements (RB, RC, IP, MR, AT), pp. 263–267.
- CAV-2007-BogudlovLRS #analysis #parametricity
- Revamping TVLA: Making Parametric Shape Analysis Competitive (IB, TLA, TWR, MS), pp. 221–225.
- CAV-2007-BouajjaniFQ #analysis #bound #parallel #source code #thread
- Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
- CAV-2007-CharltonH #analysis #model checking #named #plugin
- Hector: Software Model Checking with Cooperating Analysis Plugins (NC, MH), pp. 168–172.
- CAV-2007-GaravelMLS #analysis #distributed #process
- CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes (HG, RM, FL, WS), pp. 158–163.
- CAV-2007-GopanR #analysis #library #low level #summary
- Low-Level Library Analysis and Summarization (DG, TWR), pp. 68–81.
- CAV-2007-ManoliosSV #analysis #named
- BAT: The Bit-Level Analysis Tool (PM, SKS, DV), pp. 303–306.
- ICLP-2007-Morozov #analysis #design #logic programming #visual notation
- Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
- ICLP-2007-Naish #analysis #concurrent
- Resource-Oriented Deadlock Analysis (LN), pp. 302–316.
- ICLP-2007-NavasMLH #analysis #bound #logic programming #source code
- User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
- ICLP-2007-PhanJ #analysis
- Static Region Analysis for Mercury (QP, GJ), pp. 317–332.
- ISSTA-2007-ClauseLO #analysis #framework #named
- Dytan: a generic dynamic taint analysis framework (JAC, WL, AO), pp. 196–206.
- ISSTA-2007-DufourRS #analysis #comprehension #performance
- Blended analysis for performance understanding of framework-based applications (BD, BGR, GS), pp. 118–128.
- ISSTA-2007-TombBV #detection #fault #interprocedural #program analysis #runtime
- Variably interprocedural program analysis for runtime error detection (AT, GPB, WV), pp. 97–107.
- RTA-2007-HillsR #analysis #logic #named #prototype
- KOOL: An Application of Rewriting Logic to Language Prototyping and Analysis (MH, GR), pp. 246–256.
- SAT-2007-FuhsGMSTZ #analysis #polynomial #satisfiability #termination
- SAT Solving for Termination Analysis with Polynomial Interpretations (CF, JG, AM, PSK, RT, HZ), pp. 340–354.
- TLCA-2007-Marion #analysis
- Predicative Analysis of Feasibility and Diagonalization (JYM), pp. 290–304.
- TLCA-2007-ShkaravskaKE #analysis #first-order #polynomial
- Polynomial Size Analysis of First-Order Functions (OS, RvK, MCJDvE), pp. 351–365.
- VMCAI-2007-BalabanPZ #analysis
- Shape Analysis of Single-Parent Heaps (IB, AP, LDZ), pp. 91–105.
- VMCAI-2007-CheremR #analysis #invariant #maintenance #reasoning
- Maintaining Doubly-Linked List Invariants in Shape Analysis with Local Reasoning (SC, RR), pp. 234–250.
- VMCAI-2007-Logozzo #abstract interpretation #analysis #composition #java #named #verification
- Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
- VMCAI-2007-Namjoshi #analysis #symmetry
- Symmetry and Completeness in the Analysis of Parameterized Systems (KSN), pp. 299–313.
- VMCAI-2007-Yang #analysis #towards
- Towards Shape Analysis for Device Drivers (HY), p. 267.
- CBSE-2006-GrassiMS #analysis #approach #component #model transformation #performance #reliability
- A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems (VG, RM, AS), pp. 270–284.
- QoSA-2006-BucchiaroneMP #analysis #architecture #process
- A Practical Architecture-Centric Analysis Process (AB, HM, PP), pp. 127–144.
- QoSA-2006-FlorentzH #analysis #architecture #embedded #evaluation
- Embedded Systems Architecture: Evaluation and Analysis (BF, MH), pp. 145–162.
- QoSA-2006-ZullighovenLB #analysis #architecture #evaluation
- Software Architecture Analysis and Evaluation (HZ, CL, MB), pp. 7–8.
- ASE-2006-AcharyaSXX #effectiveness #generative #interface #robust #static analysis
- Effective Generation of Interface Robustness Properties for Static Analysis (MA, TS, JX, TX), pp. 293–296.
- ASE-2006-CaiS #analysis #composition #design #logic #modelling
- Modularity Analysis of Logical Design Models (YC, KJS), pp. 91–102.
- ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
- CASE-2006-Bahrami-SamaniAM #analysis #design
- Design and Analysis of a Welding Robot (MBS, MA, SAAM), pp. 454–459.
- CASE-2006-BiggsM #analysis #evaluation
- Evaluation of Dimensional Analysis in Robotics (GB, BAM), pp. 286–291.
- CASE-2006-ChaoSZJM #analysis #automation #information management #using
- Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
- CASE-2006-CheungC #analysis #capacity
- Analysis of Capacity Overflow for Manufacturing Systems (KSC, KOC), pp. 331–335.
- CASE-2006-LengC #analysis #implementation #mobile
- Velocity Analysis of Omnidirectional Mobile Robot and System Implementation (CL, QC), pp. 81–86.
- CASE-2006-LiZYC #algorithm #analysis #locality #network #novel
- A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks (SL, DZ, ZY, NC), pp. 574–579.
- CASE-2006-RecaldeMS #analysis #petri net #simulation
- Improving analysis and simulation of continuous Petri Nets (LR, CM, MS), pp. 9–14.
- CASE-2006-RenWJXY #analysis #fault
- A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis (JR, JW, IJ, DLX, JBY), pp. 144–149.
- CASE-2006-SenanayakeSCS #analysis
- Instrumented Orthopaedics Analysis System (SMNAS, CYS, JC, RGS), pp. 194–199.
- CASE-2006-ShaoHM #algorithm #analysis #component #linear #multi #using
- Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
- CASE-2006-WuD #analysis #multi #network #performance
- Performance analysis of complex supply chain networks with multi-product (YW, MD), pp. 630–635.
- CASE-2006-Zhang #analysis #enterprise #modelling #process
- Modeling and Analysis of Enterprise Processes (LZ), pp. 393–398.
- DAC-2006-AgarwalN #analysis #statistics
- Statistical analysis of SRAM cell stability (KA, SRN), pp. 57–62.
- DAC-2006-BhardwajVGC #analysis #modelling #optimisation #process
- Modeling of intra-die process variations for accurate analysis and optimization of nano-scale circuits (SB, SBKV, PG, YC), pp. 791–796.
- DAC-2006-ChaoCWCW #analysis #using
- Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
- DAC-2006-FatemiNP #analysis #logic #statistics #using
- Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
- DAC-2006-GhantaVBP #analysis #correlation #power management #probability #scalability
- Stochastic variational analysis of large power grids considering intra-die correlations (PG, SBKV, SB, RP), pp. 211–216.
- DAC-2006-IsseninBDD #analysis #memory management #multi #reuse
- Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies (II, EB, BD, ND), pp. 49–52.
- DAC-2006-KanjJN #analysis #design
- Mixture importance sampling and its application to the analysis of SRAM designs in the presence of rare failure events (RK, RVJ, SRN), pp. 69–72.
- DAC-2006-KhatibPBBBKJN #analysis #architecture #design #monitoring #multi #realtime
- A multiprocessor system-on-chip for real-time biomedical monitoring and analysis: architectural design space exploration (IAK, FP, DB, LB, MB, HK, AJ, RN), pp. 125–130.
- DAC-2006-LeeWA #analysis #statistics
- Refined statistical static timing analysis through (BNL, LCW, MSA), pp. 149–154.
- DAC-2006-LiLP #analysis #power management #statistics
- Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
- DAC-2006-LiuMM #analysis #design #reliability #tool support
- Design tools for reliability analysis (ZL, BM, JZM), pp. 182–187.
- DAC-2006-LoiASLSB #3d #analysis #performance
- A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy (GLL, BA, NS, SCL, TS, KB), pp. 991–996.
- DAC-2006-MajumdarCG #analysis #validation
- Hold time validation on silicon and the relevance of hazards in timing analysis (AM, WYC, JG), pp. 326–331.
- DAC-2006-MandrekarBSES #analysis
- System level signal and power integrity analysis methodology for system-in-package applications (RM, KB, KS, EE, MS), pp. 1009–1012.
- DAC-2006-NassifPRSBR #analysis #question
- Variation-aware analysis: savior of the nanometer era? (SRN, VP, NR, DS, CB, RR), pp. 411–412.
- DAC-2006-PakbazniaFP #analysis #concept
- Charge recycling in MTCMOS circuits: concept and analysis (EP, FF, MP), pp. 97–102.
- DAC-2006-PaulFOL #analysis #modelling #performance
- Modeling and analysis of circuit performance of ballistic CNFET (BCP, SF, MO, TL), pp. 717–722.
- DAC-2006-PillSCRBC #analysis #formal method #hardware #requirements
- Formal analysis of hardware requirements (IP, SS, RC, MR, RB, AC), pp. 821–826.
- DAC-2006-PomplSHNS #analysis #aspect-oriented #design #reliability
- Practical aspects of reliability analysis for IC designs (TP, CS, MH, HN, JS), pp. 193–198.
- DAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics #using
- Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
- DAC-2006-SuhendraMRC #analysis #detection #performance
- Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
- DAC-2006-YuSH #analysis #grid #order #performance #power management #reduction
- Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
- DATE-2006-AbbaspourFP #analysis #statistics
- Non-gaussian statistical interconnect timing analysis (SA, HF, MP), pp. 533–538.
- DATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis #using
- Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
- DATE-2006-AsadiSTK #analysis
- Vulnerability analysis of L2 cache elements to single event upsets (HA, VS, MBT, DRK), pp. 1276–1281.
- DATE-2006-BalachandranBCWRNB #analysis #grid #modelling #power management
- Analysis and modeling of power grid transmission lines (JB, SB, GC, TW, WDR, BN, EB), pp. 33–38.
- DATE-2006-BhaduriSCTGG #analysis #architecture #design #fault tolerance #framework #hybrid
- A hybrid framework for design and analysis of fault-tolerant architectures (DB, SKS, DC, VET, PSG, MG), pp. 335–336.
- DATE-2006-DensmoreDS #analysis #architecture #performance
- FPGA architecture characterization for system level performance analysis (DD, AD, ALSV), pp. 734–739.
- DATE-2006-GillPW #analysis #fault #logic
- Soft delay error analysis in logic circuits (BSG, CAP, FGW), pp. 47–52.
- DATE-2006-HeniaE #multi #using
- Improved offset-analysis using multiple timing-references (RH, RE), pp. 450–455.
- DATE-2006-IgnatNSN #classification #impact analysis #operating system #realtime
- Soft-error classification and impact analysis on real-time operating systems (NI, BN, YS, GN), pp. 182–187.
- DATE-2006-JinS #analysis #satisfiability
- Strong conflict analysis for propositional satisfiability (HJ, FS), pp. 818–823.
- DATE-2006-Kundu #analysis #design
- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
- DATE-2006-KunzliPBT #analysis #formal method #performance #simulation
- Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
- DATE-2006-MeiR #analysis #performance #using
- Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
- DATE-2006-MochockiLC #3d #analysis #mobile
- Power analysis of mobile 3D graphics (BM, KL, SC), pp. 502–507.
- DATE-2006-NazarianP #analysis
- Cell delay analysis based on rate-of-current change (SN, MP), pp. 539–544.
- DATE-2006-RossiSM #analysis
- Analysis of the impact of bus implemented EDCs on on-chip SSN (DR, CS, CM), pp. 59–64.
- DATE-2006-SchirnerD #analysis #modelling #transaction
- Quantitative analysis of transaction level models for the AMBA bus (GS, RD), pp. 230–235.
- DATE-2006-SoffkeZMG #analysis #approach #combinator #statistics
- A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits (OS, PZ, TM, MG), pp. 632–637.
- DATE-2006-TanjiWKA #analysis #scalability #using
- Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
- DATE-2006-TsengLC #2d #using
- A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap (TWT, JFL, DMC), pp. 53–58.
- DATE-2006-VandersteenBDR
- Systematic stability-analysis method for analog circuits (GV, SB, PD, YR), pp. 150–155.
- DATE-2006-ViehlSBR #analysis #design #modelling #performance #simulation #uml
- Formal performance analysis and simulation of UML/SysML models for ESL design (AV, TS, OB, WR), pp. 242–247.
- DATE-2006-WandelerMT #analysis #performance #realtime
- Performance analysis of greedy shapers in real-time systems (EW, AM, LT), pp. 444–449.
- DATE-2006-WangM #algorithm #analysis #multi
- A logarithmic full-chip thermal analysis algorithm based on multi-layer Green’s function (BW, PM), pp. 39–44.
- DATE-2006-WangXVI #analysis #optimisation
- On-chip bus thermal analysis and optimization (FW, YX, NV, MJI), pp. 850–855.
- DATE-2006-YangGZSD #adaptation #analysis #design #synthesis
- Adaptive chip-package thermal analysis for synthesis and design (YY, Z(G, CZ, LS, RPD), pp. 844–849.
- DATE-2006-YangV #analysis #evaluation #performance #synthesis
- Efficient temperature-dependent symbolic sensitivity analysis and symbolic performance evaluation in analog circuit synthesis (HY, RV), pp. 283–284.
- DATE-2006-ZhangHC #analysis #correlation #statistics
- Statistical timing analysis with path reconvergence and spatial correlations (LZ, YH, CCPC), pp. 528–532.
- DATE-2006-ZhouSMS #analysis #composition #grid #power management #scalability #using
- Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
- DATE-DF-2006-BononiC #2d #analysis #architecture #network #simulation
- Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh (LB, NC), pp. 154–159.
- DocEng-2006-Chao #analysis #geometry
- Text block geometric shape analysis (HC), pp. 22–24.
- HT-2006-QiC #analysis #development #named #segmentation
- CUTS: CUrvature-based development pattern analysis and segmentation for blogs and other Text Streams (YQ, KSC), pp. 1–10.
- SIGMOD-2006-ChidlovskiiRB #analysis #performance #self
- Documentum ECI self-repairing wrappers: performance analysis (BC, BR, MB), pp. 708–717.
- SIGMOD-2006-Hanrahan #analysis #named #query #visualisation
- VizQL: a language for query, analysis and visualization (PH), p. 721.
- SIGMOD-2006-LiOTW #analysis #named
- DADA: a data cube for dominant relationship analysis (CL, BCO, AKHT, SW), pp. 659–670.
- SIGMOD-2006-PavlouS #analysis #database #forensics
- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
- VLDB-2006-ChenRST #analysis #predict
- Bellwether Analysis: Predicting Global Aggregates from Local Regions (BCC, RR, JWS, PT), pp. 655–666.
- VLDB-2006-GonzalezHL #analysis #multi #named
- FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
- VLDB-2006-MoerkotteN #algorithm #analysis #generative #programming
- Analysis of Two Existing and One New Dynamic Programming Algorithm for the Generation of Optimal Bushy Join Trees without Cross Products (GM, TN), pp. 930–941.
- CSEET-2006-Layman #analysis #collaboration #development #student
- Changing Students’ Perceptions: An Analysis of the Supplementary Benefits of Collaborative Software Development (LL), pp. 159–166.
- CSEET-2006-WallaceWB #analysis #problem
- Instruction in Problem Structuring and Analysis Through Problem Frames (CW, XW, VB), pp. 185–186.
- ESOP-2006-CodishLSS #analysis #termination
- Size-Change Termination Analysis in k-Bits (MC, VL, PS, PJS), pp. 230–245.
- ESOP-2006-HofmannJ #analysis #type system
- Type-Based Amortised Heap-Space Analysis (MH, SJ), pp. 22–37.
- FASE-2006-OlveczkyC #algorithm #analysis #maude #realtime #scheduling #simulation
- Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude (PCÖ, MC), pp. 357–372.
- FoSSaCS-2006-BackesMPV #analysis #encryption
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
- FoSSaCS-2006-ZuninoD #analysis #protocol
- Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
- TACAS-2006-DistefanoOY #analysis #logic
- A Local Shape Analysis Based on Separation Logic (DD, PWO, HY), pp. 287–302.
- TACAS-2006-GroceJ #program analysis
- Exploiting Traces in Program Analysis (AG, RJ), pp. 379–393.
- TACAS-2006-KonigK #abstraction #analysis #graph transformation #refinement
- Counterexample-Guided Abstraction Refinement for the Analysis of Graph Transformation Systems (BK, VK), pp. 197–211.
- SCAM-J-2005-AntoniolKT06 #analysis #source code
- Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
- CSMR-2006-CanforaC #eclipse #impact analysis #named #plugin
- Jimpa: An Eclipse Plug-in for Impact Analysis (GC, LC), pp. 341–342.
- CSMR-2006-HerraizRG #analysis #comparison #evolution #metric
- Comparison between SLOCs and number of files as size metrics for software evolution analysis (IH, GR, JMGB), pp. 206–213.
- CSMR-2006-SalahMAP #dynamic analysis #scalability
- Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems (MS, SM, GA, MDP), pp. 71–80.
- CSMR-2006-Zaidman #comprehension #dynamic analysis #scalability
- Scalability Solutions for Program Comprehension through Dynamic Analysis (AZ), pp. 327–330.
- CSMR-2006-ZaidmanDASHR #dynamic analysis
- Regaining Lost Knowledge through Dynamic Analysis and Aspect Orientation (AZ, SD, BA, KDS, GH, BDR), pp. 91–102.
- ICPC-2006-JetleyZI #analysis #slicing #using
- Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
- ICPC-2006-KellyB #analysis #taxonomy
- A Context-Aware Analysis Scheme for Bloom’s Taxonomy (TK, JB), pp. 275–284.
- ICPC-2006-PhengV #analysis #data type #java #source code
- Dynamic Data Structure Analysis for Java Programs (SP, CV), pp. 191–201.
- ICPC-2006-SafyallahS #dynamic analysis #execution #mining #using
- Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
- ICSM-2006-AlsmadiM #analysis #evolution #open source
- Open Source Evolution Analysis (IA, KM), pp. 276–278.
- ICSM-2006-BreechTP #impact analysis #precise
- Integrating Influence Mechanisms into Impact Analysis for Increased Precision (BB, MT, LLP), pp. 55–65.
- ICSM-2006-StreinLLL #metamodelling #program analysis
- An Extensible Meta-Model for Program Analysis (DS, RL, JL, WL), pp. 380–390.
- ICSM-2006-ZalewskiS #impact analysis #library
- Change Impact Analysis for Generic Libraries (MZ, SS), pp. 35–44.
- MSR-2006-CanforaC #fine-grained #impact analysis #repository
- Fine grained indexing of software repositories to support impact analysis (GC, LC), pp. 105–111.
- MSR-2006-TsunodaMYKM #analysis #development #enterprise
- Productivity analysis of Japanese enterprise software development projects (MT, AM, HY, NK, KiM), pp. 14–17.
- MSR-2006-VoineaT #analysis #cvs #framework #query #repository #visualisation
- An open framework for CVS repository querying, analysis and visualization (LV, ACT), pp. 33–39.
- MSR-2006-WalkerHHKS #approach #estimation #impact analysis #lightweight #probability
- A lightweight approach to technical risk estimation via probabilistic impact analysis (RJW, RH, IH, PK, AS), pp. 98–104.
- SCAM-2006-BinkleyHK #animation #approximate #static analysis
- Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation (DB, MH, JK), pp. 43–52.
- SCAM-2006-Bruntink #analysis #tool support
- Linking Analysis and Transformation Tools with Source-Based Mappings (MB), pp. 107–116.
- SCAM-2006-StreinKL #program analysis #refactoring
- Cross-Language Program Analysis and Refactoring (DS, HK, WL), pp. 207–216.
- WCRE-2006-FischerG #analysis #approach #lightweight #named #scalability
- EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems (MF, HG), pp. 179–188.
- WCRE-2006-KnieselB #analysis #aspect-oriented #correctness #weaving
- An Analysis of the Correctness and Completeness of Aspect Weaving (GK, UB), pp. 324–333.
- WCRE-2006-MerloLA #analysis #injection #php #sql
- Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
- WCRE-2006-ZaidmanGH #comprehension #dynamic analysis
- Program COmprehension through Dynamic Analysis (AZ, OG, AHL), p. 315.
- PEPM-2006-Cordy #analysis #generative #txl
- Source transformation, analysis and generation in TXL (JRC), pp. 1–11.
- PEPM-2006-IwamaIK #analysis #exception #functional #resource management
- Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
- PEPM-2006-LewisJ #analysis #model checking
- A dead variable analysis for explicit model checking (ML, MJ), pp. 48–57.
- PLDI-2006-AcarBBT #analysis #self
- An experimental analysis of self-adjusting computation (UAA, GEB, MB, KT), pp. 96–107.
- PLDI-2006-DhurjatiKA #alias #analysis #named
- SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
- PLDI-2006-GuyerMF #automation #named #static analysis
- Free-Me: a static analysis for automatic individual object reclamation (SZG, KSM, DF), pp. 364–375.
- PLDI-2006-PratikakisFH #analysis #concurrent #correlation #detection #named
- LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
- PLDI-2006-SridharanB #analysis #java #points-to
- Refinement-based context-sensitive points-to analysis for Java (MS, RB), pp. 387–400.
- SAS-2006-AllamigeonGH #c #embedded #source code #static analysis #string
- Static Analysis of String Manipulations in Critical Embedded C Programs (XA, WG, CH), pp. 35–51.
- SAS-2006-Arnold #analysis #logic #refinement #using
- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
- SAS-2006-ChangHN #analysis #low level #using
- Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
- SAS-2006-Das #power of #static analysis
- Unleashing the Power of Static Analysis (MD), pp. 1–2.
- SAS-2006-DhurjatiDY #analysis #data flow #refinement
- Path-Sensitive Dataflow Analysis with Iterative Refinement (DD, MD, YY), pp. 425–442.
- SAS-2006-GonnordH #analysis #linear
- Combining Widening and Acceleration in Linear Relation Analysis (LG, NH), pp. 144–160.
- SAS-2006-GotsmanBC #abstraction #analysis #interprocedural
- Interprocedural Shape Analysis with Separated Heap Abstractions (AG, JB, BC), pp. 240–260.
- SAS-2006-GoubaultP #algorithm #static analysis
- Static Analysis of Numerical Algorithms (EG, SP), pp. 18–34.
- SAS-2006-KirkegaardM #java #static analysis
- Static Analysis for Java Servlets and JSP (CK, AM), pp. 336–352.
- SAS-2006-OHearn #logic #program analysis
- Separation Logic and Program Analysis (PWO), p. 181.
- SAS-2006-OrlovichR #analysis #memory management
- Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
- SAS-2006-SankaranarayananISG #static analysis
- Static Analysis in Disjunctive Numerical Domains (SS, FI, IS, AG), pp. 3–17.
- SAS-2006-Yang #analysis #low level
- Shape Analysis for Low-Level Code (HY), p. 280.
- FLOPS-2006-Avery #analysis #bound #termination
- Size-Change Termination and Bound Analysis (JA), pp. 192–207.
- FLOPS-2006-LiKL #analysis #lazy evaluation
- Lazy Set-Sharing Analysis (XL, AK, LL), pp. 177–191.
- FLOPS-2006-MarionP #analysis
- Resource Analysis by Sup-interpretation (JYM, RP), pp. 163–176.
- CIAA-2006-ChengWC #analysis #bisimulation #branch #composition #on the fly
- On-the-Fly Branching Bisimulation Minimization for Compositional Analysis (YPC, HYW, YRC), pp. 219–229.
- CIAA-2006-Luttenberger #analysis #integer #reachability #source code
- Reachability Analysis of Procedural Programs with Affine Integer Arithmetic (ML), pp. 281–282.
- ICALP-v2-2006-DelauneLLT #analysis #morphism #protocol
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
- FM-2006-AiguierBG #interactive #specification #static analysis
- Feature Specification and Static Analysis for Interaction Resolution (MA, KB, PLG), pp. 364–379.
- FM-2006-McIver #analysis #model checking #probability #refinement
- Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems (AM), pp. 131–146.
- SEFM-2006-Khedker #perspective #source code #static analysis
- Static Analysis of Programs: A Heap Centric View (UPK), p. 261.
- SEFM-2006-SampathK #analysis
- Composing Context Sensitive Analysis (PS, SK), pp. 186–195.
- ICFP-2006-FisherS #static analysis #syntax
- Static analysis for syntax objects (DF, OS), pp. 111–121.
- ICGT-2006-EdelkampJL #analysis #graph #heuristic
- Heuristic Search for the Analysis of Graph Transition Systems (SE, SJ, ALL), pp. 414–429.
- ICGT-2006-EhrigHL #analysis #graph transformation
- Molecular Analysis of Metabolic Pathway with Graph Transformation (KE, RH, GL), pp. 107–121.
- ICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability #using
- Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
- ICGT-2006-VarroVEPT #analysis #model transformation #petri net #termination
- Termination Analysis of Model Transformations by Petri Nets (DV, SVG, HE, UP, GT), pp. 260–274.
- CHI-2006-LiWL #analysis #design #testing
- Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
- CHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online #using
- Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
- CHI-2006-WrightSPSC #analysis #concept
- The sandbox for analysis: concepts and Eevaluation (WW, DS, PP, AWS, BC), pp. 801–810.
- CSCW-2006-DabbishK #analysis #email
- Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
- CSCW-2006-JacoviSGUSM #analysis #graph
- The chasms of CSCW: a citation graph analysis of the CSCW conference (MJ, VS, GGF, SU, ES, NM), pp. 289–298.
- CSCW-2006-Lee #analysis #social #what
- What goes around comes around: an analysis of del.icio.us as social space (KJL), pp. 191–194.
- CSCW-2006-RanjanBB #analysis #collaboration
- An exploratory analysis of partner action and camera control in a video-mediated collaborative task (AR, JPB, RB), pp. 403–412.
- CSCW-2006-VoidaM #analysis #challenge #multimodal
- Challenges in the analysis of multimodal messaging (AV, EDM), pp. 427–430.
- CSCW-2006-WeisethMTL #analysis #collaboration #framework #tool support
- The wheel of collaboration tools: a typology for analysis within a holistic framework (PEW, BEM, BT, SL), pp. 239–248.
- AdaEurope-2006-BreuerP #fault #kernel #linux #source code #static analysis
- One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code (PTB, SP), pp. 56–70.
- AdaEurope-2006-RazaVP #named #program analysis #reverse engineering
- Bauhaus — A Tool Suite for Program Analysis and Reverse Engineering (AR, GV, EP), pp. 71–82.
- CAiSE-2006-Franch #analysis #modelling #on the
- On the Quantitative Analysis of Agent-Oriented Models (XF), pp. 495–509.
- CAiSE-2006-HaggmarkA #analysis #logic #principle #why
- Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
- EDOC-2006-HauserFKV #analysis #workflow
- Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows (RH, MF, JMK, JV), pp. 129–140.
- EDOC-2006-JohnsonLNS #analysis #architecture #diagrams #enterprise
- Extended Influence Diagrams for Enterprise Architecture Analysis (PJ, RL, PN, MS), pp. 3–12.
- ICEIS-HCI-2006-BadjioP #analysis #data mining #mining #process #visual notation
- Context of Use Analysis — Activity Checklist for Visual Data Mining (EPFB, FP), pp. 45–50.
- ICEIS-ISAS-2006-DubinskyHTK #agile #analysis #design #development #scalability
- System Analysis and Design in a Large-Scale Software Project: The Case of Transition to Agile Development (YD, OH, DT, AK), pp. 11–18.
- ICEIS-J-2006-DubinskyHTK06a #agile #analysis #design
- Agile System Analysis and Design (YD, OH, DT, AK), pp. 281–292.
- CIKM-2006-ChiTT #analysis #named
- Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
- CIKM-2006-LiuCLS #analysis #visual notation
- The visual funding navigator: analysis of the NSF funding information (SL, NC, HL, HS), pp. 882–883.
- CIKM-2006-YeXLJBCK #analysis #linear #performance
- Efficient model selection for regularized linear discriminant analysis (JY, TX, QL, RJ, JB, VC, CK), pp. 532–539.
- ICML-2006-DingZHZ #analysis #component #invariant #named #robust
- R1-PCA: rotational invariant L1-norm principal component analysis for robust subspace factorization (CHQD, DZ, XH, HZ), pp. 281–288.
- ICML-2006-Hanneke #analysis #graph #learning
- An analysis of graph cut size for transductive learning (SH), pp. 393–399.
- ICML-2006-KimMB #analysis #kernel
- Optimal kernel selection in Kernel Fisher discriminant analysis (SJK, AM, SPB), pp. 465–472.
- ICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process #using
- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
- ICML-2006-Sugiyama #analysis #reduction
- Local Fisher discriminant analysis for supervised dimensionality reduction (MS), pp. 905–912.
- ICML-2006-TorreK #analysis #clustering
- Discriminative cluster analysis (FDlT, TK), pp. 241–248.
- ICML-2006-YeX #analysis #linear #null #orthogonal
- Null space versus orthogonal linear discriminant analysis (JY, TX), pp. 1073–1080.
- ICPR-v1-2006-AndradeBF06a #analysis #markov #modelling
- Hidden Markov Models for Optical Flow Analysis in Crowds (ELA, SB, RBF), pp. 460–463.
- ICPR-v1-2006-GunesP #analysis #automation #behaviour #database #gesture
- A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
- ICPR-v1-2006-HansenMT #analysis #clustering #re-engineering #sorting
- Cluster Analysis and Priority Sorting in Huge Point Clouds for Building Reconstruction (WvH, EM, UT), pp. 23–26.
- ICPR-v1-2006-LeeE #analysis #modelling #synthesis
- Nonlinear Shape and Appearance Models for Facial Expression Analysis and Synthesis (CSL, AME), pp. 497–502.
- ICPR-v1-2006-LiuD #analysis #linear #performance #recognition
- Improve Handwritten Character Recognition Performance by Heteroscedastic Linear Discriminant Analysis (HL, XD), pp. 880–883.
- ICPR-v1-2006-MillerW #analysis #semantics #word
- Word Completion with Latent Semantic Analysis (TM, EW), pp. 1252–1255.
- ICPR-v1-2006-OnoMKI #analysis #image
- Space-time Analysis of Spherical Projection Image (SO, TM, HK, KI), pp. 975–979.
- ICPR-v1-2006-QiDZ #analysis #case study #image #semantics
- Semantic Analysis on Medical Images: A Case Study (DQ, ERED, RZ), pp. 1260–1263.
- ICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering #using
- 3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
- ICPR-v1-2006-SchrotterZ #analysis #image #modelling #multi #robust
- Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
- ICPR-v1-2006-ShimanukiKW #analysis #sketching
- Analysis of Overlapping Faces for Constructing Paper-made Objects from Sketches (HS, JK, TW), pp. 247–250.
- ICPR-v1-2006-SibiryakovB #analysis #multi #realtime
- Real-Time Multi-Frame Analysis of Dominant Translation (AS, MB), pp. 55–58.
- ICPR-v1-2006-Solem #analysis
- Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 43–46.
- ICPR-v1-2006-Solem06a #analysis
- Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 852–855.
- ICPR-v1-2006-StorkJ #analysis #image
- Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of the Baroque (DGS, MKJ), pp. 255–258.
- ICPR-v1-2006-WangKY #2d #analysis #linear #recognition
- Bilateral Two Dimensional Linear Discriminant Analysis for Stereo Face Recognition (JGW, HK, WYY), pp. 429–432.
- ICPR-v1-2006-WeiB #data analysis #segmentation #statistics #using
- Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
- ICPR-v1-2006-YangZJY #analysis #feature model
- Unsupervised Discriminant Projection Analysis for Feature Extraction (JY, DZ, ZJ, JYY), pp. 904–907.
- ICPR-v2-2006-ChenW #analysis #component #independence #segmentation #using
- Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
- ICPR-v2-2006-GanLY #analysis #detection
- Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
- ICPR-v2-2006-HuDG #analysis #performance #retrieval
- Improving Retrieval Performance by Global Analysis (JH, WD, JG), pp. 703–706.
- ICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string #using
- Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
- ICPR-v2-2006-InoueU #2d #analysis #linear
- Non-Iterative Two-Dimensional Linear Discriminant Analysis (KI, KU), pp. 540–543.
- ICPR-v2-2006-Liang #analysis #image
- High-dimensional discriminant analysis and its application to color face images (ZL), pp. 917–920.
- ICPR-v2-2006-LiuCC #analysis #image #layout
- Latent Layout Analysis for Discovering Objects in Images (DL, DC, TC), pp. 468–471.
- ICPR-v2-2006-Loog #analysis #linear
- Conditional Linear Discriminant Analysis (ML), pp. 387–390.
- ICPR-v2-2006-LuPV #analysis #component #multi #recognition
- Multilinear Principal Component Analysis of Tensor Objects for Recognition (HL, KNP, ANV), pp. 776–779.
- ICPR-v2-2006-PungprasertyingCK #analysis #approach #learning #migration #performance
- Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
- ICPR-v2-2006-QuanHXLL #analysis #online #verification
- Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
- ICPR-v2-2006-SanguansatAJM #2d #analysis #component #recognition
- Class-Specific Subspace-Based Two-Dimensional Principal Component Analysis for Face Recognition (PS, WA, SJ, SM), pp. 1246–1249.
- ICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation #using
- A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
- ICPR-v2-2006-TangT #analysis #linear #performance #using
- Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
- ICPR-v2-2006-TongDXTL #analysis #recognition #video
- Local Motion Analysis and Its Application in Video based Swimming Style Recognition (XT, LYD, CX, QT, HL), pp. 1258–1261.
- ICPR-v2-2006-TsaiTCY #analysis #component #design #detection #fault #image #independence
- Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
- ICPR-v2-2006-UekiHK #2d #analysis #classification #linear
- Two-dimensional Heteroscedastic Linear Discriminant Analysis for Age-group Classification (KU, TH, TK), pp. 585–588.
- ICPR-v2-2006-YangL #analysis #automation #component
- Automatic Physiognomic Analysis by Classifying Facial Component Feature (HDY, SWL), pp. 1212–1215.
- ICPR-v2-2006-ZhengL #analysis #component #kernel #learning #locality #problem
- Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
- ICPR-v3-2006-ChenWTG #analysis #empirical #image #matrix #statistics
- Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix (XC, YW, TT, LG), pp. 1107–1110.
- ICPR-v3-2006-El-BazFRYEE #analysis #detection #image
- Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
- ICPR-v3-2006-GokberkA #3d #algorithm #analysis #comparative #recognition
- Comparative Analysis of Decision-level Fusion Algorithms for 3D Face Recognition (BG, LA), pp. 1018–1021.
- ICPR-v3-2006-GutmanWLCT #analysis #using
- Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
- ICPR-v3-2006-HaiESYSHAY #adaptation #analysis #image #video
- Adaptive Control of Video Display for Diagnostic Assistance by Analysis of Capsule Endoscopic Images (HV, TE, RS, KY, MS, KH, TA, YY), pp. 980–983.
- ICPR-v3-2006-JaberAM #analysis #approach #information retrieval #metric #novel
- A Novel Approach for Lexical Noise Analysis and Measurement in Intelligent Information Retrieval (TJ, AA, PM), pp. 370–373.
- ICPR-v3-2006-KitasakaNMSMTN #analysis #recognition
- Recognition of lung lobes and its application to the bronchial structure analysis (TK, YN, KM, YS, MM, HT, HN), pp. 288–291.
- ICPR-v3-2006-Levitt #analysis #component
- Component Analysis of Torah Code Phrases (AL), pp. 412–416.
- ICPR-v3-2006-LiuW #algorithm #analysis #component #feature model #recognition #search-based
- Feature Extraction with Genetic Algorithms Based Nonlinear Principal Component Analysis for Face Recognition (NL, HW), pp. 461–464.
- ICPR-v3-2006-LiZSCG #analysis #kernel #performance #recognition
- Bagging Based Efficient Kernel Fisher Discriminant Analysis for Face Recognition (YL, BZ, SS, XC, WG), pp. 523–526.
- ICPR-v3-2006-LoogR #analysis
- Local Discriminant Analysis (ML, DdR), pp. 328–331.
- ICPR-v3-2006-QinSL #analysis #feature model #performance
- Efficient Feature Extraction Based on Regularized Uncorrelated Chernoff Discriminant Analysis (AKQ, PNS, ML), pp. 125–128.
- ICPR-v3-2006-TangkuampienS #analysis #component #kernel
- Human Motion De-noising via Greedy Kernel Principal Component Analysis Filtering (TT, DS), pp. 457–460.
- ICPR-v3-2006-VlietF #analysis #clustering #multi
- Multi-orientation analysis by decomposing the structure tensor and clustering (LJvV, FGAF), pp. 856–860.
- ICPR-v3-2006-Wang06a #analysis #using
- Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
- ICPR-v3-2006-WangG #analysis #recognition
- Tensor Discriminant Analysis for View-based Object Recognition (YW, SG), pp. 33–36.
- ICPR-v3-2006-XuanCZYHSF #analysis #classification #component #novel
- A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA) (GX, PC, XZ, QY, CH, YQS, DF), pp. 320–323.
- ICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel #using
- Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
- ICPR-v3-2006-YouCBLT #analysis #speech
- Emotional Speech Analysis on Nonlinear Manifold (MY, CC, JB, JL, JT), pp. 91–94.
- ICPR-v3-2006-ZhangDC #analysis #detection #game studies
- Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
- ICPR-v4-2006-AroraA #analysis #image #multi #segmentation
- Analysis of Ramp Discontinuity Model for Multiscale Image Segmentation (HA, NA), pp. 99–103.
- ICPR-v4-2006-DhandraHHM #analysis #image #segmentation #using
- Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
- ICPR-v4-2006-GhoshB06a #adaptation #analysis #video
- A Psychological Adaptive Model For Video Analysis (NG, BB), pp. 346–349.
- ICPR-v4-2006-GurevichKMSV #analysis #automation
- Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
- ICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation #using
- A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
- ICPR-v4-2006-LuC06a #3d #analysis #metric #using
- Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
- ICPR-v4-2006-MitaniTKF #analysis #mobile #recognition
- Environment Recognition Based on Analysis of Human Actions for Mobile Robot (MM, MT, AK, KF), pp. 782–786.
- ICPR-v4-2006-WangR #analysis #kernel #recognition
- Kernel Fisher Discriminant Analysis for Palmprint Recognition (YW, QR), pp. 457–460.
- ICPR-v4-2006-WangWLJK #analysis #classification #component #independence #using
- Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
- ICPR-v4-2006-YaoLYZL #algorithm #analysis #identification
- Analysis and Improvement of An Iris Identification Algorithm (PY, JL, XY, ZZ, BL), pp. 362–365.
- KDD-2006-Berger-WolfS #analysis #framework #network #social
- A framework for analysis of dynamic social networks (TYBW, JS), pp. 523–528.
- KDD-2006-LiuCHY #analysis #dependence #detection #graph #named
- GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
- KDD-2006-LiuZBX #analysis #using
- Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
- KDD-2006-MeiXCHZ #analysis #generative #semantics
- Generating semantic annotations for frequent patterns with context analysis (QM, DX, HC, JH, CZ), pp. 337–346.
- KDD-2006-MessaoudBR #analysis #data transformation #multi #performance
- Efficient multidimensional data representations based on multiple correspondence analysis (RBM, OB, SLR), pp. 662–667.
- KDD-2006-SuchanekIW #analysis #documentation #statistics #web
- Combining linguistic and statistical analysis to extract relations from web documents (FMS, GI, GW), pp. 712–717.
- KDD-2006-SunTF #analysis #graph
- Beyond streams and graphs: dynamic tensor analysis (JS, DT, CF), pp. 374–383.
- KDD-2006-WedigM #analysis #personalisation #query #scalability
- A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
- KDD-2006-YeW #analysis
- Regularized discriminant analysis for high dimensional, low sample size data (JY, TW), pp. 454–463.
- KDD-2006-YuYTKW #analysis #component #probability
- Supervised probabilistic principal component analysis (SY, KY, VT, HPK, MW), pp. 464–473.
- SEKE-2006-BokhariP #analysis #modelling #petri net #uml
- Translation of UML Models to Object Coloured Petri Nets with a view to Analysis (AB, WFSP), pp. 568–571.
- SEKE-2006-GaaloulG #analysis #mining #statistics #workflow
- A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
- SEKE-2006-GokhaleY #analysis #architecture #pipes and filters #reliability
- Reliability Analysis of Pipe and Filter Architecture Style (SSG, SMY), pp. 625–630.
- SEKE-2006-GrauCFN #analysis #comparative #modelling
- A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
- SEKE-2006-PiaoWCC #analysis #diagrams #process #uml
- An Analysis Model of Activity Diagram in UML 2.0 (WCP, CHW, WCC, LPC), pp. 562–567.
- SEKE-2006-SartipiS #analysis #concept #evaluation #execution #mining
- Application of Execution Pattern Mining and Concept Lattice Analysis on Software Structure Evaluation (KS, HS), pp. 302–308.
- SEKE-2006-SteinmacherLH #analysis #process #simulation #using #workflow
- Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
- SEKE-2006-SunSADH #analysis #design #formal method #middleware #modelling
- Achieving a Better Middleware Design through Formal Modeling and Analysis (WS, TS, GAG, YD, XH), pp. 463–468.
- SEKE-2006-ZhangKY #concept analysis #modelling #uml #web
- UML Modelling Web Applications via Formal Concept Analysis (ZZ, JK, HY), pp. 532–535.
- SIGIR-2006-CaiHH #analysis #documentation
- Tensor space model for document analysis (DC, XH, JH), pp. 625–626.
- SIGIR-2006-JinFM #analysis #consistency #feedback #nondeterminism #performance
- Quantative analysis of the impact of judging inconsistency on the performance of relevance feedback (XJ, JCF, JM), pp. 655–656.
- SIGIR-2006-JordanHK #analysis #approach #named
- Swordfish: an unsupervised Ngram based approach to morphological analysis (CJ, JH, VK), pp. 657–658.
- SIGIR-2006-NieDQ #analysis #topic #web
- Topical link analysis for web search (LN, BDD, XQ), pp. 91–98.
- SIGIR-2006-Olsson #analysis #classification #set
- An analysis of the coupling between training set and neighborhood sizes for the kNN classifier (JSO), pp. 685–686.
- SIGIR-2006-WangSCZ #analysis #multi #semantics
- Latent semantic analysis for multiple-type interrelated data objects (XW, JTS, ZC, CZ), pp. 236–243.
- SIGIR-2006-YanH #analysis #multi #probability #query #retrieval
- Probabilistic latent query analysis for combining multiple retrieval sources (RY, AGH), pp. 324–331.
- SIGIR-2006-ZhangOFM #analysis #linear #recommendation
- Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
- ECMDA-FA-2006-MottuBT #analysis #model transformation #mutation testing #testing
- Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
- ECMDA-FA-2006-Perez-MartinezS #analysis #architecture
- From Analysis Model to Software Architecture: A PIM2PIM Mapping (JEPM, ASA), pp. 25–39.
- MoDELS-2006-ArevaloFHN #abstraction #approach #concept analysis #modelling
- Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
- MoDELS-2006-BruckerDW #analysis #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- MoDELS-2006-GoldsbyCKK #analysis #assurance #formal method #framework #modelling #visualisation
- A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
- MoDELS-2006-LundellLPM #analysis #uml #xmi
- UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-MullerFFHSGJ #analysis #modelling #syntax #synthesis
- Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
- MoDELS-2006-ArevaloFHN #abstraction #approach #concept analysis #modelling
- Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
- MoDELS-2006-BruckerDW #analysis #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- MoDELS-2006-GoldsbyCKK #analysis #assurance #formal method #framework #modelling #visualisation
- A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
- MoDELS-2006-LundellLPM #analysis #uml #xmi
- UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-MullerFFHSGJ #analysis #modelling #syntax #synthesis
- Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
- ECOOP-2006-SiekT #analysis #c++ #semantics
- A Semantic Analysis of C++ Templates (JGS, WT), pp. 304–327.
- OOPSLA-2006-BlackburnGHKMBDFFGHHJLMPSVDW #analysis #benchmark #development #java #metric
- The DaCapo benchmarks: java benchmarking development and analysis (SMB, RG, CH, AMK, KSM, RB, AD, DF, DF, SZG, MH, ALH, MJ, HBL, JEBM, AP, DS, TV, DvD, BW), pp. 169–190.
- OOPSLA-2006-KitMB #analysis #requirements #semantics #using
- Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
- OOPSLA-2006-MaebeBEB #java #named #program analysis #tool support
- Javana: a system for building customized Java program analysis tools (JM, DB, LE, KDB), pp. 153–168.
- QAPL-2005-KwiatkowskaNP06 #analysis #model checking #probability
- Quantitative Analysis With the Probabilistic Model Checker PRISM (MZK, GN, DP), pp. 5–31.
- GPCE-2006-VieraP #analysis #multi
- A multi-stage language with intensional analysis (MV, AP), pp. 11–20.
- LOPSTR-2006-Schneider-KampGST #analysis #automation #logic programming #source code #term rewriting #termination
- Automated Termination Analysis for Logic Programs by Term Rewriting (PSK, JG, AS, RT), pp. 177–193.
- PPDP-2006-Miller #analysis #horn clause #source code
- Collection analysis for Horn clause programs (DM), pp. 179–188.
- QAPL-2006-AdaoMRV #analysis #protocol #security #towards
- Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
- QAPL-2006-SotinCJ #behaviour #java #static analysis
- Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card (PS, DC, TPJ), pp. 153–167.
- QAPL-2006-ZhangH #analysis #formal method #protocol #streaming
- Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
- PADL-2006-NavasBH #analysis #clique #performance #top-down #using
- Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
- POPL-2006-MeunierFF #analysis #composition #contract
- Modular set-based analysis from contracts (PM, RBF, MF), pp. 218–231.
- POPL-2006-MightS #analysis
- Environment analysis via Delta CFA (MM, OS), pp. 127–140.
- RE-2006-ChenZZM #analysis #dependence #identification #requirements
- Identification of Crosscutting Requirements Based on Feature Dependency Analysis (KC, HZ, WZ, HM), pp. 300–303.
- RE-2006-CornfordFHJ #analysis #modelling #requirements
- Fusing Quantitative Requirements Analysis with Model-based Systems Engineering (SLC, MSF, VAH, JSJ), pp. 272–277.
- RE-2006-EbnenasirCK #analysis #case study #fault tolerance #modelling
- Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance (AE, BHCC, SK), pp. 336–337.
- RE-2006-JiangTBM #analysis #biology #case study #data transformation #database #design
- Incorporating Goal Analysis in Database Design: A Case Study from Biological Data Management (LJ, TT, AB, JM), pp. 196–204.
- RE-2006-LiaskosLYYM #analysis #on the #variability
- On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
- RE-2006-LiuJ #analysis #problem #requirements
- Integrating Goals and Problem Frames in Requirements Analysis (LL, ZJ), pp. 342–343.
- RE-2006-MehnerMT #analysis #aspect-oriented #interactive #modelling
- Interaction Analysis in Aspect-Oriented Models (KM, MM, GT), pp. 66–75.
- SAC-2006-AgostaCPS #analysis #bytecode #compilation #performance
- Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
- SAC-2006-BelguidoumD #analysis #component #dependence #deployment
- Analysis of deployment dependencies in software components (MB, FD), pp. 735–736.
- SAC-2006-BiermanMPS #analysis #array #image #named
- MACE: lossless compression and analysis of microarray images (RB, NM, CP, RS), pp. 167–172.
- SAC-2006-Capron #bound #static analysis
- Static analysis of time bounded reactive properties of Boolean symbols (GC), pp. 1827–1834.
- SAC-2006-ChengCW #analysis #composition #named #scalability
- ARCATS: a scalable compositional analysis tool suite (YPC, YRC, HYW), pp. 1852–1853.
- SAC-2006-CutelloNO #algorithm #analysis #heuristic
- Analysis of an evolutionary algorithm with HyperMacromutation and stop at first constructive mutation heuristic for solving trap functions (VC, GN, PSO), pp. 945–949.
- SAC-2006-DattaE #analysis #requirements #workflow
- Effects of changing requirements: a tracking mechanism for the analysis workflow (SD, RvE), pp. 1739–1744.
- SAC-2006-DextersPG #algorithm #analysis #probability
- A probability analysis for candidate-based frequent itemset algorithms (ND, PWP, DVG), pp. 541–545.
- SAC-2006-FangFHT #analysis #geometry #image
- Digital geometry image analysis for medical diagnosis (JF, SF, JH, MT), pp. 217–221.
- SAC-2006-GotoC #analysis #logic
- A quantitative analysis of implicational paradoxes in classical mathematical logic (YG, JC), pp. 42–43.
- SAC-2006-HeatherS #analysis #infinity #protocol #security
- To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
- SAC-2006-LangstonPSSV #data analysis
- Innovative computational methods for transcriptomic data analysis (MAL, ADP, AMS, JAS, BHV), pp. 190–194.
- SAC-2006-NorguetZS #analysis #semantics #web
- Semantic analysis of web site audience (JPN, EZ, RS), pp. 525–529.
- SAC-2006-OrshanskyWCX #analysis #robust #statistics
- Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
- SAC-2006-OsorioK #analysis #behaviour
- An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
- SAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set #using
- Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
- SAC-2006-WangS #analysis
- Escape analysis for synchronization removal (LW, XS), pp. 1419–1423.
- SAC-2006-WuGL #analysis #database #modelling #towards
- Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
- FSE-2006-YeCCX #analysis #collaboration
- Local analysis of atomicity sphere for B2B collaboration (CY, SCC, WKC, CX), pp. 186–196.
- ICSE-2006-CeballosG #analysis #performance
- P2P file sharing analysis for a better performance (MRC, JLG), pp. 941–944.
- ICSE-2006-DubocRW #analysis #framework #modelling #scalability
- A framework for modelling and analysis of software systems scalability (LD, DSR, TW), pp. 949–952.
- ICSE-2006-FurusawaCW #analysis #bibliography #design #modelling #performance
- Efficiency analysis of model-based review in actual software design (HF, EHC, HW), pp. 604–607.
- ICSE-2006-GallL #analysis #evolution #visualisation
- Software evolution: analysis and visualization (HG, ML), pp. 1055–1056.
- ICSE-2006-KitchenhamKJC #analysis #database #lessons learnt #scalability
- Lessons learnt from the analysis of large-scale corporate databases (BK, CK, DRJ, CC), pp. 439–444.
- ICSE-2006-KobayashiKSP #agile #analysis #effectiveness #interactive
- Analysis of the interaction between practices for introducing XP effectively (OK, MK, MS, EP), pp. 544–550.
- ICSE-2006-ManoliosV #proving #static analysis #termination #theorem proving
- Integrating static analysis and general-purpose theorem proving for termination analysis (PM, DV), pp. 873–876.
- ICSE-2006-MartinX #analysis #comprehension #interface #string
- Understanding software application interfaces via string analysis (EM, TX), pp. 901–904.
- ICSE-2006-NakagawaKH #analysis #modelling #multi
- Analysis of multi-agent systems based on KAOS modeling (HN, TK, SH), pp. 926–929.
- ICSE-2006-Ruthruff #paradigm #program analysis
- Experimental program analysis: a new paradigm for program analysis (JRR), pp. 977–980.
- ICSE-2006-VerlekarA #analysis #distributed #performance
- A methodology and tool for performance analysis of distributed server systems (RPV, VA), pp. 913–916.
- ICSE-2006-Zhao #analysis #approach #testing
- A new approach for software testability analysis (LZ), pp. 985–988.
- LDTA-2006-EichbergKKMS #analysis #incremental
- Incremental Confined Types Analysis (ME, SK, SK, MM, TS), pp. 81–96.
- SPLC-2006-LeeKKP #analysis #aspect-oriented #development #feature model #product line #programming
- Combining Feature-Oriented Analysis and Aspect-Oriented Programming for Product Line Asset Development (KL, KCK, MK, SP), pp. 103–112.
- ASPLOS-2006-SilvaS #analysis #optimisation #pointer #probability
- A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
- CC-2006-BaconCFGHR #analysis #named #online #realtime #visualisation
- Demonstration: On-Line Visualization and Analysis of Real-Time Systems with TuningFork (DFB, PC, DF, DG, MH, VTR), pp. 96–100.
- CC-2006-FangCOW #analysis #distance #reuse
- Path-Based Reuse Distance Analysis (CF, SC, SÖ, ZW), pp. 32–46.
- CC-2006-LamprechtMS #analysis #data flow #model checking
- Data-Flow Analysis as Model Checking Within the jABC (ALL, TMS, BS), pp. 101–104.
- CC-2006-LhotakH #analysis #points-to #question
- Context-Sensitive Points-to Analysis: Is It Worth It? (OL, LJH), pp. 47–64.
- CC-2006-RountevKM #analysis #data flow #interprocedural #library #scalability
- Interprocedural Dataflow Analysis in the Presence of Large Libraries (AR, SK, TJM), pp. 2–16.
- CC-2006-TokGL #analysis #data flow #interprocedural #performance #pointer
- Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
- CGO-2006-ChakrabartiL #analysis #heuristic
- Inline Analysis: Beyond Selection Heuristics (DRC, SML), pp. 221–232.
- CGO-2006-LauPC #analysis
- Selecting Software Phase Markers with Code Structure Analysis (JL, EP, BC), pp. 135–146.
- HPCA-2006-JosephVT #analysis #linear #modelling #performance
- Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
- LCTES-2006-Mine #analysis #c #embedded #pointer #source code
- Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
- LCTES-2006-SandbergEGL #analysis #performance #slicing
- Faster WCET flow analysis by program slicing (CS, AE, JG, BL), pp. 103–112.
- LCTES-2006-ZhuangP #analysis #compilation #concurrent #effectiveness #network #thread
- Effective thread management on network processors with compiler analysis (XZ, SP), pp. 72–82.
- OSDI-2006-JoukovTIWZ #analysis #latency #operating system #profiling
- Operating System Profiling via Latency Analysis (NJ, AT, RI, CPW, EZ), pp. 89–102.
- CAV-2006-BeyerHT #analysis #lazy evaluation
- Lazy Shape Analysis (DB, TAH, GT), pp. 532–546.
- CAV-2006-Lev-AmiIS #abstraction #analysis #performance #precise
- Abstraction for Shape Analysis with Fast and Precise Transformers (TLA, NI, SS), pp. 547–561.
- CAV-2006-ManoliosV #analysis #graph #termination
- Termination Analysis with Calling Context Graphs (PM, DV), pp. 401–414.
- ICLP-2006-MeraLPCH #estimation #execution #logic programming #profiling #static analysis #using
- Using Combined Static Analysis and Profiling for Logic Program Execution Time Estimation (EM, PLG, GP, MC, MVH), pp. 431–432.
- ISSTA-2006-CsallnerS #analysis #debugging #hybrid #named
- DSD-Crasher: a hybrid analysis tool for bug finding (CC, YS), pp. 245–254.
- ISSTA-2006-RuthruffER #paradigm #program analysis
- Experimental program analysis: a new program analysis paradigm (JRR, SGE, GR), pp. 49–60.
- ISSTA-2006-Wagner #analysis #detection #quality
- A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
- ISSTA-2006-ZhangKPWJMZ #analysis
- The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
- RTA-2006-GieslSST #analysis #automation #haskell #programming language #term rewriting #termination
- Automated Termination Analysis for Haskell: From Term Rewriting to Programming Languages (JG, SS, PSK, RT), pp. 297–312.
- SAT-2006-ChaviraD #analysis #component #encoding
- Encoding CNFs to Empower Component Analysis (MC, AD), pp. 61–74.
- SAT-2006-WatanabeY #analysis #problem #satisfiability
- Average-Case Analysis for the MAX-2SAT Problem (OW, MY), pp. 277–282.
- TestCom-2006-CsorbaPDC #analysis #concurrent #performance
- Performance Analysis of Concurrent PCOs in TTCN-3 (MJC, SP, SD, GC), pp. 149–160.
- VMCAI-2006-ChangCN #framework #program analysis #safety
- A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety (BYEC, AC, GCN), pp. 174–189.
- VMCAI-2006-KobayashiSW #analysis #resource management #π-calculus
- Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
- VMCAI-2006-SankaranarayananCSM #analysis #performance #relational
- Efficient Strongly Relational Polyhedral Analysis (SS, MC, HBS, ZM), pp. 111–125.
- VMCAI-2006-WiesKLPR #analysis #constraints
- Field Constraint Analysis (TW, VK, PL, AP, MCR), pp. 157–173.
- CBSE-2005-Rountev #analysis #component #data flow
- Component-Level Dataflow Analysis (AR), pp. 82–89.
- WICSA-2005-Garlan #analysis #architecture #evaluation
- Software Architecture Evaluation and Analysis Session Report (DG), pp. 227–228.
- WICSA-2005-SmithS #analysis #architecture #automation
- Extending SPQR to Architectural Analysis by Semi-Automated Training (JMS, PDS), pp. 239–242.
- WICSA-2005-TekinerdoganSA #analysis #architecture #reliability #using
- Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
- WICSA-2005-WangSM #analysis #architecture #named
- ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
- ASE-2005-CaiS #analysis #design #modelling #named
- Simon: modeling and analysis of design space structures (YC, KJS), pp. 329–332.
- ASE-2005-FredrikssonTC #analysis #component #design #development #framework #non-functional
- A component-based development framework for supporting functional and non-functional analysis in control system design (JF, MT, IC), pp. 368–371.
- ASE-2005-FriasGSB #analysis #performance #relational #specification #verification
- A strategy for efficient verification of relational specifications, based on monotonicity analysis (MFF, RG, GS, LB), pp. 305–308.
- ASE-2005-HalfondO #analysis #injection #monitoring #named
- AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
- ASE-2005-HennessyP #analysis #generative #grammarware #testing
- An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software (MH, JFP), pp. 104–113.
- ASE-2005-JurjensY #analysis #security
- Code security analysis with assertions (JJ, MY), pp. 392–395.
- ASE-2005-LangelierSP #analysis #quality #scalability #visualisation
- Visualization-based analysis of quality for large-scale software systems (GL, HAS, PP), pp. 214–223.
- ASE-2005-LienhardDA #concept analysis #identification
- Identifying traits with formal concept analysis (AL, SD, GA), pp. 66–75.
- CASE-2005-JainR #analysis #modelling #using
- Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
- CASE-2005-KoschwanezHCMGM #analysis #automation
- Automated lifetime analysis of a single yeast cell (JK, MH, RHC, MM, DG, DRM), pp. 13–18.
- CASE-2005-LeeH #analysis #array #design
- An integrated system of microcantilever arrays with carbon nanotube tips for bio/nano analysis: design and control (EL, HSH), pp. 113–117.
- CASE-2005-LeeP #analysis #constraints #graph
- Steady state analysis of a timed event graph with time window constraints (TEL, SHP), pp. 404–409.
- CASE-2005-MillerSSLM #analysis #using
- Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
- DAC-2005-AgarwalCBZ #analysis #optimisation #statistics #using
- Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
- DAC-2005-AminMKDCHI #analysis #how #question #statistics
- Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
- DAC-2005-ChangS #analysis #correlation #power management #process
- Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
- DAC-2005-ChangZNV #analysis #parametricity #statistics
- Parameterized block-based statistical timing analysis with non-gaussian parameters, nonlinear delay functions (HC, VZ, SN, CV), pp. 71–76.
- DAC-2005-ChenDHSW #analysis #concurrent #design #simulation
- Simulation based deadlock analysis for system level designs (XC, AD, HH, ALSV, YW), pp. 260–265.
- DAC-2005-DililloGPVB #analysis #comparison #fault #injection
- Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
- DAC-2005-GuptaKKS #analysis
- Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
- DAC-2005-HuLWD #analysis #integration #novel #using
- Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
- DAC-2005-KhandelwalS #analysis #correlation #framework #statistics
- A general framework for accurate statistical timing analysis considering correlations (VK, AS), pp. 89–94.
- DAC-2005-Li #analysis #grid #performance #power management #simulation
- Power grid simulation via efficient sampling-based sensitivity analysis and hierarchical symbolic relaxation (PL), pp. 664–669.
- DAC-2005-Najm #analysis #on the #statistics
- On the need for statistical timing analysis (FNN), pp. 764–765.
- DAC-2005-SuWKLK #analysis #effectiveness #embedded #functional #performance
- A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
- DAC-2005-YangCS #analysis
- Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
- DAC-2005-ZhangCHGC #analysis #polynomial #statistics
- Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
- DAC-2005-ZhanSLPNS #analysis #statistics
- Correlation-aware statistical timing analysis with non-gaussian delay distributions (YZ, AJS, XL, LTP, DN, MS), pp. 77–82.
- DAC-2005-Zhu #analysis #pointer #scalability #towards
- Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
- DATE-2005-Al-ArsHMG #analysis #fault #framework #generative #testing
- Framework for Fault Analysis and Test Generation in DRAMs (ZAA, SH, GM, AJvdG), pp. 1020–1021.
- DATE-2005-AlbersS #analysis #performance #realtime #scheduling
- Efficient Feasibility Analysis for Real-Time Systems with EDF Scheduling (KA, FS), pp. 492–497.
- DATE-2005-BurguiereR #branch #modelling #predict
- A Contribution to Branch Prediction Modeling in WCET Analysi (CB, CR), pp. 612–617.
- DATE-2005-ChakrabortyT #analysis #scheduling #streaming
- A New Task Model for Streaming Applications and Its Schedulability Analysis (SC, LT), pp. 486–491.
- DATE-2005-Conti #analysis #architecture #power management
- SystemC Analysis of a New Dynamic Power Management Architectur (MC), pp. 177–178.
- DATE-2005-ContiM #analysis #standard
- System Level Analysis of the Bluetooth Standard (MC, DM), pp. 118–123.
- DATE-2005-DhillonDC #analysis #optimisation
- Soft-Error Tolerance Analysis and Optimization of Nanometer Circuits (YSD, AUD, AC), pp. 288–293.
- DATE-2005-ForzanP #analysis #behaviour #library #modelling
- Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
- DATE-2005-GhantaVPW #analysis #grid #power management #probability #process
- Stochastic Power Grid Analysis Considering Process Variations (PG, SBKV, RP, JMW), pp. 964–969.
- DATE-2005-HeniaE #analysis #distributed #scheduling
- Context-Aware Scheduling Analysis of Distributed Systems with Tree-Shaped Task-Dependencies (RH, RE), pp. 480–485.
- DATE-2005-KangPR #analysis #statistics #using
- Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
- DATE-2005-LiC #analysis #clustering #hybrid #sequence
- Hybrid BIST Based on Repeating Sequences and Cluster Analysis (LL, KC), pp. 1142–1147.
- DATE-2005-LiuFYO #analysis #correlation #graph #modelling
- Hierarchical Variance Analysis for Analog Circuits Based on Graph Modelling and Correlation Loop Tracing (FL, JJF, DVY, SO), pp. 126–131.
- DATE-2005-MangassarianA #analysis #on the #statistics
- On Statistical Timing Analysis with Inter- and Intra-Die Variations (HM, MA), pp. 132–137.
- DATE-2005-MilevB #analysis
- A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems (MM, RB), pp. 204–208.
- DATE-2005-MukhopadhyayBR #analysis #logic #modelling
- Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits (SM, SB, KR), pp. 224–229.
- DATE-2005-NazarianPTLA #analysis #modelling
- Modeling and Propagation of Noisy Waveforms in Static Timing Analysis (SN, MP, ET, TL, AHA), pp. 776–777.
- DATE-2005-PomeranzR #analysis #detection #testing #worst-case
- Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
- DATE-2005-SchianoOLPS #analysis #fault #on the #reliability
- On the Analysis of Reed Solomon Coding for Resilience to Transient/Permanent Faults in Highly Reliable Memories (LS, MO, FL, SP, AS), pp. 580–585.
- DATE-2005-ShenQL #algorithm #analysis #performance
- A Faster Counterexample Minimization Algorithm Based on Refutation Analysis (SS, YQ, SL), pp. 672–677.
- DATE-2005-SoensPWD #analysis #simulation
- Simulation Methodology for Analysis of Substrate Noise Impact on Analog / RF Circuits Including Interconnect Resistance (CS, GVdP, PW, SD), pp. 270–275.
- DATE-2005-StaschulatESW #analysis #performance
- Context Sensitive Performance Analysis of Automotive Applications (JS, RE, AS, FW), pp. 165–170.
- DATE-2005-VargheseCY #analysis #using
- Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
- DATE-2005-WangMDCM #analysis #embedded #energy #process #variability
- Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules (HW, MM, WD, FC, KM), pp. 914–919.
- DATE-2005-ZhangCHC #analysis #pseudo #statistics
- Statistical Timing Analysis with Extended Pseudo-Canonical Timing Model (LZ, WC, YH, CCPC), pp. 952–957.
- HT-2005-Henzinger #analysis #web
- Hyperlink analysis on the world wide web (MRH), pp. 1–3.
- HT-2005-HorieYK #analysis #higher-order #rank #web
- Higher-order rank analysis for web structure (IH, KY, KK), pp. 98–106.
- HT-2005-MantratzisOC #analysis #html #navigation #using
- Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
- ICDAR-2005-AradhyeMH #analysis #categorisation #email #image #performance
- Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
- ICDAR-2005-BerardiACM #analysis #layout #process
- A color-based layout analysis to process censorship cards of film archives (MB, OA, MC, DM), pp. 1110–1114.
- ICDAR-2005-ChenL #algorithm #analysis #component #independence #segmentation
- Independent Component Analysis Segmentation Algorithm (YC, GL), pp. 680–684.
- ICDAR-2005-GarainC #analysis #approach #multi #segmentation
- Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis (UG, BBC), pp. 177–181.
- ICDAR-2005-IshitaniFS #analysis #classification #documentation #xml
- Table Structure Analysis Based on Cell Classification and Cell Modification for XML Document Transformation (YI, KF, KS), pp. 1247–1252.
- ICDAR-2005-LavenLR #analysis #approach #documentation #image #learning #statistics
- A Statistical Learning Approach To Document Image Analysis (KL, SL, STR), pp. 357–361.
- ICDAR-2005-LiSC #analysis #matrix #multi
- A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
- ICDAR-2005-NakamuraK #analysis #online
- Individuality Analysis of Online Kanji Handwriting (YN, MK), pp. 620–624.
- ICDAR-2005-SclaroffBKAALMT #analysis #gesture #recognition #video
- Tracking, Analysis, and Recognition of Human Gestures in Video (SS, MB, GK, JA, VA, RL, JJM, TPT), pp. 806–810.
- ICDAR-2005-SextonS #analysis #matrix #semantics
- Semantic Analysis of Matrix Structures (APS, VS), pp. 1141–1145.
- ICDAR-2005-YingsaereeK #analysis #detection #documentation #layout #rule-based
- Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
- PODS-2005-AbadiW #analysis #documentation #encryption #security #xml
- Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
- PODS-2005-Gehrke #analysis #modelling #privacy #tutorial
- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
- PODS-2005-LamWLMACU #database #program analysis #query
- Context-sensitive program analysis as database queries (MSL, JW, VBL, MCM, DA, MC, CU), pp. 1–12.
- SIGMOD-2005-JahangiriS #data analysis #named
- ProDA: a suite of web-services for progressive data analysis (MJ, CS), pp. 894–896.
- CSEET-2005-WangS #analysis #architecture #student #using
- Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
- ITiCSE-2005-AhmadzadehEH #analysis #debugging #student
- An analysis of patterns of debugging among novice computer science students (MA, DE, CH), pp. 84–88.
- ITiCSE-2005-Dick #analysis #assessment #design #learning #student
- Student interviews as a tool for assessment and learning in a systems analysis and design course (MD), pp. 24–28.
- ITiCSE-2005-Hamza #analysis #approach #design #object-oriented
- Introducing object-oriented analysis and design in lower-level undergraduate courses: a pattern-based approach (HSH), p. 350.
- ITiCSE-2005-NodelmanH #analysis
- Complex analysis in computer graphics course (VN, BH), p. 381.
- WRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #using #verification
- Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
- ESOP-2005-KremerR #analysis #protocol #π-calculus
- Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
- ESOP-2005-LeeYY #analysis #automation #grammarware #pointer #source code #using #verification
- Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
- ESOP-2005-Muller-OlmS #analysis #composition
- Analysis of Modular Arithmetic (MMO, HS), pp. 46–60.
- FASE-2005-JakobacEM #analysis #comprehension #interactive #source code
- Improving System Understanding via Interactive, Tailorable, Source Code Analysis (VJ, AE, NM), pp. 253–268.
- FASE-2005-JurjensS #analysis #development #security #tool support #uml
- Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
- FASE-2005-LeicherS #analysis #composition #modelling #uml
- Augmenting UML Models for Composition Conflict Analysis (AL, JGS), pp. 127–140.
- TACAS-2005-JeannetJRZ #analysis #approximate #testing
- Symbolic Test Selection Based on Approximate Analysis (BJ, TJ, VR, EZ), pp. 349–364.
- TACAS-2005-JinHS #analysis #performance
- Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit (HJ, HH, FS), pp. 287–300.
- TACAS-2005-PnueliPR #analysis
- Separating Fairness and Well-Foundedness for the Analysis of Fair Discrete Systems (AP, AP, AR), pp. 124–139.
- CSMR-2005-Al-EkramK #analysis #framework #representation #xml
- An XML-Based Framework for Language Neutral Program Representation and Generic Analysis (RAE, KK), pp. 42–51.
- CSMR-2005-BodhuinT #impact analysis
- A Tool for Static and Dynamic Model Extraction and Impact Analysis (TB, MT), p. 193.
- CSMR-2005-BreechTP #algorithm #comparison #impact analysis #online
- A Comparison of Online and Dynamic Impact Analysis Algorithms (BB, MT, LLP), pp. 143–152.
- CSMR-2005-GreevyD #analysis #approach #correlation #using
- Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
- CSMR-2005-JiangLSS #analysis #comparison #uml #web #web service
- UML-Level Analysis and Comparison of Web Service Descriptions (JJ, JL, PS, TS), pp. 236–240.
- CSMR-2005-KarailaS #analysis #case study #industrial #maintenance #source code #visual notation
- Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 158–167.
- ICSM-2005-AlvesCVSDBR #analysis #comparative #game studies #migration
- Comparative Analysis of Porting Strategies in J2ME Games (VA, IC, HV, PHMS, ALGD, PB, GR), pp. 123–132.
- ICSM-2005-GreevyDG #analysis #evolution #semantics
- Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
- ICSM-2005-HayesZ #analysis #evolution #maintenance #metric #predict
- Maintainability Prediction: A Regression Analysis of Measures of Evolving Systems (JHH, LZ), pp. 601–604.
- ICSM-2005-JinC #analysis #integration #ontology #re-engineering #tool support
- Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology (DJ, JRC), pp. 613–616.
- ICSM-2005-Lock #analysis #modelling #named
- Strider: Configuration Modelling and Analysis of Complex Systems (SL), pp. 495–504.
- ICSM-2005-MilanovaR #analysis #constraints #precise
- Annotated Inclusion Constraints for Precise Flow Analysis (AM, BGR), pp. 187–196.
- ICSM-2005-SalahMAP #dynamic analysis #towards
- Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla (MS, SM, GA, MDP), pp. 639–642.
- ICSM-2005-SharpR #java #static analysis
- Static Analysis of Object References in RMI-Based Java Software (MS, AR), pp. 101–110.
- ICSM-2005-ShinomiT #aspect-oriented #impact analysis #programming #weaving
- Impact Analysis of Weaving in Aspect-Oriented Programming (HS, TT), pp. 657–660.
- ICSM-2005-StorzerG #analysis #aspect-oriented #evolution #using
- Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
- ICSM-IT-2005-Pacione #abstraction #analysis #named #network #visualisation
- VANESSA: Visualisation Abstraction NEtwork for Software Systems Analysis (MJP), pp. 85–88.
- IWPC-2005-FischerOGG #analysis #evolution #execution
- System Evolution Tracking through Execution Trace Analysis (MF, JO, HCG, TG), pp. 237–246.
- IWPC-2005-Hamou-LhadjLF #analysis #named
- SEAT: A Usable Trace Analysis Tool (AHL, TCL, LF), pp. 157–160.
- MSR-2005-KimWB #analysis
- Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
- PASTE-2005-BradburyCD #analysis #effectiveness #empirical #formal method #framework #testing
- An empirical framework for comparing effectiveness of testing and property-based formal analysis (JSB, JRC, JD), pp. 2–5.
- PASTE-2005-ChristodorescuKG #analysis #string
- String analysis for x86 binaries (MC, NK, WHG), pp. 88–95.
- PASTE-2005-HampapuramYD #analysis #data flow #simulation
- Symbolic path simulation in path-sensitive dataflow analysis (HH, YY, MD), pp. 52–58.
- PASTE-2005-HovemeyerSP #debugging #null #pointer #static analysis
- Evaluating and tuning a static analysis to find null pointer bugs (DH, JS, WP), pp. 13–19.
- PASTE-2005-Myers #distributed #program analysis #program transformation
- Making distributed systems secure with program analysis and transformation (ACM), p. 47.
- PASTE-2005-PrivatD #compilation #object-oriented #performance #static analysis
- Link-time static analysis for efficient separate compilation of object-oriented languages (JP, RD), pp. 20–27.
- PASTE-2005-RountevVR #analysis #control flow #diagrams #reverse engineering #sequence chart #uml
- Static control-flow analysis for reverse engineering of UML sequence diagrams (AR, OV, MR), pp. 96–102.
- PASTE-2005-StroutMH #independence #program analysis
- Representation-independent program analysis (MMS, JMMC, PDH), pp. 67–74.
- PASTE-2005-TallamG #algorithm #concept analysis #testing
- A concept analysis inspired greedy algorithm for test suite minimization (ST, NG), pp. 35–42.
- SCAM-2005-BussEYW #analysis #pointer #text-to-text
- Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
- SCAM-2005-FluriGP #analysis #fine-grained
- Fine-Grained Analysis of Change Couplings (BF, HG, MP), pp. 66–74.
- SCAM-2005-JonesK #analysis #garbage collection #performance #thread
- A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading (REJ, ACK), pp. 129–138.
- SCAM-2005-ShiN #component #java #static analysis
- Static Analysis for Computing Escapability and Mutability for Java Components (AS, GN), pp. 119–128.
- PLDI-2005-LukCMPKLWRH #named #program analysis #tool support
- Pin: building customized program analysis tools with dynamic instrumentation (CKL, RSC, RM, HP, AK, PGL, SW, VJR, KMH), pp. 190–200.
- SAS-2005-Abramsky #algorithm #game studies #semantics #static analysis
- Algorithmic Game Semantics and Static Analysis (SA), p. 1.
- SAS-2005-BruynoogheGH #analysis #logic programming #source code #termination
- Inference of Well-Typings for Logic Programs with Application to Termination Analysis (MB, JPG, WVH), pp. 35–51.
- SAS-2005-JungKSY #analysis #c #statistics
- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
- SAS-2005-KodumalA #analysis #constraints #named #scalability #tool support
- Banshee: A Scalable Constraint-Based Analysis Toolkit (JK, AA), pp. 218–234.
- SAS-2005-Muller-OlmS #analysis #framework #interprocedural
- A Generic Framework for Interprocedural Analysis of Numerical Properties (MMO, HS), pp. 235–250.
- SAS-2005-RinetzkySY #analysis #interprocedural #source code
- Interprocedural Shape Analysis for Cutpoint-Free Programs (NR, MS, EY), pp. 284–302.
- SAS-2005-SecciS #analysis #object-oriented #source code
- Pair-Sharing Analysis of Object-Oriented Programs (SS, FS), pp. 320–335.
- SAS-2005-SimonK #analysis
- Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
- ICALP-2005-DonatoLT #algorithm #analysis #ranking #similarity
- Stability and Similarity of Link Analysis Ranking Algorithms (DD, SL, PT), pp. 717–729.
- FM-2005-BuchholtzGHM #analysis #framework #performance #security
- End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
- FM-2005-CacheraJPS #analysis #memory management
- Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
- FM-2005-CelikuM #composition #cost analysis #probability #source code #specification
- Compositional Specification and Analysis of Cost-Based Properties in Probabilistic Programs (OC, AM), pp. 107–122.
- FM-2005-SharyginaCCS #analysis #component
- Dynamic Component Substitutability Analysis (NS, SC, EMC, NS), pp. 512–528.
- IFM-2005-GrunskeLYW #analysis #automation #behaviour #design #specification
- An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
- SEFM-2005-BarthePS #analysis #logic #memory management #precise #using
- Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
- SEFM-2005-CeroneLC #analysis #formal method #human-computer #interactive #model checking #using
- Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
- SEFM-2005-GeorgievaM #analysis #logic
- Description Logics for Shape Analysis (LG, PM), pp. 321–331.
- SEFM-2005-LanotteMT #analysis #automaton #data type #design #distributed
- Timed Automata with Data Structures for Distributed Systems Design and Analysis (RL, AMS, AT), pp. 44–53.
- SEFM-2005-WandelerJLT #automaton #interface #modelling #static analysis
- Counting Interface Automata and their Application in Static Analysis of Actor Models (EW, JWJ, EAL, LT), pp. 106–116.
- SFM-2005-Grassi #analysis #mobile #performance
- Performance Analysis of Mobile Systems (VG), pp. 107–154.
- ICFP-2005-BergerHY #alias #analysis #higher-order #imperative #logic
- A logical analysis of aliasing in imperative higher-order functions (MB, KH, NY), pp. 280–293.
- IFL-2005-BradyH #execution #framework #static analysis
- A Dependently Typed Framework for Static Analysis of Program Execution Costs (EB, KH), pp. 74–90.
- IFL-2005-GrelckSS #analysis #array #source code
- A Binding Scope Analysis for Generic Programs on Arrays (CG, SBS, AVS), pp. 212–230.
- CHI-2005-HinckleyBRG #analysis #design #gesture
- Design and analysis of delimiters for selection-action pen gesture phrases in scriboli (KH, PB, GR, FG), pp. 451–460.
- CHI-2005-LiHGL #analysis #user interface
- Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
- SOFTVIS-2005-JohannesSW #algorithm #analysis #animation #using #visualisation
- Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
- SOFTVIS-2005-KholkarKSV #analysis #case study #specification #visual notation
- Visual specification and analysis of use cases (DK, GMK, US, RV), pp. 77–85.
- VISSOFT-2005-ClearyGEB #eclipse #plugin #static analysis #visualisation
- A Combined Software Reconnaissance & Static Analysis Eclipse Visualisation Plug-in (BC, ALG, CE, JB), pp. 121–122.
- VISSOFT-2005-RillingN #3d #analysis #comprehension #design pattern
- Applying Code Analysis and 3D Design Pattern Grouping to Facilitate Program Comprehension (JR, VLN), pp. 123–124.
- SIGAda-2005-AlexandrID #ada #analysis #clustering #performance #source code
- Experimental performance analysis of ada programs in cluster system (KA, SI, KD), pp. 31–36.
- SIGAda-2005-SinghoffLNM #analysis #memory management #requirements #scheduling
- Scheduling and memory requirements analysis with AADL (FS, JL, LN, LM), pp. 1–10.
- CAiSE-2005-Evermann #analysis #concept #modelling #ontology #using
- The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
- EDOC-2005-JonkersILS #analysis #aspect-oriented #development #integration #modelling #non-functional
- Integration and Analysis of Functional and Non-Functional Aspects in Model-Driven E-Service Development (HJ, MEI, MML, PS), pp. 229–238.
- ICEIS-v1-2005-AndreouL #analysis #parametricity #reliability
- Nonparametric Analysis of Software Reliability: Revealing the Nature of Software Failure Dataseries (ASA, CL), pp. 138–145.
- ICEIS-v2-2005-MezaNMGC #analysis #modelling
- Free Software for Decision Analysis: A Software Package for Data Envelopment Models (LAM, LBN, JCCBSdM, EGG, PHGC), pp. 207–212.
- ICEIS-v3-2005-Boulanger #analysis #named #safety
- BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
- ICEIS-v3-2005-Liang #analysis #information management #modelling #specification
- Dialogue Act Modelling for Analysis and Specification of Web-Based Information Systems (YL), pp. 89–97.
- ICEIS-v3-2005-MenkhausA #analysis #embedded #metric
- Metric Suite Directing the Failure Mode Analysis of Embedded Software Systems (GM, BA), pp. 266–273.
- ICEIS-v3-2005-MisraKK #analysis #modelling
- Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects (SCM, VK, UK), pp. 288–293.
- ICEIS-v3-2005-PereiraTS #analysis #development
- Sustainable Development and Investment in Information Technologies: A Socio-Economic Analysis (MJP, LVT, RS), pp. 81–88.
- ICEIS-v3-2005-YangLZ #analysis #performance #process
- A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
- ICEIS-v5-2005-RuschelIRF #analysis #concept #design #framework #process
- Designing Geographic Analysis Processes on the Basis of the Conceptual Framework Geoframe (CR, CI, LVdR, JLF), pp. 91–97.
- CIKM-2005-AlonsoL #analysis
- Model-guided information discovery for intelligence analysis (RA, HL), pp. 269–270.
- CIKM-2005-AslamY #analysis #geometry
- A geometric interpretation and analysis of R-precision (JAA, EY), pp. 664–671.
- CIKM-2005-MishneCHRS #analysis #automation
- Automatic analysis of call-center conversations (GM, DC, RH, AR, AS), pp. 453–459.
- CIKM-2005-WhitelawGA #analysis #sentiment #using
- Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
- ECIR-2005-BalfeS #analysis #collaboration #query #similarity #web
- An Analysis of Query Similarity in Collaborative Web Search (EB, BS), pp. 330–344.
- ECIR-2005-CachedaCPO #analysis #architecture #distributed #information retrieval #network
- Network Analysis for Distributed Information Retrieval Architectures (FC, VC, VP, IO), pp. 527–529.
- ECIR-2005-DingCZ #analysis #clustering #concept #detection #video
- Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
- ECIR-2005-HauffA #analysis #documentation
- Age Dependent Document Priors in Link Structure Analysis (CH, LA), pp. 552–554.
- ICML-2005-HeCM #analysis #locality #statistics
- Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
- ICML-2005-Pietraszek #analysis #classification #optimisation #using
- Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
- ICML-2005-PoczosL #analysis #independence #using
- Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
- ICML-2005-ShaS #analysis #reduction
- Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
- ICML-2005-SinghPGBB #analysis #learning
- Active learning for sampling in time-series experiments with application to gene expression analysis (RS, NP, DKG, BB, ZBJ), pp. 832–839.
- ICML-2005-StrehlL #analysis #estimation #modelling
- A theoretical analysis of Model-Based Interval Estimation (ALS, MLL), pp. 856–863.
- ICML-2005-TorreK #analysis #multimodal
- Multimodal oriented discriminant analysis (FDlT, TK), pp. 177–184.
- KDD-2005-ChenH #analysis #classification #image #network
- A Bayesian network classifier with inverse tree structure for voxelwise magnetic resonance image analysis (RC, EH), pp. 4–12.
- KDD-2005-ItoSKM #analysis #kernel
- Application of kernels to link analysis (TI, MS, TK, YM), pp. 586–592.
- MLDM-2005-BunkeDIK #analysis #graph #learning #predict
- Analysis of Time Series of Graphs: Prediction of Node Presence by Means of Decision Tree Learning (HB, PJD, CI, MK), pp. 366–375.
- MLDM-2005-GhoshGYB #algorithm #analysis #comparative #network #search-based
- Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
- MLDM-2005-GuptaKB #classification #concept analysis #incremental #using
- Incremental Classification Rules Based on Association Rules Using Formal Concept Analysis (AG, NK, VB), pp. 11–20.
- MLDM-2005-HamanoS #analysis #semantics
- Semantic Analysis of Association Rules via Item Response Theory (SH, MS), pp. 641–650.
- MLDM-2005-HanCY #analysis #component #feature model #image #independence #using
- Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
- MLDM-2005-OhnishiI #analysis #component #detection #independence #using
- Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
- MLDM-2005-XiaWZL #data mining #mining #modelling #random
- Mixture Random Effect Model Based Meta-analysis for Medical Data Mining (YX, SW, CZ, SL), pp. 630–640.
- SEKE-2005-AyalaCCGHSFMQ #analysis #comparative #modelling
- A Comparative Analysis of i*-Based Agent-Oriented Modeling Languages (CPA, CC, JPC, GG, MH, GS, XF, EM, CQ), pp. 43–50.
- SEKE-2005-JonssonW #comprehension #empirical #impact analysis
- Understanding Impact Analysis: An Empirical Study to Capture Knowledge on Different Organisational Level (PJ, CW), pp. 707–712.
- SEKE-2005-KongOF #analysis #formal method #security #workflow
- Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
- SEKE-2005-LiCLY #analysis #design #evolution #feature model #legacy #using
- Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
- SEKE-2005-LiuCBGROA #analysis #approach #component #composition #quality #requirements #two-level grammar
- Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
- SEKE-2005-LungZ #analysis #architecture #combinator #design
- Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis (CHL, MZ), pp. 418–423.
- SEKE-2005-YuLYH #analysis #aspect-oriented #modelling
- Formal Aspect-Oriented Modeling and Analysis by Aspect (HY, DL, LY, XH), pp. 169–174.
- SIGIR-2005-AgichteinCB #analysis #effectiveness
- Analysis of factoid questions for effective relation extraction (EA, SC, EB), pp. 567–568.
- SIGIR-2005-LiY #analysis #recursion
- Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
- SIGIR-2005-TeevanDH #analysis #automation #personalisation #process
- Personalizing search via automated analysis of interests and activities (JT, STD, EH), pp. 449–456.
- SIGIR-2005-XueYZYC #analysis
- Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
- SIGIR-2005-XuSMK #analysis #automation #music #summary #video
- Automatic music video summarization based on audio-visual-text analysis and alignment (CX, XS, NCM, MSK), pp. 361–368.
- ECMDA-FA-2005-GarousiBL #analysis #control flow #diagrams #sequence chart #uml
- Control Flow Analysis of UML 2.0 Sequence Diagrams (VG, LCB, YL), pp. 160–174.
- ECMDA-FA-2005-TabuchiSN #algebra #analysis #design #modelling #performance #probability #process #uml
- Model-Driven Performance Analysis of UML Design Models Based on Stochastic Process Algebra (NT, NS, HN), pp. 41–58.
- MoDELS-2005-ChengSB #analysis #automation #case study #experience #industrial #lessons learnt #modelling #uml
- Lessons Learned from Automated Analysis of Industrial UML Class Models (An Experience Report) (BHCC, RS, BB), pp. 324–338.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- MoDELS-2005-ChengSB #analysis #automation #case study #experience #industrial #lessons learnt #modelling #uml
- Lessons Learned from Automated Analysis of Industrial UML Class Models (An Experience Report) (BHCC, RS, BB), pp. 324–338.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- ECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
- Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
- OOPSLA-2005-ShankarSBS #analysis #runtime
- Runtime specialization with optimistic heap analysis (AS, SSS, RB, JES), pp. 327–343.
- OOPSLA-2005-SridharanGSB #analysis #java #points-to
- Demand-driven points-to analysis for Java (MS, DG, LS, RB), pp. 59–76.
- QAPL-2004-AldiniP05 #analysis #on the #probability #protocol
- On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
- QAPL-2004-HankinW05 #program analysis #λ-calculus
- λ-calculus and Quantitative Program Analysis: (Extended Abstract) (CH, HW), pp. 5–18.
- QAPL-2004-LanotteMT05 #analysis #automation #protocol
- Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
- LOPSTR-2005-CorreasPHB #analysis #composition #source code
- Experiments in Context-Sensitive Analysis of Modular Programs (JC, GP, MVH, FB), pp. 163–178.
- PPDP-2005-Mitchell #analysis #logic #network #protocol #security
- Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
- PPDP-2005-SahaR #analysis #incremental #logic programming #points-to #using
- Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
- POPL-2005-GopanRS #analysis #array #framework
- A framework for numeric analysis of array operations (DG, TWR, SS), pp. 338–350.
- POPL-2005-GulwaniN #analysis #interprocedural #precise #random #using
- Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
- POPL-2005-HackettR #analysis
- Region-based shape analysis with tracked locations (BH, RR), pp. 310–323.
- RE-2005-BucchiaroneGP #analysis #case study #industrial #quality #requirements
- Quality Analysis of NL Requirements: An Industrial Case Study (AB, SG, PP), pp. 390–394.
- RE-2005-CoheneE #analysis #design
- Contextual Risk Analysis for Interview Design (TC, SME), pp. 95–104.
- RE-2005-Fuji #analysis #education #requirements
- Finding Competitive Advantage in Requirements Analysis Education (TF), pp. 493–494.
- RE-2005-GrauFM #analysis #architecture #named
- REDEPEND-REACT: an Architecture Analysis Tool (GG, XF, NAMM), pp. 455–456.
- RE-2005-LutzNPFT #analysis #identification #requirements #using
- Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
- RE-2005-Nakamura #analysis #integration #project management
- Analysis of Project Management Reports of 49 System Integration Projects (TN), pp. 485–486.
- RE-2005-RobinsonWW #analysis #design #probability #requirements #using
- Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
- RE-2005-SvetinovicBG #analysis #concept #identification #object-oriented #student #why
- Concept Identification in Object-Oriented Domain Analysis: Why Some Students Just Don’t Get It (DS, DMB, MWG), pp. 189–198.
- SAC-2005-AbbasMG #analysis
- Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
- SAC-2005-AversanoBT #assessment #impact analysis #process
- Assessment and impact analysis for aligning business processes and software systems (LA, TB, MT), pp. 1338–1343.
- SAC-2005-BleisteinCV #analysis #approach #requirements
- Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
- SAC-2005-Casale #analysis #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
- SAC-2005-ChenA #analysis #approach #comparative #predict #sequence #using
- A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
- SAC-2005-CuiK #analysis #documentation #topic
- Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
- SAC-2005-DalkilicS #analysis #design #evaluation
- Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
- SAC-2005-DaoudM #analysis #mobile #reliability
- Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
- SAC-2005-FernandezS #analysis #modelling
- An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
- SAC-2005-HouD #analysis #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- SAC-2005-JiJC #adaptation #analysis #migration
- Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
- SAC-2005-NicolaLM #analysis #formal method #mobile #modelling
- Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
- SAC-2005-PervouchineLM #analysis #documentation #forensics
- Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
- SAC-2005-Rosso #analysis #framework #message passing #paradigm #performance #scalability
- Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
- SAC-2005-ZhangP #analysis
- Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
- ESEC-FSE-2005-InverardiMP #analysis #architecture #named
- CHARMY: an extensible tool for architectural analysis (PI, HM, PP), pp. 111–114.
- ESEC-FSE-2005-KuncakJ #algebra #analysis #data type #relational
- Relational analysis of algebraic datatypes (VK, DJ), pp. 207–216.
- GTTSE-2005-EkmanH #analysis #composition #jastadd #java #using
- Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
- ICSE-2005-ApiwattanapongOH #impact analysis #performance #precise #sequence #using
- Efficient and precise dynamic impact analysis using execute-after sequences (TA, AO, MJH), pp. 432–441.
- ICSE-2005-AvotsDLL #analysis #c #pointer #security
- Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
- ICSE-2005-FislerKMT #impact analysis #policy #verification
- Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
- ICSE-2005-LetierKMU #analysis #monitoring #requirements
- Monitoring and control in scenario-based requirements analysis (EL, JK, JM, SU), pp. 382–391.
- ICSE-2005-NagappanB05a #fault #static analysis #tool support
- Static analysis tools as early indicators of pre-release defect density (NN, TB), pp. 580–586.
- ICSE-2005-RenRST #impact analysis #java #named #source code
- Chianti: a change impact analysis tool for java programs (XR, BGR, MS, FT), pp. 664–665.
- ICSE-2005-RountevC #analysis #diagrams #sequence chart
- Object naming analysis for reverse-engineered sequence diagrams (AR, BHC), pp. 254–263.
- LDTA-2005-CassidyCDD #analysis #concurrent
- Source Transformation for Concurrency Analysis (TC, JRC, TRD, JD), pp. 57–75.
- CC-2005-QianH #analysis #case study #jit
- A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
- CC-2005-XueN #analysis #object-oriented #source code
- Completeness Analysis for Incomplete Object-Oriented Programs (JX, PHN), pp. 271–286.
- CGO-2005-GuoBTORA #analysis #low level #pointer
- Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
- HPDC-2005-BaudCLN #analysis #grid #performance
- Performance analysis of a file catalog for the LHC computing grid (JPB, JC, SL, CN), pp. 91–99.
- LCTES-2005-StaschulatE #analysis #precise #scalability #scheduling
- Scalable precision cache analysis for preemptive scheduling (JS, RE), pp. 157–165.
- LCTES-2005-TanM #analysis
- WCRT analysis for a uniprocessor with a unified prioritized cache (YT, VJMI), pp. 175–182.
- PPoPP-2005-SasturkarAWS #analysis #automation #type system
- Automated type-based analysis of data races and atomicity (AS, RA, LW, SDS), pp. 83–94.
- PPoPP-2005-WangS #source code #static analysis
- Static analysis of atomicity for programs with non-blocking synchronization (LW, SDS), pp. 61–71.
- SAT-J-2004-TangYRM05 #algorithm #analysis #problem #quantifier #satisfiability
- Analysis of Search Based Algorithms for Satisfiability of Propositional and Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 292–305.
- CAV-2005-ConwayNDE #algorithm #analysis #incremental #interprocedural #safety
- Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
- CAV-2005-CostanGGMP #algorithm #fixpoint #policy #source code #static analysis
- A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
- CAV-2005-Monniaux #analysis #composition #float #linear
- Compositional Analysis of Floating-Point Linear Numerical Filters (DM), pp. 199–212.
- CAV-2005-NeculaG #algorithm #program analysis #random #verification
- Randomized Algorithms for Program Analysis and Verification (GCN, SG), p. 1.
- CSL-2005-Lambov #analysis #complexity #framework
- Complexity and Intensionality in a Type-1 Framework for Computable Analysis (BL), pp. 442–461.
- ICLP-2005-BrasselH #analysis #functional #logic programming #nondeterminism #source code
- Nondeterminism Analysis of Functional Logic Programs (BB, MH), pp. 265–279.
- ICLP-2005-CorinSE #analysis #constraints #protocol #security
- PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
- ICLP-2005-Fruhwirth #analysis #confluence #constraints #using
- Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
- ICLP-2005-NguyenS #analysis #logic programming #polynomial #source code #termination
- Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs (MTN, DDS), pp. 311–325.
- ICLP-2005-PueblaAH #analysis #framework #logic programming #source code
- A Generic Framework for the Analysis and Specialization of Logic Programs (GP, EA, MVH), pp. 407–409.
- ICLP-2005-Sneyers #analysis #optimisation #source code
- Analysis and Optimization of CHR Programs (JS), pp. 450–451.
- LICS-2005-EsparzaKM #analysis #automaton #probability
- Quantitative Analysis of Probabilistic Pushdown Automata: Expectations and Variances (JE, AK, RM), pp. 117–126.
- LICS-2005-Hillston #algebra #analysis #process
- Process Algebras for Quantitative Analysis (JH), pp. 239–248.
- TestCom-2005-LeeJL #analysis #detection #smarttech #using
- Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
- VMCAI-2005-BalabanPZ #abstraction #analysis
- Shape Analysis by Predicate Abstraction (IB, AP, LDZ), pp. 164–180.
- VMCAI-2005-Bertrane #abstract interpretation #composition #source code #static analysis
- Static Analysis by Abstract Interpretation of the Quasi-synchronous Composition of Synchronous Programs (JB), pp. 97–112.
- VMCAI-2005-GenaimS #analysis #bytecode #data flow #java
- Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
- VMCAI-2005-Goubault-LarrecqP #analysis #c #encryption #protocol
- Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
- VMCAI-2005-SalcianuR #analysis #java #source code
- Purity and Side Effect Analysis for Java Programs (AS, MCR), pp. 199–215.
- VMCAI-2005-SankaranarayananSM #analysis #linear #programming #scalability #using
- Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
- CBSE-2004-Maydl #analysis #component #design #embedded
- Design Accompanying Analysis of Component-Based Embedded Software (WM), pp. 178–193.
- WICSA-2004-IonitaAHOT #approach #architecture #cost analysis
- A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
- WICSA-2004-MeisterRR #analysis #architecture #product line #statistics
- Applying Patterns to Develop a Product Line Architecture for Statistical Analysis Software (JM, RHR, MR), pp. 291–294.
- WICSA-2004-Perez-MartinezS #analysis #architecture #heuristic
- Heuristics for the Transition from Analysis to Software Architecture (JEPM, ASA), pp. 311–314.
- WICSA-2004-Tekinerdogan #analysis #architecture #named
- ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
- ASE-2004-Alzamil #analysis #named #performance
- RCAT: A Performance Analysis Tool (ZA), pp. 366–370.
- ASE-2004-Haydar #analysis #automation #framework #verification
- Formal Framework for Automated Analysis and Verification of Web-Based Applications (MH), pp. 410–413.
- ASE-2004-KhorG #algorithm #automation #branch #concept analysis #search-based #testing #using
- Using a Genetic Algorithm and Formal Concept Analysis to Generate Branch Coverage Test Data Automatically (SK, PG), pp. 346–349.
- ASE-2004-KonradCC #analysis #automation #diagrams #uml
- Automated Analysis of Timing Information in UML Diagrams (SK, LAC, BHCC), pp. 350–353.
- ASE-2004-SampathMSP #approach #concept analysis #scalability #testing #web
- Scalable Approach to User-Session based Testing of Web Applications through Concept Analysis (SS, VM, ALS, LLP), pp. 132–141.
- DAC-2004-AgarwalSBLNV #analysis #metric
- Variational delay metrics for interconnect timing analysis (KA, DS, DB, FL, SRN, SBKV), pp. 381–384.
- DAC-2004-AsafMZ #analysis #functional
- Defining coverage views to improve functional coverage analysis (SA, EM, AZ), pp. 41–44.
- DAC-2004-ContiCVOT #algorithm #analysis #performance
- Performance analysis of different arbitration algorithms of the AMBA AHB bus (MC, MC, GBV, SO, CT), pp. 618–621.
- DAC-2004-HungSYYP #analysis #logic #quantum #reachability #synthesis
- Quantum logic synthesis by symbolic reachability analysis (WNNH, XS, GY, JY, MAP), pp. 838–841.
- DAC-2004-LeeZB #analysis #using
- Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
- DAC-2004-LeLP #analysis #correlation #named #statistics
- STAC: statistical timing analysis with correlation (JL, XL, LTP), pp. 343–348.
- DAC-2004-MangH #abstraction #analysis #refinement
- Abstraction refinement by controllability and cooperativeness analysis (FYCM, PHH), pp. 224–229.
- DAC-2004-NajmM #analysis #statistics
- Statistical timing analysis based on a timing yield model (FNN, NM), pp. 460–465.
- DAC-2004-OrshanskyB #analysis #correlation #performance #statistics
- Fast statistical timing analysis handling arbitrary delay correlations (MO, AB), pp. 337–342.
- DAC-2004-PantBZSP #analysis #approach #grid #power management #probability
- A stochastic approach To power grid analysis (SP, DB, VZ, SS, RP), pp. 171–176.
- DAC-2004-SchueleS #abstraction #analysis #assembly #execution #source code
- Abstraction of assembler programs for symbolic worst case execution time analysis (TS, KS), pp. 107–112.
- DAC-2004-TanGQ #analysis #approach #scalability
- Hierarchical approach to exact symbolic analysis of large analog circuits (SXDT, WG, ZQ), pp. 860–863.
- DAC-2004-TanjiA #analysis #distributed
- Closed-form expressions of distributed RLC interconnects for analysis of on-chip inductance effects (YT, HA), pp. 810–813.
- DAC-2004-VisweswariahRKWN #analysis #first-order #incremental #statistics
- First-order incremental block-based statistical timing analysis (CV, KR, KK, SGW, SN), pp. 331–336.
- DAC-2004-WuC #analysis #design #network #performance
- Efficient power/ground network analysis for power integrity-driven design methodology (SWW, YWC), pp. 177–180.
- DAC-2004-ZhangHC #analysis #pipes and filters #statistics
- Statistical timing analysis in sequential circuit for on-chip global interconnect pipelining (LZ, YH, CCPC), pp. 904–907.
- DAC-2004-ZhaoBD #analysis #scalability
- A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits (CZ, XB, SD), pp. 894–899.
- DATE-DF-2004-BrandoleseFSS #analysis #energy #modelling #program transformation #source code
- Analysis and Modeling of Energy Reducing Source Code Transformations (CB, WF, FS, DS), pp. 306–311.
- DATE-DF-2004-FummiMMPP #analysis #architecture #industrial #modelling #network
- Modeling and Analysis of Heterogeneous Industrial Networks Architectures (FF, SM, MM, GP, MP), pp. 342–344.
- DATE-v1-2004-BhuniaRR #analysis #using
- Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
- DATE-v1-2004-IsseninBMD #analysis #memory management #reuse
- Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
- DATE-v1-2004-LaurentJSM #analysis #approach #functional #modelling #performance #power management
- Functional Level Power Analysis: An Efficient Approach for Modeling the Power Consumption of Complex Processors (JL, NJ, ES, EM), pp. 666–667.
- DATE-v1-2004-MurgaiRMHT #analysis #modelling
- Sensitivity-Based Modeling and Methodology for Full-Chip Substrate Noise Analysis (RM, SMR, TM, TH, MBT), pp. 610–615.
- DATE-v1-2004-PosadasHSVB #analysis #performance
- System-Level Performance Analysis in SystemC (HP, FH, PS, EV, FB), pp. 378–383.
- DATE-v1-2004-SiebenbornBR #analysis #communication #design
- Communication Analysis for System-On-Chip Design (AS, OB, WR), pp. 648–655.
- DATE-v2-2004-FengZCZF #analysis #order #reduction
- Direct Nonlinear Order Reduction with Variational Analysis (LF, XZ, CC, DZ, QF), pp. 1316–1321.
- DATE-v2-2004-GlebovGZOPB #analysis
- False-Noise Analysis for Domino Circuits (AG, SG, VZ, CO, RP, MRB), pp. 784–789.
- DATE-v2-2004-HuangCHTHH #analysis #fault #probability
- Intermittent Scan Chain Fault Diagnosis Based on Signal Probability Analysis (YH, WTC, CJH, HYT, AH, YTH), pp. 1072–1077.
- DATE-v2-2004-JersakHE #analysis #design #embedded #performance
- Context-Aware Performance Analysis for Efficient Embedded System Design (MJ, RH, RE), pp. 1046–1051.
- DATE-v2-2004-KumarBK #algorithm #analysis #array #embedded #memory management #named #reduction #using
- MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
- DATE-v2-2004-LanD #analysis #modelling #synthesis
- Synthesized Compact Models (SCM) of Substrate Noise Coupling Analysis and Synthesis in Mixed-Signal ICs (HL, RWD), pp. 836–843.
- DATE-v2-2004-MondalCM #analysis #approach #logic #using
- A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
- DATE-v2-2004-RanKWM #analysis
- Eliminating False Positives in Crosstalk Noise Analysis (YR, AK, YW, MMS), pp. 1192–1197.
- DATE-v2-2004-TanM #analysis #multi #realtime
- Timing Analysis for Preemptive Multi-Tasking Real-Time Systems with Caches (YT, VJMI), pp. 1034–1039.
- DATE-v2-2004-ZhangC #analysis #embedded #fault tolerance #realtime #scalability
- Task Feasibility Analysis and Dynamic Voltage Scaling in Fault-Tolerant Real-Time Embedded Systems (YZ, KC), pp. 1170–1175.
- DATE-v2-2004-ZhouZLLZC #analysis #using
- Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
- DRR-2004-Nishida #adaptation #analysis #documentation #image #multi
- Adaptive inverse halftoning for scanned document images through multiresolution and multiscale analysis (HN), pp. 192–203.
- HT-2004-HorieY #analysis #documentation #set #using #web
- Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
- SIGMOD-2004-MiklauS #analysis #formal method
- A Formal Analysis of Information Disclosure in Data Exchange (GM, DS), pp. 575–586.
- VLDB-2004-XuCOTH #analysis #mining #semantics
- Semantic Mining and Analysis of Gene Expression Data (XX, GC, BCO, KLT, AKHT), pp. 1261–1264.
- ITiCSE-2004-BlumensteinGNM #analysis #automation #game studies
- An experimental analysis of GAME: a generic automated marking environment (MB, SG, AN, VM), pp. 67–71.
- ESOP-2004-BugliesiFM #analysis #authentication #composition #protocol
- Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
- ESOP-2004-Feret #static analysis
- Static Analysis of Digital Filters (JF), pp. 33–48.
- ESOP-2004-Ghica #analysis #approach #logic #semantics #specification
- Semantical Analysis of Specification Logic, 3: An Operational Approach (DRG), pp. 264–278.
- ESOP-2004-LeviB #analysis #control flow
- A Control Flow Analysis for Safe and Boxed Ambients (FL, CB), pp. 188–203.
- ESOP-2004-Shmatikov #analysis #composition #decidability #encryption #protocol
- Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
- FASE-2004-ChildsGRDDHJSS #analysis #component #development #ide #named #synthesis #verification
- Cadena: An Integrated Development Environment for Analysis, Synthesis, and Verification of Component-Based Systems (AC, JG, VPR, XD, MBD, JH, GJ, PS, GS), pp. 160–164.
- FASE-2004-GhezziMP #static analysis #type system
- Enhancing Remote Method Invocation through Type-Based Static Analysis (CG, VM, GPP), pp. 339–353.
- FASE-2004-OlveczkyM #analysis #maude #realtime #specification #using
- Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
- FoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #protocol #security
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
- TACAS-2004-KrcalY #analysis #automaton #decidability #problem #scheduling #using
- Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
- TACAS-2004-LingerS #analysis #constraints #ml #theorem proving #type inference
- Binding-Time Analysis for MetaML via Type Inference and Constraint Solving (NL, TS), pp. 266–279.
- TACAS-2004-SenRA #analysis #online #parallel #performance #predict #safety #source code #thread
- Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
- TACAS-2004-SuW #analysis #constraints
- A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings (ZS, DW), pp. 280–295.
- TACAS-2004-YorshRS #analysis
- Symbolically Computing Most-Precise Abstract Operations for Shape Analysis (GY, TWR, SS), pp. 530–545.
- CSMR-2004-ItkonenHL #analysis #java
- Application of Relation Analysis to a Small Java Software (JI, MH, VL), pp. 233–242.
- ICSM-2004-BreechDSP #compilation #impact analysis #online
- Online Impact Analysis via Dynamic Compilation Technology (BB, AD, SAS, LLP), pp. 453–457.
- ICSM-2004-Granja-Alvarez #analysis #case study #maintenance #specification
- Software Maintenance: Analysis of Estimates Based on Requirement Specification in the Context of New Technologies, a Case Study (JCGA), p. 531.
- ICSM-2004-LuoJZMS #analysis #case study #component #graph #object-oriented
- An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
- ICSM-2004-MaleticC #analysis #difference #source code
- Supporting Source Code Difference Analysis (JIM, MLC), pp. 210–219.
- ICSM-2004-Marcus #program analysis #semantics
- Semantic Driven Program Analysis (AM), pp. 469–473.
- ICSM-2004-Ricca #analysis #testing #web
- Analysis, Testing and Re-Structuring of Web Applications (FR), pp. 474–478.
- ICSM-2004-RivaSSX #analysis #architecture #maintenance #reverse engineering #uml
- UML-Based Reverse Engineering and Model Analysis Approaches for Software Architecture Maintenance (CR, PS, TS, JX), pp. 50–59.
- ICSM-2004-SatpathySR #analysis #case study #maintenance #object-oriented
- Assertions in Object Oriented Software Maintenance: Analysis and a Case Study (MS, NTS, DR), pp. 124–135.
- ICSM-2004-WhiteR #analysis #industrial #realtime #testing #using
- Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
- IWPC-2004-AntoniolPZ #comprehension #dynamic analysis #web
- Understanding Web Applications through Dynamic Analysis (GA, MDP, MZ), pp. 120–131.
- IWPC-2004-LuciaFST #analysis #re-engineering #web
- Reengineering Web Applications Based on Cloned Pattern Analysis (ADL, RF, GS, GT), pp. 132–141.
- PASTE-2004-Ernst #dynamic analysis
- Invited Talk Static and dynamic analysis: synergy and duality (MDE), p. 35.
- PASTE-2004-NystromKH #analysis #pointer
- Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
- PASTE-2004-PearceKH #analysis #c #performance #pointer
- Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
- PASTE-2004-RountevKG #static analysis
- Evaluating the imprecision of static analysis (AR, SK, MG), pp. 14–16.
- SCAM-2004-RoblesG #analysis #execution #source code
- Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
- SCAM-2004-Rothermel #analysis #source code #using
- Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
- SCAM-2004-TourweM #concept analysis #mining #using
- Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
- WCRE-2004-KarailaS #analysis #case study #industrial #maintenance #source code #visual notation
- Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 294–295.
- WCRE-2004-LakhotiaP #analysis #research #tool support
- Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
- WCRE-2004-MarinDM #analysis #aspect-oriented #identification #using
- Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
- WCRE-2004-ParkKWY #analysis #behaviour #design pattern
- A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
- WCRE-2004-TonellaC #concept analysis #execution #mining
- Aspect Mining through the Formal Concept Analysis of Execution Traces (PT, MC), pp. 112–121.
- PLDI-2004-WangL #adaptation #analysis #parametricity
- Parametric analysis for adaptive computation offloading (CW, ZL), pp. 119–130.
- PLDI-2004-WhaleyL #alias #analysis #diagrams #pointer #using
- Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
- PLDI-2004-ZhuC #analysis #pointer #revisited
- Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
- SAS-2004-AmtoftB #analysis #data flow #logic
- Information Flow Analysis in Logical Form (TA, AB), pp. 100–115.
- SAS-2004-GulwaniN04a #analysis #linear
- Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions (SG, GCN), pp. 328–343.
- SAS-2004-HymansU #data flow #dependence #graph #static analysis
- Static Analysis of Gated Data Dependence Graphs (CH, EU), pp. 197–211.
- SAS-2004-JeannetLRS #analysis #approach #interprocedural #relational
- A Relational Approach to Interprocedural Shape Analysis (BJ, AL, TWR, SS), pp. 246–264.
- SAS-2004-NielsonNP #analysis
- Spatial Analysis of BioAmbients (HRN, FN, HP), pp. 69–83.
- SAS-2004-NystromKH #analysis #bottom-up #pointer #top-down
- Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
- SAS-2004-Rugina #analysis
- Shape Analysis Quantitative Shape Analysis (RR), pp. 228–245.
- SAS-2004-SankaranarayananSM #analysis #constraints
- Constraint-Based Linear-Relations Analysis (SS, HBS, ZM), pp. 53–68.
- SAS-2004-Venet #analysis #embedded #pointer #scalability #source code
- A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
- SAS-2004-YongH #analysis
- Pointer-Range Analysis (SHY, SH), pp. 133–148.
- STOC-2004-KempeM #algorithm #analysis #distributed
- A decentralized algorithm for spectral analysis (DK, FM), pp. 561–568.
- FLOPS-2004-BuenoLH #abstract interpretation #analysis #multi #standard
- Multivariant Non-failure Analysis via Standard Abstract Interpretation (FB, PLG, MVH), pp. 100–116.
- FLOPS-2004-HagiyaTYS #abstraction #analysis #automaton #logic #using
- Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
- FLOPS-2004-LuK #analysis
- Backward Pair Sharing Analysis (LL, AK), pp. 132–146.
- ICALP-2004-Toftdal #analysis #effectiveness #logic #theorem
- A Calibration of Ineffective Theorems of Analysis in a Hierarchy of Semi-classical Logical Principles: (Extended Abstract) (MT), pp. 1188–1200.
- IFM-2004-EllisI #automation #integration #program analysis #proving #theorem proving
- An Integration of Program Analysis and Automated Theorem Proving (BJE, AI), pp. 67–86.
- SEFM-2004-BertoliniFFO #analysis #automaton #generative #network #probability #testing #using
- Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
- SEFM-2004-Fronk #algebra #analysis #approach #automation #petri net #using
- Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
- SEFM-2004-NguyenM #analysis #consistency
- A Formalism for Conformance Analysis and Its Applications (TNN, EVM), pp. 330–339.
- SFM-2004-KatoenBKH #analysis #embedded
- Embedded Software Analysis with MOTOR (JPK, HCB, RK, HH), pp. 268–294.
- ICFP-2004-HermanM #embedded #partial evaluation #static analysis
- Improving the static analysis of embedded languages via partial evaluation (DH, PM), pp. 16–27.
- ICGT-2004-RosselloV #analysis #graph transformation
- Analysis of Metabolic Pathways by Graph Transformation (FR, GV), pp. 70–82.
- CHI-2004-LawH #analysis #combinator #testing #usability
- Analysis of combinatorial user effect in international usability tests (ELCL, EÞH), pp. 9–16.
- CSCW-2004-BarrettKMHTP #analysis #tool support
- Field studies of computer system administrators: analysis of system management tools and practices (RB, EK, PPM, EMH, LT, MP), pp. 388–395.
- CSCW-2004-HornFBMJ #analysis #evolution #network #research #social
- Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research (DBH, TAF, JPB, DM, SJ), pp. 582–591.
- CSCW-2004-SorokaJ #analysis #collaboration #framework
- The diffusion of reachOut: analysis and framework for the successful diffusion of collaboration technologies (VS, MJ), pp. 314–323.
- SIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
- SIGAda-2004-SoriconeN #algorithm #analysis #comparative #implementation #search-based
- Comparative analysis of genetic algorithm implementations (RS, MN), pp. 35–38.
- CAiSE-2004-GePL #analysis #database
- Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
- CAiSE-2004-SofferW #analysis #process
- Goal-Driven Analysis of Process Model Validity (PS, YW), pp. 521–535.
- ICEIS-v1-2004-Lyytinen #analysis #functional #requirements #scalability #source code
- Large Scale Requirements Engineering in Action: An Ethnographic Analysis of Functional and Political Ecologies in Situ in Space Mission Programs (KL), p. V.
- ICEIS-v2-2004-CamponovoBP #analysis
- Strategic Analysis of the Environment: A DSS for Assessing Technology Environments (GC, SB, YP), pp. 122–129.
- ICEIS-v2-2004-DhoteMR #analysis #detection #development #fault
- Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
- ICEIS-v2-2004-Martinez-OtzetaS #algorithm #analysis #nearest neighbour #probability
- Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
- ICEIS-v2-2004-Turowska #analysis #nondeterminism
- Application of Uncertain Variables to Stability Analysis and Stabilization for ATM ABR Congestion Control Systems (MT), pp. 523–526.
- ICEIS-v3-2004-BonacinBL #analysis #design #diagrams #ontology #semantics
- From Ontology Charts to Class Diagrams: Semantic Analysis Aiding Systems Design (RB, MCCB, KL), pp. 389–395.
- ICEIS-v3-2004-Douglas #analysis #enterprise #performance
- Founding Enterprise Systems on Enterprise Performance Analysis (ID), pp. 588–591.
- ICEIS-v3-2004-Hair #analysis #concept #design #named #process
- U_VBOOM: Unified Analysis and Design Process Based on the Viewpoint Concept (AH), pp. 217–224.
- ICEIS-v3-2004-Martens #analysis #re-engineering #web #web service
- Analysis and Re-Engineering of Web Services (AM), pp. 419–426.
- ICEIS-v3-2004-Ohki #analysis #formal method
- Formalization of Class Structure Extraction through Lifetime Analysis (MO), pp. 635–642.
- ICEIS-v3-2004-PanedaMGGN #analysis #monitoring #predict #video
- Analysis and Configuration Methodology for Video on Demand Services Based on Monitoring Information and Prediction (XGP, DM, RG, VGG, ÁN), pp. 289–294.
- ICEIS-v4-2004-HislopE #analysis #education #online
- An Analysis of Variation in Teaching Effort Across Tasks in Online and Traditional Courses (GWH, HJCE), pp. 202–207.
- ICEIS-v5-2004-MarzalBMC #analysis #documentation #perspective #topic
- Verbs & Topic Maps: A Proposal for Legal Documentation from the Document Content Analysis Perspective (MÁM, CB, JM, FC), pp. 63–68.
- CIKM-2004-FradkinK #adaptation #analysis #approach #design #information retrieval
- A design space approach to analysis of information retrieval adaptive filtering systems (DF, PBK), pp. 251–260.
- CIKM-2004-GollapudiS #algorithm #analysis #framework #set
- Framework and algorithms for trend analysis in massive temporal data sets (SG, DS), pp. 168–177.
- CIKM-2004-LynamBCC #analysis #documentation #feedback #multi
- A multi-system analysis of document and term selection for blind feedback (TRL, CB, CLAC, GVC), pp. 261–269.
- CIKM-2004-MegalooikonomouLW #analysis #database #performance #reduction #similarity
- A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
- CIKM-2004-SanoE #analysis #categorisation #information management
- Circumstance-based categorization analysis of knowledge management systems for the japanese market (MS, DAE), pp. 507–514.
- CIKM-2004-SrinivasanADZ #analysis #grammarware #web
- Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
- CIKM-2004-TakakiFI #analysis #documentation #query #retrieval #topic
- Associative document retrieval by query subtopic analysis and its application to invalidity patent search (TT, AF, TI), pp. 399–405.
- ECIR-2004-CachedaPO #analysis #architecture #distributed #performance
- Performance Analysis of Distributed Architectures to Index One Terabyte of Text (FC, VP, IO), pp. 394–408.
- ECIR-2004-StokesNCS #analysis #using
- Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
- ICML-2004-BanerjeeDGM #analysis #estimation #exponential #product line
- An information theoretic analysis of maximum likelihood mixture estimation for exponential families (AB, ISD, JG, SM).
- ICML-2004-DingH04a #analysis #clustering #component
- K-means clustering via principal component analysis (CHQD, XH).
- ICML-2004-EspositoS #analysis #classification #monte carlo
- A Monte Carlo analysis of ensemble classification (RE, LS).
- ICML-2004-YeJLP #analysis #feature model #linear
- Feature extraction via generalized uncorrelated linear discriminant analysis (JY, RJ, QL, HP).
- ICPR-v1-2004-BelaidB #analysis #approach #documentation
- Morphological Tagging Approach in Document Analysis of Invoices (YB, AB), pp. 469–472.
- ICPR-v1-2004-Bruce #analysis #image #information management #metric
- Image Analysis Through Local Information Measures (NB), pp. 616–619.
- ICPR-v1-2004-ChengLLC #classification #component #independence #kernel #using
- Texture Classification Using Kernel Independent Component Analysi (JC, QL, HL, YWC), pp. 620–623.
- ICPR-v1-2004-KeysersN #analysis #linear #modelling
- Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
- ICPR-v1-2004-MiasnikovH #analysis #rank
- Regression Analysis and Automorphic Orbits in Free Groups of Rank 2 (ADM, RMH), pp. 180–183.
- ICPR-v1-2004-ShenB #analysis #kernel #recognition
- Gabor Wavelets and Kernel Direct Discriminant Analysis for Face Recognition (LS, LB), pp. 284–287.
- ICPR-v1-2004-SoaresM #analysis
- Watershed Lines Suppression by Waterfall Marker Improvement and Line-Neighbourhood Analysis (FS, FM), pp. 604–607.
- ICPR-v1-2004-VaswaniC #analysis #classification #component #null #probability
- Classification Probability Analysis of Principal Component Null Space Analysis (NV, RC), pp. 240–243.
- ICPR-v1-2004-ZhouT #analysis #clustering #coordination #documentation #geometry #re-engineering #visual notation
- Coordinate Systems Reconstruction for Graphical Documents by Hough-feature Clustering and Geometric Analysis (YPZ, CLT), pp. 376–379.
- ICPR-v2-2004-BevilacquaG #analysis #image
- Age-related Skin Analysis by Capacitance Images (AB, AG), pp. 703–706.
- ICPR-v2-2004-BriassouliA #analysis
- Fusion of Frequency and Spatial Domain Information for Motion Analysis (AB, NA), pp. 175–178.
- ICPR-v2-2004-DaiQJ #analysis #kernel #pattern matching #pattern recognition #recognition
- A Kernel Fractional-Step Nonlinear Discriminant Analysis for Pattern Recognition (GD, YQ, SJ), pp. 431–434.
- ICPR-v2-2004-DeepuMR #analysis #component #online #recognition
- Principal Component Analysis for Online Handwritten Character Recognition (VD, SM, AGR), pp. 327–330.
- ICPR-v2-2004-ErikssonC #2d #analysis
- Maximizing Validity in 2D Motion Analysis (ME, SC), pp. 179–183.
- ICPR-v2-2004-GaoHBW #analysis #markov #process #using
- Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
- ICPR-v2-2004-GritaiSS #analysis #invariant #on the
- On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
- ICPR-v2-2004-ImiyaY #analysis
- Principal Curve Analysis for Temporal Data (AI, NY), pp. 475–478.
- ICPR-v2-2004-LinYL #analysis #incremental #using
- Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
- ICPR-v2-2004-LiuTLM #analysis #kernel #recognition
- Kernel Scatter-Difference Based Discriminant Analysis For Face Recognition (QL, XT, HL, SM), pp. 419–422.
- ICPR-v2-2004-PlotzF #analysis #biology #feature model #sequence
- Feature Extraction for Improved Profile HMM based Biological Sequence Analysis (TP, GAF), pp. 315–318.
- ICPR-v2-2004-SaadiTC #analysis #kernel
- Optimally Regularised Kernel Fisher Discriminant Analysis (KS, NLCT, GCC), pp. 427–430.
- ICPR-v2-2004-SantamariaBS #analysis #statistics #using
- Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
- ICPR-v2-2004-SenerG #analysis #component #independence #using
- Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
- ICPR-v2-2004-ShihL #analysis #detection #using #video
- Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
- ICPR-v2-2004-SoiferKK #analysis #fuzzy
- Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
- ICPR-v2-2004-TaoT #analysis #feedback #image #parametricity #retrieval
- Nonparametric Discriminant Analysis in Relevance Feedback for Content-Based Image Retrieval (DT, XT), pp. 1013–1016.
- ICPR-v2-2004-ZiouB #analysis #finite #image #learning #using
- Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
- ICPR-v3-2004-AiLZ #analysis #automation
- Combination of Wavelet Analysis and Color Applied to Automatic Color Grading of Ceramic Tiles (JA, DL, XZ), pp. 235–238.
- ICPR-v3-2004-GurevichM #analysis #image
- Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
- ICPR-v3-2004-KaholTP #analysis #gesture
- Computational Analysis of Mannerism Gestures (KK, PT, SP), pp. 946–949.
- ICPR-v3-2004-KolschT #analysis #detection #robust
- Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
- ICPR-v3-2004-McCallT #analysis #invariant #using
- Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
- ICPR-v3-2004-NaganumaTMM #analysis #using
- Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
- ICPR-v3-2004-NishiF #analysis #using #video
- Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
- ICPR-v3-2004-NovakLCMAHA #analysis #markov #modelling #using
- Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
- ICPR-v3-2004-TsujiZHK #analysis #correlation
- Levels of Detail Control Based on Correlation Analysis Between Surface Position and Direction (TT, HZ, TH, RK), pp. 622–625.
- ICPR-v3-2004-WangLL #analysis #towards
- Tensor Voting Toward Feature Space Analysis (JW, HL, QL), pp. 462–465.
- ICPR-v3-2004-YapCLHP #analysis #detection
- Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
- ICPR-v4-2004-HagaSY #analysis #detection #using
- Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
- ICPR-v4-2004-HsiehYCH #analysis
- A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
- ICPR-v4-2004-OtsukaM #analysis #multi
- A Particle Filter for Tracking Densely Populated Objects Based on Explicit Multiview Occlusion Analysis (KO, NM), pp. 745–750.
- ICPR-v4-2004-QinandS #algorithm #analysis #clustering #kernel
- Kernel Neural Gas Algorithms with Application to Cluster Analysis (AKQ, PNS), pp. 617–620.
- ICPR-v4-2004-SangiHS #analysis #difference #metric #using
- Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
- ICPR-v4-2004-SelmaouiRLA #analysis #detection #image
- Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
- ICPR-v4-2004-ShihKG #analysis #bound #fault #image
- An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
- ICPR-v4-2004-XieHTP #analysis #multi #video
- A Multi-Object Tracking System for Surveillance Video Analysis (DX, WH, TT, JP), pp. 767–770.
- ICPR-v4-2004-YazdiAB #analysis #process #segmentation
- Morphological Analysis of Spatio-Temporal Patterns for the Segmentation of Cyclic Human Activities (MY, ABA, RB), pp. 240–243.
- ICPR-v4-2004-ZhangLT #analysis #image #recognition #using #word
- Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
- ICPR-v4-2004-ZhouC #analysis #multi #recognition
- Multiple-Exemplar Discriminant Analysis for Face Recognition (SKZ, RC), pp. 191–194.
- KDD-2004-CaruanaN #analysis #data mining #empirical #learning #metric #mining #performance
- Data mining in metric space: an empirical analysis of supervised learning performance criteria (RC, ANM), pp. 69–78.
- KDD-2004-JinZM #analysis #mining #probability #semantics #web
- Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
- KR-2004-BenferhatBN #analysis #reasoning
- An Experimental Analysis of Possibilistic Default Reasoning (SB, JFB, RDSN), pp. 130–140.
- KR-2004-Denecker #analysis #logic programming #what
- What’s in a Model? Epistemological Analysis of Logic Programming (MD), pp. 106–113.
- KR-2004-FriedlandAWMSMASICPBC #analysis #independence #towards
- Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems (NSF, PGA, MJW, GM, NS, PM, JA, SS, DJI, VKC, BWP, KB, PC), pp. 507–515.
- KR-2004-GrootTH #analysis #approximate #case study #classification #problem #towards
- Towards a Structured Analysis of Approximate Problem Solving: A Case Study in Classification (PG, AtT, FvH), pp. 399–406.
- SEKE-2004-CaiGHD #analysis #architecture #modelling #performance
- Software Architecture Modelling and Performance Analysis with Argo/MTE (YC, JCG, JGH, XD), pp. 276–281.
- SEKE-2004-JarzabekSZZ #analysis #case study #metaprogramming
- Analysis of meta-programs: a case study (SJ, RS, HZ, ZS), pp. 68–73.
- SEKE-2004-SmithC #analysis #generative #requirements
- Commonality and Requirements Analysis for Mesh Generating Software (SS, CHC), pp. 384–387.
- SIGIR-2004-BeitzelJCGF #analysis #query #scalability #topic #web
- Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
- SIGIR-2004-CaiHWM #analysis
- Block-level link analysis (DC, XH, JRW, WYM), pp. 440–447.
- SIGIR-2004-GrankaJG #analysis #behaviour
- Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
- SIGIR-2004-MontgomerySCE #analysis #documentation #empirical #feedback
- Effect of varying number of documents in blind feedback: analysis of the 2003 NRRC RIA workshop “bf_numdocs” experiment suite (JM, LS, JC, DAE), pp. 476–477.
- SIGIR-2004-XuU #analysis #mining #ranking #web
- A unified model of literal mining and link analysis for ranking web resources (YX, KU), pp. 546–547.
- UML-2004-Reinhartz-BergerS #analysis #approach #behaviour #domain model #modelling
- Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
- TOOLS-USA-2003-EnselmeFL04 #analysis #component #contract #dependence #design
- Design by Contract: analysis of hidden dependencies in component based application (DE, GF, FLA), pp. 23–45.
- TOOLS-USA-2003-HamzaE04 #analysis #problem
- Applying Analysis Patterns Through Analogy: Problems and Solutions (HSH, MEF), pp. 197–208.
- ECOOP-2004-BeersSF #analysis
- Efficiently Verifiable Escape Analysis (MQB, CHS, MF), pp. 75–95.
- ECOOP-2004-HirzelDH #analysis #pointer
- Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
- ECOOP-2004-VitenbergKS #concurrent #database #program analysis #using
- Increasing Concurrency in Databases Using Program Analysis (RV, KK, AKS), pp. 341–363.
- OOPSLA-2004-GuyerM #static analysis
- Finding your cronies: static analysis for dynamic object colocation (SZG, KSM), pp. 237–250.
- OOPSLA-2004-RenSTRC #impact analysis #java #named #source code
- Chianti: a tool for change impact analysis of java programs (XR, FS, FT, BGR, OCC), pp. 432–448.
- LOPSTR-2004-CraigGLH #analysis #automation #prolog
- Fully Automatic Binding-Time Analysis for Prolog (SJC, JPG, ML, KSH), pp. 53–68.
- LOPSTR-2004-Lopez-GarciaBH #analysis #logic programming #source code #using
- Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
- PDCL-2004-PueblaCHBBMS #analysis #composition #framework #source code
- A Generic Framework for Context-Sensitive Analysis of Modular Programs (GP, JC, MVH, FB, MJGdlB, KM, PJS), pp. 233–260.
- PDCL-2004-VanhoofBL #analysis
- Binding-Time Analysis for Mercury (WV, MB, ML), pp. 189–232.
- POPL-2004-Muller-OlmS #algebra #analysis #interprocedural #linear #precise
- Precise interprocedural analysis through linear algebra (MMO, HS), pp. 330–341.
- RE-2004-Gonzalez-BaixauliLM #analysis #modelling #variability #visual notation
- Visual Variability Analysis for Goal Models (BGB, JCSdPL, JM), pp. 198–207.
- SAC-2004-DincovP #analysis #multi
- Computational analysis of microwave heating patterns in resonant multimode cavities (DDD, KAP), pp. 215–219.
- SAC-2004-Granmo #analysis #parallel #video
- Parallel hypothesis driven video content analysis (OCG), pp. 642–648.
- SAC-2004-Kavakli #analysis #modelling
- Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
- SAC-2004-Kincaid #analysis #array #interactive #named #visualisation
- VistaClara: an interactive visualization for exploratory analysis of DNA microarrays (RK), pp. 167–174.
- SAC-2004-MengC #analysis #scalability
- Bio-sequence analysis with cradle’s 3SoCTM software scalable system on chip (XM, VC), pp. 202–206.
- SAC-2004-OBrienH #analysis #authoring
- Training Needs Analysis: the first step in authoring e-learning content (EO, TH), pp. 935–939.
- SAC-2004-VincentR #analysis #framework #using
- A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
- SAC-2004-WebbW #analysis #biology #synthesis
- Combining analysis and synthesis in a model of a biological cell (KW, TW), pp. 185–190.
- FSE-2004-DingelL #analysis #automation #concurrent #safety #source code #txl #using
- Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
- FSE-2004-Egyed #analysis #nondeterminism
- Resolving uncertainties during trace analysis (AE), pp. 3–12.
- FSE-2004-ManevichSA #named #static analysis
- PSE: explaining program failures via postmortem static analysis (RM, MS, SA, MD, ZY), pp. 63–72.
- FSE-2004-RinardSB #analysis #aspect-oriented #classification #source code
- A classification system and analysis for aspect-oriented programs (MCR, AS, SB), pp. 147–158.
- FSE-2004-ZhangYF #analysis
- Refining code-design mapping with flow analysis (XZ, MY, JHEFL), pp. 231–240.
- FSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
- Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
- ICSE-2004-BaniassadC #analysis #approach #aspect-oriented #design #named
- Theme: An Approach for Aspect-Oriented Analysis and Design (ELAB, SC), pp. 158–167.
- ICSE-2004-Berenbach #analysis #design #evaluation #scalability #uml
- The Evaluation of Large, Complex UML Analysis and Design Model (BB), pp. 232–241.
- ICSE-2004-ChatzigeorgiouXS #analysis #design #object-oriented
- Evaluating Object-Oriented Designs with Link Analysis (AC, SX, GS), pp. 656–665.
- ICSE-2004-GouldSD04a #sql #static analysis
- JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications (CG, ZS, PTD), pp. 697–698.
- ICSE-2004-Kang #analysis #approximate #embedded #parametricity #realtime
- Parametric Analysis of Real-Time Embedded Systems with Abstract Approximation Interpretation (EYK), pp. 39–41.
- ICSE-2004-Keenan #agile #analysis #problem #process
- Agile Process Tailoring and probLem analYsis (APTLY) (FK), pp. 45–47.
- ICSE-2004-OrsoALRH #algorithm #comparison #empirical #impact analysis
- An Empirical Comparison of Dynamic Impact Analysis Algorithms (AO, TA, JL, GR, MJH), pp. 491–500.
- ICSE-2004-Roshandel #analysis #architecture #modelling #reliability
- Calculating Architectural Reliability via Modeling and Analysis (RR), pp. 69–71.
- ICSE-2004-Tonella #concept analysis #re-engineering
- Formal Concept Analysis in Software Engineering (PT), pp. 743–744.
- ATEM-2003-NaikB04 #analysis #framework #programmable #reverse engineering
- A Programmable Analysis and Transformation Framework for Reverse Engineering (RN, AB), pp. 39–49.
- LDTA-2004-BegelG #ambiguity #analysis #tool support
- Language Analysis and Tools for Ambiguous Input Streams (AB, SLG), pp. 75–96.
- SPLC-2004-ChastekD #analysis #product line
- Product Line Analysis (GJC, PD), p. 310.
- SPLC-2004-FritschH #analysis #product line
- Product Line Potential Analysis (CF, RH), pp. 228–237.
- SPLC-2004-JohnS04a #analysis #modelling #product line
- Starting Product Lines (II) — Product Line Analysis and Modeling (IJ, KS), p. 320.
- ASPLOS-2004-CherHV #analysis #garbage collection #hardware
- Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign (CYC, ALH, TNV), pp. 199–210.
- CC-2004-ChowdhuryDCBM #alias #analysis #optimisation
- The Limits of Alias Analysis for Scalar Optimizations (RAC, PD, BC, JHB, KSM), pp. 24–38.
- CC-2004-ClaussT #approach #optimisation #program analysis
- A Symbolic Approach to Bernstein Expansion for Program Analysis and Optimization (PC, IT), pp. 120–133.
- CGO-2004-LattnerA #compilation #framework #named #program analysis
- LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation (CL, VSA), pp. 75–88.
- HPCA-2004-JosephHM #analysis #case study #design #experience
- Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization (RJ, ZH, MM), pp. 36–47.
- ISMM-2004-ChenKVI #analysis #embedded #java #optimisation
- Field level analysis for heap space optimization in embedded java environments (GC, MTK, NV, MJI), pp. 131–142.
- ISMM-2004-CheremR #analysis #java #source code
- Region analysis and transformation for Java programs (SC, RR), pp. 85–96.
- ISMM-2004-SagonasW #concurrent #garbage collection #incremental
- Message analysis-guided allocation and low-pause incremental garbage collection in a concurrent language (KFS, JW), pp. 1–12.
- CAV-2004-ArthoSBEBZ #dynamic analysis #java #named #performance
- JNuke: Efficient Dynamic Analysis for Java (CA, VS, AB, PE, MB, BZ), pp. 462–465.
- CAV-2004-FarzanCMR #analysis #formal method #java #source code
- Formal Analysis of Java Programs in JavaFAN (AF, FC, JM, GR), pp. 501–505.
- CAV-2004-FuBS #analysis #formal method #named #web #web service
- WSAT: A Tool for Formal Analysis of Web Services (XF, TB, JS), pp. 510–514.
- CAV-2004-Metzner #analysis #model checking #why
- Why Model Checking Can Improve WCET Analysis (AM), pp. 334–347.
- CAV-2004-RepsSW #logic #program analysis
- Static Program Analysis via 3-Valued Logic (TWR, SS, RW), pp. 15–30.
- CAV-2004-Wang #analysis #hybrid #linear #parametricity #safety
- Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
- FATES-2004-YoonKSC #analysis #component #empirical #fault #injection #mutation testing #testing #using
- Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
- IJCAR-2004-MeseguerR #analysis #formal method #logic #semantics #specification #tool support
- Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools (JM, GR), pp. 1–44.
- RTA-2004-JonesB #analysis #calculus #termination
- Termination Analysis of the Untyped lamba-Calculus (NDJ, NB), pp. 1–23.
- SAT-2004-TangYRM #algorithm #analysis #problem #quantifier #satisfiability
- Analysis of Search Based Algorithms for Satisfiability of Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 214–223.
- VMCAI-2004-EnglerM #debugging #model checking #static analysis
- Static Analysis versus Software Model Checking for Bug Finding (DRE, MM), pp. 191–210.
- VMCAI-2004-Etessami #analysis #data flow #equation #game studies #graph #recursion #using
- Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
- VMCAI-2004-KuncakR #algebra #analysis #constraints
- Boolean Algebra of Shape Analysis Constraints (VK, MCR), pp. 59–72.
- ASE-2003-FischerS #analysis #image
- Applying AutoBayes to the Analysis of Planetary Nebulae Images (BF, JS), pp. 337–342.
- ASE-2003-SabetzadehE #analysis #approach #consistency #graph #nondeterminism
- Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach (MS, SME), pp. 12–21.
- ASE-2003-SkeneE #analysis #approach #architecture #modelling #non-functional
- A Model-Driven Approach to Non-Functional Analysis of Software Architectures (JS, WE), pp. 236–239.
- DAC-2003-AgostaBS #modelling #static analysis #transaction
- Static analysis of transaction-level models (GA, FB, DS), pp. 448–453.
- DAC-2003-BeniniMMOPP #analysis #design #difference #energy
- Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
- DAC-2003-BergamaschiJ #analysis
- State-based power analysis for systems-on-chip (RAB, YJ), pp. 638–641.
- DAC-2003-ChaiKRTWM #analysis
- Temporofunctional crosstalk noise analysis (DC, AK, YR, KHT, YW, MMS), pp. 860–863.
- DAC-2003-ChenHBW #analysis #automation #constraints #logic
- Automatic trace analysis for logic of constraints (XC, HH, FB, YW), pp. 460–465.
- DAC-2003-CroixW #analysis #modelling #using
- Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
- DAC-2003-FangRPC #modelling #performance #static analysis #towards
- Toward efficient static analysis of finite-precision effects in DSP applications via affine arithmetic modeling (CFF, RAR, MP, TC), pp. 496–501.
- DAC-2003-JersakE #analysis #dependence #multi #scheduling
- Enabling scheduling analysis of heterogeneous systems with multi-rate data dependencies and rate intervals (MJ, RE), pp. 454–459.
- DAC-2003-LeeKBS #analysis
- Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
- DAC-2003-LiLXP #analysis #megamodelling
- Analog and RF circuit macromodels for system-level analysis (XL, PL, YX, LTP), pp. 478–483.
- DAC-2003-LiMR #analysis #interactive #modelling
- Accurate timing analysis by modeling caches, speculation and their interaction (XL, TM, AR), pp. 466–471.
- DAC-2003-MaHDCCCG #analysis #optimisation
- Dynamic global buffer planning optimization based on detail block locating and congestion analysis (YM, XH, SD, SC, YC, CKC, JG), pp. 806–811.
- DAC-2003-MantheLS #analysis
- Symbolic analysis of analog circuits with hard nonlinearity (AM, ZL, CJRS), pp. 542–545.
- DAC-2003-StehrGA #analysis #bound #performance #trade-off
- Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
- DAC-2003-TsengK #analysis
- Static noise analysis with noise windows (KT, VK), pp. 864–868.
- DAC-2003-ZhuYC #adaptation #algebra #analysis #approach #multi #network #using
- Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
- DATE-2003-AgarwalBZV #analysis #bound #statistics #using
- Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
- DATE-2003-BrandoleseFSS #analysis #library
- Library Functions Timing Characterization for Source-Level Analysis (CB, WF, FS, DS), pp. 11132–11133.
- DATE-2003-CaldariCCCOPT #analysis
- System-Level Power Analysis Methodology Applied to the AMBA AHB Bus (MC, MC, MC, PC, SO, LP, CT), pp. 20032–20039.
- DATE-2003-ChoLYCZ #analysis #communication #design #scheduling
- Scheduling and Timing Analysis of HW/SW On-Chip Communication in MP SoC Design (YC, GL, SY, KC, NEZ), pp. 20132–20137.
- DATE-2003-DebOJ #analysis #embedded #simulation #using
- Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, JÖ, AJ), pp. 11100–11101.
- DATE-2003-DobrovolnyVWD #analysis #modelling
- Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
- DATE-2003-GoelB #analysis #functional #reachability #set
- Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis (AG, REB), pp. 10816–10821.
- DATE-2003-GouraryRUZM #analysis #simulation
- A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
- DATE-2003-LogothetisS #analysis #source code
- Exact High Level WCET Analysis of Synchronous Programs by Symbolic State Space Exploration (GL, KS), pp. 10196–10203.
- DATE-2003-LupeaPJ #analysis #named
- RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
- DATE-2003-MantheLSM #analysis
- Symbolic Analysis of Nonlinear Analog Circuits (AM, ZL, CJRS, KM), pp. 11108–11109.
- DATE-2003-PanBKK #analysis #architecture #design #programmable
- Design and Analysis of a Programmable Single-Chip Architecture for DVB-T Base-Band Receiver (CP, NB, AHK, AK), pp. 10468–10475.
- DATE-2003-PopEP #analysis #clustering #distributed #embedded #multi #optimisation #scheduling #synthesis
- Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems (PP, PE, ZP), pp. 10184–10189.
- DATE-2003-RapakaM #analysis #embedded #performance
- Pre-Characterization Free, Efficient Power/Performance Analysis of Embedded and General Purpose Software Applications (VSPR, DM), pp. 10504–10509.
- DATE-2003-RebaudengoRV #analysis #fault #pipes and filters
- An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor (MR, MSR, MV), pp. 10602–10607.
- DATE-2003-VanasscheGS #analysis #detection #domain model #modelling
- Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
- DATE-2003-WangZ #analysis #polynomial
- Transistor-Level Static Timing Analysis by Piecewise Quadratic Waveform Matching (ZW, JZ), pp. 11026–11031.
- DATE-2003-YeBM #analysis #communication
- Packetized On-Chip Interconnect Communication Analysis for MPSoC (TTY, LB, GDM), pp. 10344–10349.
- DocEng-2003-BayerlLGWN #analysis #documentation #semantics
- Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
- DocEng-2003-SimskeA #analysis #image
- User-directed analysis of scanned images (SJS, JA), pp. 212–221.
- DRR-2003-AradhyeHM #analysis #detection #recognition
- Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
- DRR-2003-MaoRK #algorithm #analysis #bibliography #documentation
- Document structure analysis algorithms: a literature survey (SM, AR, TK), pp. 197–207.
- HT-2003-WuGDB #analysis #collaboration
- Link analysis for collaborative knowledge building (HW, MDG, KD, NB), pp. 216–217.
- ICDAR-2003-AmanoA #analysis #documentation #grammarware #graph grammar
- Graph Grammar Based Analysis System of Complex Table Form Document (AA, NA), pp. 916–920.
- ICDAR-2003-Baird #analysis #documentation #image #library
- Digital Libraries and Document Image Analysis (HSB), p. 2–?.
- ICDAR-2003-Breuel #algorithm #analysis #documentation #layout
- An Algorithm for Finding Maximal Whitespace Rectangles at Arbitrary Orientations for Document Layout Analysis (TMB), pp. 66–70.
- ICDAR-2003-DoermannLL #analysis #documentation #image
- Progress in Camera-Based Document Image Analysis (DSD, JL, HL), p. 606–?.
- ICDAR-2003-FutrelleSCG #analysis #classification #diagrams #documentation #layout
- Extraction, layout analysis and classification of diagrams in PDF documents (RPF, MS, CC, AEG), pp. 1007–1014.
- ICDAR-2003-GattaniMG #analysis #approach #documentation #image #multi #performance
- A Fast Multifunctional Approach for Document Image Analysis (AG, MM, HG), pp. 1178–1182.
- ICDAR-2003-GuestCFP #analysis #automation #classification #geometry #sequence #using
- Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
- ICDAR-2003-HeD #analysis #documentation #image #library
- User-Assisted Archive Document Image Analysis for Digital Library Construction (JH, ACD), pp. 498–502.
- ICDAR-2003-HendersonS #analysis #approach
- Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis (TH, LS), pp. 180–184.
- ICDAR-2003-KleinAB #analysis #comprehension #documentation #modelling
- Understanding Document Analysis and Understanding (through Modeling) (BK, SA, ADB), pp. 1218–1222.
- ICDAR-2003-SimardSP #analysis #documentation #network #visual notation
- Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis (PYS, DS, JCP), pp. 958–962.
- ICDAR-2003-SuenMKL #analysis #recognition #state of the art
- Analysis and Recognition of Asian Scripts — the State of the Art (CYS, SM, SHK, CHL), p. 866–?.
- ICDAR-2003-SutantoLP #analysis #consistency #documentation
- Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter “a” (PJS, GL, VP), pp. 1091–1095.
- ICDAR-2003-ZhangS #analysis #using #word
- Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
- ICDAR-2003-ZouTLL #analysis #online #using #verification
- On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
- SIGMOD-2003-Bierman #analysis #query #semantics
- Formal semantics and analysis of object queries (GMB), pp. 407–418.
- VLDB-2003-ShiSZ #approach #data analysis #multi
- A Shrinking-Based Approach for Multi-Dimensional Data Analysis (YS, YS, AZ), pp. 440–451.
- VLDB-2003-SrinivasaK #analysis #framework #multi
- A Platform Based on the Multi-dimensional Data Model for Analysis of Bio-Molecular Structures (SS, SK), pp. 975–986.
- ITiCSE-2003-MoodyS #analysis #assurance #education #process #quality #requirements
- Incorporating quality assurance processes into requirements analysis education (DLM, GS), pp. 74–78.
- ITiCSE-2003-Trakhtenbrot #analysis #concept #how
- Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
- ESOP-2003-GenaimK #analysis #independence #logic programming #scheduling #source code
- Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling (SG, AK), pp. 84–98.
- ESOP-2003-GorrieriLM #analysis #encryption #protocol #realtime
- A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
- ESOP-2003-Laud #analysis #data flow #encryption
- Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
- ESOP-2003-Leroy #perspective #programming language #security #static analysis
- Computer Security from a Programming Language and Static Analysis Perspective (XL), pp. 1–9.
- ESOP-2003-Meadows #analysis #encryption #evolution #protocol #requirements #specification #what
- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
- ESOP-2003-RepsSL #difference #finite #logic #static analysis
- Finite Differencing of Logical Formulas for Static Analysis (TWR, SS, AL), pp. 380–398.
- FASE-2003-JinELJ #analysis #composition #data flow #network #process
- Modular Analysis of Dataflow Process Networks (YJ, RE, CL, JWJ), pp. 184–199.
- FASE-2003-Young #static analysis #testing
- Symbiosis of Static Analysis and Program Testing (MY), pp. 1–5.
- TACAS-2003-AmlaKMM #analysis #bound #model checking
- Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
- TACAS-2003-BasuR #analysis #composition #verification
- Compositional Analysis for Verification of Parameterized Systems (SB, CRR), pp. 315–330.
- TACAS-2003-BDSV #analysis #encryption #information management #protocol #representation
- A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
- TACAS-2003-BehrmannBFL #analysis #automaton #verification
- Static Guard Analysis in Timed Automata Verification (GB, PB, EF, KGL), pp. 254–277.
- TACAS-2003-BerthomieuV #analysis #branch #petri net
- State Class Constructions for Branching Analysis of Time Petri Nets (BB, FV), pp. 442–457.
- TACAS-2003-FersmanMPY #analysis #scheduling #using
- Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
- TACAS-2003-HermannsJ #analysis #component #dependence #performance #set
- A Set of Performance and Dependability Analysis Components for CADP (HH, CJ), pp. 425–430.
- TACAS-2003-SokolskyPLC #analysis #modelling #power management
- Modeling and Analysis of Power-Aware Systems (OS, AP, IL, KC), pp. 409–425.
- TACAS-2003-ZhangCS #analysis #concurrent #functional #performance #verification
- The Integrated CWB-NC/PIOATool for Functional Verification and Performance Analysis of Concurrent Systems (DZ, RC, EWS), pp. 431–436.
- CSMR-2003-GschwindO #aspect-oriented #data analysis #programming
- Improving Dynamic Data Analysis with Aspect-Oriented Programming (TG, JO), p. 259–?.
- CSMR-2003-MerloAB #analysis #fuzzy #performance
- Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels (EM, GA, PLB), p. 351–?.
- ICSM-2003-BriandLO #impact analysis #modelling #uml
- Impact Analysis and Change Management of UML Models (LCB, YL, LO), pp. 256–265.
- ICSM-2003-Klusener #analysis #source code
- Source Code Based Function Point Analysis for Enhancement Projects (SK), pp. 373–376.
- ICSM-2003-KnethenG #automation #impact analysis #named
- QuaTrace: A Tool Environment for (Semi-) Automatic Impact Analysis Based on Traces (AvK, MG), pp. 246–255.
- ICSM-2003-LandC #analysis #architecture #case study #integration
- Software Systems Integration and Architectural Analysis — A Case Study (RL, IC), pp. 338–347.
- ICSM-2003-OhstWK #analysis #design #difference #documentation #tool support
- Difference Tools for Analysis and Design Documents (DO, MW, UK), pp. 13–22.
- IWPC-2003-BeyerL #analysis #named #object-oriented #performance #source code
- CrocoPat: Efficient Pattern Analysis in Object-Oriented Programs (DB, CL), pp. 294–295.
- IWPC-2003-CoxC #analysis #approximate #semiparsing #using
- Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
- IWPC-2003-MarcusFM #3d #analysis #comprehension #using #visualisation
- Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
- IWPC-2003-Reiss #analysis #performance
- Event-Based Performance Analysis (SPR), pp. 74–83.
- SCAM-2003-AntoniolPMV #abstract syntax tree #analysis #named #xml
- XOgastan: XML-Oriented gcc AST Analysis and Transformations (GA, MDP, GM, UV), pp. 173–182.
- SCAM-2003-Martel #clustering #static analysis
- Improving the Static Analysis of Loops by Dynamic Partitioning Techniques (MM), pp. 13–21.
- SCAM-2003-PearceKH #analysis #detection #difference #online #pointer
- Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
- SCAM-2003-Verhoef #analysis #multi #source code #using
- Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
- WCRE-2003-AliasB #algorithm #analysis #data flow #recognition
- Algorithm Recognition based on Demand-Driven Data-flow Analysis (CA, DB), pp. 296–305.
- WCRE-2003-ZouG #analysis #detection #using
- Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
- PEPM-2003-ChinKX #analysis
- Extending sized type with collection analysis (WNC, SCK, DNX), pp. 75–84.
- PLDI-2003-AmmonsMBL #concept analysis #debugging #specification
- Debugging temporal specifications with concept analysis (GA, DM, RB, JRL), pp. 182–195.
- PLDI-2003-BerndlLQHU #analysis #points-to #using
- Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
- PLDI-2003-DingZ #analysis #distance #locality #predict #reuse
- Predicting whole-program locality through reuse distance analysis (CD, YZ), pp. 245–257.
- PLDI-2003-LambTA #analysis #linear #optimisation #source code
- Linear analysis and optimization of stream programs (AAL, WT, SPA), pp. 12–25.
- PLDI-2003-LinCHYJNC #analysis #compilation #framework #optimisation
- A compiler framework for speculative analysis and optimizations (JL, TC, WCH, PCY, RDCJ, TFN, SC), pp. 289–299.
- PLDI-2003-PraunG #analysis #concurrent #multi #object-oriented #source code #thread
- Static conflict analysis for multi-threaded object-oriented programs (CvP, TRG), pp. 115–128.
- SAS-2003-BessonJ #analysis #composition #datalog
- Modular Class Analysis with DATALOG (FB, TPJ), pp. 19–36.
- SAS-2003-CarlssonSW #analysis #concurrent
- Message Analysis for Concurrent Languages (RC, KFS, JW), pp. 73–90.
- SAS-2003-ChatterjeeMMZHP #analysis #source code #stack
- Stack Size Analysis for Interrupt-Driven Programs (KC, DM, RM, TZ, TAH, JP), pp. 109–126.
- SAS-2003-ChongR #data type #recursion #static analysis
- Static Analysis of Accessed Regions in Recursive Data Structures (SC, RR), pp. 463–482.
- SAS-2003-ChristensenMS #analysis #precise #string
- Precise Analysis of String Expressions (ASC, AM, MIS), pp. 1–18.
- SAS-2003-GuyerL #analysis #pointer
- Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
- SAS-2003-HalbwachsMP #analysis #linear
- Cartesian Factoring of Polyhedra in Linear Relation Analysis (NH, DM, CPV), pp. 355–365.
- SAS-2003-KremenekE #approximate #named #static analysis #statistics #using
- Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations (TK, DRE), pp. 295–315.
- SAS-2003-Logozzo #analysis #composition #object-oriented
- Class-Level Modular Analysis for Object Oriented Languages (FL), pp. 37–54.
- SAS-2003-McMillan #analysis #reachability
- Craig Interpolation and Reachability Analysis (KLM), p. 336.
- SAS-2003-RepsSJ #analysis #automaton #data flow #interprocedural
- Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
- CIAA-2003-WangHY #analysis
- TCTL Inevitability Analysis of Dense-Time Systems (FW, GDH, FY), pp. 176–187.
- ICALP-2003-Jagerskupper #algorithm #analysis
- Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces (JJ), pp. 1068–1079.
- ICALP-2003-Rabinovich #analysis #probability
- Quantitative Analysis of Probabilistic Lossy Channel Systems (AMR), pp. 1008–1021.
- FME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
- SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
- FME-2003-CompareIPS #analysis #architecture #lifecycle #model checking #validation
- Integrating Model-Checking Architectural Analysis and Validation in a Real Software Life-Cycle (DC, PI, PP, AS), pp. 114–132.
- FME-2003-Schafer #analysis #fault #model checking #realtime
- Combining Real-Time Model-Checking and Fault Tree Analysis (AS), pp. 522–541.
- SEFM-2003-JinLE #analysis #case study #component #design
- Component-Based Design and Analysis: A Case Study (YJ, CL, RE), p. 126–?.
- SFM-2003-Garlan #analysis #architecture #component #formal method #modelling
- Formal Modeling and Analysis of Software Architecture: Components, Connectors, and Events (DG), pp. 1–24.
- SFM-2003-KramerMU #analysis #approach #architecture #modelling
- Software Architecture Modeling & Analysis: A Rigorous Approach (JK, JM, SU), pp. 44–51.
- SFM-2003-StaffordWC #analysis #architecture #dependence
- The Application of Dependence Analysis to Software Architecture Descriptions (JAS, ALW, MC), pp. 52–62.
- ICFP-2003-Mairson #analysis #game studies #semantics
- From Hilbert space to Dilbert space: context semantics as a language for games and flow analysis (HGM), p. 125.
- ICFP-2003-OgawaHS #program analysis
- Iterative-free program analysis (MO, ZH, IS), pp. 111–123.
- AGTIVE-2003-DottiRS #analysis #behaviour #fault #graph grammar #specification #using
- Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
- AGTIVE-2003-LaraGV #analysis #graph transformation #hybrid #metamodelling #model checking
- Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems (JdL, EG, HV), pp. 292–298.
- AGTIVE-2003-MarburgerW #analysis #behaviour #graph transformation
- Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
- SOFTVIS-2003-ZhouSC #analysis #graph #visualisation
- Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers (CZ, KLS, TPC), pp. 143–149.
- VISSOFT-2003-MarcusFM #3d #analysis #multi #visualisation
- Source Viewer 3D (sv3D): A System for Visualizing Multi Dimensional Software Analysis Data (AM, LF, JIM), pp. 62–63.
- AdaEurope-2003-BliebergerBS #analysis
- Busy Wait Analysis (JB, BB, BS), pp. 142–152.
- AdaEurope-2003-EvangelistaKPR #ada #analysis #concurrent #named #source code
- Quasar: A New Tool for Concurrent Ada Programs Analysis (SE, CK, JFPP, PR), pp. 168–181.
- CAiSE-2003-KolpGM #analysis #requirements
- Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
- ICEIS-v2-2003-AzevedoM #analysis #capacity #enterprise #network #requirements
- Requirements of a Decision Support System for Capacity Analysis and Planning in Enterprise Networks (ALA, AM), pp. 177–184.
- ICEIS-v2-2003-NetoCMG #analysis #network #simulation #using
- Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
- ICEIS-v2-2003-SilvaIE #analysis #database #identification #information management #using
- Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
- ICEIS-v2-2003-TolbaMGA #algorithm #analysis #image #multi #segmentation #using
- MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
- ICEIS-v3-2003-AgerfalkW #analysis #concept #development #framework
- Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
- ICEIS-v3-2003-AkatsuKK #analysis #parametricity
- Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
- ICEIS-v3-2003-NahouraiiWD #analysis #information management
- Information System Failure: Analysis and Commentary (AN, JAW, AD), pp. 566–572.
- ICEIS-v3-2003-SaeedA #analysis
- Analysis of Level of Involvement of Six Best Practices of RUP in OOSP (MS, FA), pp. 523–526.
- ICEIS-v3-2003-SerraoNT #analysis #open source #operating system #security
- Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
- ICEIS-v3-2003-TyrvainenP #analysis #communication #how #metric
- How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
- ICEIS-v3-2003-WohedPDH #analysis #modelling
- Pattern Based Analysis of Eai Languages — The Case of the Business Modeling Language (PW, EP, MD, AHMtH), pp. 174–184.
- ICEIS-v4-2003-CamponovoP #analysis #mobile
- Business Model Analysis Applied to Mobile Business (GC, YP), pp. 173–183.
- ICEIS-v4-2003-Oriogun #analysis #case study #online #re-engineering #reliability #using
- Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
- ICEIS-v4-2003-PierozziGAC #analysis #towards #web
- Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
- ICEIS-v4-2003-Zhao #analysis
- Analysis of Business to Business Electronic Markets in China: Theoretical and Practical Perspectives (JZ), pp. 377–385.
- CIKM-2003-GloorLDZ #analysis #collaboration #communication #network #visualisation
- Visualization of Communication Patterns in Collaborative Innovation Networks — Analysis of Some W3C Working Groups (PAG, RL, SBCD, YZ), pp. 56–60.
- CIKM-2003-JiangC #analysis #data type #relational
- Queueing analysis of relational operators for continuous data streams (QJ, SC), pp. 271–278.
- CIKM-2003-LiZO #analysis #categorisation #multi #performance
- Efficient multi-way text categorization via generalized discriminant analysis (TL, SZ, MO), pp. 317–324.
- ICML-2003-BerardiCEM #analysis #layout #learning #logic programming #source code
- Learning Logic Programs for Layout Analysis Correction (MB, MC, FE, DM), pp. 27–34.
- ICML-2003-FurnkranzF #analysis #evaluation #metric
- An Analysis of Rule Evaluation Metrics (JF, PAF), pp. 202–209.
- ICML-2003-KaskiP #analysis
- Informative Discriminant Analysis (SK, JP), pp. 329–336.
- ICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
- Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
- ICML-2003-LaudD #analysis #learning
- The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping (AL, GD), pp. 440–447.
- ICML-2003-LiY #analysis #categorisation #classification
- A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
- ICML-2003-Mamitsuka #analysis
- Hierarchical Latent Knowledge Analysis for Co-occurrence Data (HM), pp. 504–511.
- KDD-2003-LauLW #analysis #similarity
- Similarity analysis on government regulations (GTL, KHL, GW), pp. 711–716.
- KDD-2003-Piatetsky-ShapiroKR #array #data analysis
- Capturing best practice for microarray gene expression data analysis (GPS, TK, SR), pp. 407–415.
- KDD-2003-RaoSNGR #analysis
- Clinical and financial outcomes analysis with existing hospital patient records (RBR, SS, RSN, CG, HR), pp. 416–425.
- MLDM-2003-KostersPP #analysis #complexity #implementation
- Complexity Analysis of Depth First and FP-Growth Implementations of APRIORI (WAK, WP, VP), pp. 284–292.
- MLDM-2003-RodriguesDFVC #algorithm #analysis #clustering #comparative #profiling
- A Comparative Analysis of Clustering Algorithms Applied to Load Profiling (FR, FJFD, VF, ZAV, MC), pp. 73–85.
- MLDM-2003-TanakaU #analysis #component #multi #principle #using
- Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
- SEKE-2003-BeaverS #data analysis #modelling #quality
- Spatial Data Analysis as a Software Quality Modeling Technique (JMB, GAS), pp. 74–77.
- SEKE-2003-CaoLZD #analysis #design #information management
- Open Giant Intelligent Information Systems and Its Agent-Oriented Analysis and Design (LC, CL, CZ, RD), pp. 85–89.
- SEKE-2003-ColeT #analysis #concept
- Conceptual Analysis of Software Structure (RC, TT), pp. 726–733.
- SEKE-2003-MenziesLM #analysis #fault
- Better Analysis of Defect Data at NASA (TM, RRL, ICM), pp. 607–611.
- SIGIR-2003-Davison #analysis #towards #unification
- Toward a unification of text and link analysis (BDD0), pp. 367–368.
- SIGIR-2003-Dupret #analysis #concept #orthogonal #semantics
- Latent concepts and the number orthogonal factors in latent semantic analysis (GD), pp. 221–226.
- SIGIR-2003-EironM #analysis #web
- Analysis of anchor text for web search (NE, KSM), pp. 459–460.
- SIGIR-2003-Hofmann #analysis #collaboration #probability #semantics
- Collaborative filtering via gaussian probabilistic latent semantic analysis (TH), pp. 259–266.
- SIGIR-2003-HuBZ #analysis #fault #topic
- Error analysis of difficult TREC topics (XH, SB, CZ), pp. 407–408.
- SIGIR-2003-TeevanK #analysis #development #empirical #exponential #probability #retrieval #using
- Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
- SIGIR-2003-WesterveldV #analysis #generative #image #probability #retrieval
- Experimental result analysis for a generative probabilistic image retrieval model (TW, APdV), pp. 135–142.
- SIGIR-2003-XueZCMZL #analysis #web
- Implicit link analysis for small web search (GRX, HJZ, ZC, WYM, HZ, CJL), pp. 56–63.
- SIGIR-2003-YangZK #analysis #categorisation #classification #scalability
- A scalability analysis of classifiers in text categorization (YY, JZ, BK), pp. 96–103.
- ECOOP-2003-LamR #analysis #automation #design #type system
- A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
- LOPSTR-2003-Gallagher #analysis #logic programming #program transformation #source code
- A Program Transformation for Backwards Analysis of Logic Programs (JPG), pp. 92–105.
- LOPSTR-2003-MurakamiHKT #algorithm #analysis #performance #staging
- An Efficient Staging Algorithm for Binding-Time Analysis (TM, ZH, KK, MT), pp. 106–107.
- PADL-2003-FerreiraD #analysis
- WAM Local Analysis (MF, LD), pp. 286–303.
- POPL-2003-BouajjaniET #approach #concurrent #source code #static analysis
- A generic approach to the static analysis of concurrent programs with procedures (AB, JE, TT), pp. 62–73.
- POPL-2003-Chakaravarthy #analysis #complexity
- New results on the computability and complexity of points — to analysis (VTC), pp. 115–125.
- POPL-2003-GheorghioiuSR #analysis #interprocedural
- Interprocedural compatibility analysis for static object preallocation (OG, AS, MCR), pp. 273–284.
- RE-2003-AlspaughA #analysis #case study
- Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System (TAA, AIA), pp. 355–356.
- RE-2003-BergmanM #analysis #requirements
- In Situ Requirements Analysis: A Deeper Examination of the Relationship between Requirements Determination and Project Selection (MB, GM), pp. 11–22.
- RE-2003-BolchiniPR #analysis #hypermedia #requirements
- Adding Hypermedia Requirements to Goal-Driven Analysis (DB, PP, GR), pp. 127–137.
- RE-2003-HuiLM #analysis #framework #requirements
- Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework (BH, SL, JM), pp. 117–126.
- RE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
- Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
- RE-2003-LiuYM #analysis #privacy #requirements #security #social
- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
- RE-2003-RifautMMPSLV #analysis #formal method #named #specification #tool support #using
- FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
- RE-2003-SutcliffeCN #analysis #requirements
- Evolutionary Requirements Analysis (AGS, WCC, RN), p. 264–?.
- SAC-2003-BeitzelJCFGG #analysis #data fusion #effectiveness #information retrieval
- Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies (SMB, ECJ, AC, OF, DAG, NG), pp. 823–827.
- SAC-2003-BreeseSMGE #analysis #array #framework #information management
- Labrat LIMS: An Extensible Framework for Developing Laboratory Information Management, Analysis, and Bioinformatics Solutions for Microarrays (MRB, MJS, JNM, MWG, HJE), pp. 103–108.
- SAC-2003-FurhtGHM #3d #adaptation #analysis
- An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis (BF, KG, HH, OM), pp. 765–768.
- SAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance #using
- ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
- SAC-2003-NandaK #analysis #web #web service
- Synchronization Analysis for Decentralizing Composite Web Services (MGN, NMK), pp. 407–414.
- SAC-2003-NandaR #analysis #java #parallel #pointer #source code #thread
- Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
- ESEC-FSE-2003-BradburyD #analysis #automation
- Evaluating and improving the automatic analysis of implicit invocation systems (JSB, JD), pp. 78–87.
- ESEC-FSE-2003-BrylowP #analysis
- Deadline analysis of interrupt-driven software (DB, JP), pp. 198–207.
- ESEC-FSE-2003-ChengYHP #analysis #composition #design #modelling #refactoring #scalability #towards
- Towards scalable compositional analysis by refactoring design models (YPC, MY, CLH, CYP), pp. 247–256.
- ESEC-FSE-2003-OrsoAH #impact analysis #testing
- Leveraging field data for impact analysis and regression testing (AO, TA, MJH), pp. 128–137.
- ESEC-FSE-2003-SenRA #analysis #parallel #runtime #safety #source code #thread
- Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
- ESEC-FSE-2003-TkachukD #adaptation #analysis #composition #model checking
- Adapting side effects analysis for modular program model checking (OT, MBD), pp. 188–197.
- ESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
- ICSE-2003-AbrahamssonWSR #agile #analysis #comparative
- New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
- ICSE-2003-CoppitS #analysis #effectiveness #modelling #tool support
- Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
- ICSE-2003-HatcliffDDJR #analysis #component #development #named #verification
- Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems (JH, XD, MBD, GJ, VPR), pp. 160–173.
- ICSE-2003-JohnsonKACMMZD #analysis #metric #process
- Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined (PMJ, HK, JA, CC, CAM, JM, SZ, WEJD), pp. 641–646.
- ICSE-2003-LawR #impact analysis
- Whole Program Path-Based Dynamic Impact Analysis (JL, GR), pp. 308–318.
- ICSE-2003-RountevMR #analysis #java #morphism #polymorphism #testing
- Fragment Class Analysis for Testing of Polymorphism in Java Software (AR, AM, BGR), pp. 210–220.
- ICSE-2003-YokomoriIYMKI #component #java #program analysis #slicing
- Java Program Analysis Projects in Osaka University: Aspect-Based Slicing System ADAS and Ranked-Component Search System SPARS-J (RY, TI, TY, MM, SK, KI), pp. 828–829.
- ICSE-2003-ZageZ #analysis #fault #process #scalability
- An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model (DMZ, WMZ), pp. 570–577.
- LDTA-2003-CostagliolaDFG #analysis #development #visual notation
- Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
- CC-2003-LhotakH #analysis #java #points-to #scalability #using
- Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
- CC-2003-Ryder #analysis #object-oriented #precise #programming language
- Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages (BGR), pp. 126–137.
- HPCA-2003-SakamotoKIAUMK #analysis #architecture #enterprise #performance
- Microarchitecture and Performance Analysis of a SPARC-V9 Microprocessor for Enterprise Server Systems (MS, AK, AI, TA, HU, KM, YK), pp. 141–152.
- HPDC-2003-TakefusaTMM #algorithm #analysis #architecture #energy #grid #performance #physics #replication #scheduling
- Performance Analysis of Scheduling and Replication Algorithms on Grid Datafarm Architecture for High-Energy Physics Applications (AT, OT, SM, YM), pp. 34–47.
- LCTES-2003-AmeurBBPW #analysis #embedded #robust
- Robustness analysis of avionics embedded systems (YAA, GB, FB, SP, VW), pp. 123–132.
- PPoPP-2003-ChenHHJL #analysis #architecture #compilation #multi #points-to #probability #thread
- Compiler support for speculative multithreading architecture with probabilistic points-to analysis (PSC, MYH, YSH, RDCJ, JKL), pp. 25–36.
- SOSP-2003-GummadiDSGLZ #analysis #metric #modelling #peer-to-peer
- Measurement, modeling, and analysis of a peer-to-peer file-sharing workload (PKG, RJD, SS, SDG, HML, JZ), pp. 314–329.
- CAV-2003-GrumbergHS #algorithm #analysis #distributed #reachability
- A Work-Efficient Distributed Algorithm for Reachability Analysis (OG, TH, AS), pp. 54–66.
- CSL-2003-Gerhardy #analysis #complexity
- Refined Complexity Analysis of Cut Elimination (PG), pp. 212–225.
- ICLP-2003-LagoonMS #analysis #termination
- Termination Analysis with Types Is More Accurate (VL, FM, PJS), pp. 254–268.
- ICLP-2003-Serebrenik #analysis #logic programming #source code #termination
- Termination Analysis of Logic Programs: Extended Abstract (AS), pp. 507–508.
- RTA-2003-ChenRV #analysis #rule-based #safety
- Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
- SAT-2003-ArmandoC #analysis #protocol #satisfiability #security
- Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
- VMCAI-2003-BraghinCFLP #analysis #complexity #mobile
- Complexity of Nesting Analysis in Mobile Ambients (CB, AC, RF, FLL, CP), pp. 86–101.
- VMCAI-2003-DamsN #abstraction #analysis #model checking
- Shape Analysis through Predicate Abstraction and Model Checking (DD, KSN), pp. 310–324.
- VMCAI-2003-Masse #abstract interpretation #static analysis
- Property Checking Driven Abstract Interpretation-Based Static Analysis (DM), pp. 56–69.
- VMCAI-2003-UnnikrishnanSL #analysis #bound
- Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
- CBSE-2002-Mason #analysis #component #composition #probability #reliability
- Probabilistic Analysis for Component Reliability Composition (DM), p. 8.
- WICSA-2002-Ramdane-CherifLL #analysis #architecture #configuration management #evaluation
- Dynamic Reconfigurable Software Architecture: Analysis and Evaluation (ARC, NL, FL), pp. 79–93.
- CBSE-2003-BaresiHTV #analysis #architecture #graph transformation #modelling
- Modeling and Analysis of Architectural Styles Based on Graph Transformation (LB, RH, ST, DV), p. 12.
- ASE-2002-GueheneucDJ #dynamic analysis #java #source code
- No Java without Caffeine: A Tool for Dynamic Analysis of Java Programs (YGG, RD, NJ), p. 117–?.
- ASE-2002-HeimdahlCW #analysis #model checking
- Deviation Analysis Through Model Checking (MPEH, YC, MWW), pp. 37–46.
- ASE-2002-LoerH #analysis #interactive #model checking #towards
- Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
- DAC-2002-AttarhaN #analysis #fault #modelling #using
- Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
- DAC-2002-BhuniaRS #analysis #detection #fault #locality #novel
- A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
- DAC-2002-BodapatiN #analysis #megamodelling
- High-level current macro-model for power-grid analysis (SB, FNN), pp. 385–390.
- DAC-2002-Casinovi #algorithm #analysis
- An algorithm for frequency-domain noise analysis in nonlinear systems (GC), pp. 514–517.
- DAC-2002-KoukabDD #analysis #named #performance
- HSpeedEx: a high-speed extractor for substrate noise analysis in complex mixed signal SOC (AK, CD, MJD), pp. 767–770.
- DAC-2002-KrauterW #analysis
- Variable frequency crosstalk noise analysis: : a methodology to guarantee functionality from dc to fmax (BK, DW), pp. 665–668.
- DAC-2002-LachishMUZ #analysis #functional
- Hole analysis for functional coverage data (OL, EM, SU, AZ), pp. 807–812.
- DAC-2002-LeeP #analysis #design #embedded #performance #simulation
- Timed compiled-code simulation of embedded software for performance analysis of SOC design (JYL, ICP), pp. 293–298.
- DAC-2002-LiouKWC #analysis #performance #statistics #testing #validation
- False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation (JJL, AK, LCW, KTC), pp. 566–569.
- DAC-2002-OrshanskyK #analysis #framework #probability
- A general probabilistic framework for worst case timing analysis (MO, KK), pp. 556–561.
- DAC-2002-RichterZJE #analysis #composition #design #framework #scheduling
- Model composition for scheduling analysis in platform design (KR, DZ, MJ, RE), pp. 287–292.
- DAC-2002-VaratkarM #analysis #design #multi #network
- Traffic analysis for on-chip networks design of multimedia applications (GV, RM), pp. 795–800.
- DAC-2002-WolfSE #analysis #formal method
- Associative caches in formal software timing analysis (FW, JS, RE), pp. 622–627.
- DAC-2002-YeMB #analysis #network #power management
- Analysis of power consumption on switch fabrics in network routers (TTY, GDM, LB), pp. 524–529.
- DAC-2002-ZhengP #analysis #modelling #network #symmetry
- Modeling and analysis of regular symmetrically structured power/ground distribution networks (HZ, LTP), pp. 395–398.
- DATE-2002-BecerZBPH #analysis #using
- Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
- DATE-2002-BhuniaR #analysis #detection #fault #using
- Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
- DATE-2002-BontempiK #data analysis #performance #predict
- A Data Analysis Method for Software Performance Prediction (GB, WK), pp. 971–976.
- DATE-2002-GoffioulWVD #analysis #approach #architecture #using
- Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
- DATE-2002-Hieu #analysis #design #feedback #linear #optimisation
- Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
- DATE-2002-IndrusiakGR #analysis #comparative #design #distributed #framework #repository
- Comparative Analysis and Application of Data Repository Infrastructure for Collaboration-Enabled Distributed Design Environments (LSI, MG, RAdLR), p. 1130.
- DATE-2002-IraniGS #analysis #multi #power management
- Competitive Analysis of Dynamic Power Management Strategies for Systems with Multiple Power Savings States (SI, RKG, SKS), pp. 117–123.
- DATE-2002-JerkeL #analysis #verification
- Hierarchical Current Density Verification for Electromigration Analysis in Arbitrary Shaped Metallization Patterns of Analog Circuits (GJ, JL), pp. 464–469.
- DATE-2002-KimKM #algorithm #analysis #realtime #scalability #using
- A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
- DATE-2002-LiP #analysis #approach #modelling
- A Linear-Centric Modeling Approach to Harmonic Balance Analysis (PL, LTP), pp. 634–639.
- DATE-2002-PoppOHB #analysis #automation #parametricity
- Parameter Controlled Automatic Symbolic Analysis of Nonlinear Analog Circuits (RP, JO, LH, EB), pp. 274–278.
- DATE-2002-RichterE #analysis #interface
- Event Model Interfaces for Heterogeneous System Analysis (KR, RE), pp. 506–513.
- DATE-2002-VedulaA #analysis #functional #generative #named #testing
- FACTOR: A Hierarchical Methodology for Functional Test Generation and Testability Analysis (VMV, JAA), pp. 730–734.
- SIGMOD-2002-PhanN #analysis #named #tool support
- GEA: a toolkit for gene expression analysis (JMP, RTN), p. 628.
- VLDB-2002-ChenHWW #analysis #data type #multi
- Multi-Dimensional Regression Analysis of Time-Series Data Streams (YC, GD, JH, BWW, JW), pp. 323–334.
- VLDB-2002-Faloutsos #analysis #data mining #mining #similarity
- Sensor Data Mining: Similarity Search and Pattern Analysis (CF).
- VLDB-2002-SantiniG #analysis #geometry #named
- GeMBASE: A Geometric Mediator for Brain Analysis with Surface Ensembles (SS, AG), pp. 1075–1078.
- ESOP-2002-Feret #analysis #dependence #mobile
- Dependency Analysis of Mobile Systems (JF), pp. 314–330.
- ESOP-2002-NielsonNS #analysis #automation #complexity
- Automatic Complexity Analysis (FN, HRN, HS), pp. 243–261.
- ESOP-2002-Weirich #analysis #higher-order
- Higher-Order Intensional Type Analysis (SW), pp. 98–114.
- TACAS-2002-JinKS #analysis #reachability #scheduling
- Fine-Grain Conjunction Scheduling for Symbolic Reachability Analysis (HJ, AK, FS), pp. 312–326.
- TACAS-2002-Lowry #analysis #tool support
- Software Construction and Analysis Tools for Future Space Missions (MRL), pp. 1–19.
- TACAS-2002-Subramani #analysis #scheduling
- An Analysis of Zero-Clairvoyant Scheduling (KS), pp. 98–112.
- CSMR-2002-LuciaPSP #analysis #empirical #maintenance #process
- Empirical Analysis of Massive Maintenance Processes (ADL, AP, SS, EP), pp. 5–14.
- CSMR-2002-RaysideK #algorithm #graph #problem #program analysis #reachability
- A Generic Worklist Algorithm for Graph Reachability Problems in Program Analysis (DR, KK), pp. 67–76.
- ICSM-2002-Barry #analysis #evolution #lifecycle #maintenance
- Software Evolution, Volatility and Lifecycle Maintenance Patterns: A Longitudinal Analysis (EJB), pp. 474–477.
- ICSM-2002-BinhDR #analysis #component #testing
- Testability Analysis for Software Components (TBN, MD, CR), pp. 422–429.
- ICSM-2002-BriandLS #automation #design #impact analysis #testing #uml
- Automating Impact Analysis and Regression Test Selection Based on UML Designs (LCB, YL, GS), pp. 252–261.
- ICSM-2002-ChenZBZY #analysis #approach #dependence #novel
- A Novel Approach to Measuring Class Cohesion Based on Dependence Analysis (ZC, YZ, BX, JZ, HY), pp. 377–384.
- ICSM-2002-KorelTV #analysis #dependence #modelling #reduction #testing #using
- Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
- ICSM-2002-LawR #impact analysis
- Path Profile-Based Dynamic Impact Analysis (JL, GR), p. 262.
- ICSM-2002-OhstK #analysis #design #fine-grained
- A Fine-Grained Version and Configuration Model in Analysis and Design (DO, UK), pp. 521–527.
- ICSM-2002-RotschkeK #analysis #architecture #evolution #industrial #scalability #tool support
- Architecture Analysis Tools to Support Evolution of Large Industrial Systems (TR, RLK), pp. 182–191.
- ICSM-2002-SouterP #analysis #testing
- Putting Escape Analysis to Work for Software Testing (ALS, LLP), pp. 430–439.
- ICSM-2002-TonellaP #analysis #c++ #diagrams
- Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram (PT, AP), pp. 54–63.
- IWPC-2002-Hamou-LhadjL #analysis #execution #scalability
- Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
- IWPC-2002-Moonen #impact analysis #lightweight #semiparsing #using
- Lightweight Impact Analysis using Island Grammars (LM), pp. 219–228.
- IWPC-2002-Walenstein #analysis #comprehension #tool support
- Theory-based Analysis of Cognitive Support in Software Comprehension Tools (AW), pp. 75–84.
- PASTE-2002-Morrisett #analysis
- Analysis issues for cyclone (JGM), p. 26.
- PASTE-2002-Notkin #program analysis
- Longitudinal program analysis (DN), p. 1.
- SCAM-2002-Baxter #analysis #parallel #source code
- Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
- SCAM-2002-ChangJH #exception #java #static analysis #using #visualisation
- Visualization of Exception Propagation for Java Using Static Analysis (BMC, JWJ, SHH), p. 173–?.
- SCAM-2002-HarmanFHHDW #analysis #dependence #named
- VADA: A Transformation-Based System for Variable Dependence Analysis (MH, CF, RMH, LH, SD, JW), pp. 55–64.
- WCRE-2002-ProbstKS #analysis #liveness #optimisation
- Register Liveness Analysis for Optimizing Dynamic Binary Translation (MP, AK, BS), pp. 35–44.
- WCRE-2002-RillingM #3d #analysis #on the #source code #visual notation
- On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
- WCRE-2002-TanT #fault #program analysis #transaction #verification
- Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis (HBKT, NLT), p. 233–?.
- WCRE-2002-TrogerC #analysis
- Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
- ASIA-PEPM-2002-Heintze #alias #analysis #c
- Aliasing analysis for a million lines of C (NH), pp. 47–49.
- ASIA-PEPM-2002-SheardL #analysis #search-based #using
- Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
- PEPM-2002-GomezL #analysis #automation #bound #higher-order
- Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
- PEPM-2002-Lu #analysis #logic programming #source code
- Path dependent analysis of logic programs (LL), pp. 63–74.
- SAS-2002-AdamsBDLRSW #analysis #data flow #pointer #using
- Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
- SAS-2002-BruynoogheCGV #analysis #logic programming #reuse #source code #termination
- Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
- SAS-2002-Esparza #algebra #approach #concurrent #static analysis
- An Algebraic Approach to the Static Analysis of Concurrent Software (JE), p. 3.
- SAS-2002-Faxen #analysis #representation
- Representation Analysis for Coercion Placement (KFF), pp. 278–293.
- SAS-2002-LangenbachTH #analysis #modelling #pipes and filters
- Pipeline Modeling for Timing Analysis (ML, ST, RH), pp. 294–309.
- SAS-2002-Lee #analysis #polynomial
- Finiteness Analysis in Polynomial Time (CSL), pp. 493–508.
- SAS-2002-ManevichRFGS #first-order #representation #static analysis
- Compactly Representing First-Order Structures for Static Analysis (RM, GR, JF, DG, SS), pp. 196–212.
- SAS-2002-Martel #static analysis
- Static Analysis of the Numerical Stability of Loops (MM), pp. 133–150.
- SAS-2002-Probst #analysis #composition #control flow #library
- Modular Control Flow Analysis for Libraries (CWP), pp. 165–179.
- SAS-2002-Reps #logic #program analysis
- Static Program Analysis via 3-Valued Logic (TWR), p. 1.
- SAS-2002-Venet #alias #analysis #array #data type #recursion
- Nonuniform Alias Analysis of Recursive Data Structures and Arrays (AV), pp. 36–51.
- SAS-2002-WhaleyL #analysis #performance #points-to #strict
- An Efficient Inclusion-Based Points-To Analysis for Strictly-Typed Languages (JW, MSL), pp. 180–195.
- STOC-2002-Bachmat #analysis #scheduling #sequence
- Average case analysis for batched disk scheduling and increasing subsequences (EB), pp. 277–286.
- STOC-2002-ChanLTW #analysis #video
- A unified analysis of hot video schedulers (WTC, TWL, HFT, PWHW), pp. 179–188.
- STOC-2002-ScharbrodtSS #analysis #scheduling
- A new average case analysis for completion time scheduling (MS, TS, AS), pp. 170–178.
- FME-2002-Fidge #analysis #assembly #control flow
- Timing Analysis of Assembler Code Control-Flow Paths (CJF), pp. 370–389.
- FME-2002-Pahl #abstraction #analysis #refinement #using
- Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
- FME-2002-RatsabySU #analysis
- Improvements in Coverability Analysis (GR, BS, SU), pp. 41–56.
- ICFP-2002-DubeF #adaptation #analysis
- A demand-driven adaptive type analysis (DD, MF), pp. 84–97.
- ICFP-2002-GlynnSSS #analysis #exception #strict
- Exception analysis for non-strict languages (KG, PJS, MS, HS), pp. 98–109.
- ICFP-2002-JonesG #analysis #generative #termination
- Program generation, termination, and binding-time analysis (NDJ, AJG), p. 283.
- IFL-2002-PortilloHLV #automation #cost analysis #using
- Cost Analysis Using Automatic Size and Time Inference (ÁJRP, KH, HWL, PBV), pp. 232–248.
- CHI-2002-HinckleyCBM #analysis
- Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
- CHI-2002-PiperRI #3d #analysis #interface
- Illuminating clay: a 3-D tangible interface for landscape analysis (BP, CR, HI), pp. 355–362.
- VISSOFT-2002-RillingSB #analysis #complexity #concept #source code #visualisation
- The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
- AdaEurope-2002-Amey #analysis #design
- Closing the Loop: The Influence of Code Analysis on Design (PA), pp. 151–162.
- AdaEurope-2002-ChenBZY #ada #analysis #concurrent #dependence #source code
- Static Dependency Analysis for Concurrent Ada 95 Programs (ZC, BX, JZ, HY), pp. 219–230.
- AdaEurope-2002-CzarneckiHRVR #ada #analysis #approach #data flow #named
- DataFAN: A Practical Approach to Data Flow Analysis for Ada 95 (KC, MH, ER, FV, AR), pp. 231–244.
- AdaEurope-2002-MedinaGDH #ada #analysis #component #distributed #modelling #realtime #scheduling
- Modeling and Schedulability Analysis of Hard Real-Time Distributed Systems Based on Ada Components (JLM, JJG, JMD, MGH), pp. 282–296.
- SIGAda-2002-KorochkinK #ada #analysis #java #parallel #performance
- Experimental performance analysis of the Ada95 and Java parallel program on SMP systems (DK, SK), pp. 53–56.
- CAiSE-2002-CostalST #analysis #comprehension #modelling #object-oriented #uml
- Understanding Redundancy in UML Models for Object-Oriented Analysis (DC, MRS, ET), pp. 659–674.
- ICEIS-2002-Abe #analysis #domain model #information management #modelling
- Applying Domain Modeling and SECI Theory in Knowledge Management for Information Systems Analysis (AA), pp. 725–731.
- ICEIS-2002-Audy #analysis #information management
- Analysis of the Relation between the Prescriptive and Descriptive Approaches of the Information System Planning (JLNA), pp. 553–561.
- ICEIS-2002-BarjisC #analysis #database #design #modelling #semantics #using
- Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
- ICEIS-2002-CastelaTGL #analysis #bibliography #modelling #process #validation
- Survey, Analysis and Validation of Information for Business Process Modeling (NC, JMT, AG, ERL), pp. 803–806.
- ICEIS-2002-IochpeT #analysis #aspect-oriented #process #workflow
- Inferring Aspects of the Organizational Structure through Workflow Process Analysis (CI, LHT), pp. 758–763.
- ICEIS-2002-LiuL #analysis #object-oriented #throughput
- A Knowledge Object Oriented System for High Throughput Collection and Analysis of Data (HL, TL), pp. 764–769.
- ICEIS-2002-SalimifardW #analysis #modelling #performance #petri net #using #workflow
- Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
- ICEIS-2002-SalterL #analysis #semantics #using
- Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
- ICEIS-2002-Vellido #analysis #e-commerce #network
- Neural Networks for B2C E-Commerce Analysis: Some Elements of Best Practice (AV), pp. 439–445.
- CIKM-2002-BrantsCT #analysis #documentation #probability #segmentation #semantics #topic
- Topic-based document segmentation with probabilistic latent semantic analysis (TB, FC, IT), pp. 211–218.
- CIKM-2002-KaoCLH #analysis #mining #web
- Entropy-based link analysis for mining web informative structures (HYK, MSC, SHL, JMH), pp. 574–581.
- CIKM-2002-LohLAL #analysis #query
- Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
- ECIR-2002-BenammarHM #analysis #automation #documentation #using
- Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
- ICML-2002-Gama #analysis #functional
- An Analysis of Functional Trees (JG), pp. 155–162.
- ICML-2002-GlobersonT #analysis #novel #reduction
- Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
- ICML-2002-LangfordZK #analysis #trade-off
- Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
- ICPR-v1-2002-BagdanovW #analysis #documentation #image
- Granulometric Analysis of Document Images (ADB, MW), pp. 468–471.
- ICPR-v1-2002-CarcassoniRH #analysis #recognition
- Texture Recognition through Modal Analysis of Spectral Peak Patterns (MC, ER, ERH), pp. 243–246.
- ICPR-v1-2002-DavisT #analysis #recognition
- Analysis and Recognition of Walking Movements (JWD, SRT), pp. 315–318.
- ICPR-v1-2002-DockstaderBT #analysis #feature model
- Feature Extraction for the Analysis of Gait and Human Motion (SLD, KAB, AMT), pp. 5–8.
- ICPR-v1-2002-HadidKP #analysis #learning #linear #using
- Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
- ICPR-v1-2002-KovalevKC #3d #analysis #image #symmetry
- Structural Brain Asymmetry as Revealed by 3D Texture Analysis of Anatomical MR Images (VAK, FK, DYvC), p. 808–?.
- ICPR-v1-2002-Meas-YedidTO #analysis #clustering #image #markov #random #segmentation
- Color Image Segmentation Based on Markov Random Field Clustering for Histological Image Analysis (VMY, ST, JCOM), pp. 796–799.
- ICPR-v1-2002-MoreauCP #analysis #estimation #using
- Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
- ICPR-v1-2002-OjalaMPVKH #algorithm #analysis #empirical #evaluation #framework
- Outex- New Framework for Empirical Evaluation of Texture Analysis Algorithms (TO, TM, MP, JV, JK, SH), pp. 701–706.
- ICPR-v1-2002-RellierDZF #analysis
- A Gauss-Markov Model for Hyperspectral Texture Analysis of Urban Areas (GR, XD, JZ, FF), pp. 692–695.
- ICPR-v1-2002-SinghMS #analysis #dependence #image
- Colour Image Texture Analysis: Dependence on Colour Spaces (MS, MM, SS), pp. 672–675.
- ICPR-v1-2002-SinghS #analysis #case study #comparative
- Spatial Texture Analysis: A Comparative Study (MS, SS), pp. 676–679.
- ICPR-v1-2002-VegaS #analysis
- Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
- ICPR-v1-2002-WollnyTK #analysis #segmentation
- Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
- ICPR-v2-2002-BaekD #analysis
- Factor Analysis or Background Suppression (KB, BAD), pp. 643–646.
- ICPR-v2-2002-Duncan #analysis #geometry #image #modelling #physics
- Geometrical and Physical Models for the Recovery of Quantitative Information from Medical Image Analysis (JSD), p. 277.
- ICPR-v2-2002-Fasel #analysis #network #robust #using
- Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
- ICPR-v2-2002-Ho #analysis #proximity
- Exploratory Analysis of Point Proximity in Subspaces (TKH), pp. 196–199.
- ICPR-v2-2002-KumanoAAUST #analysis #editing #video
- Video Editing Support System Based on Video Grammar and Content Analysis (MK, YA, MA, KU, KS, KT), pp. 1031–1036.
- ICPR-v2-2002-LiuHLM #analysis #kernel #recognition
- Kernel-Based Optimized Feature Vectors Selection and Discriminant Analysis for Face Recognition (QL, RH, HL, SM), pp. 362–365.
- ICPR-v2-2002-Maloof #analysis #machine learning #on the #statistics #testing
- On Machine Learning, ROC Analysis, and Statistical Tests of Significance (MAM), pp. 204–207.
- ICPR-v2-2002-MiyauchiHBK #analysis #collaboration #detection #multi #semantics #video
- Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
- ICPR-v2-2002-MoghaddamZ #analysis #linear #online #pattern matching #pattern recognition #performance #recognition
- Fast Linear Discriminant Analysis for On-Line Pattern Recognition Applications (HAM, KAZ), pp. 64–67.
- ICPR-v2-2002-PhungDV #analysis #education
- Narrative Structure Analysis with Education and Training Videos for E-Learning (DQP, CD, SV), p. 835–?.
- ICPR-v2-2002-RoliFV #analysis #classification #trade-off
- Analysis of Error-Reject Trade-off in Linearly Combined Classifiers (FR, GF, GV), pp. 120–125.
- ICPR-v2-2002-SeokL #algorithm #analysis #approach #difference #learning #probability
- The Analysis of a Stochastic Differential Approach for Langevine Comepetitive Learning Algorithm (JS, JWL), pp. 80–83.
- ICPR-v2-2002-TweedM #analysis #automation #detection
- Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
- ICPR-v2-2002-VasilescuT #analysis #image #multi #recognition
- Multilinear Image Analysis for Facial Recognition (MAOV, DT), pp. 511–514.
- ICPR-v2-2002-WachsmuthS #analysis #image #probability #process #speech
- Integrated Analysis of Speech and Images as a Probabilistic Decoding Process (SW, GS), pp. 588–592.
- ICPR-v2-2002-YeungB #analysis #mobile #towards
- Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
- ICPR-v3-2002-BhanuH #analysis #recognition
- Individual Recognition by Kinematic-Based Gait Analysis (BB, JH), pp. 343–346.
- ICPR-v3-2002-BoomgaardW #analysis #equivalence #estimation #on the #robust
- On the Equivalence of Local-Mode Finding, Robust Estimation and Mean-Shift Analysis as Used in Early Vision Tasks (RvdB, JvdW), pp. 927–930.
- ICPR-v3-2002-ChenZL #analysis #component #detection #independence #segmentation
- Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
- ICPR-v3-2002-DuongEC #analysis #documentation #image
- Features for Printed Document Image Analysis (JD, HE, MC), pp. 245–248.
- ICPR-v3-2002-FataichaCNS #analysis #approach #documentation #image
- Content Analysis in Document Images: A Scale Space Approach (YF, MC, JYN, CYS), pp. 335–338.
- ICPR-v3-2002-GuestF #analysis #approach #clustering #image
- A Clustering Approach to Corner Point Analysis in Hand Drawn Images (RMG, MCF), pp. 940–943.
- ICPR-v3-2002-KatzMDK #analysis #automation #linear #robust #speech
- Robustness of Linear Discriminant Analysis in Automatic Speech Recognitio (MK, HGM, HD, DK), pp. 371–374.
- ICPR-v3-2002-Kitamoto #analysis #component
- Fractional Component Analysis (FCA) for Mixed Signals (AK), pp. 383–386.
- ICPR-v3-2002-KongZ #analysis #authentication #image
- Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
- ICPR-v3-2002-LuT #analysis #documentation #image #layout #word
- Word Spotting in Chinese Document Images without Layout Analysis (YL, CLT), pp. 57–60.
- ICPR-v3-2002-NishidaS #analysis #documentation #image #multi
- Correcting Show-Through Effects on Document Images by Multiscale Analysis (HN, TS), pp. 65–68.
- ICPR-v3-2002-Vasilescu #analysis #recognition #synthesis
- Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
- ICPR-v4-2002-FengWP #agile #analysis #case study #comparative #modelling
- A Comparative Study of Two Velocity ProfIle Models for Rapid Stroke Analysis (CF, AW, RP), p. 52–?.
- ICPR-v4-2002-IbrahimovSD #analysis #clustering #performance #similarity #topic
- The Performance Analysis of a Chi-square Similarity Measure for Topic Related Clustering of Noisy Transcripts (OI, IKS, ND), pp. 285–288.
- ICPR-v4-2002-NgoPZ #analysis #retrieval #slicing
- Motion Retrieval by Temporal Slices Analysis (CWN, TCP, HZ), pp. 64–67.
- ICPR-v4-2002-SocolinskyS #analysis #comparative #performance #recognition
- A Comparative Analysis of Face Recognition Performance with Visible and Thermal Infrared Imagery (DAS, AS), p. 217–?.
- ICPR-v4-2002-ZhuS #adaptation #analysis #detection #feature model #statistics
- Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
- KDD-2002-RidgewayM #analysis #dataset
- Bayesian analysis of massive datasets via particle filters (GR, DM), pp. 5–13.
- KDD-2002-StolteTH #analysis #query #using #visualisation
- Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
- KDD-2002-TuzhilinA #analysis #array #scalability
- Handling very large numbers of association rules in the analysis of microarray data (AT, GA), pp. 396–404.
- KR-2002-Fruhwirth #analysis #automation #complexity
- As Time Goes by: Automatic Complexity Analysis of Simplified Rules (TWF), pp. 547–557.
- SEKE-2002-Fernandez-CondeG #analysis #framework #object-oriented
- Domain analysis of object-oriented frameworks in FrameDoc (CFC, PAGC), pp. 27–33.
- SEKE-2002-RiescoSPPJ #analysis #metamodelling #uml
- Al analysis patterns as UML meta-model constructs (AMR, GS, DP, SP, JMJ), pp. 237–238.
- SEKE-2002-RusBH #analysis #development #empirical #process #simulation
- Systematically combining process simulation and empirical data in support of decision analysis in software development (IR, SB, MH), pp. 827–833.
- SIGIR-2002-BinghamKL #analysis #documentation
- ICA and SOM in text document analysis (EB, JK, KL), pp. 361–362.
- SIGIR-2002-Canny #analysis #collaboration #privacy
- Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
- SIGIR-2002-DingHHZS #analysis #framework #rank
- PageRank, HITS and a unified framework for link analysis (CHQD, XH, PH, HZ, HDS), pp. 353–354.
- SIGIR-2002-JonesG #analysis #development #topic #visualisation
- A visualisation tool for topic tracking analysis and development (GJFJ, SMG), pp. 389–390.
- SIGIR-2002-LarkeyBC #analysis #information retrieval
- Improving stemming for Arabic information retrieval: light stemming and co-occurrence analysis (LSL, LB, MEC), pp. 275–282.
- SIGIR-2002-ParkPGK #analysis #documentation
- Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
- UML-2002-GogollaH #analysis #metamodelling #uml
- Analysis of UML Stereotypes within the UML Metamodel (MG, BHS), pp. 84–99.
- OOPSLA-2002-KovedPK #analysis #java
- Access rights analysis for Java (LK, MP, AK), pp. 359–372.
- OOPSLA-2002-ZeeR #static analysis
- Write barrier removal by static analysis (KZ, MCR), pp. 191–210.
- GPCE-2002-JonesG #analysis #generative #termination
- Program Generation, Termination, and Binding-Time Analysis (NDJ, AJG), pp. 1–31.
- GPCE-2002-Lee #analysis #polynomial #termination
- Program Termination Analysis in Polynomial Time (CSL), pp. 218–235.
- PPDP-2002-Fiore #analysis #evaluation #normalisation #semantics #λ-calculus
- Semantic analysis of normalisation by evaluation for typed λ calculus (MPF), pp. 26–37.
- PPDP-2002-JonesG #analysis #generative #termination
- Abstract and conclusions of PLI invited paper: program generation, termination, and binding-time analysis (NDJ, AJG), p. 1.
- PPDP-2002-LagoonS #analysis #logic programming #precise #source code
- Precise pair-sharing analysis of logic programs (VL, PJS), pp. 99–108.
- PPDP-2002-OvertonSS #analysis #constraints
- Constraint-based mode analysis of mercury (DO, ZS, PJS), pp. 109–120.
- PPDP-2002-SchrijversD #analysis
- Combining an improvement to PARMA trailing with trailing analysis (TS, BD), pp. 88–98.
- PADL-2002-GallagherP #abstract interpretation #analysis #automaton #finite #logic programming #nondeterminism #source code
- Abstract Interpretation over Non-deterministic Finite Tree Automata for Set-Based Analysis of Logic Programs (JPG, GP), pp. 243–261.
- PADL-2002-Meadows #analysis #declarative #using
- Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
- POPL-2002-BallR #debugging #static analysis
- The SLAM project: debugging system software via static analysis (TB, SKR), pp. 1–3.
- POPL-2002-IgarashiK #analysis #resource management
- Resource usage analysis (AI, NK), pp. 331–342.
- POPL-2002-KuncakLR #analysis
- Role analysis (VK, PL, MCR), pp. 17–32.
- POPL-2002-RubinBC #framework #optimisation #performance
- An efficient profile-analysis framework for data-layout optimizations (SR, RB, TMC), pp. 140–153.
- RE-2002-Alexander #analysis #case study #experience #industrial #trade-off
- Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
- RE-2002-BergmanM #analysis #empirical #requirements
- Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program (MB, GM), pp. 247–254.
- RE-2002-FantechiGLM #analysis #case study
- Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
- RE-2002-Garcia-DuquePB #requirements #specification #using
- An Analysis-Revision Cycle to Evolve Requirements Specifications by Using the SCTL-MUS Methodology (JGD, JJPA, ABBM), pp. 282–288.
- RE-2002-JohnMST #analysis #evolution #performance
- Efficient and Systematic Software Evolution through Domain Analysis (IJ, DM, PS, ET), pp. 237–246.
- RE-2002-KaiyaHS #analysis #named #requirements
- AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
- RE-2002-StutzSKK #analysis #uml
- Analysis beyond UML (CS, JS, DK, WK), pp. 215–218.
- SAC-2002-BorealeB #analysis #automation #protocol #security
- Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
- SAC-2002-El-Ansary #analysis #behaviour #representation #requirements #towards
- Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
- SAC-2002-GarcesF #analysis #behaviour #distributed
- Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
- SAC-2002-HauglidM #analysis #metadata #named
- SESAM: searching supported by analysis of metadata (JOH, RM), pp. 418–425.
- SAC-2002-SmithH #analysis #design #reliability
- Augmenting descriptive scenario analysis for improvements in human reliability design (SPS, MDH), pp. 739–743.
- SAC-2002-TourinoBDG #analysis #clustering #performance
- Performance analysis of MPI-I/O primitives on a PC cluster (JT, JB, RD, VMG), pp. 907–912.
- FSE-2002-BrunsC #analysis #points-to
- Searching for points-to analysis (GB, SC), pp. 61–70.
- ICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
- Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
- SPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering #using
- Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
- SPLC-2002-Yacoub #analysis #component #performance
- Performance Analysis of Component-Based Applications (SMY), pp. 299–315.
- CC-2002-CousotC #composition #program analysis
- Modular Static Program Analysis (PC, RC), pp. 159–178.
- CC-2002-GuptaMZ #analysis #optimisation #representation
- A Representation for Bit Section Based Analysis and Optimization (RG, EM, YZ), pp. 62–77.
- CC-2002-Mohnen #analysis #approach #data flow
- A Graph-Free Approach to Data-Flow Analysis (MM), pp. 46–61.
- CC-2002-NeculaMRW #analysis #c #named #source code #tool support
- CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs (GCN, SM, SPR, WW), pp. 213–228.
- HPCA-2002-KampeSD #analysis #branch #fourier #predict #using
- The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
- OSDI-2002-DunlapKCBC #analysis #named
- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
- OSDI-2002-SaroiuGDGL #analysis #internet
- An Analysis of Internet Content Delivery Systems (SS, PKG, RJD, SDG, HML), pp. 315–327.
- CADE-2002-Baaz #analysis #proving
- Proof Analysis by Resolution (MB), pp. 517–532.
- CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-BaumgartnerKA #analysis
- Property Checking via Structural Analysis (JB, AK, JAA), pp. 151–165.
- CAV-2002-Holzmann #analysis #model checking
- Software Analysis and Model Checking (GJH), pp. 1–16.
- CAV-2002-YonedaKM #analysis #automation #constraints
- Automatic Derivation of Timing Constraints by Failure Analysis (TY, TK, CJM), pp. 195–208.
- ICLP-2002-DucasseL #analysis #automation #execution
- Automated Analysis of CLP(FD) Program Execution Traces (MD, LL), pp. 470–471.
- ICLP-2002-SchrijversBD #analysis
- Trailing Analysis for HAL (TS, MJGdlB, BD), pp. 38–53.
- ISSTA-2002-BriandLS #analysis #contract #fault #object-oriented
- Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
- ISSTA-2002-LiangPH #analysis #precise #profiling #using
- Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
- ISSTA-2002-VaysburgTK #analysis #dependence #reduction #testing
- Dependence analysis in reduction of requirement based test suites (BV, LHT, BK), pp. 107–111.
- RTA-2002-KennawayKP #composition #static analysis #λ-calculus
- Static Analysis of Modularity of β-Reduction in the Hyperbalanced λ-Calculus (RK, ZK, AP), pp. 51–65.
- RTA-2002-Mitchell #analysis #multi #protocol #security
- Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
- SAT-2002-KaporisKL #algorithm #analysis #probability #satisfiability
- The Probabilistic Analysis of a Greedy Satisfiability Algorithm (ACK, LMK, EGL), p. 5.
- SAT-2002-MonassonC #algorithm #analysis #exponential #random #satisfiability #scalability
- Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
- TestCom-2002-CastanetR #analysis #proving #reachability #testing #theorem proving
- Generate Certified Test Cases by Combining Theorem Proving and Reachability Analysis (RC, DR), pp. 249–266.
- VMCAI-2002-CharatonikMP #analysis #composition #termination
- Compositional Termination Analysis of Symbolic Forward Analysis (WC, SM, AP), pp. 109–125.
- VMCAI-2002-MurawskiY #analysis
- Static Monotonicity Analysis for lambda-definable Functions over Lattices (ASM, KY), pp. 139–153.
- CBSE-2001-Mason #probability #program analysis
- Probability Density Functions in Program Analysis (DM), p. 13.
- ASE-2001-BratV #model checking #static analysis
- Combining Static Analysis and Model Checking for Software Analysis (GPB, WV), p. 262–?.
- ASE-2001-GarcezRNK #requirements #specification
- An Analysis-Revision Cycle to Evolve Requirements Specifications (ASdG, AR, BN, JK), pp. 354–358.
- ASE-2001-ZarrasI #analysis #automation #enterprise #information management #performance #reliability
- Automating the Performance and Reliability Analysis of Enterprise Information Systems (AZ, VI), pp. 350–353.
- DAC-2001-AjamiBPG #analysis #performance
- Analysis of Non-Uniform Temperature-Dependent Interconnect Performance in High Performance ICs (AHA, KB, MP, LPPPvG), pp. 567–572.
- DAC-2001-ArunachalamBP #analysis #interactive
- False Coupling Interactions in Static Timing Analysis (RA, RDB, LTP), pp. 726–731.
- DAC-2001-BaiBH #analysis #power management
- Static Timing Analysis Including Power Supply Noise Effect on Propagation Delay in VLSI Circuits (GB, SB, INH), pp. 295–300.
- DAC-2001-BanerjeeM #analysis #distributed #novel #optimisation #performance #using
- Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
- DAC-2001-ChenC #analysis #grid #performance #power management #scalability
- Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
- DAC-2001-DanielSW #analysis #performance #using
- Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
- DAC-2001-GalaBWZZ #analysis #design
- Inductance 101: Analysis and Design Issues (KG, DB, JW, VZ, MZ), pp. 329–334.
- DAC-2001-GorenSW #analysis #novel #pipes and filters #probability
- A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
- DAC-2001-LiouCKK #analysis #performance #probability #statistics
- Fast Statistical Timing Analysis By Probabilistic Event Propagation (JJL, KTC, SK, AK), pp. 661–666.
- DAC-2001-MassoudKMW #analysis #difference #induction #modelling
- Modeling and Analysis of Differential Signaling for Minimizing Inductive Cross-Talk (YM, JK, DM, JW), pp. 804–809.
- DAC-2001-MathurS #analysis #precise #using
- Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
- DAC-2001-McDonaldB #analysis #simulation #using
- Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
- DAC-2001-NandiM #analysis #design #embedded #performance
- System-Level Power/Performance Analysis for Embedded Systems Design (AN, RM), pp. 599–604.
- DAC-2001-SchenkelPZSGA #analysis #optimisation
- Mismatch Analysis and Direct Yield Optimization by Spec-Wise Linearization and Feasibility-Guided Search (FS, MP, SZ, RS, HEG, KA), pp. 858–863.
- DAC-2001-ShinKL #analysis #energy #scheduling #using
- Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
- DAC-2001-VerhaegenG #analysis #linear #performance #scalability
- Efficient DDD-based Symbolic Analysis of Large Linear Analog Circuits (WV, GGEG), pp. 139–144.
- DAC-2001-XiaoM #analysis #correlation #functional #identification
- Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
- DAC-2001-ZhouSN #analysis #fixpoint
- Timing Analysis with Crosstalk as Fixpoints on Complete Lattice (HZ, NVS, WN), pp. 714–719.
- DATE-2001-BensoCNP #analysis #distributed #fault #injection #open source
- SEU effect analysis in an open-source router via a distributed fault injection environment (AB, SDC, GDN, PP), pp. 219–225.
- DATE-2001-DoboliV #analysis #network #scalability
- A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
- DATE-2001-FioriM #analysis
- Analysis of EME produced by a microcontroller operation (FF, FM), pp. 341–347.
- DATE-2001-HsiehCP #analysis #simulation
- Microprocessor power analysis by labeled simulation (CTH, LC, MP), pp. 182–189.
- DATE-2001-JungYC #analysis #multi #performance
- Performance improvement of multi-processor systems cosimulation based on SW analysis (JJ, SY, KC), pp. 749–753.
- DATE-2001-KoranneG #analysis #automation #geometry #layout #on the
- On automatic analysis of geometrically proximate nets in VSLI layout (SK, OPG), p. 818.
- DATE-2001-KralicekJG #analysis #modelling
- Modeling electromagnetic emission of integrated circuits for system analysis (PK, WJ, HG), pp. 336–340.
- DATE-2001-MarculescuN #analysis #modelling #probability
- Probabilistic application modeling for system-level perfromance analysis (RM, AN), pp. 572–579.
- DATE-2001-NayakHCB #analysis #automation #fault #hardware #matlab #precise #synthesis
- Precision and error analysis of MATLAB applications during automated hardware synthesis for FPGAs (AN, MH, ANC, PB), pp. 722–728.
- DATE-2001-OlbrichRB #algorithm #analysis #classification
- An improved hierarchical classification algorithm for structural analysis of integrated circuits (MO, AR, EB), p. 807.
- DATE-2001-Zhu01a #analysis #memory management #pointer
- Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
- DocEng-2001-NaF #analysis #authoring #documentation #hypermedia #petri net #using
- Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
- ICDAR-2001-AmanoAMSS #analysis #documentation #grammarware #synthesis
- Table Form Document Synthesis by Grammar-Based Structure Analysis (AA, NA, TM, TS, KS), pp. 533–539.
- ICDAR-2001-BlumensteinV #analysis #benchmark #database #metric #performance #segmentation
- Analysis of Segmentation Performance on the CEDAR Benchmark Database (MB, BV), pp. 1142–1146.
- ICDAR-2001-ChaS #algorithm #analysis #classification
- Apriori Algorithm for Sub-category Classification Analysis of Handwriting (SHC, SNS), pp. 1022–1025.
- ICDAR-2001-DaWM #analysis #classification #fuzzy
- Character Preclassification Based on Fuzzy Typographical Analysis (LD, PW, BM), pp. 74–78.
- ICDAR-2001-GarainC #analysis #fuzzy #multi #segmentation #using
- Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
- ICDAR-2001-HaritCGVJ #analysis #documentation #image
- A Model Guided Document Image Analysis Scheme (GH, SC, PG, NV, SDJ), pp. 1137–1141.
- ICDAR-2001-KimLSN #analysis #encoding #performance
- Analysis of Postal Address Fields for Efficient Encoding of Korean Mail Pieces (GK, SL, MS, YSN), pp. 675–679.
- ICDAR-2001-LiuLHY #algorithm #analysis #component #layout
- A New Component Based Algorithm for Newspaper Layout Analysis (FL, YL, DH, MY), pp. 1176–1180.
- ICDAR-2001-LoprestiW #analysis #documentation #graph
- Evaluating Document Analysis Results via Graph Probing (DPL, GTW), pp. 116–120.
- ICDAR-2001-MatsumotoFN #analysis #online
- Collection and Analysis of On-line Handwritten Japanese Character Patterns (KM, TF, MN), pp. 496–500.
- ICDAR-2001-MitchellY #analysis #documentation #segmentation
- Newspaper Document Analysis Featuring Connected Line Segmentation (PEM, HY), pp. 1181–1185.
- ICDAR-2001-PennHLM #analysis #documentation #flexibility #web
- Flexible Web Document Analysis for Delivery to Narrow-Bandwidth Devices (GP, JH, HL, RTM), pp. 1074–1078.
- ICDAR-2001-ShinjoHMSS #analysis #recognition #recursion
- A Recursive Analysis for Form Cell Recognition (HS, EH, KM, YS, HS), pp. 694–698.
- ICDAR-2001-WangHP #automation #generative
- Automatic Table Ground Truth Generation and a Background-Analysis-Based Table Structure Extraction Method (YW, RMH, ITP), pp. 528–532.
- ICDAR-2001-WongSA01a #analysis #layout
- Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
- ICDAR-2001-YangZ #analysis #html #visual notation
- HTML Page Analysis Based on Visual Cues (YY, HZ), pp. 859–864.
- ICDAR-2001-ZanibbiBC #analysis
- Baseline Structure Analysis of Handwritten Mathematics Notation (RZ, DB, JRC), pp. 768–773.
- ICDAR-2001-ZhouT #analysis #documentation #image #recognition
- Chart Analysis and Recognition in Document Images (YPZ, CLT), pp. 1055–1058.
- ESOP-2001-GenaimC #analysis #approach #dependence
- The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
- ESOP-2001-HuthJS #program analysis
- Modal Transition Systems: A Foundation for Three-Valued Program Analysis (MH, RJ, DAS), pp. 155–169.
- ESOP-2001-Laud #data flow #program analysis #semantics
- Semantics and Program Analysis of Computationally Secure Information Flow (PL), pp. 77–91.
- ESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #protocol #security
- Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
- ESOP-2001-NielsonS #analysis #control flow #polynomial
- Control-Flow Analysis in Cubic Time (FN, HS), pp. 252–268.
- ESOP-2001-Weirich #analysis #encoding
- Encoding Intensional Type Analysis (SW), pp. 92–106.
- FASE-2001-OlveczkyKMTZ #analysis #maude #network #protocol #realtime #specification
- Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
- FASE-2001-SharyginaBK #analysis #design #object-oriented #reliability #verification
- A Formal Object-Oriented Analysis for Software Reliability: Design for Verification (NS, JCB, RPK), pp. 318–332.
- FoSSaCS-2001-JensenS #abstract interpretation #analysis #object-oriented #source code
- Class Analysis of Object-Oriented Programs through Abstract Interpretation (TPJ, FS), pp. 261–275.
- TACAS-2001-Castillo #analysis #modelling #state machine #tool support #validation
- The ASM Workbench — A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models Tool Demonstration (GDC), pp. 578–581.
- TACAS-2001-RiccaT #analysis #problem #testing #web
- Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions (FR, PT), pp. 373–388.
- TACAS-2001-RuysLKLM #algebra #analysis #partial order #probability #process #using
- First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
- TACAS-2001-SouterWSP #analysis #named #testing
- TATOO: Testing and Analysis Tool for Object- Oriented Software (ALS, TMW, SAS, LLP), pp. 389–403.
- IWPC-J-1999-MartinoMMV01 #communication #detection #interactive #parallel #program analysis
- Parallel program analysis and restructuring by detection of point-to-point interaction patterns and their transformation into collective communication constructs (BDM, AM, NM, UV), pp. 235–263.
- CSMR-2001-EisenbarthKS #component #concept analysis
- Derivation of Feature Component Maps by Means of Concept Analysis (TE, RK, DS), pp. 176–179.
- CSMR-2001-PodnarM #analysis #maintenance #process #simulation #using
- Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
- CSMR-2001-Villavicencion #automation #detection #program analysis #programming #slicing
- Program Analysis for the Automatic Detection of Programming Plans Applying Slicing (GV), pp. 188–191.
- ICSM-2001-AtkinsonG #analysis #data flow #implementation #performance #scalability #source code
- Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
- ICSM-2001-Chulani #analysis #modelling #quality
- Bayesian Analysis of Software Cost and Quality Models (SC), p. 565–?.
- ICSM-2001-EisenbarthKS #analysis #comprehension
- Aiding Program Comprehension by Static and Dynamic Feature Analysis (TE, RK, DS), pp. 602–611.
- ICSM-2001-KrishnaCKCWBR #empirical #impact analysis #incremental #maintenance #spreadsheet #validation
- Incorporating Incremental Validation and Impact Analysis into Spreadsheet Maintenance: An Empirical Study (VBK, CRC, DK, JC, CSW, MMB, GR), pp. 72–81.
- ICSM-2001-MalenfantAMD #analysis #detection
- Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
- ICSM-2001-RotschkeKH #analysis #architecture #multi
- Multi-View Architecture Trend Analysis for Medical Imaging (TR, RLK, DH), p. 107.
- ICSM-2001-Sneed01a #distributed #impact analysis #maintenance #object-oriented
- Impact Analysis of Maintenance Tasks for a Distributed Object-Oriented System (HMS), pp. 180–189.
- IWPC-2001-AndritsosM #data analysis #reverse engineering
- Reverse Engineering Meets Data Analysis (PA, RJM), pp. 157–166.
- IWPC-2001-AntoniolDCM #concept analysis #legacy
- A Method to Re-Organize Legacy Systems via Concept Analysis (GA, MDP, GC, EM), pp. 281–290.
- IWPC-2001-BassilK #analysis #bibliography #tool support #visualisation
- Software Visualization Tools: Survey and Analysis (SB, RKK), pp. 7–17.
- IWPC-2001-EisenbarthKS #comprehension #concept analysis #execution #using
- Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
- IWPC-2001-Stewart #analysis #automation #semantics
- Automated Analysis of Scientific and Engineering Semantics (MEMS), pp. 113–114.
- PASTE-2001-Hind #analysis #pointer #problem #question
- Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
- PASTE-2001-MaessenSG #java #program analysis #safety #virtual machine
- Program analysis for safety guarantees in a Java virtual machine written in Java (JWM, VS, DG), pp. 62–65.
- PASTE-2001-Palsberg #analysis #type system
- Type-based analysis and applications (JP), pp. 20–27.
- PASTE-2001-RyderT #impact analysis #object-oriented #source code
- Change impact analysis for object-oriented programs (BGR, FT), pp. 46–53.
- SCAM-2001-BurdR #analysis #automation #evolution #source code #using
- Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
- SCAM-2001-DeruelleMBB #analysis #distributed #multi
- Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
- SCAM-2001-HorganPW #analysis #java #metric #profiling #runtime #source code
- Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
- SCAM-2001-Knight #analysis #exclamation #java #smell
- Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
- SCAM-2001-MaggiS #analysis #bytecode #data flow #java #using
- Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
- SCAM-2001-Ward #analysis #approach #source code
- The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
- WCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
- Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
- PLDI-2001-AggarwalR #analysis
- Related Field Analysis (AA, KHR), pp. 214–220.
- PLDI-2001-ChatterjeePHL #analysis #behaviour
- Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
- PLDI-2001-GhiyaLS #ambiguity #analysis #c #memory management #on the #points-to #source code
- On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
- PLDI-2001-HeintzeT #analysis #pointer
- Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
- PLDI-2001-HeintzeT01a #alias #analysis #c #using
- Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
- PLDI-2001-VivienR #analysis #pointer
- Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
- SAS-2001-BagnaraGHZ #analysis #constraints
- Finite-Tree Analysis for Constraint Logic-Based Languages (RB, RG, PMH, EZ), pp. 165–184.
- SAS-2001-DasLFR #impact analysis #optimisation #pointer #scalability
- Estimating the Impact of Scalable Pointer Analysis on Optimization (MD, BL, MF, JR), pp. 260–278.
- SAS-2001-DorRS #analysis #c #integer #source code #string
- Cleanness Checking of String Manipulations in C Programs via Integer Analysis (ND, MR, SS), pp. 194–212.
- SAS-2001-Feret #abstract interpretation #mobile #static analysis
- Abstract Interpretation-Based Static Analysis of Mobile Ambients (JF), pp. 412–430.
- SAS-2001-GlynnSS #analysis #constraints #effectiveness #strict
- Effective Strictness Analysis with HORN Constraints (KG, PJS, MS), pp. 73–92.
- SAS-2001-GordonJ #analysis #protocol #security
- A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
- SAS-2001-Lu #analysis #logic programming #source code
- Parameterizing a Groundness Analysis of Logic Programs (LL), pp. 146–164.
- SAS-2001-MesnardN #logic programming #source code #static analysis #termination
- Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs (FM, UN), pp. 93–110.
- SAS-2001-Monniaux #analysis #probability #source code #termination
- An Abstract Analysis of the Probabilistic Termination of Programs (DM), pp. 111–126.
- SAS-2001-Rinard #analysis #parallel #source code #thread
- Analysis of Multithreaded Programs (MCR), pp. 1–19.
- SAS-2001-Wagner #assurance #static analysis
- Static Analysis and Software Assurance (DW), p. 431.
- STOC-2001-AzarFKMS #analysis
- Spectral analysis of data (YA, AF, ARK, FM, JS), pp. 619–626.
- STOC-2001-SpielmanT #algorithm #analysis #polynomial #why
- Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time (DAS, SHT), pp. 296–305.
- FLOPS-2001-AmatoS #analysis #compilation
- Abstract Compilation for Sharing Analysis (GA, FS), pp. 311–325.
- FLOPS-2001-LagoonS #analysis #framework #logic programming #source code
- A Framework for Analysis of Typed Logic Programs (VL, PJS), pp. 296–310.
- ICALP-2001-Boreale #analysis #encryption #protocol
- Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
- FME-2001-Beyer #analysis #automaton #reachability
- Improvements in BDD-Based Reachability Analysis of Timed Automata (DB0), pp. 318–343.
- FME-2001-HelkeS #analysis #behaviour #consistency #eiffel #library
- Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
- ICFP-2001-NeubauerS #analysis #emacs #lisp
- Down with Emacs Lisp: Dynamic Scope Analysis (MN, MS), pp. 38–49.
- IFL-2001-PenaS01a #analysis #nondeterminism
- A Polynomial-Cost Non-determinism Analysis (RP, CS), pp. 121–137.
- CHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
- Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
- CHI-2001-Muller #analysis
- Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
- SIGAda-2001-WhiteW #ada #dynamic analysis
- Dynamic analysis for locating product features in Ada code (LJW, NW), pp. 99–106.
- ICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation #using
- Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
- ICEIS-v1-2001-SierraRLG #analysis #image #machine learning #mobile #order #recognition
- Machine Learning Approaches for Image Analysis: Recognition of Hand Orders by a Mobile Robot (BS, IR, EL, UG), pp. 330–335.
- ICEIS-v2-2001-ArevaloCQAV #analysis #corba #design #framework #industrial #web
- A CORBA and Web Technology Based Framework for the Analysis and Optimal Design of Complex Systems in the Oil Industry (CJA, JAC, NVQ, NA, JV), pp. 953–961.
- ICEIS-v2-2001-BohnackerDFR #analysis #automation #feedback
- Automatic Analysis of Customer Feedback and Inquiries (UB, LD, JF, IR), pp. 1162–1165.
- ICEIS-v2-2001-FerreiraL #analysis #effectiveness #reuse
- Organization of Analysis Patterns for Effective Reuse (MJF, PL), pp. 766–773.
- ICEIS-v2-2001-MorilloFD #analysis #named
- RSHP: A Scheme to Classify Information in a Domain Analysis Environment (JLM, JMF, ID), pp. 686–690.
- ICEIS-v2-2001-OmelayenkoF #analysis #integration #problem
- An Analysis of B2B Catalogue Integration Problems (BO, DF), pp. 945–952.
- ICEIS-v2-2001-ShishkovD #analysis #case study #diagrams #modelling #process
- Analysis of Suitability, Appropriateness and Adequacy of Use Cases Combined with Activity Diagram for Business Systems Modelling (BS, JLGD), pp. 854–858.
- CIKM-2001-Couchot #analysis #composition #set #termination
- Termination Analysis of Active Rules Modular Sets (AC), pp. 326–333.
- KDD-2001-BerkhinBR #analysis #interactive #web
- Interactive path analysis of web site traffic (PB, JDB, DJR), pp. 414–419.
- KDD-2001-HotzGHNW #analysis #detection #industrial
- REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
- KDD-2001-SpanglerK #analysis #knowledge base #maintenance #using
- Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
- MLDM-2001-SyG #analysis #approach #data mining #mining #statistics
- Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data (BKS, AKG), pp. 128–140.
- SEKE-2001-BarrosWT #analysis #process #project management #reuse
- Scenario Oriented Project Management Knowledge Reuse within a Risk Analysis Process (MdOB, CMLW, GHT), pp. 37–44.
- SEKE-2001-GruerHKC #analysis #design #framework #multi
- A Formal Framework for Multi-Agent Systems Analysis and Design (PG, VH, AK, KC), pp. 276–282.
- SEKE-2001-JarzabekZ #abstraction #analysis #component #control flow #reuse
- Enhacing component reuse with control flow abstraction analysis (SJ, HZ), pp. 171–178.
- SEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
- Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
- SIGIR-2001-AndoL #analysis
- Iterative Residual Rescaling: An Analysis and Generalization of LSI (RKA, LL), pp. 154–162.
- SIGIR-2001-GongL #analysis #semantics #summary #using
- Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
- SIGIR-2001-ZhengNJ #algorithm #analysis
- Stable Algorithms for Link Analysis (AXZ, AYN, MIJ), pp. 258–266.
- UML-2001-DevosS #analysis #object-oriented #paradigm
- The Message Paradigm in Object-Oriented Analysis (FD, ES), pp. 182–193.
- UML-2001-GrassiM #analysis #architecture #mobile #modelling #performance #uml
- UML Modelling and Performance Analysis of Mobile Software Architectures (VG, RM), pp. 209–224.
- UML-2001-XuandongMYJG #analysis #diagrams #process #uml
- Timing Analysis of UML Activity Diagrams (XL, CM, YP, JZ, GZ), pp. 62–75.
- ECOOP-2001-PolletCC #java #source code #static analysis
- Distinctness and Sharing Domains for Static Analysis of Java Programs (IP, BLC, AC), pp. 77–98.
- OOPSLA-2001-PechtchanskiS #analysis #framework #interprocedural
- Dynamic Optimistic Interprocedural Analysis: A Framework and an Application (IP, VS), pp. 195–210.
- OOPSLA-2001-RountevMR #analysis #constraints #java #points-to #using
- Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
- TOOLS-EUROPE-2001-SevitskyPK #analysis #java #performance #source code
- An Information Exploration Tool for Performance Analysis of Java Programs (GS, WDP, RK), pp. 85–101.
- LOPSTR-2001-Shankar #functional #static analysis
- Static Analysis for Safe Destructive Updates in a Functional Language (NS), pp. 1–24.
- PPDP-2001-ChangJ #analysis #constraints #java
- Granularity of Constraint-Based Analysis for Java (BMC, JWJ), pp. 94–102.
- QAPL-2001-ClarkHM #analysis
- Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
- QAPL-2001-Fruhwirth #analysis #automation #complexity #concurrent #source code
- As Time Goes By II: More Automatic Complexity Analysis of Concurrent Rule Programs (TWF), pp. 185–206.
- PADL-2001-BellaB #analysis #constraints #protocol #security
- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
- POPL-2001-Ganzinger #deduction #performance #program analysis
- Efficient deductive methods for program analysis (HG), pp. 102–103.
- POPL-2001-Monniaux #analysis #monte carlo #probability #source code
- An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
- POPL-2001-RehofF #analysis #polymorphism #type system
- Type-base flow analysis: from polymorphic subtyping to CFL-reachability (JR, MF), pp. 54–66.
- RE-2001-ChengC #analysis #formal method #modelling #requirements
- Integrating Informal and Formal Approaches to Requirements Modeling and Analysis (BHCC, LAC), pp. 294–295.
- RE-2001-FarbeyF #analysis
- Software Acquisition: A Business Strategy Analysis (BF, AF), pp. 76–83.
- RE-2001-InOR #analysis #modelling #multi #requirements
- A Requirements Negotiation Model Based on Multi-Criteria Analysis (HI, DO, TR), pp. 312–313.
- SAC-2001-BaroneBVM #algorithm #analysis #approximate #problem
- An approximation algorithm for the shortest common supersequence problem: an experimental analysis (PB, PB, GDV, GM), pp. 56–60.
- SAC-2001-ChangJYC #analysis #exception #interprocedural #java
- Interprocedural exception analysis for Java (BMC, JWJ, KY, KMC), pp. 620–625.
- SAC-2001-GuPH #analysis #data type #database #design #image #query
- Design and analysis of data structures for querying image databases (YG, BP, KAH), pp. 236–241.
- SAC-2001-LiPJ #analysis
- Analysis of dynamic movement-based location update scheme (JL, YP, XJ), pp. 368–372.
- SAC-2001-MinFO #adaptation #analysis #network
- Analysis of adaptive wormhole-routed torus networks with IPP input traffic (GM, JDF, MOK), pp. 494–498.
- SAC-2001-ShahrabiOM #adaptation #analysis
- Unicast-based broadcast: an analysis for the hypercube with adaptive routing (AS, MOK, LMM), pp. 489–493.
- ESEC-FSE-2001-EdvardssonK #analysis #constraints #generative #testing #theorem proving
- Analysis of the constraint solver in UNA based test data generation (JE, MK), pp. 237–245.
- ICSE-2001-Campbell #analysis #diagrams #uml #visualisation
- Visualizaiton an Interpretation of Analysis Results within the Context of Formalized UML Diagrams (LAC), pp. 785–786.
- ICSE-2001-CobleighCO #algorithm #analysis #data flow #finite #verification
- The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification (JMC, LAC, LJO), pp. 37–46.
- ICSE-2001-DickinsonLP #analysis #clustering #execution
- Finding Failures by Cluster Analysis of Execution Profiles (WD, DL, AP), pp. 339–348.
- ICSE-2001-DillonS #analysis #graph #specification #using
- Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
- ICSE-2001-FioravantiMN #analysis #object-oriented #re-engineering
- Reengineering Analysis of Object-Oriented Systems via Duplication (FF, GM, PN), pp. 577–586.
- ICSE-2001-JhaW #analysis #network
- Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
- ICSE-2001-MenziesPH #analysis #diagrams #formal method #performance #requirements
- Fast Formal Analysis of Requirements via “Topoi Diagrams” (TM, JDP, MEH), pp. 391–400.
- ICSE-2001-NordPSH #analysis #architecture #design #effectiveness #uml
- Effective Software Architecture Design: From Global Analysis to UML Descriptions (RLN, DJP, DS, CH), pp. 741–742.
- ICSE-2001-OvermyerLR #analysis #concept #modelling #using
- Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
- ICSE-2001-RiccaT #analysis #testing #web
- Analysis and Testing of Web Applications (FR, PT), pp. 25–34.
- ICSE-2001-SmithOB #analysis #architecture #component #mining #product line #re-engineering
- Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
- ICSE-2001-StirewaltD #analysis #approach #component #formal method #tool support
- A Component-Based Approach to Building Formal Analysis Tools (KS, LKD), pp. 167–176.
- CC-2001-Engelen #analysis #compilation #optimisation #performance
- Efficient Symbolic Analysis for Optimizing Compilers (RvE), pp. 118–132.
- CC-2001-MartenaP #alias #analysis #model checking
- Alias Analysis by Means of a Model Checker (VM, PSP), pp. 3–19.
- CC-2001-RinetzkyS #analysis #interprocedural #recursion #source code
- Interprocedural Shape Analysis for Recursive Programs (NR, SS), pp. 133–149.
- HPDC-2001-WuB #analysis #architecture #parallel
- Parallel Retrograde Analysis on Different Architecture (RW, DFB), pp. 356–362.
- LCTES-OM-2001-UnnikrishnanSL #analysis #automation #garbage collection #memory management
- Automatic Accurate Live Memory Analysis for Garbage-Collected Languages (LU, SDS, YAL), pp. 102–111.
- LCTES-OM-2001-VivancosHMW #analysis #parametricity
- Parametric Timing Analysis (EV, CAH, FM, DBW), pp. 88–93.
- LCTES-OM-2001-ZiegenbeinWRJE #analysis #process
- Interval-Based Analysis of Software Processes (DZ, FW, KR, MJ, RE), pp. 94–101.
- PPoPP-2001-InoFH #analysis #named #parallel
- LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
- PPoPP-2001-KimOEFV #analysis #execution #framework #optimisation
- Reference idempotency analysis: a framework for optimizing speculative execution (SWK, ClO, RE, BF, TNV), pp. 2–11.
- PPoPP-2001-SalcianuR #analysis #parallel #pointer #source code #thread
- Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
- PPoPP-2001-VetterM #analysis #communication #distributed #scalability #statistics
- Statistical scalability analysis of communication operations in distributed applications (JSV, MOM), pp. 123–132.
- CAV-2001-AlurEY #analysis #recursion #state machine
- Analysis of Recursive State Machines (RA, KE, MY), pp. 207–220.
- CAV-2001-AnnichiniBS #analysis #named #reachability
- TReX: A Tool for Reachability Analysis of Complex Systems (AA, AB, MS), pp. 368–372.
- CAV-2001-Dang #analysis #automaton #reachability
- Binary Reachability Analysis of Pushdown Timed Automata with Dense Clocks (ZD), pp. 506–518.
- ICLP-2001-CodishGSS #analysis
- Higher-Precision Groundness Analysis (MC, SG, HS, PJS), pp. 135–149.
- IJCAR-2001-Jones #analysis #graph #termination
- Program Termination Analysis by Size-Change Graphs (Abstract) (NDJ), pp. 1–4.
- LICS-2001-MitchellRST #analysis #calculus #probability #process #protocol #security
- Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
- SAT-2001-CoccoM #analysis #backtracking #physics #random #satisfiability #statistics
- Statistical physics analysis of the backtrack resolution of random 3-SAT instances (SC, RM), pp. 36–47.
- ASE-2000-HillL #analysis
- Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
- ASE-2000-MorisioTS #analysis #uml
- Extending UML to Support Domain Analysis (MM, GT, MES), pp. 321–324.
- ASE-2000-SouzaFGW #analysis #design #object-oriented
- A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
- DAC-2000-ArunachalamRP #analysis #named
- TACO: timing analysis with coupling (RA, KR, LTP), pp. 266–269.
- DAC-2000-CarloniS #analysis #latency #optimisation #performance
- Performance analysis and optimization of latency insensitive systems (LPC, ALSV), pp. 361–367.
- DAC-2000-ChaudhryBPE #analysis
- Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
- DAC-2000-DickLRJ #analysis #embedded #operating system
- Power analysis of embedded operating systems (RPD, GL, AR, NKJ), pp. 312–315.
- DAC-2000-FinF #analysis #simulation
- A Web-CAD methodology for IP-core analysis and simulation (AF, FF), pp. 597–600.
- DAC-2000-GalaZPYWB #analysis #modelling
- On-chip inductance modeling and analysis (KG, VZ, RP, BY, JW, DB), pp. 63–68.
- DAC-2000-Hassoun #analysis #bound #using
- Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
- DAC-2000-JainMMWL #analysis #canonical #complexity #composition #graph #how
- Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
- DAC-2000-KahngMS #analysis #on the
- On switch factor based analysis of coupled RC interconnects (ABK, SM, ES), pp. 79–84.
- DAC-2000-LevyBBDGOOSZ #analysis #design #named
- ClariNet: a noise analysis tool for deep submicron design (RL, DB, GB, AD, AG, CO, BO, SS, VZ), pp. 233–238.
- DAC-2000-LevySMW #analysis #performance
- A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
- DAC-2000-PiS #analysis #approach #diagrams #multi
- Multi-terminal determinant decision diagrams: a new approach to semi-symbolic analysis of analog integrated circuits (TP, CJRS), pp. 19–22.
- DAC-2000-ShepardK #analysis
- Static noise analysis for digital integrated circuits in partially-depleted silicon-on-insulator technology (KLS, DJK), pp. 239–242.
- DAC-2000-ShinKC #analysis #embedded #multi #performance #realtime
- Schedulability-driven performance analysis of multiple mode embedded real-time systems (YS, DK, KC), pp. 495–500.
- DAC-2000-SomasekharCRYD #analysis
- Dynamic noise analysis in precharge-evaluate circuits (DS, SHC, KR, YY, VD), p. 243.
- DAC-2000-SouriBMS #analysis #design #motivation #multi #performance
- Multiple Si layer ICs: motivation, performance analysis, and design implications (SJS, KB, AM, KS), pp. 213–220.
- DAC-2000-WangN #analysis #linear #multi #order
- Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
- DAC-2000-ZhaoPSECB #analysis #network
- Hierarchical analysis of power distribution networks (MZ, RP, SSS, TE, RC, DB), pp. 150–155.
- DATE-2000-Balarin #abstraction #analysis #automation #worst-case
- Automatic Abstraction for Worst-Case Analysis of Discrete Systems (FB), pp. 494–501.
- DATE-2000-CarlettaPN #analysis #detection #fault #using
- Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
- DATE-2000-GuerraRFR #analysis #approach #scalability
- A Hierarchical Approach for the Symbolic Analysis of Large Analog Integrated Circuits (OG, ER, FVF, ÁRV), pp. 48–52.
- DATE-2000-GuptaGMC #analysis #program transformation #programmable
- Analysis of High-Level Address Code Transformations for Programmable Processors (SG, RKG, MM, FC), pp. 9–13.
- DATE-2000-HergenhanR #analysis #architecture #embedded
- Static Timing Analysis of Embedded Software on Advanced Processor Architectures (AH, WR), pp. 552–559.
- DATE-2000-PopEP #analysis #distributed #embedded #optimisation #scheduling
- Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
- DATE-2000-RingeLB #analysis
- Static Timing Analysis Taking Crosstalk into Account (MR, TL, EB), pp. 451–455.
- DATE-2000-SugiharaYD #analysis #approach
- Analysis and Minimization of Test Time in a Combined BIST and External Test Approach (MS, HY, HD), pp. 134–140.
- HT-2000-Neumuller #analysis #tool support
- A semiotic analysis of iMarketing tools (MN), pp. 238–239.
- HT-2000-PohlP #analysis #authoring #documentation #hypermedia #process
- Analysis of the authoring process of hypertext documents (MP, PP), pp. 240–241.
- HT-2000-YooB #analysis
- Finding linking opportunities through relationship-based analysis (JY, MB), pp. 181–190.
- PODS-2000-Lynch #adaptation #analysis
- Analysis and Application of Adaptive Sampling (JFL), pp. 260–267.
- VLDB-2000-CarusoCGLM #analysis #database #quality
- Telcordia’s Database Reconciliation and Data Quality Analysis Tool (FC, MC, UG, GL, PM), pp. 615–618.
- CSEET-2000-CybulskiL #analysis #design #education #multi #using
- Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
- ITiCSE-2000-Abi-Raad #analysis #exclamation
- Systems analysis with attitude! (MAR), pp. 57–60.
- ITiCSE-2000-Chang #analysis #concept #learning #web
- Discovering learning patterns from Web logs by concept transformation analysis (poster session) (CKC), pp. 186–187.
- ESOP-2000-HoweK #analysis #implementation
- Implementing Groundness Analysis with Definite Boolean Functions (JMH, AK), pp. 200–214.
- ESOP-2000-NielsonNS #analysis #mobile
- A Kleene Analysis of Mobile Ambients (FN, HRN, SS), pp. 305–319.
- ESOP-2000-SeidlS #analysis #constraints #interprocedural #parallel #source code
- Constraint-Based Inter-Procedural Analysis of Parallel Programs (HS, BS), pp. 351–365.
- ESOP-2000-SmithW #analysis
- Polyvariant Flow Analysis with Constrained Types (SFS, TW), pp. 382–396.
- TACAS-2000-AbdullaBE #analysis #reachability
- Symbolic Reachability Analysis Based on SAT-Solvers (PAA, PB, NE), pp. 411–425.
- TACAS-2000-BozgaFG #automation #generative #static analysis #testing #using
- Using Static Analysis to Improve Automatic Test Generation (MB, JCF, LG), pp. 235–250.
- TACAS-2000-Schmidt #analysis #low level #reachability #symmetry
- Integrating Low Level Symmetries into Reachability Analysis (KS0), pp. 315–330.
- WRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
- WRLA-2000-Millen #analysis #bibliography #encryption #protocol #term rewriting
- Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
- WRLA-2000-Rodriguez #analysis #case study #maude #protocol #specification
- Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
- CSMR-2000-AbreuPS #analysis #approach #clustering #composition #object-oriented
- A Coupling-Guided Cluster Analysis Approach to Reengineer the Modularity of Object-Oriented Systems (FBeA, GP, PMAS), pp. 13–22.
- ICSM-2000-HuMDL #analysis #c #c++ #compilation #execution #symbolic computation #using
- C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
- ICSM-2000-KimbleW #analysis #source code
- An Alternative Source Code Analysis (JEKJ, LJW), pp. 64–75.
- ICSM-2000-RiccaT #analysis #evolution #web
- Web Site Analysis: Structure and Evolution (FR, PT), p. 76–?.
- IWPC-2000-JahnkeNW #analysis #automation #component #embedded #quality
- Automated Quality Analysis of Component Software for Embedded Systems (JHJ, JN, JPW), pp. 18–26.
- IWPC-2000-KuipersM #concept analysis #legacy
- Types and Concept Analysis for Legacy Systems (TK, LM), pp. 221–230.
- IWPC-2000-PowerM #analysis #context-free grammar
- Metric-Based Analysis of Context-Free Grammars (JFP, BAM), pp. 171–178.
- WCRE-2000-BalazinskaMDLK #object-oriented #refactoring
- Advanced Clone-Analysis to Support Object-Oriented System Refactoring (MB, EM, MD, BL, KK), pp. 98–107.
- WCRE-2000-BurdBD #analysis #evolution #process
- Studying the Process of Software Change: An Analysis of Software Evolution (EB, SB, JD), pp. 232–239.
- PEPM-2000-Das #case study #experience #scalability #source code #static analysis
- Static Analysis of Large Programs: Some Experiences (Abstract of Invited Talk) (MD), p. 1.
- PEPM-2000-LeviS #analysis #linear #refinement
- Non Pair-Sharing and Freeness Analysis Through Linear Refinement (GL, FS), pp. 52–61.
- PEPM-2000-MurphyL #program analysis
- Program Analysis with Partial Transfer Functions (BRM, MSL), pp. 94–103.
- PEPM-2000-ScholzBF #analysis #detection #memory management #pointer
- Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
- PLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer #using
- Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
- PLDI-2000-Das #analysis #pointer
- Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
- PLDI-2000-FahndrichRD #analysis #constraints #scalability #using
- Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
- PLDI-2000-GhemawatRS #analysis #interprocedural #low cost
- Field analysis: getting useful and low-cost interprocedural information (SG, KHR, DJS), pp. 334–344.
- PLDI-2000-LinP #analysis #compilation #memory management
- Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
- PLDI-2000-RouhtevC #analysis #points-to #scalability
- Off-line variable substitution for scaling points-to analysis (AR, SC), pp. 47–56.
- PLDI-2000-RuginaR #analysis #array #bound #memory management #pointer
- Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
- PLDI-2000-StephensonBA #analysis #compilation
- Bitwidth analysis with application to silicon compilation (MS, JB, SPA), pp. 108–120.
- SAS-2000-ClarkHH #analysis #graph grammar #safety #strict
- Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
- SAS-2000-Feret #analysis #mobile
- Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
- SAS-2000-FinkKS #analysis #array
- Unified Analysis of Array and Object References in Strongly Typed Languages (SJF, KK, VS), pp. 155–174.
- SAS-2000-FosterFA #analysis #c #points-to #polymorphism
- Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C (JSF, MF, AA), pp. 175–198.
- SAS-2000-Saidi #abstraction #analysis #model checking
- Model Checking Guided Abstraction and Analysis (HS), pp. 377–396.
- SAS-2000-Scozzari #abstract domain #analysis #semantics
- Abstract Domains for Sharing Analysis by Optimal Semantics (FS), pp. 397–412.
- SAS-2000-UngureanuJ #analysis #concurrent #java
- Concurrency Analysis for Java (CU, SJ), pp. 413–432.
- ICALP-2000-FocardiGM #analysis #encryption #protocol
- Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
- IFM-2000-BryansBBD #analysis #design #specification
- Specification and Analysis of Automata-Based Designs (JB, LB, HB, JD), pp. 176–193.
- ICFP-2000-DamianD #continuation #program analysis
- Syntactic accidents in program analysis: on the impact of the CPS transformation (DD, OD), pp. 209–220.
- ICFP-2000-TrifonovSS #analysis #reflexive
- Fully reflexive intensional type analysis (VT, BS, ZS), pp. 82–93.
- IFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system
- A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
- IFL-2000-PenaS #analysis #nondeterminism
- Non-determinism Analysis in a Parallel-Functional Language (RP, CS), pp. 1–18.
- CHI-2000-Balter #analysis #email
- Keystroke level analysis of email message organization (OB), pp. 105–112.
- AdaEurope-2000-BliebergerBS #ada #analysis #data flow #detection #source code
- Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
- AdaEurope-2000-MauriS #analysis #embedded #reliability #safety #using
- Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
- AdaEurope-2000-Ringler #analysis #execution #source code #worst-case
- Static Worst-Case Execution Time Analysis of Synchronous Programs (TR), pp. 56–68.
- AdaEurope-2000-Schmitt #ada #analysis #design #framework #implementation #object-oriented
- Analysis, Design and Implementation of an Object-Oriented Framework in Ada95 (DS), pp. 196–210.
- CAiSE-2000-Wohed #analysis #concept #information management #reuse
- Conceptual Patterns for Reuse in Information Systems Analysis (PW), pp. 157–175.
- ICEIS-2000-DawsonA #case study #requirements
- Facilitating a User Performed Requirements Analysis-A Case Study (RD, AAZ), pp. 525–526.
- ICEIS-2000-Feng #analysis
- The Need for an “Information Analysis” Stage for ISD (JF), pp. 275–281.
- ICEIS-2000-OFlahertyW #analysis #bibliography #intranet
- Intranet Adoption: A Survey Analysis (BO, HW), pp. 429–434.
- ICEIS-2000-SarmentoM #workflow
- The Adoption of Workflow Systems: Proposal of a Model for a Methodology to Analysis-The Impact of Workflow Systems in Organisations (AS, AM), pp. 349–354.
- ICEIS-2000-Wagner00a #analysis #design #enterprise #information management
- Agent-Oriented Analysis and Design of Enterprise Information Systems (GW), pp. 85–89.
- CIKM-2000-StojanovicDS #analysis #framework #query #visual notation
- Visual Query and Analysis Tool of the Object-Relational GIS Framework (ZS, SDK, DS), pp. 328–335.
- ICML-2000-NomotoM #analysis #automation
- Comparing the Minimum Description Length Principle and Boosting in the Automatic Analysis of Discourse (TN, YM), pp. 687–694.
- ICPR-v1-2000-Abrantes #algorithm #analysis #clustering #multi
- A Constrained Clustering Algorithm for Shape Analysis with Multiple Features (AJA), pp. 1912–1919.
- ICPR-v1-2000-BasuS #analysis
- Analysis of Cylindrical Stereo Imaging (AB, HS), pp. 1366–1369.
- ICPR-v1-2000-FontaineMP #analysis #segmentation
- Unsupervised Segmentation Based on Connectivity Analysis (MF, LM, JGP), pp. 1660–1663.
- ICPR-v1-2000-Kanatani #3d #analysis #re-engineering #reliability
- Gauge-Based Reliability Analysis of 3-D Reconstruction from Two Uncalibrated Perspective Views (KiK), pp. 1076–1079.
- ICPR-v1-2000-KawasakiIS #analysis #image
- EPI Analysis of Omni-Camera Image (HK, KI, MS), pp. 1379–1383.
- ICPR-v1-2000-KornDH #analysis #approach #image #independence
- Weather Independent Flight Guidance: Analysis of MMW Radar Images for Approach and Landing (BK, HUD, PH), pp. 1350–1353.
- ICPR-v1-2000-KruizingaP #analysis
- A Nonlinear Texture Operator Specialized in the Analysis of Dot-Patterns (PK, NP), pp. 1197–1201.
- ICPR-v1-2000-KuboNEKKMOKNMY #analysis #image
- Extraction of Pulmonary Fissures from HRCT Images Based on Surface Curvatures Analysis and Morphology Filters (MK, NN, KE, MK, MK, NM, HO, RK, HN, KM, AY), pp. 1490–1493.
- ICPR-v1-2000-Louchet #analysis #evolution #using
- Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
- ICPR-v1-2000-Mitchell #analysis #documentation #layout #segmentation #using
- Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
- ICPR-v1-2000-PalettaPP #analysis #learning #recognition #using
- Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
- ICPR-v1-2000-SuzukiSAO #analysis #image
- Dynamic Shadow Compensation of Aerial Images Based on Color and Spatial Analysis (AS, AS, HA, SO), pp. 1317–1320.
- ICPR-v2-2000-ChenW #analysis #segmentation #string #using
- Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
- ICPR-v2-2000-FyfeL #analysis #canonical #correlation #network
- Canonical Correlation Analysis Neural Networks (CF, PLL), pp. 2977–2980.
- ICPR-v2-2000-GhaderiW #analysis
- Circular ECOC: A Theoretical and Experimental Analysis (RG, TW), pp. 2203–2206.
- ICPR-v2-2000-HiraokaHHMMY #algorithm #analysis #learning #linear
- Successive Learning of Linear Discriminant Analysis: Sanger-Type Algorithm (KH, KiH, MH, HM, TM, SY), pp. 2664–2667.
- ICPR-v2-2000-LiLT #analysis #cumulative #image
- Image Analysis by Accumulative Hopfield Matching (WJL, TL, HTT), pp. 2442–2445.
- ICPR-v2-2000-MenardDC #ambiguity #analysis #distance #modelling #using
- Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
- ICPR-v2-2000-PerantonisPV #analysis #classification #component #paradigm #using
- Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
- ICPR-v2-2000-Schulerud #analysis #bias #fault #feature model #linear
- Bias of Error Rates in Linear Discriminant Analysis Caused by Feature Selection and Sample Size (HS), pp. 2372–2377.
- ICPR-v2-2000-SmitsA #cost analysis #image #interactive #set
- Cost-Based Feature Subset Selection for Interactive Image Analysis (PCS, AA), pp. 2386–2389.
- ICPR-v2-2000-UnsalanE #analysis #linear
- Shapes of Features and a Modified Measure for Linear Discriminant Analysis (CÜ, AE), pp. 2410–2413.
- ICPR-v2-2000-Zhao00a #analysis #performance
- Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
- ICPR-v2-2000-Zhao00b #analysis #component #recognition
- Discriminant Component Analysis for Face Recognition (WYZ), pp. 2818–2821.
- ICPR-v3-2000-ChoiL #analysis #distance
- Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
- ICPR-v3-2000-DoelVHVYGK #analysis #metric
- Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis (LRVdD, LJvV, KTH, MJV, ITY, FG, JGK), pp. 3057–3062.
- ICPR-v3-2000-FukuiIIW #analysis #component #using
- Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
- ICPR-v3-2000-Garcia-SevillaP #analysis #case study #comparative
- Analysis of Irregularly Shaped Texture Regions: A Comparative Study (PGS, MP), pp. 7080–7083.
- ICPR-v3-2000-HuangCH00a #2d #analysis #pseudo
- Local Spectra Features Extraction Based-On 2D Pseudo-Wigner Distribution for Texture Analysis (ZH, KLC, YH), pp. 3925–3928.
- ICPR-v3-2000-LiK #ambiguity #analysis #detection
- Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
- ICPR-v3-2000-LuM #analysis #symmetry
- Computer Analysis of Rotational Symmetry in CBED Patterns (QY, HL, SM), pp. 3754–3757.
- ICPR-v3-2000-PagetL #analysis #markov #parametricity #random #testing
- Nonparametric Markov Random Field Model Analysis of the MeasTex Test Suite (RP, IDL), pp. 3939–3942.
- ICPR-v3-2000-Rahmann #analysis #geometry #image
- Polarization Images: A Geometric Interpretation for Shape Analysis (SR), pp. 3542–3546.
- ICPR-v3-2000-ValdesME #analysis #behaviour #case study #image
- Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
- ICPR-v3-2000-VassZ #analysis #component #fault #image #performance
- Enhanced Significance-Linked Connected Component Analysis for High Performance Error Resilient Wavelet Image Coding (JV, XZ), pp. 3075–3078.
- ICPR-v3-2000-WilkinsonRDB #analysis #using
- Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
- ICPR-v3-2000-ZhangGST #adaptation #analysis #modelling #using
- Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
- ICPR-v4-2000-KawataNOKKKMMNE #analysis
- Computerized Analysis of Pulmonary Nodules in Topological and Histogram Feature Spaces (YK, NN, HO, RK, MK, MK, NM, KM, HN, KE), pp. 4332–4335.
- ICPR-v4-2000-KopilovicVS #analysis #detection #lens
- Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
- ICPR-v4-2000-Leavers #analysis #using
- Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
- ICPR-v4-2000-OkunP #analysis #automation #documentation #evaluation #generative #layout
- Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
- ICPR-v4-2000-RyuLK #analysis #documentation #geometry #independence #layout
- Parameter-Independent Geometric Document Layout Analysis (DSR, SWL, SMK), pp. 4397–4400.
- ICPR-v4-2000-WatanabeOIK #analysis #video
- Discourse Structure Analysis for News Video by Checking Surface Information in the Transcript (YW, YO, EI, SK), pp. 4242–4245.
- ICPR-v4-2000-WatanabeS #analysis #documentation #layout
- Layout Analysis of Complex Documents (TW, TS), pp. 4447–4450.
- ICPR-v4-2000-XuGMC #analysis #performance #retrieval
- Performance Analysis in Content-Based Retrieval with Textures (KX, BG, PM, DC), pp. 4275–4278.
- ICPR-v4-2000-Zheng #analysis #flexibility
- A Flexible Laser Range Sensor Based on Spatial-temporal Analysis (JYZ), pp. 4740–4743.
- KDD-2000-BecherBF #automation #data analysis #data mining #mining #performance
- Automating exploratory data analysis for efficient data mining (JDB, PB, EF), pp. 424–429.
- KDD-2000-TalbertF #analysis #empirical
- An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
- UML-2000-PickinM #analysis #uml
- Describing AI Analysis Patterns with UML (SP, AMR), pp. 466–481.
- OOPSLA-2000-LujanFG #algebra #analysis #design #linear #named #object-oriented
- OoLALA: an object oriented analysis and design of numerical linear algebra (ML, TLF, JRG), pp. 229–252.
- TOOLS-ASIA-2000-YeDD #analysis #design #development #object-oriented
- Application of Object-Oriented Analysis and Design in CDMA BSS Development (WY, YD, WD), pp. 73–80.
- TOOLS-ASIA-2000-YuSYM #analysis #object-oriented
- Improving Object Oriented Analysis by Explicit Change Analysis (LY, CKS, XY, YM), pp. 2–7.
- TOOLS-PACIFIC-2000-SkevoulisJ #detection #fault #invariant #java #runtime #source code #static analysis
- Generic Invariant-Based Static Analysis Tool for Detection of Runtime Errors in Java Programs (SS, XJ), pp. 36–44.
- TOOLS-USA-2000-HindP #case study #experience #object-oriented #program analysis
- Traveling Through Dakota: Experiences with an Object-Oriented Program Analysis System (MH, AP), pp. 49–60.
- TOOLS-USA-2000-LeeOA #algorithm #analysis #object-oriented
- Algorithmic Analysis of the Impacts of Changes to Object-Oriented Software (ML, AJO, RTA), pp. 61–70.
- TOOLS-USA-2000-YacoubA #analysis #approach #composition #design pattern
- Pattern-Oriented Analysis and Design (POAD): A Structural Composition Approach to Glue Design Patterns (SMY, HHA), p. 273–?.
- GCSE-2000-Bruin #analysis #component #composition
- Scenario-Based Analysis of Component Compositions (HdB), pp. 129–146.
- LOPSTR-2000-BuenoBHMPS #analysis #compilation #optimisation
- A model for inter-module analysis and optimizing compilation (FB, MJGdlB, MVH, KM, GP, PJS).
- LOPSTR-2000-SerebrenikS #analysis #logic programming #source code #termination
- Non-tranformational termination analysis of logic programs, based on general term-orderings (AS, DDS).
- LOPSTR-2000-VanhoofB #analysis #composition #higher-order #towards
- Towards a modular binding-time analysis for higher-order Mercury (WV, MB).
- LOPSTR-J-2000-BuenoBHMPS #analysis #compilation #optimisation
- A Model for Inter-module Analysis and Optimizing Compilation (FB, MJGdlB, MVH, KM, GP, PJS), pp. 86–102.
- LOPSTR-J-2000-SerebrenikS #analysis #logic programming #source code #termination
- Non-transformational Termination Analysis of Logic Programs, Based on General Term-Orderings (AS, DDS), pp. 69–85.
- PPDP-2000-BagnaraZH #analysis #evaluation
- Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
- PPDP-2000-CalcagnoIO #alias #analysis #hoare #logic #pointer #semantics
- Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
- PPDP-2000-Lu #analysis #logic programming #precise #source code
- A precise type analysis of logic programs (LL), pp. 214–225.
- SAIG-2000-FischerSP #data analysis #generative #modelling #source code #statistics
- Generating Data Analysis Programs from Statistical Models (BF, JS, TP), pp. 212–229.
- PADL-2000-HuCT #algorithm #analysis #data mining #mining
- Calculating a New Data Mining Algorithm for Market Basket Analysis (ZH, WNC, MT), pp. 169–184.
- PADL-2000-MarinoM #functional #logic programming #source code #static analysis #using
- Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), pp. 63–80.
- POPL-2000-CharatonikPT #program analysis
- Paths vs. Trees in Set-Based Program Analysis (WC, AP, JMT), pp. 330–337.
- POPL-2000-HeintzeJV #analysis #framework #verification
- A Framework for Combining Analysis and Verification (NH, JJ, RV), pp. 26–39.
- POPL-2000-NielsonN #analysis #mobile
- Shape Analysis for Mobile Ambients (HRN, FN), pp. 142–154.
- ICRE-2000-AlcazarM #analysis #framework #process #requirements #specification
- A Process Framework for Requirements Analysis and Specification (EGA, AM), p. 27–?.
- ICRE-2000-DayJ #analysis #framework #multi #requirements #specification
- A Framework for Multi-Notation Requirements Specification and Analysis (NAD, JJJ), pp. 39–48.
- ICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process #using
- Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
- SAC-2000-AlhamedL #analysis #approach #clustering #multi #using
- A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
- SAC-2000-BaldwinMP #analysis #feature model #semantics
- Semantic Discrimination Analysis for Feature Selection (JFB, TPM, CP), pp. 519–523.
- SAC-2000-BodlaenderRS #analysis #design #named
- TRAnD: Temporal Requirement Analysis and Design Tool (MPB, AHLR, PDVvdS), pp. 882–886.
- SAC-2000-BoujarwahSA #analysis #data flow #java #source code #testing #using
- Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
- SAC-2000-LenartSG #analysis #constant
- SSA-based Flow-sensitive Type Analysis: Combining Constant and Type Propagation (AL, CS, SKSG), pp. 813–817.
- FoSE-2000-JacksonR #analysis #roadmap
- Software analysis: a roadmap (DJ, MCR), pp. 133–145.
- ICSE-2000-AndrewsZ #analysis
- Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
- ICSE-2000-GannodL #analysis #approach #architecture #product line
- An approach to architectural analysis of product lines (GCG, RRL), pp. 548–557.
- ICSE-2000-HayesGM #component #design #program analysis #reuse #tool support
- Component design of retargetable program analysis tools that reuse intermediate representations (JH, WGG, SM), pp. 356–365.
- ICSE-2000-LeszakPS #analysis #case study #fault
- A case study in root cause defect analysis (ML, DEP, DS), pp. 428–437.
- SPLC-2000-KishiN #analysis #architecture #aspect-oriented #product line
- Aspect-oriented analysis for product line architecture (TK, NN), pp. 135–146.
- ASPLOS-2000-RedstoneEL #analysis #architecture #behaviour #operating system #parallel #thread
- An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
- CC-2000-GayS #analysis #performance #source code #stack
- Fast Escape Analysis and Stack Allocation for Object-Based Programs (DG, BS), pp. 82–93.
- CC-2000-LinP #analysis #array #compilation #optimisation
- Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
- CC-2000-WilhelmSR #analysis
- Shape Analysis (RW, SS, TWR), pp. 1–17.
- HPCA-2000-BoschSSRH #analysis #case study #parallel #performance #using #visualisation
- Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
- HPCA-2000-HaungsSF #analysis #branch #classification #metric
- Branch Transition Rate: A New Metric for Improved Branch Classification Analysis (MH, PS, MKF), pp. 241–250.
- CAV-2000-AlurGM #analysis #performance #reachability
- Efficient Reachability Analysis of Hierarchical Reactive Machines (RA, RG, MM), pp. 280–295.
- CAV-2000-BaierHHK #analysis #markov #model checking
- Model Checking Continuous-Time Markov Chains by Transient Analysis (CB, BRH, HH, JPK), pp. 358–372.
- CAV-2000-DangIBKS #analysis #automaton #reachability
- Binary Reachability Analysis of Discrete Pushdown Timed Automata (ZD, OHI, TB, RAK, JS), pp. 69–84.
- CAV-2000-FraerKZVF #analysis #performance #reachability #traversal #verification
- Prioritized Traversal: Efficient Reachability Analysis for Verification and Falsification (RF, GK, BZ, MYV, LF), pp. 389–402.
- CAV-2000-HeymanGGS #analysis #parallel #reachability #scalability
- Achieving Scalability in Parallel Reachability Analysis of Very Large Circuits (TH, DG, OG, AS), pp. 20–35.
- CAV-2000-Meadows #analysis #encryption #formal method #protocol
- Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
- CL-2000-BraileyPN #analysis #approach #database #termination
- A Dynamic Approach to Termination Analysis for Active Database Rules (JB, AP, PN), pp. 1106–1120.
- CL-2000-DebrayH #analysis #constraints #database #termination
- Constraint-Based Termination Analysis for Cyclic Active Database Rules (SKD, TJH), pp. 1121–1136.
- CL-2000-FerreR #concept analysis #file system
- A File System Based on Concept Analysis (SF, OR), pp. 1033–1047.
- CL-2000-Gervas #analysis #logic programming
- A Logic Programming Application for the Analysis of Spanish Verse (PG), pp. 1330–1344.
- CL-2000-MancarellaNRT #analysis #declarative #named
- MuTACLP: A Language for Declarative GIS Analysis (PM, GN, AR, FT), pp. 1002–1016.
- CL-2000-MazurJB #analysis #memory management #reuse
- A Module Based Analysis for Memory Reuse in Mercury (NM, GJ, MB), pp. 1255–1269.
- CSL-2000-Schuster #analysis
- Elementary Choiceless Constructive Analysis (PS), pp. 512–526.
- ISSTA-2000-BhargavanGKLOSV #analysis #formal method #named #network #simulation
- Verisim: Formal analysis of network simulations (KB, CAG, MK, IL, DO, OS, MV), pp. 2–13.
- ISSTA-2000-HindP #analysis #pointer #question
- Which pointer analysis should I use? (MH, AP), pp. 113–123.
- ISSTA-2000-KolanoK #analysis #classification #realtime
- Classification schemes to aid in the analysis of real-time systems (PZK, RAK), pp. 86–95.
- ISSTA-2000-Lev-AmiRSW #case study #static analysis #verification
- Putting static analysis to work for verification: A case study (TLA, TWR, SS, RW), pp. 26–38.
- ISSTA-2000-Pincus #analysis #case study #developer #experience #tool support
- Analysis is necessary, but far from sufficient: Experiences building and deploying successful tools for developers and testers (abstract only) (JDP), p. 1.
- ISSTA-2000-SchroederK #analysis #black box #reduction #using
- Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
- LICS-2000-AehligS #analysis #polynomial
- A Syntactical Analysis of Non-Size-Increasing Polynomial Time Computation (KA, HS), pp. 84–91.
- RTA-2000-OhlebuschCM #analysis #logic programming #named #source code #termination
- TALP: A Tool for the Termination Analysis of Logic Programs (EO, CC, CM), pp. 270–273.
- WICSA-1999-JaktmanLL #analysis #architecture #assessment #case study #maintenance
- Structural Analysis of the Software Architecture — A Maintenance Assessment Case Study (CBJ, JL, ML), pp. 455–470.
- WICSA-1999-MageeKG #analysis #architecture #behaviour
- Behaviour Analysis of Software Architectures (JM, JK, DG), pp. 35–50.
- ASE-1999-Brackin #analysis #automation #effectiveness #encryption #implementation #protocol
- Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
- ASE-1999-MaleticV #analysis #automation #clustering #semantics
- Automatic Software Clustering via Latent Semantic Analysis (JIM, NV), pp. 251–254.
- ASE-1999-Saidi #analysis #composition #concurrent #incremental
- Modular and Incremental Analysis of Concurrent Software Systems (HS), pp. 92–101.
- ASE-1999-WatersRA #architecture #concept analysis #using
- Architectural Element Matching Using Concept Analysis (RW, SR, GDA), pp. 291–294.
- DAC-1999-DaemsGS #analysis #complexity #reduction
- Circuit Complexity Reduction for Symbolic Analysis of Analog Integrated Circuits (WD, GGEG, WMCS), pp. 958–963.
- DAC-1999-JiangC #analysis #performance #power management
- Analysis of Performance Impact Caused by Power Supply Noise in Deep Submicron Devices (YMJ, KTC), pp. 760–765.
- DAC-1999-KamonMMSW #3d #analysis #modelling
- Interconnect Analysis: From 3-D Structures to Circuit Models (MK, NAM, YM, LMS, JW), pp. 910–914.
- DAC-1999-LiuPS #analysis
- Model Order-Reduction of RC(L) Interconnect Including Variational Analysis (YL, LTP, AJS), pp. 201–206.
- DAC-1999-YalcinMPBS #analysis #functional
- Functional Timing Analysis for IP Characterization (HY, MM, RP, CB, KAS), pp. 731–736.
- DATE-1999-Holzheuer #analysis #how #process
- How to use Knowledge in an Analysis Process (HH), pp. 498–502.
- DATE-1999-HongB #analysis #finite #reachability #scalability #state machine #using
- Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
- DATE-1999-JantschKH #analysis #case study #concept #modelling #synthesis
- The Rugby Model: A Conceptual Frame for the Study of Modelling, Analysis and Synthesis Concepts of Electronic Systems (AJ, SK, AH), pp. 256–262.
- DATE-1999-NovakHK #analysis #on the
- On Analog Signature Analysis (FN, BH, SK), p. 249–?.
- DATE-1999-RadetzkiSPN #analysis #data type #hardware #modelling #object-oriented #synthesis
- Data Type Analysis for Hardware Synthesis from Object-Oriented Models (MR, AS, WPR, WN), p. 491–?.
- HT-1999-ChenC #analysis #hypermedia
- Trailblazing the Literature of Hypertext: Author Co-Citation Analysis (1989-1998) (CC, LC), pp. 51–60.
- HT-1999-Lange #analysis #hypermedia #tool support
- Hypermedia Potentials for Analysis Support Tools (DSL), pp. 165–166.
- HT-1999-Rety #analysis #hypermedia
- Structure Analysis for Hypertext with Conditional Linkage (JHR), pp. 135–136.
- ICDAR-1999-AltamuraEM #adaptation #analysis #documentation #interactive
- WISDOM++: An Interactive and Adaptive Document Analysis System (OA, FE, DM), pp. 366–369.
- ICDAR-1999-AntonacopoulosB #algorithm #analysis #flexibility #performance #segmentation
- Methodology for Flexible and Efficient Analysis of the Performance of Page Segmentation Algorithms (AA, AB), pp. 451–454.
- ICDAR-1999-AntonacopoulosC #analysis #comparative #representation #using
- Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
- ICDAR-1999-ChangLTH #analysis #documentation #image #multi #using
- Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
- ICDAR-1999-ChaSS #algorithm #analysis #approximate #recognition #sequence #string
- Approximate Stroke Sequence String Matching Algorithm for Character Recognition and Analysis (SHC, YCS, SNS), pp. 53–56.
- ICDAR-1999-CracknellD #agile #analysis #comprehension #documentation #prototype #research
- A Handwriting Understanding Environment (HUE) for Rapid Prototyping in Handwriting and Document Analysis Research (CC, ACD), pp. 362–365.
- ICDAR-1999-Faure #analysis #documentation #image
- Preattentive Reading and Selective Attention for Document Image Analysis (CF), pp. 577–580.
- ICDAR-1999-FukudaSTXS #analysis
- A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
- ICDAR-1999-HitzRI #analysis #documentation #image
- Analysis of Synthetic Document Images (OH, LR, RI), pp. 374–377.
- ICDAR-1999-Ishitani #analysis #documentation #image #logic
- Logical Structure Analysis of Document Images based on Emergent Computation (YI), pp. 189–192.
- ICDAR-1999-JunkerDH #analysis #component #documentation #evaluation #on the #precise
- On the Evaluation of Document Analysis Components by Recall, Precision, and Accuracy (MJ, AD, RH), pp. 713–716.
- ICDAR-1999-LebourgeoisE #analysis #documentation #using
- Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
- ICDAR-1999-SrihariYG #analysis #automation
- Information Theoretic Analysis of Postal Address Fields for Automatic Address Interpretation (SNS, WjY, VG), pp. 309–312.
- ICDAR-1999-SteinherzIR #analysis #component #detection
- Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
- ICDAR-1999-Thoma #analysis #automation #database #documentation #image #online
- Automating Data Entry for an On-line Biomedical Database: A Document Image Analysis Application (GRT), pp. 370–373.
- ICDAR-1999-XingyuanGDO #analysis #robust
- A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
- ICDAR-1999-ZhuTW #analysis #recognition
- Font Recognition based on Global Texture Analysis (YZ, TT, YW), pp. 349–352.
- PODS-1999-KleinbergT #algebra #analysis #hypermedia #information retrieval #linear
- Applications of Linear Algebra in Information Retrieval and Hypertext Analysis (JMK, AT), pp. 185–193.
- CSEET-1999-Hislop #analysis #online
- An Online Systems Analysis Course (GWH), pp. 138–144.
- CSEET-1999-MengelU #analysis #case study #source code #student
- A Case Study of the Analysis of Novice Student Programs (SAM, JVU), pp. 40–49.
- ESOP-1999-KingSH #analysis #dependence
- Quotienting Share for Dependency Analysis (AK, JGS, PMH), pp. 59–73.
- ESOP-1999-NielsonN #analysis #control flow #interprocedural
- Interprocedural Control Flow Analysis (FN, HRN), pp. 20–39.
- ESOP-1999-PodelskiCM #analysis #concurrent #constraints #logic programming #source code
- Set-Based Failure Analysis for Logic Programs and Concurrent Constraint Programs (AP, WC, MM), pp. 177–192.
- FoSSaCS-1999-BodeiDNN #process #static analysis
- Static Analysis of Processes for No and Read-Up and No Write-Down (CB, PD, FN, HRN), pp. 120–134.
- FoSSaCS-1999-EsparzaK #analysis #approach #data flow #interprocedural
- An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis (JE, JK), pp. 14–30.
- TACAS-1999-BakhmurovKS #analysis #design #embedded #named
- DYANA: An Environment for Embedded System Design and Analysis (AGB, APK, RLS), pp. 390–404.
- TACAS-1999-BergeronM #analysis #automation #email #interactive
- An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
- TACAS-1999-BuchholzK #analysis #composition #distributed #tool support
- Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
- TACAS-1999-MarchignoliM #analysis #automation #composition #encryption #protocol #verification
- Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
- TACAS-1999-RusuS #abstraction #on the #proving #safety #static analysis #theorem proving
- On Proving Safety Properties by Integrating Static Analysis, Theorem Proving and Abstraction (VR, ES), pp. 178–192.
- TACAS-1999-SpeltE #analysis #database #object-oriented #theorem proving
- A Theorem Prover-Based Analysis Tool for Object-Oriented Databases (DS, SE), pp. 375–389.
- CSMR-1999-JahnkeW #analysis #information management #integration #process #re-engineering
- Integration of Analysis and Redesign Activities in Information System Reengineering (JHJ, JPW), pp. 160–168.
- ICSM-1999-Agrawal #analysis #data flow #graph
- Simultaneous Demand-Driven Data-Flow and Call Graph Analysis (GA), pp. 453–462.
- ICSM-1999-BriandWL #impact analysis #metric #object-oriented #using
- Using Coupling Measurement for Impact Analysis in Object-Oriented Systems (LCB, JW, HL), pp. 475–482.
- ICSM-1999-LiF #impact analysis #realtime
- Impact Analysis in Real-Time Control Systems (JL, PHF), pp. 443–452.
- IWPC-1999-MayrhauserL #maintenance #on the #static analysis
- On the Role of Static Analysis during Software Maintenance (AvM, SL), pp. 170–177.
- PASTE-1999-ChoiGHS #analysis #exception #java #modelling #performance #precise #source code
- Efficient and Precise Modeling of Exceptions for the Analysis of Java Programs (JDC, DG, MH, VS), pp. 21–31.
- PASTE-1999-LiangH #analysis #data flow #equivalence #performance #pointer
- Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
- PASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #using #verification
- Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
- PASTE-1999-SouterPH #analysis
- Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
- PASTE-1999-WhitingH #analysis #monitoring #safety
- Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
- WCRE-1999-BalazinskaMDLK #analysis #java
- Partial Redesign of Java Software Systems Based on Clone Analysis (MB, EM, MD, BL, KK), pp. 326–336.
- WCRE-1999-CimitileFV #empirical #impact analysis #validation
- A Software Model for Impact Analysis: A Validation Experiment (AC, ARF, GV), p. 212–?.
- PLDI-1999-BodikGS #analysis #design #evaluation
- Load-Reuse Analysis: Design and Evaluation (RB, RG, MLS), pp. 64–76.
- PLDI-1999-RuginaR #analysis #parallel #pointer #source code #thread
- Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
- PLDI-1999-YongHR #analysis #pointer #source code
- Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
- SAS-1999-Asai #analysis
- Binding-Time Analysis for Both Static and Dynamic Expressions (KA), pp. 117–133.
- SAS-1999-BessonJT #analysis
- Polyhedral Analysis for Synchronous Languages (FB, TPJ, JPT), pp. 51–68.
- SAS-1999-BozgaFG #analysis #reduction
- State Space Reduction Based on Live Variables Analysis (MB, JCF, LG), pp. 164–178.
- SAS-1999-HillS #analysis #linear #refinement
- Freeness Analysis Through Linear Refinement (PMH, FS), pp. 85–100.
- SAS-1999-McAllester #analysis #complexity #on the
- On the Complexity Analysis of Static Analyses (DAM), pp. 312–329.
- SAS-1999-Soffa #analysis #data flow #named #precise #scalability #tutorial
- Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
- SAS-1999-Weise #static analysis
- Static Analysis of Mega-Programs (DW), pp. 300–302.
- FLOPS-1999-HanusL #functional #logic #program analysis #semantics
- A Semantics for Program Analysis in Narrowing-Based Functional Logic Languages (MH, SL), pp. 353–368.
- FLOPS-1999-RidouxBM #prolog #static analysis
- Typed Static Analysis: Application to Groundness Analysis of PROLOG and λ-PROLOG (OR, PB, FM), pp. 267–283.
- FLOPS-1999-VerbaetenS #analysis #logic programming #source code #termination #using
- Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
- WIA-1999-BergeronC #analysis
- Analysis of Reactive Systems with n Timers (AB, RC), pp. 27–38.
- WIA-1999-CaludeSY #analysis #metric
- Metric Lexical Analysis (CC, KS, SY), pp. 48–59.
- FM-v1-1999-AlurEKKL #analysis #case study #coordination #formal method #hybrid #modelling #multi
- Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multi-robot Coordination (RA, JME, MK, VK, IL), pp. 212–232.
- FM-v1-1999-KestenKPR #analysis #deduction #model checking #verification
- A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software (YK, AK, AP, GR), pp. 173–194.
- FM-v1-1999-LincolnMMS #analysis #equivalence #polynomial #probability #security
- Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
- FM-v1-1999-ZhouC #analysis #communication #formal method #protocol
- Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
- FM-v2-1999-SereT #analysis #safety #specification
- Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
- ICFP-1999-CraryW #analysis #flexibility
- Flexible Type Analysis (KC, SW), pp. 233–248.
- AGTIVE-1999-BaresiP #analysis #graph grammar #programmable
- A Formal Definition of Stuctured Analysis with Programmable Graph Grammars (LB, MP), pp. 193–208.
- CHI-1999-BruckmanE #analysis #fault #programming language
- Should we Leverage Natural-Language Knowledge? An Analysis of User Errors in a Natural-Language-Style Programming Language (AB, EE), pp. 207–214.
- CHI-1999-QuintanaECWS #analysis #case study #design #named #process
- Symphony: A Case Study in Extending Learner-Centered Design through Process Space Analysis (CQ, JE, AC, HKW, ES), pp. 473–480.
- CHI-1999-Soto #analysis #learning #quality #semantics
- Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis (RS), pp. 418–425.
- HCI-CCAD-1999-Callantine #analysis #performance #visualisation
- Visualization and analysis of flight crew procedure performance (TJC), pp. 1281–1285.
- HCI-CCAD-1999-MajoeH #analysis #gesture #recognition
- Human gesture analysis and recognition for medical and dance applications (DM, NH), pp. 818–822.
- HCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
- Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
- HCI-CCAD-1999-WatanabeO #analysis #communication #interactive #synthesis
- Virtual face-to-face communication system for human interaction analysis by synthesis (TW, MO), pp. 182–186.
- HCI-EI-1999-KuzniarzP #analysis #design #object-oriented #towards
- Towards Complex Object Oriented Analysis and Design (LK, MP), pp. 1257–1261.
- HCI-EI-1999-NoldusKHD #analysis #tool support
- Software Tools for Collection and Analysis of Observational Data (LN, AK, WtH, RD), pp. 1114–1118.
- HCI-EI-1999-TokudaMTL #analysis #development #requirements #user interface
- A New Integrated Support Environment for Requirements Analysis of User Interface Development (YT, TM, YT, ESL), pp. 895–899.
- HCI-EI-1999-Urokohara #analysis #design #usability #user interface #using
- Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
- SIGAda-1999-Colket #analysis #realtime #using
- Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
- CAiSE-1999-GreenR #analysis #modelling #ontology #process
- An Ontological Analysis of Integrated Process Modelling (PFG, MR), pp. 225–240.
- CAiSE-1999-Wietek #data analysis #modelling #multi #visual notation
- Modelling Multidimensional Data in a Dataflow-Based Visual Data Analysis Environment (FW), pp. 149–163.
- ICEIS-1999-AbeT #analysis #development #process #scheduling
- IDEFO-Based Software Process Analysis for Scheduling Systems Development (AA, TT), pp. 361–370.
- ICEIS-1999-BarjisD #analysis #modelling #network #process #using
- Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
- ICEIS-1999-Cheng #analysis #realtime #verification
- Analysis and Verification of Real-Time Systems (AMKC), p. X.
- ICEIS-1999-Gustas #analysis #approach #enterprise #information management
- Integrated Approach for Information System Analysis at the Enterprise Level (RG), pp. 435–442.
- ICEIS-1999-KiniSJ #analysis #visualisation
- A System for Analysis & Visualization of Domain Specific Data (SNK, S, KPJ), pp. 82–90.
- ICEIS-1999-LiHCHN #analysis #automation #comprehension #documentation
- Automatic Document Analysis and Understanding System (XL, JH, ZC, DCDH, PAN), pp. 91–100.
- ICEIS-1999-RodriguesRH #analysis
- An Intelligent Retail Analysis System (MdFR, CR, PRH), pp. 140–147.
- ICEIS-1999-Stamper #analysis #design #paradigm
- Information-Field Paradigm and New Directions for Systems Analysis and Design (RKS), p. VI.
- ICML-1999-LangleyS #analysis #classification #naive bayes
- Tractable Average-Case Analysis of Naive Bayesian Classifiers (PL, SS), pp. 220–228.
- ICML-1999-SchefferJ #analysis #fault
- Expected Error Analysis for Model Selection (TS, TJ), pp. 361–370.
- KDD-1999-BarbaraW #approximate #data analysis #using
- Using Approximations to Scale Exploratory Data Analysis in Datacubes (DB, XW), pp. 382–386.
- MLDM-1999-PengB #analysis #image #independence #retrieval
- Independent Feature Analysis for Image Retrieval (JP, BB), pp. 103–115.
- UML-1999-FirleyHDGG #analysis #case study #diagrams #sequence chart
- Timed Sequence Diagrams and Tool-Based Analysis — A Case Study (TF, MH, KD, TG, UG), pp. 645–660.
- UML-1999-LiL #analysis #diagrams #sequence chart #uml
- Timing Analysis of UML Sequence Diagrams (XL, JL), pp. 661–674.
- UML-1999-SendallS #analysis #case study #uml
- UML Based Fusion Analysis Applied to a Bank Case Study (SS, AS), pp. 278–291.
- OOPSLA-1999-Blanchet #analysis #java #object-oriented
- Escape Analysis for Object-Oriented Languages: Application to Java (BB), pp. 20–34.
- OOPSLA-1999-ChoiGSSM #analysis #java
- Escape Analysis for Java (JDC, MG, MJS, VCS, SPM), pp. 1–19.
- OOPSLA-1999-France #analysis #concept #modelling #problem #requirements #uml
- A Problem-Oriented Analysis of Basic UML Static Requirements Modeling Concepts (RBF), pp. 57–69.
- OOPSLA-1999-Madsen #analysis #semantics
- Semantic Analysis of Virtual Classes and Tested Classes (OLM), pp. 114–131.
- OOPSLA-1999-WhaleyR #analysis #composition #java #pointer #source code
- Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
- TOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
- Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
- TOOLS-EUROPE-1999-Collins-Cope #analysis #approach #case study #interface #requirements
- The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
- TOOLS-EUROPE-1999-MayerH #analysis #metric #object-oriented
- Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
- TOOLS-EUROPE-1999-Mitchell99a #analysis #contract #exclamation #uml
- Analysis by Contract: UML with Attitude! (RM), p. 407.
- TOOLS-USA-1999-AlexanderO #analysis #polymorphism #testing
- Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
- TOOLS-USA-1999-Arsanjani #analysis #design #distributed #framework #implementation #java #using
- Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
- TOOLS-USA-1999-Mitchell #analysis #contract #uml
- Analysis by Contract or UML with Attitude (RM), p. 465–?.
- TOOLS-USA-1999-Parnas #analysis #component #documentation #testing #tool support
- Tools for Component Documentation, Analysis and Testing (DLP), p. 2.
- TOOLS-USA-1999-PloschP #analysis #c++ #contract #implementation #named
- Contracts: From Analysis to C++ Implementation (RP, JP), pp. 248–257.
- GCSE-1999-BayerMW #analysis
- Customizable Domain Analysis (JB, DM, TW), pp. 178–194.
- LOPSTR-1999-SmausHK #analysis #logic programming #source code
- Mode Analysis Domains for Typed Logic Programs (JGS, PMH, AK), pp. 82–101.
- POPL-1999-PessauxL #analysis #exception #type system
- Type-Based Analysis of Uncaught Exceptions (FP, XL), pp. 276–290.
- POPL-1999-RamalingamFT #identification #program analysis
- Aggregate Structure Identification and Its Application to Program Analysis (GR, JF, FT), pp. 119–132.
- POPL-1999-SagivRW #analysis #logic #parametricity
- Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
- RE-1999-VillerS #analysis #process #requirements #social
- Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
- ESEC-FSE-1999-Ball #concept #dynamic analysis
- The Concept of Dynamic Analysis (TB), pp. 216–234.
- ESEC-FSE-1999-LiangH #performance #points-to #program analysis
- Efficient Points-to Analysis for Whole-Program Analysis (DL, MJH), pp. 199–215.
- ESEC-FSE-1999-RountevRL #analysis #data flow
- Data-Flow Analysis of Program Fragments (AR, BGR, WL), pp. 235–252.
- ICSE-1999-ArdisC #analysis #product line
- Defining Families — Commonality Analysis (MAA, DAC), pp. 671–672.
- ICSE-1999-DeursenK #clustering #concept analysis #identification #using
- Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
- ICSE-1999-KazmanBKCW #analysis #architecture #experience #trade-off
- Experience with Performing Architecture Tradeoff Analysis (RK, MB, MK, SJC, SGW), pp. 54–63.
- ICSE-1999-KeyesDC #analysis #framework
- Analysis of a Scheduler for a CAD Framework (DSK, LKD, MJC), pp. 152–161.
- ICSE-1999-Magee #analysis #architecture #behaviour #using
- Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
- ICSE-1999-Mascolo #analysis #mobile #prototype #specification
- Specification, Analysis, and Prototyping of Mobile Systems (CM), pp. 724–725.
- ICSE-1999-NaumovichAC #analysis #concurrent #data flow #java #source code
- Data Flow Analysis for Checking Properties of Concurrent Java Programs (GN, GSA, LAC), pp. 399–410.
- ICSE-1999-YurRL #alias #analysis #incremental #pointer
- An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
- CC-1999-Martin #analysis #comparison #functional #interprocedural #string
- Experimental Comparison of call string and functional Approaches to Interprocedural Analysis (FM), pp. 63–75.
- HPDC-1999-LeighJDBG #analysis #collaboration #set
- A Methodology for Supporting Collaborative Exploratory Analysis of Massive Data Sets in Tele-Immersive Environments (JL, AEJ, TAD, SB, RLG), pp. 62–69.
- LCTES-1999-Persson #analysis #embedded #garbage collection #memory management
- Live Memory Analysis for Garbage Collection in Embedded Systems (PP), pp. 45–54.
- PPoPP-1999-MoonH #analysis #array #automation #data flow #evaluation #parallel
- Evaluation of Predicated Array Data-Flow Analysis for Automatic Parallelization (SM, MWH), pp. 84–95.
- PPoPP-1999-Sundaram-StukelV #analysis #predict #using
- Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
- CADE-1999-Weidenbach #analysis #automation #first-order #logic #protocol #security #towards
- Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
- CAV-1999-AbdullaABBHL #abstraction #analysis #infinity #reachability #verification
- Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis (PAA, AA, SB, AB, PH, YL), pp. 146–159.
- CAV-1999-BehrmannLPWY #analysis #diagrams #difference #performance #reachability #using
- Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
- CAV-1999-BuchholzK #analysis
- A Toolbox for the Analysis of Discrete Event Dynamic Systems (PB, PK), pp. 483–486.
- CAV-1999-HermannsMS #analysis #composition #markov #modelling #named #performance #specification
- TIPPtool: Compositional Specification and Analysis of Markovian Performance Models (HH, VM, MS), pp. 487–490.
- CAV-1999-NamjoshiK #analysis #performance
- Efficient Analysis of Cyclic Definitions (KSN, RPK), pp. 394–405.
- CAV-1999-Schumann #analysis #authentication #automation #named #protocol
- PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
- CSL-1999-DelzannoEP #analysis #constraints #protocol
- Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
- CSL-1999-Franzle #analysis #hybrid #infinity
- Analysis of Hybrid Systems: An Ounce of Realism Can Save an Infinity of States (MF), pp. 126–140.
- ICLP-1999-HermenegildoBPL #debugging #optimisation #preprocessor #program analysis #using
- Program Analysis, Debugging, and Optimization Using the Ciao System Preprocessor (MVH, FB, GP, PLG), pp. 52–66.
- ICLP-1999-KangT #linear #logic programming #programming language #static analysis
- A Static Analysis for Classical Linear Logic Programming Language (KSK, NT), p. 610.
- ICLP-1999-LuC #analysis #logic programming #source code
- A Regular Type Analysis of Logic Programs (LL, JGC), p. 613.
- ICLP-1999-MarinoM #functional #logic programming #source code #static analysis #using
- Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), p. 614.
- ICLP-1999-VanhoofB #analysis
- Binding-time Analysis for Mercury (WV, MB), pp. 500–514.
- ICLP-1999-Verbaeten #abduction #analysis #logic programming #source code #termination
- Termination Analysis for Abductive General Logic Programs (SV), pp. 365–379.
- LICS-1999-BanerjeeHR #analysis #polymorphism #λ-calculus
- Region Analysis and the Polymorphic λ Calculus (AB, NH, JGR), pp. 88–97.
- LICS-1999-Hofmann #analysis #higher-order #semantics #syntax
- Semantical Analysis of Higher-Order Abstract Syntax (MH0), pp. 204–213.
- LICS-1999-MalacariaH #game studies #nondeterminism #program analysis #security
- Non-Deterministic Games and Program Analysis: An Application to Security (PM, CH), pp. 443–452.
- ASE-1998-Andrews #analysis #testing #tool support #using
- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
- ASE-1998-CzernyH #analysis #automation #requirements
- Automated Integrative Analysis of State-based Requirements (BJC, MPEH), p. 125–?.
- ASE-1998-MorzentiPM #analysis #automation #composition #specification
- A Tool for Automated System Analysis based on Modular Specifications (AM, PSP, SM), pp. 2–11.
- DAC-1998-ChenOIB #analysis #architecture #validation
- Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
- DAC-1998-DartuP #analysis #named
- TETA: Transistor-Level Engine for Timing Analysis (FD, LTP), pp. 595–598.
- DAC-1998-DharchoudhuryPBVTB #analysis #design #network
- Design and Analysis of Power Distribution Networks in PowerPC Microprocessors (AD, RP, DB, RV, BT, DB), pp. 738–743.
- DAC-1998-GhoshJB #analysis #testing
- A BIST Scheme for RTL Controller-Data Paths Based on Symbolic Testability Analysis (IG, NKJ, SB), pp. 554–559.
- DAC-1998-KishinevskyCK #analysis #interface #specification #synthesis
- Asynchronous Interface Specification, Analysis and Synthesis (MK, JC, AK), pp. 2–7.
- DAC-1998-KrauterM #analysis #layout
- Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis (BK, SM), pp. 303–308.
- DAC-1998-KukimotoB #analysis #functional
- Hierarchical Functional Timing Analysis (YK, RKB), pp. 580–585.
- DAC-1998-MalkaZ #analysis #debugging #design #estimation #reliability #statistics
- Design Reliability — Estimation through Statistical Analysis of Bug Discovery Data (YM, AZ), pp. 644–649.
- DAC-1998-NagarajCHY #analysis #approach
- A Practical Approach to Static Signal Electromigration Analysis (NSN, FC, HH, DY), pp. 572–577.
- DATE-1998-AllaraFSS #analysis #profiling
- A Model for System-Level Timed Analysis and Profiling (AA, WF, FS, DS), pp. 204–210.
- DATE-1998-BolchiniSS #analysis #concurrent #detection #fault #network
- Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
- DATE-1998-ChandramouliWS #analysis #functional #named
- AFTA: A Formal Delay Model for Functional Timing Analysis (VC, JW, KAS), pp. 350–355.
- DATE-1998-CoppensAR #analysis #fault #modelling
- VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
- DATE-1998-FassnachtS #analysis #optimisation
- Timing Analysis and Optimization of a High-Performance CMOS Processor Chipset (UF, JS), pp. 325–331.
- DATE-1998-KassabCAK #analysis #constraints
- Propagation of Last-Transition-Time Constraints in Gate-Level Timing Analysis (MK, EC, SA, THK), pp. 796–802.
- DATE-1998-KimuraI #analysis #design
- A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
- DATE-1998-KoegstGCW #analysis #design #reuse
- A Systematic Analysis of Reuse Strategies for Design of Electronic Circuits (MK, DG, PC, MGW), pp. 292–296.
- DATE-1998-MirRVH #analysis #fault
- Switch-Level Fault Coverage Analysis for Switched-Capacitor Systems (SM, AR, DV, JLH), pp. 810–814.
- DATE-1998-OlcozCGG #static analysis #tool support
- Static Analysis Tools for Soft-Core Reviews and Audits (SO, AC, MG, JAG), pp. 935–936.
- DATE-1998-PastorC #analysis #encoding #performance #petri net
- Efficient Encoding Schemes for Symbolic Analysis of Petri Nets (EP, JC), pp. 790–795.
- DATE-1998-SzekelyR #performance #static analysis
- Fast Field Solvers for Thermal and Electrostatic Analysis (VS, MR), pp. 518–523.
- DATE-1998-VercauterenVJL #analysis #partial order #performance #using #verification
- Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
- PODS-1998-DavulcuKRR #analysis #logic #modelling #workflow
- Logic Based Modeling and Analysis of Workflows (HD, MK, CRR, IVR), pp. 25–33.
- PODS-1998-PapadimitriouRTV #analysis #probability #semantics
- Latent Semantic Indexing: A Probabilistic Analysis (CHP, PR, HT, SV), pp. 159–168.
- SIGMOD-1998-ChaudhuriN #analysis
- AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
- VLDB-1998-Ganguly #algorithm #analysis #design #optimisation #parametricity #query
- Design and Analysis of Parametric Query Optimization Algorithms (SG), pp. 228–238.
- VLDB-1998-Mihalisin #analysis #interactive
- A Single Pass Computing Engine for Interactive Analysis of VLDBs (TM), p. 707.
- VLDB-1998-WeberSB #analysis #performance
- A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
- CSEET-1998-Cowling98a #analysis #education #experience #re-engineering #student
- Teaching Systems Analysis to Software Engineering Students: Experience with a Structured Methodology (AJC), pp. 102–113.
- ESOP-1998-BruynoogheLS #analysis #deduction
- A Polyvariant Binding-Time Analysis for Off-line Partial Deduction (MB, ML, KFS), pp. 27–41.
- ESOP-1998-ChinKL #analysis
- Synchronisation Analysis to Stop Tulping (WNC, SCK, TWL), pp. 75–89.
- FASE-1998-NielsonAN #analysis #behaviour #case study #safety
- Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
- FASE-1998-ReedJDR #analysis #automation #formal method #modelling #network
- Automated Formal Analysis of Networks: FDR Models of Arbitrary Topologies and Flow-Control Mechanisms (JNR, DMJ, BD, GMR), pp. 239–254.
- FoSSaCS-1998-AmadioC #analysis #type system
- Analysis of a Guard Condition in Type Theory (Extended Abstract) (RMA, SCG), pp. 48–62.
- TACAS-1998-CharatonikP #analysis #infinity
- Set-Based Analysis of Reactive Infinite-State Systems (WC, AP), pp. 358–375.
- TACAS-1998-Lind-NielsenABHKL #analysis #composition #dependence #scalability #using #verification
- Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
- TACAS-1998-LindahlPY #analysis #design
- Formal Design and Analysis of a Gear Controller (ML, PP, WY), pp. 281–297.
- CSMR-1998-BorneRS #analysis #object-oriented #towards
- Towards a Systematic Object-Oriented transformation of a Mrise Analysis (IB, AR, FS), pp. 213–215.
- CSMR-1998-YehL #analysis #data flow #metric #testing
- Software Testability Measurements Derived from Data Flow Analysis (PLY, JCL), pp. 96–103.
- ICSM-1998-CherinkaOR #maintenance #off the shelf #programming #question #static analysis
- Maintaining a COTS Integrated Solution — Are Traditional Static Analysis Techniques Sufficient for this New Programming Methodology? (RC, CMO, JR), pp. 160–169.
- ICSM-1998-HarmanSD #analysis #memory management #slicing #using
- Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
- ICSM-1998-HutchinsG #impact analysis #visual notation
- Improving Visual Impact Analysis (MAH, KG), pp. 294–303.
- ICSM-1998-SinhaH #analysis #source code
- Analysis of Programs with Exception-Handling Constructs (SS, MJH), pp. 348–357.
- IWPC-1998-BechiniT #concurrent #design #dynamic analysis #java #tool support
- Design of a Toolset for Dynamic Analysis of Concurrent Java Program (AB, KCT), pp. 190–197.
- IWPC-1998-LagueLBMD #analysis #architecture #comprehension #framework
- An Analysis Framework for Understanding Layered Software Architectures (BL, CL, ALB, EM, MD), pp. 37–44.
- IWPC-1998-MartinoMMV #automation #detection #development #interactive #parallel #program analysis
- Automatic Detection of Interaction Patterns for Parallel Program Analysis and Development (BDM, AM, NM, UV), pp. 206–213.
- PASTE-1998-DorRS #analysis #detection #experience #fault #memory management #pointer
- Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
- PASTE-1998-NaumovichCO #analysis #concurrent #data flow #performance #source code
- Efficient Composite Data Flow Analysis Applied to Concurrent Programs (GN, LAC, LJO), pp. 51–58.
- PASTE-1998-Snelting #comprehension #concept analysis #framework
- Concept Analysis — A New Framework for Program Understanding (GS), pp. 1–10.
- PASTE-1998-ZhangRL #alias #analysis #pointer
- Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
- WCRE-1998-CimitileCL #analysis #data flow #incremental #migration
- Incremental Migration Strategies: Data Flow Analysis For Wrapping (AC, UdC, ADL), pp. 59–68.
- PLDI-1998-AdveM #integer #optimisation #program analysis #set #using
- Using Integer Sets for Data-Parallel Program Analysis and Optimization (VSA, JMMC), pp. 186–198.
- PLDI-1998-AmmonsL #analysis #data flow
- Improving Data-flow Analysis with Path Profiles (GA, JRL), pp. 72–84.
- PLDI-1998-DiwanMM #alias #analysis #type system
- Type-Based Alias Analysis (AD, KSM, JEBM), pp. 106–117.
- PLDI-1998-HastiH #analysis #pointer #using
- Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
- SAS-1998-FagesG #analysis #logic programming #source code
- Analysis of Normal Logic Programs (FF, RG), pp. 82–98.
- SAS-1998-HagiyaT #analysis #data flow #java #on the #virtual machine
- On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
- SAS-1998-PeraltaGS #analysis #constraints #imperative #logic programming #source code
- Analysis of Imperative Programs through Analysis of Constraint Logic Programs (JCP, JPG, HS), pp. 246–261.
- SAS-1998-Ruthing #analysis #bidirectional #data flow
- Bidirectional Data Flow Analysis in Code Motion: Myth and Reality (OR), pp. 1–16.
- SAS-1998-SchmidtS #abstract interpretation #model checking #program analysis
- Program Analysis as Model Checking of Abstract Interpretations (DAS, BS), pp. 351–380.
- SAS-1998-TadjouddineEF #automation #difference #program analysis
- Sparse Jacobian Computation in Automatic Differentiation by Static Program Analysis (MT, FE, CF), pp. 311–326.
- STOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
- STOC-1998-LubyMSS #analysis #design #graph #using
- Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
- Best-of-PLDI-1998-AmmonsL98a #analysis #data flow
- Improving data-flow analysis with path profiles (with retrospective) (GA, JRL), pp. 568–582.
- FM-1998-Borger #analysis #design #state machine #using
- High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
- ICFP-1998-Gustavsson #analysis #optimisation
- A Type Based Sharing Analysis for Update Avoidance and Optimisation (JG), pp. 39–50.
- ICFP-1998-Russell #analysis #design #functional #named
- MAP: A Functional Analysis and Design Method (DR), p. 342.
- CHI-1998-Boy #analysis #automation #safety
- Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
- CHI-1998-MackayB #data analysis #multi #named
- DIVA: Exploratory Data Analysis with Multimedia Streams (WEM, MBL), pp. 416–423.
- AdaEurope-1998-BliebergerB #ada #analysis #source code
- Symbolic Reaching Definitions Analysis of Ada Programs (JB, BB), pp. 238–250.
- SIGAda-1998-LaskiSH #ada #analysis #dependence #source code
- Dependency Analysis of Ada Programs (JWL, WS, JH), pp. 263–275.
- SIGAda-1998-MillsP #ada #analysis #co-evolution #design #hardware #migration
- Hardware/Software Co-Design: VHDL and Ada 95 Code Migration and Integrated Analysis (MM, GP), pp. 18–27.
- SIGAda-1998-PritchettR #static analysis
- An ASIS-Based Static Analysis Tool for High-Integrity Systems (WWPI, JDR), pp. 12–17.
- CAiSE-1998-KavakliL #analysis #process
- Goal-Driven Business Process Analysis — Application in Electricity Deregulation (VK, PL), pp. 305–324.
- CAiSE-1998-Lam #analysis #development #reuse
- Change Analysis and Management in a Reuse-Oriented Software Development Setting (WL), pp. 219–236.
- EDOC-1998-SyrbeP #analysis
- An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
- CIKM-1998-DulleaS #analysis #modelling
- An Analysis of the Structural Validity of Ternary Relatinships in Entity Relationship Modeling (JD, IYS), pp. 331–339.
- ICML-1998-GarciaN #algorithm #analysis #learning
- A Learning Rate Analysis of Reinforcement Learning Algorithms in Finite-Horizon (FG, SMN), pp. 215–223.
- ICML-1998-KimuraK #algorithm #analysis #learning #using
- An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
- ICML-1998-PendrithM #analysis #learning #markov
- An Analysis of Direct Reinforcement Learning in Non-Markovian Domains (MDP, MM), pp. 421–429.
- ICPR-1998-AdigaC98a #analysis #image #industrial
- Analysis of volumetric images of filamentous bacteria in industrial sludge (PSUA, BBC), pp. 1735–1737.
- ICPR-1998-Ayache #analysis #challenge #image #research
- Medical image analysis a challenge for computer vision research (NA), pp. 1255–1256.
- ICPR-1998-BamfordL #analysis #segmentation
- Bayesian analysis of cell nucleus segmentation by a Viterbi search based active contour (PB, BCL), pp. 133–135.
- ICPR-1998-ChenHS #analysis #email
- E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
- ICPR-1998-CutlerD #analysis #detection
- View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
- ICPR-1998-Duin #analysis #problem #relational #scalability
- Relational discriminant analysis and its large sample size problem (RPWD), pp. 445–449.
- ICPR-1998-Garcia-SevillaP #analysis #image
- The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
- ICPR-1998-GovindanDKP #analysis #classification #component #independence
- Independent component analysis applied to electrogram classification during atrial fibrillation (AG, GD, JK, JP), pp. 1662–1664.
- ICPR-1998-GuoYM #analysis #game studies #multi #robust #segmentation #statistics
- Unsupervised segmentation based on multi-resolution analysis, robust statistics and majority game theory (GG, SY, SM), pp. 799–801.
- ICPR-1998-HatteryL #analysis #image #physics
- Depth from physics: physics-based image analysis and feature definition (DH, MHL), pp. 711–713.
- ICPR-1998-HofmanJ #analysis #approach #clustering #performance #robust #using
- Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
- ICPR-1998-HontaniD #analysis #component #detection #image #multi
- Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
- ICPR-1998-Huynh #analysis #image #re-engineering
- Euclidean reconstruction from an image triplet: a sensitivity analysis (DQH), pp. 835–837.
- ICPR-1998-HyvarinenOHH #analysis #component #feature model #image #independence
- Image feature extraction by sparse coding and independent component analysis (AH, EO, POH, JH), pp. 1268–1273.
- ICPR-1998-KangTH #analysis #architecture #image #pattern matching #pattern recognition #recognition
- An IRAM architecture for image analysis and pattern recognition (YK, JT, TSH), pp. 1561–1564.
- ICPR-1998-KawataNOKMEKM #analysis #image #using
- Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
- ICPR-1998-KogaKSF #analysis #segmentation #using
- Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
- ICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
- ICPR-1998-LuYI #analysis
- Intensity modulated moire and its intensity-phase analysis (CL, AY, SI), pp. 1791–1793.
- ICPR-1998-MaedaKIZ #analysis #multi #using
- Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
- ICPR-1998-MottlBKKM #analysis #image
- Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
- ICPR-1998-NakaiMI #analysis #simulation
- Simulation and analysis of spectral distributions of human skin (HN, YM, SI), pp. 1065–1067.
- ICPR-1998-OhLS #analysis #using
- Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
- ICPR-1998-OzdemirBMEE #algorithm #analysis #comparative #evaluation #fault
- Comparative evaluation of texture analysis algorithms for defect inspection of textile products (SÖ, AB, RM, AE, AE), pp. 1738–1740.
- ICPR-1998-Perner #analysis #classification #image
- Image analysis and classification of HEp-2 cells in fluorescent images (PP), pp. 1677–1679.
- ICPR-1998-Shevlin #analysis #problem #using
- Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
- ICPR-1998-SimonB #analysis #clustering #image
- WaveStat-cluster analysis of image data and wavelet coefficients (US, MB), pp. 1622–1625.
- ICPR-1998-Takasu #analysis #documentation #image #probability
- Probabilistic interpage analysis for article extraction from document images (AT), pp. 932–935.
- ICPR-1998-Tayeb-beySE #analysis #documentation
- Analysis and conversion of documents (STb, ASS, HE), pp. 1089–1091.
- ICPR-1998-WatanabeT #2d #analysis #image
- An analysis system for two-dimensional gel electrophoresis images of genomic DNA (YW, KT), pp. 368–371.
- ICPR-1998-YogesanEB #analysis #image
- Texture analysis of retinal images to determine nerve fibre loss (KY, RHE, CJB), pp. 1665–1667.
- ICPR-1998-ZhaoN #analysis #linear #recognition
- Linear discriminant analysis of MPF for face recognition (WZ, NN), pp. 185–188.
- ICPR-1998-ZhugeTLHD #analysis #image #interactive #programming #segmentation
- An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
- SIGIR-1998-Greiff #data analysis #formal method
- A Theory of Term Weighting Based on Exploratory Data Analysis (WRG), pp. 11–19.
- UML-1998-BourdeauLR #analysis #case study #diagrams #experience #uml
- Hierarchical Context Diagrams with UML: An Experience Report on Satellite Ground System Analysis (EB, PL, PR), pp. 227–239.
- ECOOP-1998-GilI #analysis #complexity #object-oriented #source code
- The Complexity of Type Analysis of Object Oriented Programs (JYG, AI), pp. 601–634.
- TOOLS-ASIA-1998-YuanCXMY #analysis #c++ #database #information management #tool support
- C++ Program Information Database for Analysis Tools (WY, XC, TX, HM, FY), pp. 173–180.
- TOOLS-USA-1998-Mitchell #analysis #constraints #contract #ocl #uml
- Analysis by Contract: An Introduction to UML’s Object Constraint Language (OCL) (RM), p. 448–?.
- TOOLS-USA-1998-Walden #analysis #contract #design #named
- BON: Seamless, Reversible, Contract-Based Analysis and Design (KW), p. 445.
- ALP-PLILP-1998-CodishS #analysis #logic #set
- The Boolean Logic of Set Sharing Analysis (MC, HS), pp. 89–101.
- ALP-PLILP-1998-Hannan #program analysis #prolog
- Program Analysis in λ-Prolog (JH), pp. 353–354.
- LOPSTR-1998-GabricGS #analysis #constraints #strict #theorem proving
- Strictness Analysis as Finite-Domain Constraint Solving (TG, KG, HS), pp. 255–270.
- POPL-1998-Blanchet #analysis #correctness #implementation #proving
- Escape Analysis: Correctness Proof, Implementation and Experimental Results (BB), pp. 25–37.
- POPL-1998-BodikA #analysis
- Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
- POPL-1998-DebrayMW #alias #analysis #execution
- Alias Analysis of Executable Code (SKD, RM, MW), pp. 12–24.
- POPL-1998-DeFouwGC #analysis #interprocedural #performance
- Fast Interprocedural Class Analysis (GD, DG, CC), pp. 222–236.
- POPL-1998-GhiyaH #analysis #pointer
- Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
- POPL-1998-JagannathanTWW #alias #analysis #higher-order
- Single and Loving It: Must-Alias Analysis for Higher-Order Languages (SJ, PT, SW, AKW), pp. 329–341.
- POPL-1998-Schmidt #abstract interpretation #analysis #data flow #model checking
- Data Flow Analysis is Model Checking of Abstract Interpretations (DAS), pp. 38–48.
- ICRE-1998-HaglindJR #analysis #case study #empirical #experience #requirements
- Experiences Integrating Requirements Engineering and Business Analysis An Empirical Study of Operations & Management System Procurement Projects (MH, LJ, MR), pp. 108–117.
- ICRE-1998-LutzHMST #analysis #product line #requirements #safety
- Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
- ICRE-1998-SutcliffeR #analysis #experience #requirements
- Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
- REFSQ-1998-SutcliffeM #analysis #non-functional #requirements
- Scenario-based Analysis of Non-Functional Requirements (AGS, SM), pp. 219–233.
- SAC-1998-KimYL #analysis #policy
- Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
- SAC-1998-Marchiori #analysis
- Light analysis of complex systems (MM), pp. 18–22.
- FSE-1998-AllenG #analysis #component #formal method #integration #modelling #standard
- Formal Modeling and Analysis of the HLA Component Integration Standard (RA, DG), pp. 70–79.
- FSE-1998-AtkinsonG #effectiveness #pointer #program analysis
- Effective Whole-Program Analysis in the Presence of Pointers (DCA, WGG), pp. 46–55.
- FSE-1998-Jackson #analysis #design
- An Intermedicate Design Language and Its Analysis (DJ), pp. 121–130.
- FSE-1998-SneltingT #concept analysis #re-engineering #using
- Reengineering Class Hierarchies Using Concept Analysis (GS, FT), pp. 99–110.
- ICSE-1998-ChanBS #analysis #named #specification
- Promises: Limited Specifications for Analysis and Manipulation (ECC, JB, WLS), pp. 167–176.
- ICSE-1998-MascarenhasKBK #analysis #artificial reality #modelling #petri net
- Modeling and Analysis of a Virtual Reality System with Time Petri Nets (RM, DK, UAB, RVK), pp. 33–42.
- ICSE-1998-TanakaAOY #analysis #metric #process #quality
- Software Quality Analysis & Measurement Service Activity in the Company (TT, MA, HO, AY), pp. 426–429.
- ICSE-1998-YokoyamaK #analysis #quality #statistics
- Software Cost and Quality Analysis by Statistical Approaches (YY, MK), pp. 465–467.
- ASPLOS-1998-GhoshMM #analysis #precise #program transformation
- Precise Miss Analysis for Program Transformations with Caches of Arbitrary Associativity (SG, MM, SM), pp. 228–239.
- ASPLOS-1998-SodaniS #analysis #empirical
- An Empirical Analysis of Instruction Repetition (AS, GSS), pp. 35–45.
- CC-1998-BraunKK #analysis #control flow #generative #named
- Cool: A Control-Flow Generator for System Analysis (VB, JK, DK), pp. 306–309.
- CC-1998-BrouwerGP #analysis #automaton #finite #implementation #performance
- Myths and Facts about the Efficient Implementation of Finite Automata and Lexical Analysis (KB, WG, EP), pp. 1–15.
- CC-1998-MalacariaH #analysis #approach #control flow
- A New Approach to Control Flow Analysis (PM, CH), pp. 95–108.
- CC-1998-MartinAWF #analysis
- Analysis of Loops (FM, MA, RW, CF), pp. 80–94.
- CC-1998-NielsonN #analysis #constraints #logic
- Flow Logics for Constraint Based Analysis (HRN, FN), pp. 109–127.
- HPDC-1998-TierneyJCHBG #analysis #distributed #performance
- The NetLogger Methodology for High Performance Distributed Systems Performance Analysis (BT, WEJ, BC, GH, CXB, DG), pp. 260–267.
- LCTES-1998-LiuG #analysis #automation #bound
- Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
- LCTES-1998-LundqvistS #analysis #simulation #using
- Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
- CADE-1998-BrauburgerG #analysis #evaluation #induction #termination
- Termination Analysis by Inductive Evaluation (JB, JG), pp. 254–269.
- CADE-1998-FleuriotP #analysis #geometry #proving #standard #theorem proving
- A Combination of Nonstandard Analysis and Geometry Theorem Proving, with Application to Newton’s Principia (JDF, LCP), pp. 3–16.
- CAV-1998-AbdullaBJ #analysis #bound #on the fly
- On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
- CAV-1998-ComonJ #analysis #automaton #multi #safety
- Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
- CAV-1998-Mitchell #analysis #finite #protocol #security
- Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
- ISSTA-1998-Ball #analysis #control flow #on the #testing
- On the Limit of Control Flow Analysis for Regression Test Selection (TB), pp. 134–142.
- ISSTA-1998-GodefroidHJ #analysis #model checking #monitoring #using
- Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
- JICSLP-1998-DecorteS #analysis #termination
- Termination Analysis: Some Practical Properties of the Norm and Level Mapping Space (SD, DDS), pp. 235–249.
- LICS-1998-StarkS #analysis #automaton #composition #network #probability
- Compositional Analysis of Expected Delays in Networks of Probabilistic I/O Automata (EWS, SAS), pp. 466–477.
- ASE-1997-Ameur #comprehension #program analysis #source code
- A Contribution to Program Comprehension by Program Analysis: Application to Numerical Programs (YAA), pp. 134–142.
- ASE-1997-Dwyer #analysis #composition #concurrent
- Modular Flow Analysis for Concurrent Software (MBD), pp. 264–273.
- ASE-1997-Gaugne #comprehension #debugging #static analysis
- A Static Analysis for Program Understanding and Debugging (RG), pp. 297–298.
- ASE-1997-HarrisonB #analysis #data flow #design #information management
- Data Flow Analysis within the ITOC Information System Design Recovery Tool (JVH, AB), p. 227–?.
- ASE-1997-LamJ #analysis #requirements #reuse
- Mechanising Requirements Engineering: Reuse and the Application of Domain Analysis Technology (WL, SJ), pp. 303–304.
- DAC-1997-ChenL #analysis #design #power management
- Power Supply Noise Analysis Methodology for Deep-Submicron VLSI Chip Design (HHC, DDL), pp. 638–643.
- DAC-1997-CongHKNSY #2d #analysis
- Analysis and Justification of a Simple, Practical 2 1/2-D Capacitance Extraction Methodology (JC, LH, ABK, DN, NS, SHCY), pp. 627–632.
- DAC-1997-KlenkeMAJRG #analysis #dependence #design #performance
- An Integrated Design Environment for Performance and Dependability Analysis (RHK, MM, JHA, BWJ, RR, AG), pp. 184–189.
- DAC-1997-KukimotoB #analysis #detection
- Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
- DAC-1997-MalikML #analysis #embedded
- Static Timing Analysis of Embedded Software (SM, MM, YTSL), pp. 147–152.
- DAC-1997-MarculescuMP #analysis #finite #probability #sequence #state machine
- Sequence Compaction for Probabilistic Analysis of Finite-State Machines (DM, RM, MP), pp. 12–15.
- DAC-1997-PasseroneLCS #analysis #hardware #performance #prototype #trade-off
- Fast Hardware/Software Co-Simulation for Virtual Prototyping and Trade-Off Analysis (CP, LL, MC, ALSV), pp. 389–394.
- DAC-1997-SudarsanamLD #analysis #architecture #evaluation
- Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures (AS, SYL, SD), pp. 287–292.
- EDTC-1997-DasdanMG #analysis #constraints #debugging #embedded #named
- RATAN: A tool for rate analysis and rate constraint debugging for embedded systems (AD, AM, RKG), pp. 2–6.
- EDTC-1997-FradinMD #3d #analysis
- Analysis of 3D conjugate heat transfers in electronics (JPF, LM, BD), pp. 190–194.
- EDTC-1997-Garcia-VargasGFR #algorithm #analysis #generative #scalability
- An algorithm for numerical reference generation in symbolic analysis of large analog circuits (IGV, MG, FVF, ÁRV), pp. 395–399.
- EDTC-1997-GuLKP #analysis #testing
- A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
- EDTC-1997-KunduG #analysis
- Inductance analysis of on-chip interconnects [deep submicron CMOS] (SK, UG), pp. 252–255.
- EDTC-1997-NouraniP #analysis #behaviour #using
- Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
- EDTC-1997-WalrathVB #analysis #partial evaluation #performance #using #verification
- Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
- HT-1997-Chen #analysis #similarity #visualisation
- Structuring and Visualising the WWW by Generalised Similarity Analysis (CC), pp. 177–186.
- ICDAR-1997-Ah-SoonT #analysis #architecture
- Variations on the Analysis of Architectural Drawing (CAS, KT), pp. 347–351.
- ICDAR-1997-AraiO #analysis
- Form Processing based on Background Region Analysis (HA, KO), pp. 164–169.
- ICDAR-1997-BlasiusGJK #analysis #documentation #knowledge-based
- Knowledge-based Document Analysis (KHB, BG, IJ, NK), pp. 728–731.
- ICDAR-1997-ChangCCLLSTWY #analysis #documentation #recognition
- A Document Analysis and Recognition System (FC, TFC, TRC, MCL, YCL, TYS, TMT, JJW, CSY), pp. 736–739.
- ICDAR-1997-ChangLP #algorithm #analysis
- Line sweep thinning algorithm for feature analysis (FC, YCL, TP), pp. 123–127.
- ICDAR-1997-CracknellDD97a #analysis #comprehension #documentation #framework #image #named
- TABS — A New Software Framework for Document Image Processing, Analysis, and Understanding (CC, ACD, LD), pp. 1001–1005.
- ICDAR-1997-CullenHH #analysis #database #documentation #image #retrieval #using
- Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
- ICDAR-1997-Ishitani #analysis #documentation #layout
- Document Layout Analysis Based on Emergent Computation (YI), pp. 45–50.
- ICDAR-1997-JingboXT #analysis #segmentation
- Segmentation of Stick Text Based on Sub Connected Area Analysis (JG, XL, ZT), p. 417–?.
- ICDAR-1997-Kim #analysis #documentation #problem
- Problems and Approaches for Oriental Document Analysis (JHK), p. 1111.
- ICDAR-1997-KoppenLN #analysis #documentation #framework #image #internet
- An Image Consulting Framework for Document Analysis of Internet Graphics (MK, LL, BN), p. 819–?.
- ICDAR-1997-LiangRHP #analysis #documentation #image
- UW-ISL Document Image Analysis Toolbox: An Experimental Environment (JL, RR, RMH, ITP), pp. 984–988.
- ICDAR-1997-LinNN #analysis #documentation #image #logic #using
- Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
- ICDAR-1997-MaergnerKP #analysis #benchmark #documentation #metric #on the
- On Benchmarking of Document Analysis Systems (VFM, PK, AKP), p. 331–?.
- ICDAR-1997-MiyamotoISNT #analysis #documentation #requirements
- Analysis of required elements for next-generation document reader on the basis of user requirements (TM, YI, KS, TN, YT), pp. 428–432.
- ICDAR-1997-OgierMLL #analysis #image #reliability #semantics
- An Image Interpretation Device cannot be Reliable without any Semantic Coherency Analysis of the Interpretated Objects — Application to French Cadastral Maps (JMO, RM, JL, YL), pp. 532–535.
- ICDAR-1997-SauvolaHKSPD #algorithm #analysis #distributed #documentation #image #testing
- A distributed management system for testing document image analysis algorithms (JJS, SH, HK, TS, MP, DSD), pp. 989–995.
- PODS-1997-HellersteinKP #analysis #on the
- On the Analysis of Indexing Schemes (JMH, EK, CHP), pp. 249–256.
- CSEET-1997-LethbridgeIMG #analysis #re-engineering
- An Undergraduate Option in Software Engineering: Analysis and Rationale (TCL, DI, AM, DG), pp. 120–131.
- TACAS-1997-ParashkevovY #analysis #performance #pseudo #reachability
- Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
- TACAS-1997-Tofts #analysis #composition #performance
- Compositional Performance Analysis (CMNT), pp. 290–305.
- CSMR-1997-ClassenHMS #migration #static analysis #user interface
- CUI to GUI Migration: Static Analysis of Character-Based Panels (IC, KH, IM, MS), pp. 144–149.
- CSMR-1997-FantechiNS #analysis #cobol #object-oriented
- Object-Oriented Analysis of COBOL (AF, PN, ES), pp. 157–164.
- CSMR-1997-MendoncaK #analysis #architecture
- A Quality-Based Analysis of Architecture Recovery Environments (NCM, JK), pp. 54–59.
- CSMR-1997-TonellaAFM #analysis #maintenance #precise
- Variable Precision Reaching Definitions Analysis for Software Maintenance (PT, GA, RF, EM), pp. 60–67.
- ICSM-1997-SiffR #concept analysis #identification
- Identifying modules via concept analysis (MS, TWR), pp. 170–179.
- WCRE-1997-MooreR #analysis #reuse
- Domain Analysis for Transformational Reuse (MMM, SR), pp. 156–163.
- WPC-1997-TonellaAFM #analysis #comprehension #points-to
- Points-to Analysis for Program Understanding (PT, GA, RF, EM), pp. 90–99.
- ICSM-2000-Basili #analysis #maintenance #reuse
- Analysis for Reuse and Maintenance: A Program for Experimentation (VRB), p. 296–?.
- ICSM-2000-EmamHM #analysis #process #requirements #scalability
- Causal Analysis of the Requirements Change Process for a Large System (KEE, DH, NHM), pp. 214–221.
- ICSM-2000-IioFA #analysis #maintenance #process
- Experimental Analysis of the Cognitive Processes of Program Maintainers during Software Maintenance (KI, TF, YA), pp. 242–249.
- PEPM-1997-HornofN #analysis #imperative
- Accurate Binding-Time Analysis For Imperative Languages: Flow, Context, and Return Sensitivity (LH, JN), pp. 63–73.
- PLDI-1997-Collberg #analysis #automation #mutation testing
- Reverse Interpretation + Mutation Analysis = Automatic Retargeting (CSC), pp. 57–70.
- PLDI-1997-FlanaganF #analysis #component
- Componential Set-Based Analysis (CF, MF), pp. 235–248.
- PLDI-1997-Goodwin #analysis #data flow #execution #interprocedural
- Interprocedural Dataflow Analysis in an Executable Optimizer (DWG), pp. 122–133.
- PLDI-1997-HeintzeM #analysis #control flow #linear #transitive
- Linear-time Subtransitive Control Flow Analysis (NH, DAM), pp. 261–272.
- PLDI-1997-WagnerG #analysis #incremental #programming language
- Incremental Analysis of real Programming Languages (TAW, SLG), pp. 31–43.
- PLDI-1997-Webber #program analysis #using
- Program Analysis Using Binary Relations (ABW), pp. 249–260.
- SAS-1997-Braunburger #analysis #automation #order #polynomial #termination #using
- Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
- SAS-1997-CodishLB #algebra #analysis #approach #logic programming #source code
- An Algebraic Approach to Sharing Analysis of Logic Programs (MC, VL, FB), pp. 68–82.
- SAS-1997-Cousot #abstract interpretation #semantics #static analysis
- Abstract Interpretation Based Static Analysis Parameterized by Semantics (PC), pp. 388–394.
- SAS-1997-FahndrichA #constraints #program analysis #set #using
- Program Analysis Using Mixed Term and Set Constraints (MF, AA), pp. 114–126.
- SAS-1997-IgarashiK #analysis #communication #concurrent #programming language #type system
- Type-Based Analysis of Communication for Concurrent Programming Languages (AI, NK), pp. 187–201.
- SAS-1997-JagannathanWW #analysis
- Type-Directed Flow Analysis for Typed Intermediate Languages (SJ, SW, AKW), pp. 232–249.
- SAS-1997-Mackie #distributed #implementation #interactive #static analysis
- Static Analysis of Interaction Nets for Distributed Implementations (IM), pp. 217–231.
- SAS-1997-Mossin #analysis
- Exact Flow Analysis (CM), pp. 250–264.
- SAS-1997-Ryder #analysis
- Practical Compile-Time Analysis (BGR), pp. 406–412.
- SAS-1997-Scozzari #analysis #logic
- Logical Optimality of Groundness Analysis (FS), pp. 83–97.
- SAS-1997-ShapiroH #analysis #pointer #precise
- The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
- SAS-1997-SpeirsSS #analysis #termination
- Termination Analysis for Mercury (CS, ZS, HS), pp. 160–171.
- SAS-1997-TalbotTD #analysis #automaton #logic programming
- Set-Based Analysis for Logic Programming and Tree Automata (JMT, ST, PD), pp. 127–140.
- ICALP-1997-BouajjaniH #analysis #reachability #set
- Symbolic Reachability Analysis of FIFO Channel Systems with Nonregular Sets of Configurations (Extended Abstract) (AB, PH), pp. 560–570.
- ICALP-1997-HemaspaandraHR #analysis #parallel
- Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
- ICALP-1997-HondaY #analysis #call-by #game studies
- Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
- FME-1997-MartinJ #analysis #concurrent #network #performance #process #scalability
- An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
- FME-1997-YoungB #analysis #memory management #modelling
- Mathematical Modeling and Analysis of an External Memory Manager (WDY, WRB), pp. 237–257.
- ICFP-1997-Ashley #analysis #effectiveness
- The Effectiveness of Flow Analysis for Inlining (JMA), pp. 99–111.
- ICFP-1997-Banerjee #analysis #composition #type system
- A Modular, Polyvariant, and Type-Based Closure Analysis (AB), pp. 1–10.
- ICFP-1997-HeintzeM #analysis #complexity #on the
- On the Complexity of Set-Based Analysis (NH, DAM), pp. 150–163.
- ICFP-1997-SabelfeldS #analysis #functional #problem #semantics #source code
- Simple Semantic Analysis Problems for Functional Programs (VKS, AS), p. 319.
- ICFP-1997-Shao #analysis #flexibility #representation
- Flexible Representation Analysis (ZS), pp. 85–98.
- CHI-1997-BhavnaniJ #analysis #performance
- From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
- CHI-1997-ChinRC #analysis #development #requirements
- Participatory Analysis: Shared Development of Requirements from Scenarios (GCJ, MBR, JMC), pp. 162–169.
- CHI-1997-Muller #analysis #collaboration #human-computer
- Translation in HCI: Formal Representations for Work Analysis and Collaboration (MJM), pp. 544–545.
- CHI-1997-Ramsay #analysis
- A Factor Analysis of User Cognition and Emotion (JR), pp. 546–547.
- HCI-CC-1997-Angehrn #analysis #framework
- An Agent-Centered Framework for the Analysis and Diagnosis of Organizational Groupware Platforms (AAA), pp. 289–292.
- HCI-CC-1997-FunadaYIN #analysis #effectiveness #evaluation #how #human-computer #performance
- How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
- HCI-CC-1997-KazumaSNGOS #analysis #evaluation #process
- Evaluation of Mental Stress During Tracking Tasks Based on the Analysis of Electrodermal Activity, Blinks and Blood Pressure (HK, MS, YN, HG, YO, MS), pp. 567–570.
- HCI-CC-1997-LeporeMMPTCT #analysis
- Computer-Aided Analysis in Ophthalmological Imaging (DL, FM, GM, MMP, ST, GC, MT), pp. 753–756.
- HCI-CC-1997-StrohmU #analysis #concept #people
- Sociotechnical Analysis According to the Concept of People, Technology, Organization (OS, EU), pp. 241–244.
- HCI-CC-1997-Suzuki #analysis #development #evaluation #variability
- The Application of Heart Rate Variability Analysis on the Evaluation of Mental Strain and its Future Development (KS), pp. 559–562.
- HCI-CC-1997-Venda #analysis #communication #performance #predict
- Ergodynamics in Analysis and Prediction of Communication Efficiency (VFV), pp. 833–836.
- HCI-CC-1997-WhisenandE #analysis
- Analysis of Cursor Movements with a Mouse (TGW, HHE), pp. 533–536.
- HCI-SEC-1997-Brath #3d #analysis #experience #guidelines #interactive #visualisation
- 3D Interactive Information Visualization: Guidelines from Experience and Analysis of Applications (RB), pp. 865–868.
- HCI-SEC-1997-EarlYMK #analysis #case study #design #usability
- The Contribution of Usability Analysis to the Design of Medical Devices: A Case Study (SE, MY, BM, RJK), pp. 601–604.
- HCI-SEC-1997-HolstCG #analysis #constraints #interface
- Transporting Honey Bears: A Cognitive Analysis of the Effects of Interface Manipulation Style on a Constraint-Based Planning Task (SJH, EFC, DJG), pp. 169–172.
- HCI-SEC-1997-JackoD #analysis #interface #requirements
- Interface Requirements: An Analysis of Technologies Designed for Individual and Group Work (JAJ, VGD), pp. 347–350.
- HCI-SEC-1997-JungY #analysis
- Managing Information by a New Compound Noun Analysis (IHJ, SYY), pp. 299–302.
- HCI-SEC-1997-MacLeodMK #analysis #comprehension #human-computer #requirements
- Understanding HCI Requirements: Expertise and Assistance to Imagery Analysis (ISM, AJM, EK), pp. 559–562.
- HCI-SEC-1997-Mizuno #analysis
- Conjoint Analysis of Consumer Preferences in Cyber Space (MM), pp. 475–478.
- HCI-SEC-1997-PedraliB #analysis #process #question
- Can We Trace Back Cognitive Processes in Root Cause Analysis? (MP, RB), pp. 59–62.
- HCI-SEC-1997-WatanabeO #analysis #communication
- Physiological Analysis of Entrainment in Face-to-Face Communication (TW, MO), pp. 411–414.
- AdaEurope-1997-Bell #ada #analysis #source code #tool support
- An Alternative Toolset for Analysis of Ada Programs (AEB), pp. 112–124.
- AdaEurope-1997-Thornley #case study #development #experience #static analysis
- Static Analysis and Diversity in the Software Development Process- Experiences with the Use of SPARK (JPT), pp. 266–277.
- TRI-Ada-1997-Conn #analysis #source code
- The Source Code Analysis Tool Construction Project (RLC), pp. 141–148.
- TRI-Ada-1997-RileyDP #analysis #implementation #verification
- An Instance of the Application Download Pattern: The SPAIDS Software Loader/Verifier Domain Analysis and Implementation (JDR, SD, WP), pp. 273–278.
- CAiSE-1997-CarricoG #analysis
- Facilitating Analysis and Diagnosis in Organisations (LC, NG), pp. 131–144.
- CAiSE-1997-CastanoA #analysis #framework #information management #legacy #multi
- A Multi-Perspective Framework for the Analysis of Legacy Information Systems (SC, VDA), pp. 117–130.
- CIKM-1997-DulleaS #analysis #constraints
- An Analysis of Cardinality Constraints in Redundant Relationships (JD, IYS), pp. 270–277.
- CIKM-1997-GauchW #analysis #approach #automation #corpus #query
- A Corpus Analysis Approach for Automatic Query Expansion (SG, JW), pp. 278–284.
- CIKM-1997-KimC #approach #database #execution #static analysis
- A Practical Approach to Static Analysis and Execution of Rules in Active Databases (SKK, SC), pp. 161–168.
- CIKM-1997-ZarkeshASSS #analysis #design
- Analysis and Design of Server Informative WWW-Sites (AMZ, JA, CS, RS, VS), pp. 254–261.
- ICML-1997-Joachims #algorithm #analysis #categorisation #probability
- A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization (TJ), pp. 143–151.
- KDD-1997-BergstenSS #analysis #data mining #machine learning #mining
- Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
- KDD-1997-ChienFMLG #data analysis #database #image #scalability #using
- Using Artificial Intelligence Planning to Automate Science Data Analysis for Large Image Databases (SAC, FF, HM, EL, RG), pp. 147–150.
- KDD-1997-ProvostF #analysis #classification #comparison #performance #visualisation
- Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
- KDD-1997-SmythW #data analysis #set
- Anytime Exploratory Data Analysis for Massive Data Sets (PS, DW), pp. 54–60.
- SIGIR-1997-Stairmand #analysis #information retrieval
- Textual Context Analysis for Information Retrieval (MAS), pp. 140–147.
- OOPSLA-1997-Haines #analysis #design #implementation #lightweight #thread
- An Open Implementation Analysis and Design for Lightweight Threads (MH), pp. 229–242.
- TOOLS-ASIA-1997-Mitchell97a #analysis #contract
- Analysis by Contract (RM), p. 421.
- TOOLS-ASIA-1997-PengCC #analysis #morphism #multi #performance #polymorphism
- The Implement Mechanism and Efficiency Analysis of Multiinheritance and Polymorphism (RP, JC, SC), pp. 389–392.
- TOOLS-PACIFIC-1997-FrohlichS #analysis #architecture #interactive
- Interactive Analysis of Object Architectures (JHF, TS), pp. 252–266.
- TOOLS-PACIFIC-1997-Hoffman #analysis #object-oriented
- A Practical Notation for Object Oriented Analysis with a Formal Meaning (JH), pp. 225–237.
- TOOLS-USA-1997-FetckeAN #analysis #approach
- Mapping the OO-Jacobson Approach into Function Point Analysis (TF, AA, THN), pp. 192–202.
- TOOLS-USA-1997-Mitchell #analysis #contract
- Analysis by Contract (RM), p. 372.
- TOOLS-USA-1997-Walden #analysis #design #reuse
- The BON Method: Analysis and Design for Reusability (KW), p. 372.
- ALP-1997-CodishT #analysis #constraints #logic programming #semantics #source code #termination #using
- A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
- LOPSTR-1997-DecorteSLMS #analysis #logic programming #termination
- Termination Analysis for Tabled Logic Programming (SD, DDS, ML, BM, KFS), pp. 111–127.
- LOPSTR-1997-HeatonHK #analysis #logic programming #source code
- Analysis of Logic Programs with Delay (AH, PMH, AK), pp. 148–167.
- POPL-1997-Biswas #analysis
- A Demand-Driven Set-Based Analysis (SKB), pp. 372–385.
- POPL-1997-Deutsch #analysis #complexity #on the
- On the Complexity of Escape Analysis (AD), pp. 358–371.
- POPL-1997-NielsonN #analysis #control flow #semantics
- Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis (HRN, FN), pp. 332–345.
- POPL-1997-ShapiroH #analysis #performance #points-to
- Fast and Accurate Flow-Insensitive Points-To Analysis (MS, SH), pp. 1–14.
- RE-1997-Ben-AbdallahLK #analysis #functional #requirements #specification
- Integrated Specification and Analysis of Functional, Temporal, and Resource Requirements (HBA, IL, YSK), pp. 198–209.
- RE-1997-DarimontDML #analysis #integration #layout #named #requirements
- GRAIL/KAOS: An Environment for Goal-Driven Requirements Analysis, Integration and Layout (RD, ED, PM, AvL), p. 140.
- RE-1997-FaulkH #analysis #approach #requirements #specification
- The SCR Approach to Requirements Specification and Analysis (SRF, CLH), p. 263.
- RE-1997-ModugnoLRPS #analysis #requirements #safety #specification
- Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
- RE-1997-YenT #analysis #requirements #trade-off
- A Systematic Tradeoff Analysis for Conflicting Imprecise Requirements (JY, WAT), p. 87–?.
- SAC-1997-DamianiT #analysis #clustering
- Dynamic clustering for technology-based domain analysis (TDA) (ED, ADT), pp. 204–206.
- SAC-1997-LinXY #analysis #parallel #performance #problem
- Performance analysis for parallel solutions to generic search problems (WML, WX, BY), pp. 422–430.
- ESEC-FSE-1997-AlborghettiGM #analysis #automation #deduction
- Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
- ESEC-FSE-1997-ChenGK #analysis #c++ #detection #reachability
- A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
- ESEC-FSE-1997-CheungGK #analysis #composition #liveness #reachability #using #verification
- Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
- ESEC-FSE-1997-NaumovichACO #architecture #static analysis
- Applying Static Analysis to Software Architectures (GN, GSA, LAC, LJO), pp. 77–93.
- ESEC-FSE-1997-Obbink #analysis #architecture #case study #experience #industrial
- Analysis of Software Architectures in High and Low Volume Electronic Systems, Industrial Experience Report (JHO), pp. 523–524.
- ICSE-1997-ArdisW #analysis #product line #tutorial
- Defining Families: The Commonality Analysis (Tutorial) (MAA, DMW), pp. 649–650.
- ICSE-1997-Damon #analysis #design #interactive #named
- Nitpick: A Tool for Interactive Design Analysis (CD), pp. 596–597.
- ICSE-1997-Fowler #analysis #bibliography #design #object-oriented #tutorial
- A Survey of Object Oriented Analysis and Design Methods (Tutorial) (MF), pp. 653–654.
- ICSE-1997-GoelS #data analysis #re-engineering #tutorial
- Software Engineering Data Analysis Techniques (Tutorial) (ALG, MS), pp. 667–668.
- ICSE-1997-LindigS #composition #concept analysis #legacy
- Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis (CL, GS), pp. 349–359.
- ICSE-1997-PezzeY #analysis #modelling #multi #semantics #tool support #using
- Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
- ICSE-1997-PighinZ #analysis #metric #predict #statistics
- A Predictive Metric Based on Discriminant Statistical Analysis (MP, RZ), pp. 262–270.
- ICSE-1997-ReeseL #analysis
- Software Deviation Analysis (JDR, NGL), pp. 250–260.
- ICSE-1997-TonellaAFM #analysis #c++ #morphism #pointer #polymorphism #slicing
- Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
- ICSE-1997-WilsonRH #analysis #automation #specification
- Automated Analysis of Requirement Specifications (WMW, LHR, LEH), pp. 161–171.
- ICSE-1997-YurRLS #analysis #c #incremental
- Incremental Analysis of Side Effects for C Software System (JSY, BGR, WL, PS), pp. 422–432.
- ASF+SDF-1997-Moonen #analysis #architecture #data flow #reverse engineering
- A generic architecture for data flow analysis to support reverse engineering (LM), p. 10.
- PPoPP-1997-GuLL #analysis #array #data flow #experience #performance
- Experience with Efficient Array Data-Flow Analysis for Array Privatization (JG, ZL, GL), pp. 157–167.
- CAV-1997-BoigelotBR #analysis #hybrid #linear #reachability
- An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (Extended Abstract) (BB, LB, SR), pp. 167–178.
- CAV-1997-Godefroid #analysis #automation #concurrent #named
- VeriSoft: A Tool for the Automatic Analysis of Concurrent Reactive Software (PG), pp. 476–479.
- CAV-1997-VarpaaniemiHL #analysis #performance #reachability
- prod 3.2: An Advanced Tool for Efficient Reachability Analysis (KV, KH, JL), pp. 472–475.
- ICLP-1997-BruynoogheJK #analysis #logic programming #programming language
- Live-Structure Analysis for Logic Programming Languages with Declarations (MB, GJ, AK), pp. 33–47.
- ICLP-1997-BuenoCL #analysis #logic programming #set #source code #using
- Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
- ICLP-1997-CodishDS #program analysis
- XSB as the Natural Habitat for General Purpose Program Analysis (MC, BD, KFS), p. 416.
- ICLP-1997-DebrayGH #analysis #logic programming #source code
- Non-Failure Analysis for Logic Programs (SKD, PLG, MVH), pp. 48–62.
- ICLP-1997-DecorteS #analysis #automation #constraints #logic programming #source code
- Demand-Driven and Constraint-Based Automatic Left-Termination Analysis for Logic Programs (SD, DDS), pp. 78–92.
- ICLP-1997-LindenstraussS #analysis #automation #logic programming #source code #termination
- Automatic Termination Analysis of Logic Programs (NL, YS), pp. 63–77.
- ICLP-1997-SmausHK #analysis #logic programming #source code
- Domain Construction for Mode Analysis of Typed Logic Programs (JGS, PMH, AK), p. 418.
- ILPS-1997-Hermenegildo #analysis #programming
- Programming with Global Analysis (Abstract) (MVH), pp. 49–50.
- ILPS-1997-KingSB #analysis #bound #logic programming #source code
- Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
- ILPS-1997-Podelski #analysis #logic programming #source code
- Set-Based Analysis of Logic Programs and Reactive Logic Programs (Abstract) (AP), pp. 35–36.
- ILPS-1997-Reps #graph #program analysis #reachability
- Program Analysis via Graph Reachability (TWR), pp. 5–19.
- ILPS-1997-TanL #analysis #logic programming #precise #recursion #source code
- Recursive Modes for Precise Analysis of Logic Programs (JT, IPL), pp. 277–290.
- LICS-1997-HeintzeM #analysis #on the #polynomial #type system
- On the Cubic Bottleneck in Subtyping and Flow Analysis (NH, DAM), pp. 342–351.
- LICS-1997-HuthK #analysis #model checking
- Quantitative Analysis and Model Checking (MH, MZK), pp. 111–122.
- TLCA-1997-BelleM #analysis
- Typed Intermediate Languages for Shape Analysis (GB, EM), pp. 11–29.
- DAC-1996-AluruNW #analysis #parallel
- A Parallel Precorrected FFT Based Capacitance Extraction Program for Signal Integrity Analysis (NRA, VBN, JW), pp. 363–366.
- DAC-1996-Bryant #analysis
- Bit-Level Analysis of an SRT Divider Circuit (REB), pp. 661–665.
- DAC-1996-Gupta #analysis #constraints #embedded #execution
- Analysis of Operation Delay and Execution Rate Constraints for Embedded Systems (RKG), pp. 601–604.
- DAC-1996-HosseiniMK #analysis #code generation #functional #verification
- Code Generation and Analysis for the Functional Verification of Microprocessors (AH, DM, PK), pp. 305–310.
- DAC-1996-KahngM #analysis
- Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
- DAC-1996-KantrowitzN #analysis #correctness #simulation #verification #what
- I’m Done Simulating: Now What? Verification Coverage Analysis and Correctness Checking of the DECchip 21164 Alpha Microprocessor (MK, LMN), pp. 325–330.
- DAC-1996-KernsY #analysis #congruence #multi #network #performance #reduction #scalability
- Stable and Efficient Reduction of Large, Multiport RC Networks by Pole Analysis via Congruence Transformations (KJK, ATY), pp. 280–285.
- DAC-1996-MonahanB #analysis #concurrent #optimisation
- Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
- DAC-1996-PhilippsCL #analysis #performance #reduction
- Efficient Full-Wave Electromagnetic Analysis via Model-Order Reduction of Fast Integral Transforms (JRP, EC, DDL), pp. 377–382.
- DAC-1996-RaghunathanDJ #analysis #reduction
- Glitch Analysis and Reduction in Register Transfer Level (AR, SD, NKJ), pp. 331–336.
- DAC-1996-SatyanarayanaP #analysis #energy #named
- HEAT: Hierarchical Energy Analysis Tool (JHS, KKP), pp. 9–14.
- DAC-1996-TelicheveskyKW #analysis #performance
- Efficient AC and Noise Analysis of Two-Tone RF Circuits (RT, KSK, JW), pp. 292–297.
- DAC-1996-VerlindJL #analysis #performance
- Efficient Partial Enumeration for Timing Analysis of Asynchronous Systems (EV, GGdJ, BL), pp. 55–58.
- PODS-1996-BertinoC #database #static analysis
- Static Analysis of Intensional Databases in U-Datalog (EB, BC), pp. 202–212.
- SIGMOD-1996-SelfridgeSW #data analysis #idea #interactive #named
- IDEA: Interactive Data Exploration and Analysis (PGS, DS, LOW), pp. 24–34.
- VLDB-1996-Cuppens #analysis #database #logic #multi #query
- Querying a Multilevel Database: A Logical Analysis (FC), pp. 484–494.
- VLDB-1996-FaloutsosG #analysis #using
- Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
- VLDB-1996-Suciu96a #analysis #implementation #parallel #query
- Implementation and Analysis of a Parallel Collection Query Language (DS), pp. 366–377.
- VLDB-1996-Sullivan #analysis #database #named #network
- Tribeca: A Stream Database Manager for Network Traffic Analysis (MS), p. 594.
- ITiCSE-1996-Krone #algorithm #analysis #data type #education #symbolic computation #using
- Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
- ITiCSE-1996-MarsdenO #analysis #education #framework #modelling #multi #named #process #tool support
- MuPMoTT: a multimedia based tool supporting the teaching of process modelling within a framework of structured system analysis (PM, MO), pp. 116–118.
- ITiCSE-1996-SanchezV #analysis #education #image #lisp
- ViLi (Vision LISP): a software environment for teaching image processing and analysis (JS, JV), p. 234.
- ESOP-1996-BuenoGHP #analysis #prolog #source code #standard
- Global Analysis of Standard Prolog Programs (FB, DCG, MVH, GP), pp. 108–124.
- ESOP-1996-JensenM #analysis #geometry #interactive
- Flow Analysis in the Geometry of Interaction (TPJ, IM), pp. 188–203.
- TACAS-1996-BerghammerKU #algebra #analysis #perspective #petri net
- Realtion-Algebraic Analysis of Petri Nets with RELVIEW (RB, BvK, CU), pp. 49–69.
- TACAS-1996-HermannsMR #algebra #analysis #probability #process
- A Construction and Analysis Tool Based on the Stochastic Process Algebra TIPP (HH, VM, MR), pp. 427–430.
- TACAS-1996-KleinKKS #automaton #program analysis
- DFA&OPT-METAFrame: A Tool Kit for Program Analysis and Optimazation (MK, JK, DK, BS), pp. 422–426.
- TACAS-1996-Rauzy #analysis #constraints #reduction #specification #using
- Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (Abstract) (AR), p. 417.
- ICSM-1996-Bohner #impact analysis #perspective #process
- Impact analysis in the software change process: a year 2000 perspective (SAB), pp. 42–51.
- ICSM-1996-CanforaCL #analysis #specification #tool support
- Specifying code analysis tools (GC, AC, ADL), pp. 95–103.
- ICSM-1996-Gallagher #impact analysis #visual notation
- Visual Impact Analysis (KG), pp. 52–58.
- ICSM-1996-LiO #algorithm #impact analysis #object-oriented
- Algorithmic Analysis of the Impact of Changes to Object-Oriented Software (LL, AJO), pp. 171–184.
- ICSM-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
- Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
- WCRE-1996-ChaseHRY #analysis #architecture
- Analysis and Presentation of Recovered Software Architectures (MPC, DRH, SNR, ASY), pp. 153–162.
- WCRE-1996-TonellaFAM #analysis #architecture #case study
- Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic — A Case Study (PT, RF, GA, EM), pp. 198–207.
- WCRE-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
- Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
- WPC-1996-BlazyF #analysis #comprehension #interprocedural
- Interprocedural analysis for program comprehension by specialization (SB, PF), p. 133–?.
- WPC-1996-Sullivan #agile #development #program analysis #tool support
- Rapid Development of Simple, Custom Program Analysis Tools (KJS), pp. 40–44.
- PLDI-1996-ChakrabartiGC #analysis #communication #optimisation
- Global Communication Analysis and Optimization (SC, MG, JDC), pp. 68–78.
- PLDI-1996-DawsonRW #case study #logic programming #program analysis #using
- Practical Program Analysis Using General Purpose Logic Programming Systems — A Case Study (SD, CRR, DSW), pp. 117–126.
- PLDI-1996-Ramalingam #analysis #data flow
- Data Flow Frequency Analysis (GR), pp. 267–277.
- PLDI-1996-RinardD #analysis #commutative #compilation #framework
- Commutativity Analysis: A New Analysis Framework for Parallelizing Compilers (MCR, PCD), pp. 54–67.
- PLDI-1996-SreedharGL #analysis #data flow #framework #graph #incremental #using
- A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
- SAS-1996-Aiken #constraints #program analysis
- Constraint-Based Program Analysis (Abstract) (AA), p. 1.
- SAS-1996-AndersenH #analysis #functional #higher-order #partial evaluation #termination
- Termination Analysis for Offline Partial Evaluation of a Higher Order Functional Language (PHA, CKH), pp. 67–82.
- SAS-1996-BrauburgerG #analysis #termination
- Termination Analysis for Partial Functions (JB, JG), pp. 113–127.
- SAS-1996-BruynoogheDBDM #analysis #logic programming #source code
- A Freeness and Sharing Analysis of Logic Programs Based on a Pre-interpretation (MB, BD, DB, MD, AM), pp. 128–142.
- SAS-1996-CoppoDG #program analysis #refinement
- Refinement Types for Program Analysis (MC, FD, PG), pp. 143–158.
- SAS-1996-Emeljanov #analysis #similarity
- Analysis of the Equality Relations for the Program Terms (PGE), pp. 174–188.
- SAS-1996-KellyMSS #analysis #constraints #incremental #logic programming #source code
- Two Applications of an Incremental Analysis Engine for (Constraint) Logic Programs (ADK, KM, HS, PJS), pp. 385–386.
- SAS-1996-Nielson #perspective #program analysis #semantics
- Semantics-Directed Program Analysis: A Tool-Maker’s Perspective (FN), pp. 2–21.
- SAS-1996-PueblaH #algorithm #analysis #incremental #logic programming #source code
- Optimized Algorithms for Incremental Analysis of Logic Programs (GP, MVH), pp. 270–284.
- SAS-1996-Venet #alias #analysis #source code
- Abstract Cofibered Domains: Application to the Alias Analysis of Untyped Programs (AV), pp. 366–382.
- STOC-1996-DimitriouI #algorithm #analysis #optimisation #towards
- Towards an Analysis of Local Optimization Algorithms (TD, RI), pp. 304–313.
- STOC-1996-Slavik #algorithm #analysis #set
- A Tight Analysis of the Greedy Algorithm for Set Cover (PS), pp. 435–441.
- FME-1996-BicarreguiDW #analysis #formal method
- Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
- FME-1996-BoigelotG #analysis #model checking #protocol #using
- Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
- ICFP-1996-AbadiLL #analysis #dependence
- Analysis and Caching of Dependencies (MA, BWL, JJL), pp. 83–91.
- ICFP-1996-SerranoF #analysis
- Storage Use Analysis and its Applications (MS, MF), pp. 50–61.
- IFL-1996-DebbabiFT #algorithm #analysis #concurrent #control flow #higher-order #source code #type system
- A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs (MD, AF, NT), pp. 247–266.
- CHI-1996-Erickson #analysis #design
- The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
- CHI-1996-WeisbandK
- Self Disclosure on Computer Forms: Meta-Analysis and Implications (SPW, SBK), pp. 3–10.
- AdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
- Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
- CAiSE-1996-BatesBFL #analysis #formal method #guidelines #object-oriented
- Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
- CAiSE-1996-CastanoA #analysis #process #unification
- Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
- AKDDM-1996-FayyadDW #analysis #automation
- Automating the Analysis and Cataloging of Sky Surveys (UMF, SGD, NW), pp. 471–493.
- ICML-1996-OkamotoY #analysis #classification #nearest neighbour
- Theoretical Analysis of the Nearest Neighbor Classifier in Noisy Domains (SO, NY), pp. 355–363.
- ICPR-1996-AstromH #analysis #detection #modelling #probability
- Stochastic modelling and analysis of sub-pixel edge detection (KÅ, AH), pp. 86–90.
- ICPR-1996-AstromH96a #analysis #probability
- Stochastic analysis of scale-space smoothing (KÅ, AH), pp. 305–309.
- ICPR-1996-BatistaAA #analysis
- Pose view stability analysis for camera look angles computation (JB, HA, ATdA), pp. 171–175.
- ICPR-1996-BelloK #analysis #using
- Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
- ICPR-1996-BiancardiM #analysis #component #image #source code
- Connected component support for image analysis programs (AB, AM), pp. 620–624.
- ICPR-1996-ChangH #analysis
- Ribbon-based motion analysis of human body movements (ICC, CLH), pp. 436–440.
- ICPR-1996-ChenL96a #analysis #multi
- A multiresolution wavelet analysis of digital mammograms (CHC, GGL), pp. 710–714.
- ICPR-1996-ChenLC #analysis #classification #sequence #using
- Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
- ICPR-1996-Dzemyda #analysis #set #visual notation
- Visual analysis of a set of function values (GD), pp. 700–704.
- ICPR-1996-GunselT #analysis #retrieval #similarity
- Similarity analysis for shape retrieval by example (BG, AMT), pp. 330–334.
- ICPR-1996-HancockP #analysis #correlation #exponential #memory management
- An analysis of the exponential correlation associative memory (ERH, MP), pp. 291–295.
- ICPR-1996-Hauta-KasariPJL #analysis #matrix #multi
- Generalized co-occurrence matrix for multispectral texture analysis (MHK, JP, TJ, RL), pp. 785–789.
- ICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics #using
- Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
- ICPR-1996-HusseinNO #analysis #using
- Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
- ICPR-1996-KashinoH #analysis #integration #music
- A music scene analysis system with the MRF-based information integration scheme (KK, NH), pp. 725–729.
- ICPR-1996-KasprzakC #analysis #component #image #independence
- Hidden image separation from incomplete image mixtures by independent component analysis (WK, AC), pp. 394–398.
- ICPR-1996-KiaD #analysis #documentation
- Structural compression for document analysis (OEK, DSD), pp. 664–668.
- ICPR-1996-KosibaK #analysis #automation
- Automatic invoice interpretation: invoice structure analysis (DAK, RK), pp. 721–725.
- ICPR-1996-KotcheffRTH #analysis
- Shape model analysis of THR radiographs (ACWK, ALR, CJT, DWLH), pp. 391–395.
- ICPR-1996-KrotkovKZ #analysis #invariant #synthesis
- Analysis and synthesis of the sounds of impact based on shape-invariant properties of materials (EK, RLK, NBZ), pp. 115–119.
- ICPR-1996-LasakulAK #analysis #formal method #image #linear #multi #using
- A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
- ICPR-1996-Marchand-MailletS #analysis #approach #image
- A minimum spanning tree approach to line image analysis (SMM, YMS), pp. 225–230.
- ICPR-1996-MozefWJT #analysis #architecture #component #parallel
- Parallel architecture dedicated to connected component analysis (EM, SW, JJ, ET), pp. 699–703.
- ICPR-1996-NakajimaTKY #analysis #layout #process #verification
- Analysis of address layout on Japanese handwritten mail-a hierarchical process of hypothesis verification (NN, TT, TK, KY), pp. 726–731.
- ICPR-1996-Nishida #analysis #modelling #synthesis
- Analysis and synthesis of deformed patterns based on structural models (HN), pp. 315–319.
- ICPR-1996-OkadaS #analysis
- A morphological subtraction scheme for form analysis (MO, MS), pp. 190–194.
- ICPR-1996-Polikarpova #analysis #on the
- On the fractal features in fingerprint analysis (NP), pp. 591–595.
- ICPR-1996-Roberts #analysis #clustering
- Scale-space unsupervised cluster analysis (SJR), pp. 106–110.
- ICPR-1996-Sablatnig #analysis #automation #detection #flexibility #visual notation
- Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
- ICPR-1996-SakanoKM #algorithm #image #search-based
- Seeing the character images that an OCR system sees-analysis by genetic algorithm (HS, HK, NM), pp. 411–416.
- ICPR-1996-SawasakiMU #analysis #design #implementation #performance #realtime #visual notation
- Design and implementation of high-speed visual tracking system for real-time motion analysis (NS, TM, TU), pp. 478–483.
- ICPR-1996-ShihHL #analysis #estimation #parametricity
- Accuracy analysis on the estimation of camera parameters for active vision systems (SWS, YPH, WSL), pp. 930–935.
- ICPR-1996-ShiniK #3d #analysis #metric
- 3D measurement strategy based on a projection invariance motion analysis with an artificial retina sensor (CWS, KIK), pp. 369–373.
- ICPR-1996-Sinclair96a #analysis #clustering
- Cluster-based texture analysis (DS), pp. 825–829.
- ICPR-1996-Solberg #analysis #classification #flexibility
- Texture fusion and classification based on flexible discriminant analysis (AHSS), pp. 596–600.
- ICPR-1996-SugiyamaA #analysis #multi
- Edge feature analysis by a vectorized feature extractor and in multiple edges (TS, KA), pp. 280–284.
- ICPR-1996-TatsunoSYIT #analysis #image #synthesis #using
- Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
- ICPR-1996-TozakiKNOEM #3d #analysis #image #using
- Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
- ICPR-1996-UhlF #analysis #recognition
- Spatiotemporal signal analysis: recognition of interacting modes (CU, RF), pp. 55–59.
- ICPR-1996-WalkerJ #analysis #geometry #statistics
- Statistical geometric features-extensions for cytological texture analysis (RFW, PTJ), pp. 790–794.
- ICPR-1996-WangF #algorithm #analysis #bibliography #pattern matching #pattern recognition #recognition #search-based
- Applying genetic algorithms on pattern recognition: an analysis and survey (YKW, KCF), pp. 740–744.
- ICPR-1996-WatanabeTO #analysis #recognition
- A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
- ICPR-1996-WilsonCH #analysis
- Sensitivity analysis for structural matching (RCW, ADJC, ERH), pp. 62–66.
- ICPR-1996-WorringW #analysis #using
- Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
- ICPR-1996-WouwerSD #analysis #classification #speech
- Wavelet-FILVQ classifier for speech analysis (GVdW, PS, DVD), pp. 214–218.
- ICPR-1996-Young #analysis #image
- Sampling density for image analysis (ITY), pp. 840–843.
- ICPR-1996-ZribiFG #3d #analysis #invariant #set
- Set of invariant features for three-dimensional gray-level objects by harmonic analysis (MZ, HF, FG), pp. 549–553.
- KDD-1996-FayyadHS #data analysis
- KDD for Science Data Analysis: Issues and Examples (UMF, DH, PES), pp. 50–56.
- SEKE-1996-CiancariniCM #analysis #requirements #testing
- Engineering Formal Requirements: Analysis and Testing (PC, SC, CM), pp. 385–392.
- SEKE-1996-Starks #analysis #architecture #development
- Development of a Software Architecture for the Analysis of Geographic and Image-Based Data (SAS), pp. 116–120.
- SEKE-1996-SunM #automation #named #program analysis
- Wheels: An Automated Program Analysis Tool (AYS, BMM), pp. 269–276.
- SEKE-1996-WangTCR #analysis #slicing
- The Role of Program Slicing in Ripple Effect Analysis (YW, WTT, XC, SR), pp. 369–376.
- SEKE-1996-XuZ #analysis #automation #problem #requirements #specification
- Requirements Analysis and Specification as a Problem of Software Automation (JX, HZ), pp. 457–464.
- SIGIR-1996-XuC #analysis #documentation #query #using
- Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
- OOPSLA-1996-BaconS #c++ #performance #static analysis
- Fast Static Analysis of C++ Virtual Function Calls (DFB, PFS), pp. 324–341.
- OOPSLA-1996-DiwanMM #analysis #effectiveness #object-oriented #source code #static typing
- Simple and Effective Analysis of Statically Typed Object-Oriented Programs (AD, JEBM, KSM), pp. 292–305.
- PLILP-1996-WeyerW #analysis #graph #prolog
- Annotated Structure Shape Graphs for Abstract Analysis of Prolog (GW, WHW), pp. 92–106.
- POPL-1996-Ashley #analysis #flexibility #higher-order
- A Practical and Flexible Flow Analysis for Higher-Order Languages (JMA), pp. 184–194.
- POPL-1996-ColbyL #program analysis
- Trace-Based Program Analysis (CC, PL), pp. 195–207.
- POPL-1996-DaviesP #analysis #staged
- A Modal Analysis of Staged Computation (RD, FP), pp. 258–270.
- POPL-1996-GhiyaH #analysis #c #graph #pointer
- Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
- POPL-1996-GuptaS #source code #static analysis
- Static Analysis to Reduce Synchronization Costs in Data-Parallel Programs (MG, ES), pp. 322–332.
- POPL-1996-SagivRW #problem
- Solving Shape-Analysis Problems in Languages with Destructive Updating (SS, TWR, RW), pp. 16–31.
- POPL-1996-Steensgaard #analysis #linear #points-to
- Points-to Analysis in Almost Linear Time (BS), pp. 32–41.
- ICRE-1996-Anton #analysis #requirements
- Goal-Based Requirements Analysis (AIA), pp. 136–144.
- ICRE-1996-BustardDC #analysis #object-oriented
- Integrating Soft Systems and Object-Oriented Analysis (DWB, TJD, BNC), pp. 52–59.
- ICRE-1996-ChampionM #analysis #enterprise #requirements
- Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
- ICRE-1996-KoestersPS #analysis #information management #named #object-oriented
- GeoOOA: Object-Oriented Analysis for Geographic Information Systems (GK, BUP, HWS), pp. 245–254.
- ICRE-1996-KostersSV #analysis #requirements #user interface
- Combined Analysis of User Interface and Domain Requirements (GK, HWS, JV), pp. 199–207.
- ICRE-1996-LutzW #analysis #case study #experience #requirements
- Experience Report: Contributions of SFMEA to Requirements Analysis (RRL, RMW), pp. 44–51.
- ICRE-1996-NissenJJZH #analysis #case study #concept #experience #modelling #multi #requirements
- Requirements Analysis from Multiple Perspectives: Experiences with Conceptual Modeling Technology (HWN, MAJ, MJ, GVZ, HH), p. 217.
- ICRE-1996-SantosC #analysis #assessment #development #information management #object-oriented
- An assessment of the applicability of object-oriented analysis to the development of information systems (IS, JAC), pp. 238–244.
- ICRE-1996-TakahashiPKOS #analysis #collaboration #hypermedia #requirements
- Hypermedia Support for Collaboration in Requirements Analysis (KT, CP, VK, KO, JDS), pp. 31–41.
- ICRE-1996-Vanwelkenhuysen #analysis #development #quality #requirements
- Quality Requirements Analysis in Customer-Centered Software Development (JV), pp. 117–125.
- SAC-1996-Asgharzadeh #analysis #fuzzy #image #rule-based #using
- Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
- SAC-1996-RajePG #analysis #named #object-oriented #source code
- OFFERS — a tool for hierarchical implicit analysis of sequential object-oriented programs (RRR, DP, ETG), pp. 437–441.
- FSE-1996-NaumovichCO #analysis #communication #data flow #protocol #using #verification
- Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
- ICSE-1996-AtkinsonG #design #program analysis #tool support
- The Design of Whole-Program Analysis Tools (DCA, WGG), pp. 16–27.
- ICSE-1996-CheungK #analysis #composition #reachability #safety
- Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
- ICSE-1996-Forgacs #analysis #array #data flow #testing
- An Exact Array Reference Analysis for Data Flow Testing (IF), pp. 565–574.
- ICSE-1996-WoodsY #analysis #approach #comprehension #heuristic #problem
- The Program Understanding Problem: Analysis and a Heuristic Approach (SGW, QY), pp. 6–15.
- ASPLOS-1996-ChenCM #analysis #branch #predict
- Analysis of Branch Prediction Via Data Compression (ICKC, JTC, TNM), pp. 128–137.
- ASPLOS-1996-McKinleyT #analysis #locality
- A Quantitative Analysis of Loop Nest Locality (KSM, OT), pp. 94–104.
- CC-1996-Assmann #graph grammar #how #program analysis #program transformation #term rewriting
- How to Uniformly Specify Program Analysis and Transformation with Graph Rewrite Systems (UA), pp. 121–135.
- CC-1996-BoucherF #compilation #implementation #paradigm #static analysis
- Abstract Compilation: A New Implementation Paradigm for Static Analysis (DB, MF), pp. 192–207.
- CC-1996-Steensgaard #analysis #points-to #source code #type inference
- Points-to Analysis by Type Inference of Programs with Structures and Unions (BS), pp. 136–150.
- CAV-1996-CamposG #analysis #model checking #verification
- Selective Quantitative Analysis and Interval Model Checking: Verifying Different Facets of a System (SVAC, OG), pp. 257–268.
- CAV-1996-ClarkeBLXS #analysis #bound #named #realtime #specification #tool support #visual notation
- XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
- CAV-1996-MerinoT #analysis #communication #integration #named #protocol #verification
- EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
- CAV-1996-TripakisY #analysis #bisimulation
- Analysis of Timed Systems Based on Time-Abstracting Bisimulation (ST, SY), pp. 232–243.
- ISSTA-1996-ChamillardC #analysis #concurrent #petri net #source code
- Improving the Accuracy of Petri Net-Based Analysis of Concurrent Programs (ATC, LAC), pp. 24–38.
- ISSTA-1996-DaranT #analysis #case study #fault
- Software Error Analysis: A Real Case Study Involving Real Faults and Mutations (MD, PTF), pp. 158–171.
- ISSTA-1996-Heimdahl #analysis #case study #experience #lessons learnt
- Experiences and Lessons from the Analysis of TCAS II (MPEH), pp. 79–83.
- ISSTA-1996-HowdenS #analysis #linear #sequence
- Linear and Structural Event Sequence Analysis (WEH, GMS), pp. 98–106.
- ISSTA-1996-KangL #analysis #generative #performance #realtime
- An Efficient State Space Generation for Analysis of Real-Time Systems (IK, IL), pp. 4–13.
- ISSTA-1996-MorellM #analysis #testing #using
- Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
- ISSTA-1996-PezzeY #analysis #generative #multi #tool support
- Generation of Multi-Formalism State-Space Analysis Tools (MP, MY), pp. 172–179.
- ISSTA-1996-PomakisA #analysis #feature model #interactive #reachability
- Reachability Analysis of Feature Interactions: A Progress Report (KPP, JMA), pp. 216–223.
- ISSTA-1996-Tracz #analysis #architecture
- Test and Analysis of Software Architectures (WT), pp. 1–3.
- JICSLP-1996-FalaschiHW #analysis #concurrent #constraints #source code
- Demand Transformation Analysis for Concurrent Constraint Programs (MF, PH, WHW), pp. 333–347.
- LICS-1996-BasinG #analysis #complexity #order
- Complexity Analysis Based on Ordered Resolution (DAB, HG), pp. 456–465.
- LICS-1996-Davies #analysis #approach
- A Temporal-Logic Approach to Binding-Time Analysis (RD), pp. 184–195.
- DAC-1995-LeeT #algorithm #analysis #incremental
- An Algorithm for Incremental Timing Analysis (JfL, DTT), pp. 696–701.
- DAC-1995-LiM #analysis #embedded #performance #using
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
- DAC-1995-Rao #analysis #distributed
- Delay Analysis of the Distributed RC Line (VBR), pp. 370–375.
- DAC-1995-Ribas-XirgoC #analysis #fault #simulation
- Analysis of Switch-Level Faults by Symbolic Simulation (LR, JC), pp. 352–357.
- DAC-1995-RohfleischWA #analysis #logic #optimisation
- Logic Clause Analysis for Delay Optimization (BR, BW, KA), pp. 668–672.
- DAC-1995-TelicheveskyKW #analysis #performance
- Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
- DAC-1995-TremblayMIK #analysis #architecture #flexibility #performance #trade-off
- A Fast and Flexible Performance Simulator for Micro-Architecture Trade-off Analysis on UltraSPARC-I (MT, GM, AI, LK), pp. 2–6.
- DAC-1995-WempleY #analysis #megamodelling #using
- Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
- ICDAR-v1-1995-EspositoMS #analysis #approach #knowledge-based #layout
- A knowledge-based approach to the layout analysis (FE, DM, GS), pp. 466–471.
- ICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition #using
- Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
- ICDAR-v1-1995-GreenK #analysis #modelling
- Model-based analysis of printed tables (EAG, MSK), pp. 214–217.
- ICDAR-v1-1995-HoriD #analysis #reasoning #robust
- Robust table-form structure analysis based on box-driven reasoning (OH, DSD), pp. 218–221.
- ICDAR-v1-1995-LeTW #analysis #documentation #image #using
- Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
- ICDAR-v1-1995-TwaakyondoO #analysis #recognition
- Structure analysis and recognition of mathematical expressions (HMT, MO), pp. 430–437.
- ICDAR-v2-1995-AlimiG #analysis #fault #online #recognition
- The analysis of error in an on-line recognition system of Arabic handwritten characters (AMA, OAG), pp. 890–893.
- ICDAR-v2-1995-CouasnonC #analysis #documentation #music #recognition
- A way to separate knowledge from program in structured document analysis: application to optical music recognition (BC, JC), pp. 1092–1097.
- ICDAR-v2-1995-FutrelleN #analysis #constraints #diagrams #parsing #performance #using
- Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
- ICDAR-v2-1995-Hirayama #analysis #using
- A method for table structure analysis using DP matching (YH), pp. 583–586.
- ICDAR-v2-1995-Hoch #analysis #documentation #named #recognition
- READLEX: a lexicon for the recognition and analysis of structured documents (RH), pp. 549–552.
- ICDAR-v2-1995-Liu-GongDP #analysis #documentation #layout #recognition
- A general analysis system for document’s layout structure recognition (YHLG, BD, HNP), pp. 597–600.
- ICDAR-v2-1995-LuLC #analysis #documentation #named #retrieval
- TheSys — A comprehensive thesaurus system for intelligent document analysis and text retrieval (CL, KHL, HYC), pp. 1169–1173.
- ICDAR-v2-1995-PavlidisSS #analysis #graph
- Matching graph embeddings for shape analysis (TP, WJS, HS), pp. 729–733.
- ICDAR-v2-1995-SauvolaP #analysis #classification #feature model #performance #segmentation #using
- Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
- ICDAR-v2-1995-TangMMLS #analysis #approach #documentation
- A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
- ICDAR-v2-1995-TrierTJ #analysis
- Data capture from maps based on gray scale topographic analysis (ØDT, TT, AKJ), pp. 923–926.
- ESOP-J-1994-HankinM95 #lazy evaluation #program analysis #type inference
- Lazy Type Inference and Program Analysis (CH, DLM), pp. 219–249.
- ICSM-1995-BarrosBEQV #automation #impact analysis
- Supporting impact analysis: a semi-automated technique and associated tool (SB, TB, AE, JPQ, JFV), pp. 42–51.
- ICSM-1995-Williams #analysis #case study #design #experience #object-oriented #using
- Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
- WCRE-1995-LeiteC #analysis #specification
- Recovering Business Rules from Structured Analysis Specifications (JCSdPL, PMC), pp. 13–21.
- PEPM-1995-Cridlig #analysis #concurrent #model checking #semantics #using
- Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
- PEPM-1995-DasRH #analysis #imperative #semantics #source code
- Semantic Foundations of Binding Time Analysis for Imperative Programs (MD, TWR, PVH), pp. 100–110.
- PEPM-1995-Jensen #analysis #data flow #source code
- Clock Analysis of Synchronous Dataflow Programs (TPJ), pp. 156–167.
- PEPM-1995-Lu #analysis #logic programming #source code
- Type Analysis of Logic Programs in the Presence of Type Definitions (LL), pp. 241–252.
- PEPM-1995-RamakrishnanRS #analysis #constraints #framework #logic programming #source code #theorem proving
- A Symbolic Constraint Solving Framework for Analysis of Logic Programs (CRR, IVR, RCS), pp. 12–23.
- PEPM-1995-Reps #analysis #problem
- Shape Analysis as a Generalized Path Problem (TWR), pp. 1–11.
- PLDI-1995-AikenFL #analysis #higher-order #memory management
- Better Static Memory Management: Improving Region-Based Analysis of Higher-Order Languages (AA, MF, RL), pp. 174–185.
- PLDI-1995-Ruf #alias #analysis
- Context-Insensitive Alias Analysis Reconsidered (ER), pp. 13–22.
- PLDI-1995-WilsonL #analysis #c #performance #pointer #source code
- Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
- SAS-1995-DussartHM #analysis #polymorphism #polynomial #recursion #type system
- Polymorphic Recursion and Subtype Qualifications: Polymorphic Binding-Time Analysis in Polynomial Time (DD, FH, CM), pp. 118–135.
- SAS-1995-Giesl #analysis #functional #order #source code #termination #using
- Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
- SAS-1995-Hannan #analysis #functional #stack #type system
- A Type-based Analysis for Stack Allocation in Functional Languages (JH), pp. 172–188.
- SAS-1995-Heintze #analysis #control flow #type system
- Control-Flow Analysis and Type Systems (NH), pp. 189–206.
- SAS-1995-JagannathanW #analysis #effectiveness #runtime
- Effective Flow Analysis for Avoiding Run-Time Checks (SJ, AKW), pp. 207–224.
- SAS-1995-KobayashiNY #communication #concurrent #programming language #static analysis
- Static Analysis of Communication for Asynchronous Concurrent Programming Languages (NK, MN, AY), pp. 225–242.
- SAS-1995-Mohnen #analysis #higher-order #inheritance #performance
- Efficient Closure Utilisation by Higher-Order Inheritance Analysis (MM), pp. 261–278.
- SAS-1995-Seward #analysis #haskell #implementation #polymorphism #prototype
- Beyond Prototype Implementations: Polymorphic Projection Analysis for Glasgow Haskell (JS), pp. 382–399.
- SAS-1995-Vedrine #abstract interpretation #analysis #strict
- Binding-Time Analysis and Strictness Analysis by Abstract Interpretation (FV), pp. 400–417.
- FPCA-1995-CousotC #abstract interpretation #constraints #formal method #program analysis
- Formal Language, Grammar and Set-Constraint-Based Program Analysis by Abstract Interpretation (PC, RC), pp. 170–181.
- FPCA-1995-JeuringS #analysis #functional #problem #source code
- Constructing Functional Programs for Grammar Analysis Problems (JJ, SDS), pp. 259–269.
- CHI-1995-AalstCM #analysis #design #framework #learning #user interface
- Design Space Analysis as “Training Wheels” in a Framework for Learning User Interface Design (JWvA, TTC, DLM), pp. 154–161.
- AdaEurope-1995-SchneeweissAV #ada #analysis #modelling #object-oriented
- Translating Shlaer/Mellor Object-Oriented Analysis Models into Ada 95 (HS, VA, OV), pp. 249–270.
- AdaEurope-1995-Simoens #analysis #design #development #lifecycle #metric #object-oriented
- The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
- TRI-Ada-1995-Shumate95b #analysis #design #functional #object-oriented #requirements
- BATCES Solution #1: An Object-Oriented Design from Functional Requirements Analysis (KS), pp. 737–739.
- CAiSE-1995-DuffyMMM #analysis #automation #framework #reasoning #requirements #using
- A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
- CAiSE-1995-Herbst #analysis #metamodelling
- A Meta-Model for Business Rules in Systems Analysis (HH), pp. 186–199.
- CAiSE-1995-OpdahlS #analysis #modelling #problem
- Facet Models for Problem Analysis (ALO, GS), pp. 54–67.
- ICML-1995-Cussens #algorithm #analysis #finite #learning
- A Bayesian Analysis of Algorithms for Learning Finite Functions (JC), pp. 142–149.
- SEKE-1995-Debenham #analysis #approach #design #knowledge-based #requirements #specification
- A Unified Approach to Requirements Specification and System Analysis in the Design of Knowledge-Based Systems (JKD), p. 144.
- SEKE-1995-LuD #analysis #distributed #object-oriented #simulation #specification
- An Environment for Specification, Simulation and Analysis of Distributed Object-Oriented Systems (SL, YD), pp. 402–410.
- SIGIR-1995-Dubin #analysis #documentation #visualisation
- Document Analysis for Visualization (DD), pp. 199–204.
- SIGIR-1995-Ornager #analysis #clustering #database #empirical #image #word
- The Newspaper Image Database: Empirical Supported Analysis of Users’ Typology and Word Association Clusters (SO), pp. 212–218.
- ECOOP-1995-DeanGC #analysis #object-oriented #optimisation #source code #using
- Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
- LOPSTR-1995-GallardoT #abstract interpretation #cost analysis #framework #logic
- Studying the Cost of Logic Languages in an Abstract Interpretation Framework for Granularity Analysis (MdMG, JMT), pp. 91–105.
- LOPSTR-1995-VasconcelosF #approach #logic programming #optimisation #program analysis #using
- An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
- LOPSTR-1995-WaalT #deduction #problem #program analysis #program transformation #using
- Solving Deductive Planning Problems Using Program Analysis and Transformation (DAdW, MT), pp. 189–203.
- PLILP-1995-MasseyT #analysis #array #comprehension
- Modes of Comprehension: Mode Analysis of Arrays and Array Comprehensions (BCM, ET), pp. 207–222.
- PLILP-1995-MycroftS #analysis
- Uniform PERs and Comportment Analysis (AM, KLS), pp. 169–187.
- POPL-1995-AltucherL #alias #analysis
- An Extended Form of Must Alias Analysis for Dynamic Allocation (RA, WL), pp. 74–84.
- POPL-1995-HarperM #analysis #compilation #morphism #polymorphism #using
- Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
- POPL-1995-JagannathanW #analysis #higher-order
- A Unified Treatment of Flow Analysis in Higher-Order Languages (SJ, SW), pp. 393–407.
- POPL-1995-PalsbergO #analysis #type system
- A Type System Equivalent to Flow Analysis (JP, PO), pp. 367–378.
- POPL-1995-RepsHS #analysis #data flow #graph #interprocedural #precise #reachability
- Precise Interprocedural Dataflow Analysis via Graph Reachability (TWR, SH, SS), pp. 49–61.
- RE-1995-AtleeM #analysis #requirements #safety
- Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
- RE-1995-BustardL #analysis #formal method #modelling
- Enhancing soft systems analysis with formal modelling (DWB, PJL), pp. 164–171.
- RE-1995-PottsTSO #analysis #evaluation #internet #requirements
- An evaluation of inquiry-based requirements analysis for an Internet service (CP, KT, JDS, KO), pp. 172–180.
- SAC-1995-ChenH #algorithm #analysis #concurrent #database #performance
- Performance analysis of a periodic data reorganization algorithm for concurrent B-trees in database systems (IRC, SH), pp. 40–45.
- SAC-1995-PandaP #cost analysis #execution #query
- Query execution in prism and seaview: a cost analysis (BP, WP), pp. 65–70.
- SAC-1995-Serrano #analysis #compilation #control flow #functional #paradigm
- Control flow analysis: a functional languages compilation paradigm (MS), pp. 118–122.
- SAC-1995-SmithPN #analysis #network #performance
- Performance analysis of small FDDI networks (JS, LDP, TN), pp. 401–405.
- SAC-1995-WongP #analysis #design
- Design and analysis of fractals in an individual computing environment (KWW, JP), pp. 431–433.
- ESEC-1995-Chamillard #analysis #case study #metric #performance #predict #reachability
- An Exploratory Study of Program Metrics as Predictors of Reachability Analysis Performance (ATC), pp. 343–361.
- ESEC-1995-GaskellP #ambiguity #analysis #execution #semantics
- A Structured Analysis Formalism with Execution Semantics to Allow Unambiguous Model Interpretation (CG, RP), pp. 235–253.
- ESEC-1995-WagnerG #analysis #incremental
- Integrating Incremental Analysis with Version Management (TAW, SLG), pp. 205–218.
- FSE-1995-CheungK #analysis #composition #constraints #distributed #finite #reachability
- Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints (SCC, JK), pp. 140–150.
- FSE-1995-HorwitzRS #analysis #data flow #interprocedural
- Demand Interprocedural Dataflow Analysis (SH, TWR, SS), pp. 104–115.
- ICSE-1995-CookW #automation #data analysis #process
- Automating Process Discovery Through Event-Data Analysis (JEC, ALW), pp. 73–82.
- ICSE-1995-HeimdahlL #analysis #consistency #requirements
- Completeness and Consistency Analysis of State-Based Requirements (MPEH, NGL), pp. 3–14.
- ICSE-1995-HenningerLR #analysis #approach #learning
- An Organizational Learning Approach to Domain Analysis (SH, KL, AR), pp. 95–104.
- IWMM-1995-Wadler #static analysis
- Static Analysis Refuses to Stay Still: Prospects of Static Analysis for Dynamic Allocation (Abstract) (PW), p. 117.
- LCT-RTS-1995-CamposCMM #analysis #finite #named #realtime
- Verus: A Tool for Quantitative Analysis of Finite-State Real-Time Systems (SVAC, EMC, WRM, MM), pp. 70–78.
- LCT-RTS-1995-JourdanM #analysis #realtime
- Static Timing Analysis of Real-Time Systems (MJ, FM), pp. 79–87.
- LCT-RTS-1995-KoWH #analysis #constraints
- Supporting User-Friendly Analysis of Timing Constraints (LK, DBW, MGH), pp. 99–107.
- LCT-RTS-1995-LiM #analysis #embedded #performance #using
- Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
- LCT-RTS-1995-NilsenR #analysis #execution #worst-case
- Worst-Case Execution Time Analysis on Modern Processors (KDN, BR), pp. 20–30.
- PPoPP-1995-CollardBF #analysis #array #data flow #fuzzy
- Fuzzy Array Dataflow Analysis (JFC, DB, PF), pp. 92–101.
- CAV-1995-EirikssonM #analysis #case study #design #using #verification
- Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
- CAV-1995-HenzingerH #algorithm #analysis #hybrid
- Algorithmic Analysis of Nonlinear Hybrid Systems (TAH, PHH), pp. 225–238.
- CAV-1995-HoW #analysis #automation #protocol
- Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
- CAV-1995-HulgaardB #analysis #performance #petri net
- Efficient Timing Analysis of a Class of Petri Nets (HH, SMB), pp. 423–436.
- ICLP-1995-HeintzeJ #algorithm #analysis
- A Generic Algorithm for CLP Analysis (NH, JJ), pp. 49–63.
- ICLP-1995-HermenegildoPMS #analysis #incremental #logic programming #source code
- Incremental Analysis of Logic Programs (MVH, GP, KM, PJS), pp. 797–811.
- ICLP-1995-ZhaoCU #analysis #concurrent #dependence #logic programming #source code
- Program Dependence Analysis of Concurrent Logic Programs and Its Applications (JZ, JC, KU), p. 825.
- ILPS-1995-BandaMS #analysis #logic programming #performance #scheduling #source code
- Efficient Analysis of Logic Programs with Dynamic Scheduling (MJGdlB, KM, PJS), pp. 417–431.
- ILPS-1995-GallagherBS #logic programming #modelling #source code #static analysis
- Practical Model-Based Static Analysis for Definite Logic Programs (JPG, DB, HS), pp. 351–365.
- ILPS-1995-Lindgren #analysis #control flow #prolog
- Control Flow Analysis of Prolog (TL), pp. 432–446.
- LICS-1995-Wang #analysis #behaviour #realtime
- Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
- DAC-1994-BhattacharyaDB94a #analysis #optimisation #performance #specification
- Performance Analysis and Optimization of Schedules for Conditional and Loop-Intensive Specifications (SB, SD, FB), pp. 491–496.
- DAC-1994-ChenF #analysis #using
- Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
- DAC-1994-HachtelMPS #analysis #finite #probability #scalability #state machine
- Probabilistic Analysis of Large Finite State Machines (GDH, EM, AP, FS), pp. 270–275.
- DAC-1994-KahngM #analysis #equation #using
- Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
- DAC-1994-LeviaMR #analysis #design
- Lessons in Language Design: Cost/Benefit analysis of VHDL Features (OL, SM, JR), pp. 447–453.
- DAC-1994-NielsenK #analysis #performance #simulation
- Performance Analysis Based on Timing Simulation (CDN, MK), pp. 70–76.
- EDAC-1994-BaharCHMS #analysis #using
- Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
- EDAC-1994-BrashearMOPM #analysis #performance #predict #statistics #using
- Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
- EDAC-1994-Rodriguez-MontanesF #analysis #fault #testing
- Analysis of Bridging Defects in Sequential CMOS Circuits and their Current Testability (RRM, JF), pp. 356–360.
- EDAC-1994-SafiniaLS #analysis #functional #modelling
- Taking Advantage of High Level Functional Information to Refine Timing Analysis and Timing Modeling (CS, RL, GS), pp. 349–353.
- EDAC-1994-SivaramanS #analysis #parametricity #towards
- Towards Incorporating Device Parameter Variations in Timing Analysis (MS, AJS), pp. 338–342.
- EDAC-1994-Stroele #analysis
- Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
- EDAC-1994-XueDJ #analysis #fault #float #probability
- Probability Analysis for CMOS Floating Gate Faults (HX, CD, JAGJ), pp. 443–448.
- KBSE-1994-ChilenskiN #analysis #specification #test coverage #tool support
- Formal Specification Tools for Test Coverage Analysis (JC, PN), pp. 59–68.
- PODS-1994-FaloutsosK #analysis #concept #independence #using
- Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
- VLDB-1994-BaralisW #algebra #analysis #approach #database
- An Algebraic Approach to Rule Analysis in Expert Database Systems (EB, JW), pp. 475–486.
- CSEE-1994-HartrumB #analysis #education #object-oriented
- Teaching Formal Extensions of Informal-Based Object-Oriented Analysis Methodologies (TCH, PDB), pp. 389–409.
- ESOP-J-1992-NielsonN94 #analysis
- The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 327–354.
- ESOP-1994-HankinM #analysis #lazy evaluation #strict #type inference
- Lazy Type Inference for the Strictness Analysis of Lists (CH, DLM), pp. 257–271.
- ESOP-1994-HengleinM #analysis #polymorphism
- Polymorphic Binding-Time Analysis (FH, CM), pp. 287–301.
- ESOP-1994-JeuringS #analysis #bottom-up #functional
- Bottom-up Grammar Analysis — A Functional Formulation (JJ, SDS), pp. 317–332.
- ESOP-1994-King #analysis
- A Synergistic Analysis for Sharing and Groundness with Traces Linearity (AK), pp. 363–378.
- ICSM-1994-AbbattistaLMV #design #empirical #impact analysis
- An Experiment on the Effect of Design Recording on Impact Analysis (FA, FL, GM, GV), pp. 253–259.
- ICSM-1994-AngerRY #concurrent #dynamic analysis #source code
- Combining Static and Dynamic Analysis of Concurrent Programs (FDA, RVR, MY), pp. 89–98.
- ICSM-1994-BriandBKS #analysis #maintenance #process
- A Change Analysis Process to Characterize Software Maintenance Projects (LCB, VRB, YMK, DRS), pp. 38–49.
- ICSM-1994-DeBaudMR #analysis #reverse engineering
- Domain Analysis and Reverse Engineering (JMD, BM, SR), pp. 326–335.
- ICSM-1994-GuptaS #analysis #data flow #framework
- A Framework for Partial Data Flow Analysis (RG, MLS), pp. 4–13.
- ICSM-1994-MatwinA #analysis #automation #composition #reuse
- Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
- ICSM-1994-QueilleVWM #case study #impact analysis #maintenance
- The Impact Analysis Task in Software Maintenance: A Model and a Case Study (JPQ, JFV, NW, MM), pp. 234–242.
- PEPM-1994-Baker-Finch #higher-order #static analysis #type system
- Type Theory and Projections for Higher-Order Static Analysis (CABF), pp. 43–52.
- PEPM-1994-BirkedalW #analysis #ml #standard
- Binding-Time Analysis for Standard ML (LB, MW), pp. 61–71.
- PEPM-1994-Davis #analysis
- PERs from Projections for Binding-Time Analysis (KD), pp. 53–60.
- PLDI-1994-Deutsch #alias #analysis #interprocedural #pointer
- Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
- PLDI-1994-EmamiGH #analysis #interprocedural #pointer #points-to
- Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
- PLDI-1994-HentenryckCC #analysis #graph #prolog #using
- Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
- PLDI-1994-SabryF #analysis #continuation #data flow #question
- Is Continuation-Passing Useful for Data Flow Analysis? (AS, MF), pp. 1–12.
- PLDI-1994-SrivastavaE #named #program analysis #tool support
- ATOM — A System for Building Customized Program Analysis Tools (AS, AE), pp. 196–205.
- PLDI-1994-Wismuller #analysis #data flow #debugging #source code #using
- Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
- SAS-1994-ArmstrongMSS #algebra #analysis #dependence #performance #representation
- Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation (TA, KM, PS, HS), pp. 266–280.
- SAS-1994-Consel #analysis #fixpoint #performance #strict
- Fast Strictness Analysis Via Symbolic Fixpoint Iteration (CC), pp. 423–431.
- SAS-1994-Garza-SalazarB #analysis #array
- Uniqueness and Completeness Analysis of Array Comprehensions (DAGS, APWB), pp. 193–207.
- SAS-1994-HankinM #framework #program analysis #type system
- A Type-based Framework for Program Analysis (CH, DLM), pp. 380–394.
- SAS-1994-HanusZ #analysis #functional #logic programming #source code
- Mode Analysis of Functional Logic Programs (MH, FZ), pp. 26–42.
- SAS-1994-Henglein #analysis #fixpoint #strict #type system
- Iterative Fixed Point Computation for Type-Based Strictness Analysis (FH), pp. 395–407.
- SAS-1994-JensenHR #analysis #haskell #performance #strict
- Efficient Strictness Analysis of Haskell (KDJ, PH, MR), pp. 246–362.
- SAS-1994-Jorgensen #analysis #finite #fixpoint #using
- Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
- SAS-1994-LisperC #analysis
- Extended Analysis of Data Fields (BL, JFC), pp. 208–222.
- SAS-1994-MuellerW #analysis #behaviour #on the fly #performance #simulation
- Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
- SAS-1994-Solberg #analysis #strict
- Strictness and Totality Analysis (KLS), pp. 408–422.
- STOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics #using
- Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
- STOC-1994-JacquetS #algorithm #analysis #equation #functional
- A functional equation often arising in the analysis of algorithms (extended abstract) (PJ, WS), pp. 780–789.
- Best-of-PLDI-1994-SrivastavaE94a #named #program analysis #tool support
- ATOM: a system for building customized program analysis tools (with retrospective) (AS, AE), pp. 528–539.
- ICALP-1994-HoftingW #analysis #graph #polynomial
- Polynomial Time Analysis of Torodial Periodic Graphs (FH, EW), pp. 544–555.
- ICALP-1994-HotzP #analysis #context-free grammar #performance
- Fast Uniform Analysis of Coupled-Context-Free Languages (GH, GP), pp. 412–423.
- ICALP-1994-KanellakisHM #analysis #re-engineering
- An Analysis of the Core-ML Language: Expressive Power and Type Reconstruction (PCK, GGH, HGM), pp. 83–105.
- ICALP-1994-Sanchez-CousoF #analysis #pattern matching #probability
- Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
- FME-1994-Cherkaoui #analysis #security #specification
- Specification and Analysis of a Security Management System (OC), pp. 66–82.
- LFP-1994-Heintze #analysis #ml #source code
- Set-Based Analysis of ML Programs (NH), pp. 306–317.
- LFP-1994-StefanescuZ #analysis #equation #framework #functional #higher-order #source code
- An Equational Framework for the Flow Analysis of Higher Order Functional Programs (DCS, YZ), pp. 318–327.
- TAGT-1994-Assmann #on the #program analysis #term rewriting
- On Edge Addition Rewrite Systems and their Relevance to Program Analysis (UA), pp. 321–335.
- CHI-1994-HaunoldK94a #analysis
- A keystroke level analysis of a graphics application: manual map digitizing (PH, WK), pp. 337–343.
- CHI-1994-IrvingPI94a #analysis #automation
- A GOMS analysis of the advanced automated cockpit (SI, PGP, JEI), pp. 344–350.
- CHI-1994-Newman94a #analysis #human-computer #research #using
- A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
- AdaEurope-1994-Anderson94a #analysis #case study #development #experience #object-oriented
- Experiences Integrating Object-Oriented Analysis with Joint Application Development (JAD) (JAA), pp. 509–521.
- AdaEurope-1994-Noseck #analysis #reuse
- Cost-Benefit Analysis for Software-Reuse — A Decision Procedure (HN), pp. 397–405.
- AdaEurope-1994-ObermayerSSKKL #ada #analysis #realtime
- Portability Effort Estimates for Real Time Applications Written in Ada Through Static Code Analysis (PEO, JS, GS, AK, PK, RL), pp. 483–488.
- CAiSE-1994-AntonMP #analysis #composition #process #re-engineering
- Goal Decomposition and Scenario Analysis in Business Process Reengineering (AIA, WMM, CP), pp. 94–104.
- CAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience #using
- From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
- ICML-1994-SchapireW #algorithm #analysis #learning #on the #worst-case
- On the Worst-Case Analysis of Temporal-Difference Learning Algorithms (RES, MKW), pp. 266–274.
- KDD-1994-BhandariB #data analysis #on the #statistics
- On the Role of Statistical Significance in Exploratory Data Analysis (ISB, SB), pp. 61–72.
- KDD-1994-MatheusPM #analysis
- An Application of KEFM to the Analysis of Healthcare Information (CJM, GPS, DM), pp. 441–452.
- SEKE-1994-AbranDMMS #analysis #hypermedia #learning #using
- Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
- SEKE-1994-FigueiredoPC #analysis #fuzzy #petri net #realtime #using
- Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
- SEKE-1994-LuqiG #analysis #certification #synthesis
- Suggestions for progress in software analysis, synthesis and certification (L, JAG), pp. 501–507.
- SEKE-1994-Meskens #analysis #knowledge-based #quality
- A knowledge-based system for software quality analysis (NM), pp. 180–187.
- SIGIR-1994-Hoch #analysis #classification #documentation #information retrieval #using
- Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
- SIGIR-1994-MoritaS #analysis #behaviour #information management #retrieval
- Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval (MM, YS), pp. 272–281.
- SIGIR-1994-ShoensTG #analysis #incremental #performance
- Synthetic Workload Performance Analysis of Incremental Updates (KAS, AT, HGM), pp. 329–338.
- ECOOP-1994-BriggsW #analysis #design #object-oriented #specification
- A Specification Language for Object-Oriented Analysis and Design (TLB, JW), pp. 365–385.
- ECOOP-1994-MoreiraC #analysis #object-oriented
- Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
- TOOLS-EUROPE-1994-BaelenLS #analysis #constraints #design #object-oriented
- Constraints in Object-Oriented Analysis and Design (SVB, JL, ES), pp. 185–199.
- TOOLS-EUROPE-1994-Firesmith #analysis #design #logic #requirements
- O-O Requirements Analysis and Logical Design (DF), p. 513.
- TOOLS-EUROPE-1994-Fowler #analysis #comparison #design
- Comparison of Analysis and Design Methods (MF), p. 517.
- TOOLS-EUROPE-1994-Goldberg #analysis #c++ #design #object-oriented
- Object-Oriented Analysis and Design with C++ (MG), p. 531.
- TOOLS-EUROPE-1994-Graham #analysis #case study #object-oriented #process #re-engineering #requirements
- Beyond the Use Case: Combining Task Analysis and Scripts in Object-Oriented Requirements Capture and Business Process Re-engineering (IMG), pp. 203–215.
- ALP-1994-AlpuenteFV #analysis #composition #equation #source code
- Compositional Analysis for Equational Horn Programs (MA, MF, GV), pp. 77–94.
- ALP-1994-FerreiraZ #analysis #termination
- Syntactical Analysis of Total Termination (MCFF, HZ), pp. 204–222.
- LOPSTR-1994-BoulangerB #analysis #logic programming #program transformation #using
- Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
- LOPSTR-1994-CookG #analysis #source code #termination
- A Transformation System for Definite Programs Based on Termination Analysis (JC, JPG), pp. 51–68.
- PLILP-1994-Serrano #analysis #compilation #control flow #functional #higher-order #using
- Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
- POPL-1994-HankinM #algorithm #analysis #strict #type inference
- Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis (CH, DLM), pp. 202–212.
- POPL-1994-Maslov #analysis #array #data flow #dependence #lazy evaluation
- Lazy Array Data-Flow Dependence Analysis (VM), pp. 311–325.
- ICRE-1994-DrakeT #analysis #bound
- System bounding issues for analysis (JMD, WTT), pp. 24–31.
- ICRE-1994-Eckert #analysis #object-oriented
- Types, classes and collections in object-oriented analysis (GE), pp. 32–39.
- ICRE-1994-GotelF #analysis #problem #requirements #traceability
- An analysis of the requirements traceability problem (OCZG, AF), pp. 94–101.
- ICRE-1994-HollandSCC #analysis #case study #information management
- The directorate information system at St Thomas’ hospital: a study in domain analysis (JH, PHS, ERC, BC), pp. 102–109.
- ICRE-1994-HughesRS #analysis #requirements #taxonomy
- Taxonomy for requirements analysis (KJH, RMR, CTS), pp. 176–179.
- ICRE-1994-White #analysis #comparative #embedded #requirements
- Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
- SAC-1994-Arango #analysis
- A brief introduction to domain analysis (GA), pp. 42–46.
- SAC-1994-ChenB #analysis #concurrent #database #detection #performance #petri net #transaction
- A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
- SAC-1994-Foster #analysis #education #named #using
- FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
- SAC-1994-GabbrielliG #analysis #logic programming #source code
- Goal independency and call patterns in the analysis of logic programs (MG, RG), pp. 394–399.
- SAC-1994-LiMC #analysis #fuzzy #performance
- Performance analysis of fuzzy proportional-derivative control systems (HL, HAM, GC), pp. 115–119.
- SAC-1994-MerkleL #algorithm #analysis #parallel #performance #search-based
- An initial analysis of data parallelism in the fast messy genetic algorithm (LDM, GBL), pp. 488–492.
- SAC-1994-OsborneH #analysis #development #interactive
- Development of an interactive weather analysis and display system to support agricultural planning (LFO, BCH), pp. 346–350.
- FSE-1994-CorbettA #analysis #composition #scalability #towards
- Towards Scalable Compositional Analysis (JCC, GSA), pp. 53–61.
- FSE-1994-DwyerC #analysis #concurrent #data flow #source code #verification
- Data Flow Analysis for Verifying Properties of Concurrent Programs (MBD, LAC), pp. 62–75.
- FSE-1994-VandevoordeG #analysis #composition #runtime #using
- Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
- ICSE-1994-CheungK #analysis #behaviour #distributed #effectiveness
- An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
- ICSE-1994-DevanbuRW #analysis #automation #testing #tool support
- Automated Construction of Testing and Analysis Tools (PTD, DSR, ALW), pp. 241–250.
- ICSE-1994-YuM #analysis #comprehension #design #modelling #process #why
- Understanding “Why” in Software Process Modelling, Analysis, and Design (ESKY, JM), pp. 159–168.
- CC-1994-CheathamGS #analysis #interpreter #tool support
- A Suite of Analysis Tools Based on a General Purpose Abstract Interpreter (TC, HG, DCS), pp. 188–202.
- CC-1994-DuesterwaldGS #clustering #congruence #cost analysis #data flow
- Reducing the Cost of Data Flow Analysis By Congruence Partitioning (ED, RG, MLS), pp. 357–373.
- CC-1994-Reps #analysis #interprocedural #problem
- Solving Demand Versions of Interprocedural Analysis Problems (TWR), pp. 389–403.
- CC-1994-UhlH #analysis
- Flow Grammars — a Flow Analysis Methodology (JSU, RNH), pp. 203–217.
- HPDC-1994-BurrellMP #analysis #capacity #implementation #multi #network #performance #protocol
- Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
- HPDC-1994-LiHW #performance #program analysis #program transformation
- Program Analysis and Transformations for Fast Data Sharing (AL, GH, LDW), pp. 131–138.
- CADE-1994-WaalG #logic programming #program analysis #program transformation #proving #theorem proving
- The Applicability of Logic Program Analysis and Transformation to Theorem Proving (DAdW, JPG), pp. 207–221.
- CADE-1994-WangG #automation #named #program analysis
- KITP-93: An Automated Inference System for Program Analysis (TCW, AG), pp. 831–835.
- ICLP-1994-Kagedal #analysis #data flow #prolog
- A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
- ICLP-1994-Silcrat #algebra #logic #static analysis
- Logic, Algebra and Static Analysis in DM Systems, the IE Way (EDS), p. 744.
- ILPS-1994-BraemCMH #analysis #prolog
- Cardinality Analysis of Prolog (CB, BLC, SM, PVH), pp. 457–471.
- ILPS-1994-BuenoBH #analysis #automation #effectiveness #parallel #strict
- Effectiveness of Global Analysis in Strict Independence-Based Automatic Parallelization (FB, MJGdlB, MVH), pp. 320–336.
- ILPS-1994-Giacobazzi #abduction #analysis #composition #logic programming #source code
- Abductive Analysis of Modular Logic Programs (RG), pp. 377–391.
- ILPS-1994-SwiftW #analysis #evaluation #source code
- Analysis of SLG-WAM Evaluation of Definite Programs (TS, DSW), pp. 219–235.
- ISSTA-1994-BuyS #analysis #petri net #realtime #source code
- Analysis of Real-Time Programs with Simple Time Petri Nets (UAB, RHS), pp. 228–239.
- ISSTA-1994-Corbett #ada #analysis #concurrent #empirical #evaluation #source code
- An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
- ISSTA-1994-FleyshgakkerW #analysis #approach #mutation testing #performance
- Efficient Mutation Analysis: A New Approach (VNF, SNW), pp. 185–195.
- ISSTA-1994-GoldbergWZ #analysis #testing
- Applications of Feasible Path Analysis to Program Testing (AG, TCW, DZ), pp. 80–94.
- ISSTA-1994-JasperBWCZ #analysis #generative #testing
- Test Data Generation and Feasible Path Analysis (RJ, MB, KEW, BC, DZ), pp. 95–107.
- ISSTA-1994-Richardson #analysis #named #testing
- TAOS: Testing with Analysis and Oracle Support (DJR), pp. 138–153.
- ISSTA-1994-Young #analysis #testing
- State-Space Analysis as an Aid to Testing (Abstract) (MY), p. 203.
- DAC-1993-GraebWA #analysis #optimisation #worst-case
- Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
- DAC-1993-HaqueC #analysis #design #distributed #reliability
- Analysis and Reliable Design of ECL Circuits with Distributed RLC Interconnections (MH, SC), pp. 697–701.
- ICDAR-1993-Bayer #analysis #comprehension #documentation #modelling
- Understanding structured text documents by a model based document analysis system (TAB), pp. 448–453.
- ICDAR-1993-CollinTV #analysis #documentation
- Don’t tell mom I’m doing document analysis; she believes I’m in the computer vision field (SC, KT, PV), pp. 619–622.
- ICDAR-1993-Dengel93a #analysis #comprehension #documentation #information management #multi
- The role of document analysis and understanding in multi-media information systems (AD), pp. 385–390.
- ICDAR-1993-DoermannF #analysis #documentation #image
- Image based typographic analysis of documents (DSD, RF), pp. 769–773.
- ICDAR-1993-Hamada #analysis #diagrams
- A new system for the analysis of schematic diagrams (AHH), pp. 369–372.
- ICDAR-1993-HaoWN #analysis #approach #classification #documentation #layout #segmentation
- Nested segmentation: an approach for layout analysis in document classification (XH, JTLW, PAN), pp. 319–322.
- ICDAR-1993-ItoTFHU #analysis #evaluation
- Pattern analysis and evaluation of printed circuit boards (MI, YT, IF, MH, TU), pp. 798–801.
- ICDAR-1993-IttnerB #analysis #layout
- Language-free layout analysis (DJI, HSB), pp. 336–340.
- ICDAR-1993-IwaneYI #analysis #approach #classification #documentation #functional #image #layout
- A functional classification approach to layout analysis of document images (KI, MY, OI), pp. 778–781.
- ICDAR-1993-JainC #analysis #locality #using
- Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
- ICDAR-1993-MadejS #analysis #automation #evaluation #statistics #towards
- Towards automatic evaluation of drawing analysis performance-A statistical model of cadastral map (DM, AS), pp. 890–893.
- ICDAR-1993-RoseE #analysis #recognition #scalability #semantics
- Semantic analysis for large vocabulary cursive script recognition (TGR, LJE), pp. 236–239.
- ICDAR-1993-TungCL #analysis #generative #performance
- Performance analysis of an OCR system via an artificial handwritten Chinese character generator (CHT, YJC, HJL), pp. 315–318.
- ICDAR-1993-Wang #analysis #comprehension #documentation #visualisation
- Machine visualization, understanding and interpretation of polyhedral line-drawings in document analysis (PSPW), pp. 882–885.
- ICDAR-1993-WieserP #analysis #image #layout
- Layout and analysis: Finding text, titles, and photos in digital images of newspaper pages (JW, AP), pp. 774–777.
- PODS-1993-PagelSTW #analysis #data type #performance #query #towards
- Towards an Analysis of Range Query Performance in Spatial Data Structures (BUP, HWS, HT, PW), pp. 214–221.
- VLDB-1993-AmatoGM #abstract interpretation #analysis #database #programming
- Data Sharing Analysis for a Database Programming Lanaguage via Abstract Interpretation (GA, FG, GM), pp. 405–415.
- VLDB-1993-RahmM #analysis #database #parallel
- Analysis of Dynamic Load Balancing Strategies for Parallel Shared Nothing Database Systems (ER, RM), pp. 182–193.
- CSM-1993-ArnoldB #comparison #framework #impact analysis #towards
- Impact Analysis — Towards a Framework for Comparison (RSA, SAB), pp. 292–301.
- CSM-1993-KurishimaONAF #analysis #fault
- Quantitative Analysis of Errors in Telecommunications Software (NK, HO, JiN, KA, MF), pp. 190–198.
- CSM-1993-LoyallM #analysis #dependence #maintenance #process #using
- Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
- WCRE-1993-ReubensteinPR #analysis #parsing #reverse engineering #tool support
- Separating Parsing and Analysis in Reverse Engineering Tools (HBR, RLP, SNR), pp. 117–125.
- WCRE-1993-RitschS #dynamic analysis #reverse engineering #source code
- Reverse Engineering Programs via Dynamic Analysis (HR, HMS), pp. 192–201.
- PEPM-1993-Andersen #analysis #c #pointer
- Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
- PEPM-1993-Bulyonkov #analysis
- Extracting Polyvariant Binding Time Analysis from Polyvariant Specializer (MAB), pp. 59–65.
- PEPM-1993-CharlierH #analysis #evaluation #implementation #prolog
- Groundness Analysis for PROLOG: Implementation and Evaluation of the Domain Prop (BLC, PVH), pp. 99–110.
- PEPM-1993-Consel #analysis
- Polyvariant Binding-Time Analysis For Applicative Languages (CC), pp. 66–77.
- PEPM-1993-Davis #analysis #higher-order
- Higher-order Binding-time Analysis (KD), pp. 78–87.
- PEPM-1993-Seward #analysis #polymorphism #strict #using
- Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
- PEPM-1993-Thiemann #analysis #functional #safety #source code
- A Safety Analysis for Functional Programs (PT), pp. 133–144.
- PLDI-1993-BoydW #analysis #fault #optimisation
- Isolation and Analysis of Optimization Errors (MRB, DBW), pp. 26–35.
- PLDI-1993-DuesterwaldGS #analysis #array #data flow #framework #optimisation
- A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations (ED, RG, MLS), pp. 68–77.
- PLDI-1993-JohnsonP #dependence #program analysis
- Dependence-Based Program Analysis (RJ, KP), pp. 78–89.
- PLDI-1993-KolteH #analysis
- Load/Store Range Analysis for Global Register Allocation (PK, MJH), pp. 268–277.
- PLDI-1993-LandiRZ #alias #analysis #interprocedural #pointer
- Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
- STOC-1993-CoffmanJSW #analysis #markov #proving
- Markov chains, computer proofs, and average-case analysis of best fit bin packing (EGCJ, DSJ, PWS, RRW), pp. 412–421.
- STOC-1993-RackoffS #analysis #encryption
- Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
- WSA-1993-CridligG #analysis #semantics
- Semantics and Analysis of Linda-Based Languages (RC, EG), pp. 72–86.
- WSA-1993-KatoSI #abduction #performance #program analysis #reasoning
- An Efficient Abductive Reasoning System Based on Program Analysis (SK, HS, HI), pp. 230–241.
- WSA-1993-NielsonN #analysis #strict
- Finiteness Conditions for Strictness Analysis (FN, HRN), pp. 194–205.
- WSA-1993-Roy #challenge #logic programming #source code #static analysis
- Challenges in Developing Useful and Practical Static Analysis for Logic Programs (PVR), p. 111.
- WSA-1993-SahlinS #named #static analysis
- Demonstration: Static Analysis of AKL (DS, TS), pp. 282–283.
- WSA-1993-WrightB #analysis #reduction
- Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
- ICALP-1993-CodishFMW #analysis #concurrent #constraints #logic programming #performance #source code
- Efficient Analysis of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 633–644.
- FME-1993-ValmariKCL #analysis #reachability
- Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
- FPCA-1993-Nocker #analysis #reduction #strict #using
- Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
- FPCA-1993-SastryCA #analysis #functional #strict
- Order-of-evaluation Analysis for Destructive Updates in Strict Functional Languages with Flat Aggregates (AVSS, WDC, ZMA), pp. 266–275.
- HCI-ACS-1993-BextenHM #analysis #named #simulation
- AUCA: A Tool for Presentation and Analysis of Simulation Results (EMzB, DH, CM), pp. 267–272.
- HCI-ACS-1993-BrinkmanS #analysis #fault
- Analysis and Support of Fault Diagnosis Strategies (JAB, TWvdS), pp. 115–120.
- HCI-ACS-1993-CarstensenS #analysis #requirements
- Work Analysis — Perspectives on and Requirements for a Methodology (PHC, KS), pp. 575–580.
- HCI-ACS-1993-TakedaHS93a #analysis
- Analysis of Uric Properties for Stress Caused by VDT Work and Relationship Among CFF, HRV and VEP (MT, YH, KS), pp. 903–908.
- HCI-ACS-1993-TsujiMND #analysis
- New Analysis of HRV Through Wavelet Transform (HT, HM, TN, TD), pp. 920–924.
- HCI-ACS-1993-VendaH #analysis #complexity
- Qualitative and Quantitative Analysis of Human Decision-Making Complexity (VFV, HWH), pp. 636–641.
- HCI-SHI-1993-FrascinaS #analysis #design #human-computer #interface
- Task Analysis in Design of a Human-Computer Interface for a Ward Based System (TF, RAS), pp. 226–230.
- HCI-SHI-1993-Gautsch #analysis #architecture #difference #hypermedia
- An Analysis of Hypermedia Program Architecture with Individual Differences of Learners (SG), pp. 482–487.
- HCI-SHI-1993-KatoO #analysis #using
- Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
- HCI-SHI-1993-KirbyH #analysis #design
- An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
- HCI-SHI-1993-MorganHCHQMO #analysis #design #implementation #interactive #knowledge base #multi #perspective
- Implementation and Design Issues in Interactive Multi-Media Knowledge Based Systems for Criminal Intelligence Analysis: The Mycroft Perspective (KM, PH, JC, LH, TQ, RM, RO), pp. 513–518.
- HCI-SHI-1993-TakeguchiTO #analysis #information management #representation #scalability
- A Knowledge Representation for Large Scale Integrated Circuit Failure Analysis (YT, TT, SO), pp. 92–97.
- HCI-SHI-1993-UjitaKIK #analysis
- Cooperative Work Analysis of Plant Operator Crew (HU, RK, KI, RK), pp. 955–960.
- INTERCHI-1993-HillLSW #analysis #multi
- Planning for multiple task work: an analysis of a medical reception worksystem (BH, JL, WS, AW), pp. 314–320.
- INTERCHI-1993-MacleodB #analysis #metric #music #tool support #usability #video
- MUSiC video analysis and context tools for usability measurement (MM, NB), p. 55.
- INTERCHI-1993-StaskoBL #algorithm #analysis #animation #empirical #learning
- Do algorithm animations assist learning?: an empirical study and analysis (JTS, ANB, CL), pp. 61–66.
- CAiSE-1993-BrunetCMS #analysis #object-oriented
- Object-Oriented Analysis in Practice (JB, CC, DM, FS), pp. 293–308.
- CIKM-1993-FayyadWD #analysis #automation #bibliography #database #image
- Automated Cataloging and Analysis of Sky Survey Image Databases: The SKICAT System (UMF, NW, SGD), pp. 527–536.
- CIKM-1993-PearceN #analysis #generative #hypermedia #n-gram
- Generating a Dynamic Hypertext Environment with n-gram Analysis (CP, CKN), pp. 148–153.
- CIKM-1993-QianFF #analysis #database #metric #object-oriented
- An Object-Oriented Database for the Display Measurement and Analysis System (YQ, EAF, WWF), pp. 384–392.
- ICML-1993-CohenCBA #analysis #automation #modelling
- Automating Path Analysis for Building Causal Models from Data (PRC, AC, LB, ASA), pp. 57–64.
- SEKE-1993-BiebowS #analysis #requirements #validation
- Acquisition, Analysis and Validation of Informal Requirements (BB, SS), pp. 109–116.
- SEKE-1993-BombanaBCFSZ #analysis #functional #testing
- An Expert Solution to Functional Testability Analysis of VLSI Circuits (MB, GB, PC, FF, DS, GZ), pp. 263–265.
- SEKE-1993-JaegerP #analysis #information management #named #specification
- BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems (TJ, AP), pp. 191–198.
- SEKE-1993-KomiyaSHKOHOO #analysis #process #specification
- An Experimental Analysis for Classifying Specification Processes (SK, MS, SH, JK, AO, HH, SO, KO), pp. 231–234.
- SIGIR-1993-AktugC #analysis #multi #query
- Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
- SIGIR-1993-Botafogo #analysis #clustering #hypermedia
- Cluster Analysis for Hypertext Systems (RAB), pp. 116–125.
- ECOOP-1993-DuboisBP #analysis #perspective #requirements
- O-O Requirements Analysis: an Agent Perspective (ED, PDB, MP), pp. 458–481.
- OOPSLA-1993-Civello #analysis #design #object-oriented
- Roles for Composite Objects in Object-Oriented Analysis and Design (FC), pp. 376–393.
- OOPSLA-1993-GodinM #maintenance #using
- Building and Maintaining Analysis-Level Class Hierarchies Using Galois Lattices (RG, HM), pp. 394–410.
- OOPSLA-1993-HoydalsvikS #analysis #object-oriented #on the
- On the Purpose of Object-Oriented Analysis (GMH, GS), pp. 240–255.
- TOOLS-EUROPE-1993-CattaneoCLZ #analysis #bibliography #database #evolution #object-oriented
- Overview and Progress Report of the ESSE Project: Supporting Object-Oriented Database Schema Analysis and Evolution (FC, ACP, LL, RZ), pp. 63–74.
- TOOLS-EUROPE-1993-KetabchiS #analysis #automation #documentation #generative #maintenance #using
- Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
- TOOLS-EUROPE-1993-LeeS #analysis #object-oriented
- Object-Oriented Analysis in the Real World (MML, LS), pp. 127–149.
- TOOLS-EUROPE-1993-Walden #analysis #design #object-oriented
- Object-Oriented Analysis & Design (KW), p. 291.
- TOOLS-PACIFIC-1993-Firesmith93c #analysis #design #logic #object-oriented #requirements
- Object-Oriented Requirements Analysis and Logical Design (DF), p. 319.
- TOOLS-PACIFIC-1993-McEwinR #analysis #design #object-oriented
- Semiotics, Ethnomethodology, and Object-Oriented Analysis and Design Notations (JM, SR), pp. 143–151.
- TOOLS-USA-1993-Fowler #analysis #comparison #design #object-oriented
- A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
- TOOLS-USA-1993-MinginsDS #analysis #eiffel #metric
- Collection and Analysis of Software Metrics from the Eiffel Class Hierarchy (CM, BD, GS), pp. 427–435.
- TOOLS-USA-1993-MorabitoS #analysis #approach #design #object-oriented
- A New Approach to Object-Oriented Analysis and Design (JM, MSS), pp. 45–55.
- TOOLS-USA-1993-Roberts #analysis #design #object-oriented
- Object-Oriented Analysis and Design (TR), pp. 509–522.
- LOPSTR-1993-Neugebauer #analysis #reachability
- Reachability Analysis for the Extension Procedure — A Topological Result (GN), pp. 32–44.
- PLILP-1993-BurnM #analysis #compilation #correctness #optimisation #proving #strict
- Proving the Correctness of Compiler Optimizations Based on Strictness Analysis (GLB, DLM), pp. 346–364.
- PLILP-1993-Kagedal #analysis #prolog
- Improvements in Compile-Time Analysis for Ground Prolog (AK), pp. 92–107.
- PLILP-1993-Moreno-NavarroKMWH #analysis #lazy evaluation #performance #using
- Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
- POPL-1993-CodishDG #analysis #composition #logic programming #source code
- Compositional Analysis of Modular Logic Programs (MC, SKD, RG), pp. 451–464.
- POPL-1993-DhamdhereK #analysis #bidirectional #complexity #data flow
- Complexity of Bidirectional Data Flow Analysis (DMD, UPK), pp. 397–408.
- POPL-1993-MaydanAL #analysis #array #data flow
- Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
- POPL-1993-Wand #analysis #correctness #specification
- Specifying the Correctness of Binding-Time Analysis (MW), pp. 137–143.
- ICRE-1993-Beeck #analysis #execution #precise #realtime #specification
- Improving Structured Analysis — Achieving Preciseness, Executability, and Real-Time Specification (MvdB), pp. 227–245.
- ICRE-1993-FenselAS #analysis #semantics
- Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
- RE-1993-TakedaSKO #analysis #editing
- Requirement analysis by the KJ editor (NT, AS, KK, HO), pp. 98–101.
- SAC-1993-AcreeCUGS #adaptation #algorithm #analysis #linear #parallel
- Parallelization and Analysis of a Linear Adaptive Filtering Algorithm (RKA, DTC, NU, MJG, DMS), pp. 165–172.
- SAC-1993-HitzW #analysis #development #information management #multi
- Development and Analysis of a Wide Area Multimedia Information System (MH, HW), pp. 238–246.
- SAC-1993-Konstam #algorithm #analysis #linear #search-based #using
- Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
- SAC-1993-LungU #analysis #approach #integration #reuse
- Integration of Domain Analysis and Analogical Approach for Software Reuse (CHL, JEU), pp. 48–53.
- SAC-1993-VaidyanathanL #analysis #bound #learning
- Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
- ESEC-1993-Beeck #analysis #concurrent #integration #realtime #specification
- Integration of Structured Analysis and Timed Statecharts for Real-Time and Concurrency Specification (MvdB), pp. 313–328.
- ESEC-1993-CheungK #analysis #detection #distributed #source code
- Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
- FSE-1993-CheungK #analysis #composition #constraints #reachability
- Enhancing Compositional Reachability Analysis with Context Constraints (SCC, JK), pp. 115–125.
- FSE-1993-Lutz #analysis #fault #requirements
- Targeting Safety-Related Errors During Software Requirements Analysis (RRL), pp. 99–106.
- FSE-1993-PodgurskiY #analysis #clustering #testing
- Partition testing, stratified sampling, and cluster analysis (AP, CY), pp. 169–181.
- ICSE-1993-DrakeXTZ #analysis #approach #case study
- Approach and Case Study of Requirement Analysis Where End Users Take an Active Role (JMD, WWX, WTT, IAZ), pp. 177–186.
- ICSE-1993-KitsonM #analysis #assessment #process
- An Analysis of SEI Software Process Assessment Results: 1987-1991 (DHK, SMM), pp. 68–77.
- ICSE-1993-LaskiSL #analysis #mutation testing #testing
- Dynamic Mutation Testing in Integrated Regression Analysis (JWL, WS, PL), pp. 108–117.
- ICSE-1993-TamaiI #analysis #backtracking #design #development #process #requirements #scalability
- Requirements and Design Change in Large-Scale Software Development: Analysis From the Viewpoint of Process Backtracking (TT, AI), pp. 167–176.
- HPDC-1993-BiswasRTK #analysis #distributed #file system #performance
- Performance Analysis of Distributed File Systems with Non-Volatile Caches (PB, KKR, DFT, CMK), pp. 252–262.
- HPDC-1993-Coddington #analysis #distributed #hardware #physics
- An Analysis of Distributed Computing Software and Hardware for Applications in Computational Physics (PDC), pp. 179–186.
- HPDC-1993-DowdBAP #analysis #architecture #design #scalability
- Design and Analysis of a Hierarchical Scalable Photonic Architecture (PWD, KB, KAA, JAP), pp. 289–296.
- PPoPP-1993-MasticolaR #analysis
- Non-concurrency Analysis (SPM, BGR), pp. 129–138.
- PPoPP-1993-SarukkaiM #analysis #source code
- Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
- CAV-1993-Halbwachs #analysis #source code
- Delay Analysis in Synchronous Programs (NH), pp. 333–346.
- CAV-1993-MalerP #analysis #multi #reachability
- Reachability Analysis of Planar Multi-limear Systems (OM, AP), pp. 194–209.
- CSL-1993-Coquand #analysis #semantics
- From Semantics to Rules: A Machine Assisted Analysis (CC), pp. 91–105.
- ICLP-1993-CodishDFB #analysis #correctness #logic programming #question #source code
- Freeness Analysis for Logic Programs — And Correctness? (MC, DD, GF, MB), pp. 116–131.
- ICLP-1993-CorsiniR #analysis #fault #safety
- Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
- ICLP-1993-DumortierJBC #analysis #constraints
- Freeness Analysis in the Presence of Numerical Constraints (VD, GJ, MB, MC), pp. 100–115.
- ICLP-1993-Hanus #analysis #constraints
- Analysis of Nonlinear Constraints in CLP(R) (MH), pp. 83–99.
- ICLP-1993-KempS #analysis #constraints #optimisation #query
- Analysis Based Constraint Query Optimization (DBK, PJS), pp. 666–682.
- ILPS-1993-BandaH #analysis #approach #source code
- A Practical Approach to the Global Analysis of CLP Programs (MJGdlB, MVH), pp. 437–455.
- ILPS-1993-Debray #logic programming #source code #static analysis
- Static Analysis of Logic Programs (SKD), pp. 43–44.
- ILPS-1993-DecorteSF #analysis #automation #termination
- Automatic Inference of Norms: A Missing Link in Automatic Termination Analysis (SD, DDS, MF), pp. 420–436.
- ILPS-1993-Sohn #analysis #logic programming #relational #source code
- Relational Groundness Analysis for Logic Programs (KS), p. 635.
- ISSTA-1993-BelliJ #analysis #prolog #source code #testing
- Implementation-Based Analysis and Testing of Prolog Programs (FB, OJ), pp. 70–80.
- ISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction #using
- Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
- ISSTA-1993-Goradia #effectiveness #impact analysis
- Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
- ISSTA-1993-Jackson #analysis
- Abstract Analysis with Aspect (DJ), pp. 19–27.
- ISSTA-1993-LevineT #analysis #concurrent #metric #re-engineering
- Metric-Driven Reengineering for Static Concurrency Analysis (DLL, RNT), pp. 40–50.
- ISSTA-1993-UntchOH #analysis #mutation testing #using
- Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
- ISSTA-1993-WeissF #algorithm #analysis #mutation testing
- Improved Serial Algorithms for Mutation Analysis (SNW, VNF), pp. 149–158.
- DAC-1992-ChiproutN #analysis #network
- Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
- DAC-1992-LeeR #analysis #evaluation #linear #named #using
- AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
- DAC-1992-RuehliH #analysis #challenge
- Challenges and Advances in Electrical Interconnect Analysis (AER, HH), pp. 460–465.
- PODS-1992-Rotem #analysis #scalability
- Analysis of Disk Arm Movement for Large Sequential Reads (DR), pp. 47–54.
- SIGMOD-1992-DanY #analysis #performance #policy
- Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
- SIGMOD-1992-GhandeharizadehDQ #analysis #clustering #multi #performance
- A Performance Analysis of Alternative Multi-Attribute Declustering Strategies (SG, DJD, WQ), pp. 29–38.
- SIGMOD-1992-JhingranK #analysis #database #protocol #using
- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
- ESOP-1992-NielsonN #analysis
- The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 351–370.
- PEPM-1992-AndersenG #analysis #partial evaluation
- Speedup Analysis in Partial Evaluation: Preliminary Results (LOA, CKG), pp. 1–7.
- PEPM-1992-DehboneiJ #analysis #evaluation #interprocedural #semantics #symbolic computation
- Semantical Interprocedural Analysis by Partial Symbolic Evaluation (BD, PJ), pp. 14–20.
- PEPM-1992-Field #imperative #program analysis #semantics #source code
- A Simple Rewriting Semantics for Realistic Imperative Programs and its Application to Program Analysis (JF), pp. 98–107.
- PEPM-1992-RufW #analysis #control flow #higher-order #using
- Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
- PEPM-1992-RytzG #analysis
- A Polyvariant Binding Time Analysis (BR, MG), pp. 21–28.
- PLDI-1992-HendrenHN #abstraction #analysis #data type #imperative #pointer #recursion #source code
- Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
- PLDI-1992-ParkG #analysis
- Escape Analysis on Lists (YGP, BG), pp. 116–127.
- PLDI-1992-TanL #analysis #compilation #data flow #logic programming #source code
- Compiling Dataflow Analysis of Logic Programs (JT, IPL), pp. 106–115.
- WSA-1992-AmatoGM #analysis #concurrent #database #functional #programming language #transaction
- Analysis of Concurrent Transactions in a Functional Database Programming Language (GA, FG, GM), pp. 174–184.
- WSA-1992-Ayers #analysis #performance #reachability
- Efficient Closure Analysis with Reachability (AEA), pp. 126–134.
- WSA-1992-BagnaraGL #source code #static analysis
- Static Analysis of CLP Programs over Numeric Domains (RB, RG, GL), pp. 43–50.
- WSA-1992-Baker-Finch #analysis #logic #strict
- Relevant Logic and Strictness Analysis (CABF), pp. 221–228.
- WSA-1992-CodishFMW #analysis #concurrent #constraints #logic programming #performance #source code
- Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 35–42.
- WSA-1992-Gallagher #logic programming #specification #static analysis
- Static Analysis for Logic Program Specification (JPG), pp. 285–294.
- WSA-1992-GenglerR #analysis
- A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
- WSA-1992-Hamilton #analysis #first-order #functional #lazy evaluation #source code
- Sharing Analysis of Lazy First-Order Functional Programs (GWH), pp. 68–78.
- WSA-1992-ParkG #analysis #lazy evaluation
- Order-of-Demand Analysis for Lazy Languages (YGP, BG), pp. 91–101.
- WSA-1992-SolbergNN #analysis
- Inference Systems for Binding Time Analysis (KLS, HRN, FN), pp. 247–254.
- WSA-1992-TangJ #analysis #control flow
- Control-Flow Effects for Escape Analysis (YMT, PJ), pp. 313–321.
- ICALP-1992-Debray #analysis #complexity #data flow #logic programming #on the #source code
- On the Complexity of Dataflow Analysis of Logic Programs (SKD), pp. 509–520.
- ICALP-1992-Flajolet #algorithm #analysis
- Analytic Analysis of Algorithms (PF), pp. 186–210.
- ICALP-1992-KirschenhoferPS #analysis #how #probability #problem
- How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
- LFP-1992-NeubergerM #analysis #deduction #power of #precise #strict
- A Precise Relationship Between the Deductive Power of Forward and Backward Strictness Analysis (MN, PM), pp. 127–138.
- LFP-1992-TraubCS #analysis #clustering #source code #strict #thread
- Global Analysis for Partitioning Non-Strict Programs into Sequential Threads (KRT, DEC, KES), pp. 324–334.
- LFP-1992-WangH #analysis #recursion
- Analysis of Recursive Types in Lisp-Like Languages (EW, PNH), pp. 216–225.
- CHI-1992-HammontreeHH #analysis #research #testing #tool support #user interface #visual notation
- Integrated data capture and analysis tools for research and testing on graphical user interfaces (MLH, JJH, BWH), pp. 431–432.
- CHI-1992-JohnV #analysis #interactive
- A GOMS Analysis of a Graphic Machine-Paced, Highly Interactive Task (BEJ, AHV), pp. 251–258.
- TRI-Ada-C-1992-Frankel #analysis #architecture #modelling
- Analysis/Architecture Models to ASG Models: Enabling the Transition (MIF), pp. 220–231.
- TRI-Ada-C-1992-SeligPM #ada #data analysis #realtime
- Data Analysis and Reporting for Real-Time Ada Systems (TS, DBP, BDM), pp. 469–476.
- TRI-Ada-T1-1992-Roseman #analysis
- Rate Monotonic Analysis (TR), pp. 261–376.
- CAiSE-1992-Dewal #analysis #evaluation #requirements
- A Methodology for Requirements Analysis and Evaluation of SDEs (SD), pp. 394–409.
- CAiSE-1992-FouqueV #analysis #approach #machine learning
- Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
- CAiSE-1992-MacGinnes #analysis #how #object-oriented #question
- How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
- KR-1992-BaaderHNPF #analysis #empirical #optimisation #representation
- An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
- ML-1992-Etzioni #analysis #learning
- An Asymptotic Analysis of Speedup Learning (OE), pp. 129–136.
- ML-1992-GratchD #analysis #learning #problem
- An Analysis of Learning to Plan as a Search Problem (JG, GD), pp. 179–188.
- ML-1992-HirschbergP #analysis #concept #learning
- Average Case Analysis of Learning κ-CNF Concepts (DSH, MJP), pp. 206–211.
- SEKE-1992-AbateDNP #analysis #query #specification
- Querying and Analysis of Software Specifications (AFA, CD, GN, GP), pp. 470–478.
- SEKE-1992-Olson #analysis #interface #object-oriented
- An Object-Oriented Analysis Model of an Iconic Interface to Macsyma (AMO), pp. 253–260.
- SEKE-1992-Schaschinger #analysis #information management #object-oriented
- Expert-Supported Object-Oriented Analysis in Knowledge Engineering (HS), pp. 116–122.
- SEKE-1992-TuS #approach #linear #petri net #programming #static analysis
- Linear Programming Supporting Ada-Tasking Static Analysis: A Petri Net Approach (ST, WS), pp. 222–226.
- SEKE-1992-WatsonN #analysis #development #named
- ProTest: A Knowledge Analysis Tool for the Development of Expert Systems (IW, MN), pp. 206–212.
- SIGIR-1992-BlossevilleHMP #analysis #automation #classification #documentation #natural language #statistics
- Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
- SIGIR-1992-WangWY #analysis #geometry #modelling
- An Analysis of Vector Space Models Based on Computational Geometry (ZW, SKMW, YY), pp. 152–160.
- OOPSLA-1992-ClydeEW #analysis #object-oriented
- Tunable Formalism in Object-Oriented Systems Analysis: Meeting the Needs of Both Theoreticians and Practitioners (SWC, DWE, SNW), pp. 452–465.
- TOOLS-EUROPE-1992-BuddeCSZ #analysis #design #tool support
- Tools and Materials: an Analysis and Design Metaphor (RB, MLCN, KHS, HZ), pp. 135–146.
- TOOLS-EUROPE-1992-FritzsonVHF #algebra #analysis #industrial #modelling #object-oriented
- Industrial Application of OO Mathematical Modeling and Computer Algebra in Mechanical Analysis (PF, LV, JH, DF), pp. 167–181.
- TOOLS-EUROPE-1992-Nerson #analysis #design #object-oriented
- Object-Oriented Analysis and Design (JMN), p. 405.
- TOOLS-EUROPE-1992-Rubin #analysis #behaviour
- Object Behavior Analysis (KSR), p. 407.
- TOOLS-PACIFIC-1992-Henderson-Sellers92a #analysis #design
- Techniques and Notation for Analysis and Design (BHS), p. 236.
- TOOLS-PACIFIC-1992-KotakaKH #analysis #modelling #object-oriented #process #specification
- Specification Process Modelling in Object-Oriented Analysis (NK, YK, SH), pp. 67–81.
- TOOLS-PACIFIC-1992-Miller #analysis #architecture #finite #interactive
- A Class Architecture for Interactive Finite Element Analysis (GRM), pp. 101–108.
- TOOLS-USA-1992-Walden #analysis #design #object-oriented
- Object-Oriented Analysis and Design (KW), p. 255.
- ALP-1992-BundgenE #algorithm #analysis #normalisation #performance
- A Fast Algorithm for Ground Normal Form Analysis (RB, HE), pp. 291–305.
- ALP-1992-KingS #analysis #concurrent #logic programming #source code
- Serialisation Analysis of Concurrent Logic Programs (AK, PS), pp. 322–334.
- LOPSTR-1992-VerschaetseDS #analysis #automation #termination
- Automatic Termination Analysis (KV, SD, DDS), pp. 168–183.
- PLILP-1992-GomardS #analysis #data type #lazy evaluation
- Path Analysis for Lazy Data Structures (CKG, PS), pp. 54–68.
- PLILP-1992-Rosendahl #analysis #attribute grammar #strict
- Strictness Analysis for Attribute Grammars (MR), pp. 145–157.
- POPL-1992-ChowH #analysis #memory management #parallel #source code
- Compile-Time Analysis of Parallel Programs that Share Memory (JHC, WLHI), pp. 130–141.
- ICSE-1992-LubarsMPR #analysis #evolution #object-oriented
- Object-Oriented Analysis for Evolving Systems (MDL, GM, CP, CR), pp. 173–185.
- ICSE-1992-MargonoR #ada #analysis #reuse #scalability
- Software Reuse Economics: Cost-Benefit Analysis on a Large-Scale Ada Project (JM, TER), pp. 338–348.
- ICSE-1992-TsudaMTT #analysis #automation #development
- Productivity Analysis of Software Development with an Integrated CASE Tool (MT, YM, MT, MT), pp. 49–58.
- CC-1992-Knopp #analysis #lisp #parallel #performance
- Improving the Performance of Parallel LISP by Compile Time Analysis (JK), pp. 271–277.
- CC-1992-SudholtS #analysis #data flow #interprocedural #object-oriented #on the
- On Interprocedural Data Flow Analysis for Object Oriented Languages (MS, CS), pp. 156–162.
- CC-1992-VitekHU #analysis #object-oriented #source code
- Compile-Time Analysis of Object-Oriented Programs (JV, RNH, JSU), pp. 236–250.
- HPDC-1992-ParasharHMF #analysis #distributed #performance
- A Requirement Analysis for High Performance Distributed Computing over LANs (MP, SH, AGM, GF), pp. 142–151.
- CADE-1992-Ammon #analysis #automation #logic #proving
- Automatic Proofs in Mathematical Logic and Analysis (KA), pp. 4–19.
- CADE-1992-Sutcliffe #analysis #set
- Linear-Input Subset Analysis (GS), pp. 268–280.
- JICSLP-1992-BigotDM #abstract interpretation #analysis #comprehension #using
- Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
- JICSLP-1992-Heintze #analysis #aspect-oriented #set
- Practical Aspects of Set Based Analysis (NH), pp. 765–779.
- JICSLP-1992-KingS #analysis #concurrent #logic programming #source code
- Schedule Analysis of Concurrent Logic programs (AK, PS), pp. 478–492.
- JICSLP-1992-Overbeek #analysis #logic programming #search-based #sequence #tutorial
- Logic Programming and Genetic Sequence Analysis: a Tutorial (RAO), pp. 32–34.
- JICSLP-1992-SundararajanST #analysis #concurrent #logic programming #source code #thread
- Variable Threadedness Analysis for Concurrent Logic Programs (RS, AVSS, ET), pp. 493–508.
- LICS-1992-HeintzeJ #logic programming #program analysis
- An Engine for Logic Program Analysis (NH, JJ), pp. 318–328.
- LICS-1992-Jensen #analysis #strict
- Disjunctive Strictness Analysis (TPJ), pp. 174–185.
- LICS-1992-Murthy #analysis
- A Computational Analysis of Girard’s Translation and LC (CRM), pp. 90–101.
- DAC-1991-BergamaschiCP #analysis #synthesis #using
- Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
- DAC-1991-DeguchiIY #analysis #fault #logic #probability
- Probabilistic CTSS: Analysis of Timing Error Probability in Asynchronous Logic Circuits (YD, NI, SY), pp. 650–655.
- DAC-1991-Hwang #analysis #named
- REX — A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis (JPH), pp. 717–722.
- DAC-1991-RaghavanR #analysis
- A New Nonlinear Driver Model for Interconnect Analysis (VR, RAR), pp. 561–566.
- DAC-1991-SastryM #analysis #branch #process
- A Branching Process Model for Observability Analysis of Combinational Circuits (SS, AM), pp. 452–457.
- HT-1991-SamuelsonG #analysis #hypermedia #library
- Intellectual Property Rights for Digital Library and Hypertext Publishing Systems: An Analysis of Xanadu (PS, RJG), pp. 39–50.
- PODS-1991-Matsliach #analysis #multi #performance
- Performance Analysis of File Organizations that Use Multi-Bucket Data Leaves with Partial Expansions (GM), pp. 164–180.
- SIGMOD-1991-IoannidisK #analysis #optimisation #query
- Left-Deep vs. Bushy Trees: An Analysis of Strategy Spaces and its Implications for Query Optimization (YEI, YCK), pp. 168–177.
- PEPM-1991-CortesiF #abstract domain #abstract interpretation #analysis #logic programming #source code
- Abstract Interpretation of Logic Programs: An Abstract Domain for Groundness, Sharing, Freeness and Compoundness Analysis (AC, GF), pp. 52–61.
- PEPM-1991-HuntS #analysis #perspective
- Binding Time Analysis: A New PERspective (SH, DS), pp. 154–165.
- PEPM-1991-ParkG #analysis #optimisation
- Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References (YGP, BG), pp. 178–189.
- PEPM-1991-Sahlin #analysis #prolog
- Determinacy Analysis for Full Prolog (DS), pp. 23–30.
- PEPM-1991-Shivers #analysis #control flow #semantics
- The Semantics of Scheme Control-Flow Analysis (OS), pp. 190–198.
- PLDI-1991-MaydanHL #analysis #data flow #dependence #performance
- Efficient and Exact Data Dependence Analysis (DEM, JLH, MSL), pp. 1–14.
- WSA-1991-BoeckC #analysis #automation #prolog #type checking
- Automatic Construction of Prolog Primitives for Type Checking Analysis (PDB, BLC), pp. 165–172.
- WSA-1991-Breuer #analysis #learning #synthesis
- An Analysis/Synthesis Language with Learning Strategies (PTB), pp. 202–209.
- ICALP-1991-ErnoultM #analysis #strict
- Uniform Ideals and Strictness Analysis (CE, AM), pp. 47–59.
- VDME-1991-1-PlatKP #analysis #design
- A Case for Structured Analysis/Formal Design (NP, JvK, KP), pp. 81–105.
- FPCA-1991-Henglein #analysis #higher-order #performance #type inference
- Efficient Type Inference for Higher-Order Binding-Time Analysis (FH), pp. 448–472.
- FPCA-1991-Holst #analysis
- Finiteness Analysis (CKH), pp. 473–495.
- FPCA-1991-Jensen #analysis #logic #strict
- Strictness Analysis in Logical Form (TPJ), pp. 352–366.
- CHI-1991-SiochiH #analysis #case study #evaluation #user interface #using
- A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
- CHI-1991-WhittakerBC #analysis #interactive #process
- Co-ordinating activity: an analysis of interaction in computer-supported co-operative work (SW, SEB, HHC), pp. 361–367.
- AdaEurope-1991-DelisT #ada #assessment #design #static analysis #using
- Design Assessment of Ada Systems Using Static Analysis (AD, WMT), pp. 227–250.
- KDD-1991-Piatetsky #analysis
- Discovery, Analysis, and Presentation of Strong Rules (GPS), pp. 229–248.
- KDD-1991-Ziarko #analysis #database #dependence #representation
- The Discovery, Analysis, and Representation of Data Dependencies in Databases (WZ), pp. 195–212.
- ML-1991-BiswasWYK #clustering #concept #data analysis
- Conceptual Clustering and Exploratory Data Analysis (GB, JBW, QY, GRK), pp. 591–595.
- SIGIR-1991-Swanson #analysis
- Analysis of Unintended Connections Between Disjoint Science Literatures (DRS), pp. 280–289.
- SIGIR-1991-WendlandtD #analysis #documentation #retrieval #semantics
- Incorporating a Semantic Analysis into a Document Retrieval Strategy (EBW, JRD), pp. 270–279.
- ECOOP-1991-Champeaux #analysis #development #object-oriented #top-down
- Object-Oriented Analysis and Top-Down Software Development (DdC), pp. 360–376.
- OOPSLA-1991-HayesC #analysis #modelling #object-oriented
- Coherent Models for Object-Oriented Analysis (FH, DC), pp. 171–183.
- TOOLS-USA-1991-Henderson-Sellers #analysis #design
- Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
- TOOLS-USA-1991-Murphy #analysis #case study #experience #object-oriented
- Experiences in Applying Object-Oriented Analysis (GCM), pp. 249–264.
- TOOLS-USA-1991-Nerson #analysis #design
- Analysis and Design Methodologies (JMN), pp. 375–376.
- TOOLS-USA-1991-Nerson91a #analysis #design #eiffel #towards
- Associated Paper: Extending Eiffel Toward O-O Analysis and Design (JMN), pp. 377–392.
- POPL-1991-AbramskyJ #analysis #approach #higher-order #polymorphism #relational #strict
- A Relational Approach to Strictness Analysis for Higher-Order Polymorphic Functions (SA, TPJ), pp. 49–54.
- POPL-1991-SekarMR #abstract interpretation #analysis #on the #strict
- On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation (RCS, PM, IVR), pp. 37–48.
- ESEC-1991-RozmanGD #analysis #metric #source code
- Relation Between Source Code Metrics and Structure Analysis Metrics (IR, JG, TD), pp. 332–342.
- ESEC-1991-SelbyM #analysis #classification #metric
- Metric-Driven Classification Analysis (RWS, RKM), pp. 290–307.
- ICSE-1991-GorlickR #analysis #using
- Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
- ICSE-1991-SelbyPSB #analysis #development #empirical #feedback #metric
- Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development (RWS, AAP, DCS, JB), pp. 288–298.
- ASPLOS-1991-CmelikKDK #analysis #benchmark #metric #set #specification
- An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
- CAV-1991-AvruninBC #analysis #concurrent #integer #programming
- Integer Programming in the Analysis of Concurrent Systems (GSA, UAB, JCC), pp. 92–102.
- ICLP-1991-CharlierMH #abstract interpretation #algorithm #analysis #complexity
- A Generic Abstract Interpretation Algorithm and its Complexity Analysis (BLC, KM, PVH), pp. 64–78.
- ICLP-1991-CodishDY #algorithm #alias #analysis #safety #unification
- Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
- ICLP-1991-CodishFM #analysis #concurrent #logic programming #source code
- Suspension Analysis for Concurrent Logic Programs (MC, MF, KM), pp. 331–345.
- ICLP-1991-DebrayL #analysis #automation #complexity #logic programming #source code
- Automatic Complexity Analysis of Logic Programs (SKD, NWL), pp. 599–613.
- ISLP-1991-FosterW #analysis #reuse
- Copy Avoidance through Compile-Time Analysis and Local Reuse (ITF, WHW), pp. 455–469.
- LICS-1991-CortesiFW #abstract domain #analysis
- Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis (AC, GF, WHW), pp. 322–327.
- TAV-1991-DuesterwaldS #analysis #concurrent #data flow #framework #using
- Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
- TAV-1991-LongC #analysis #concurrent #data flow
- Data Flow Analysis of Concurrent Systems that Use the Rendezvous Model of Synchronization (DLL, LAC), pp. 21–35.
- TAV-1991-OstrandW #analysis #data flow #pointer #test coverage #testing
- Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
- TAV-1991-YehY #algebra #analysis #composition #process #reachability #using
- Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
- DAC-1990-KuoLW #analysis #fault
- A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
- DAC-1990-McCormickA #analysis
- Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
- DAC-1990-McGeerB #analysis #network
- Timing Analysis in Precharge/Unate Networks (PCM, RKB), pp. 124–129.
- DAC-1990-SakallahMO #analysis #design
- Analysis and Design of Latch-Controlled Synchronous Digital Circuits (KAS, TNM, KO), pp. 111–117.
- PODS-1990-JohnsonS #algorithm #analysis #concurrent #framework #performance
- A Framework for the Performance Analysis of Concurrent B-tree Algorithms (TJ, DS), pp. 273–287.
- VLDB-1990-MuntzL #analysis #array #performance
- Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
- ESOP-1990-GoldbergP #analysis #functional #higher-order #implementation #optimisation #stack
- Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations (BG, YGP), pp. 152–160.
- ESOP-1990-JensenM #analysis #garbage collection
- A Backwards Analysis for Compile-time Garbage Collection (TPJ, TÆM), pp. 227–239.
- ESOP-1990-JourdanP #analysis
- Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
- ESOP-1990-Sands #analysis #complexity #higher-order #lazy evaluation
- Complexity Analysis for a Lazy Higher-Order Language (DS), pp. 361–376.
- PLDI-1990-ChambersU #analysis #dynamic typing #object-oriented #optimisation #source code
- Iterative Type Analysis and Extended Message Splitting: Optimizing Dynamically-Typed Object-Oriented Programs (CC, DU), pp. 150–164.
- PLDI-1990-ChaseWZ #analysis #pointer
- Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
- PLDI-1990-DebrayLH #analysis #logic programming #source code
- Task Granularity Analysis in Logic Programs (SKD, NWL, MVH), pp. 174–188.
- STOC-1990-SchmidtS #analysis
- The Analysis of Closed Hashing under Limited Randomness (Extended Abstract) (JPS, AS), pp. 224–234.
- Best-of-PLDI-1990-ChaseWZ90a #analysis #pointer
- Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
- LFP-1990-Burn #analysis #using
- Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
- LFP-1990-Consel #analysis #functional #higher-order
- Binding Time Analysis for High Order Untyped Functional Languages (CC), pp. 264–272.
- LFP-1990-DraghicescuP #analysis #composition
- A Compositional Analysis of Evaluation-Order and Its Application (MD, SP), pp. 242–250.
- CHI-1990-Campbell #analysis #programming #smalltalk
- Developmental scenario analysis of Smalltalk programming (RLC), pp. 269–276.
- CHI-1990-GeorgeVN #analysis #implementation #process
- The organizational implementation of an electronic meeting system: an analysis of the innovation process (JFG, JSV, JFNJ), pp. 361–368.
- CHI-1990-HowesP #analysis #learning #semantics
- Semantic analysis during exploratory learning (AH, SJP), pp. 399–406.
- CHI-1990-SmithBG #data analysis #generative
- Stereophonic and surface sound generation for exploratory data analysis (SS, RDB, GGG), pp. 125–132.
- CHI-1990-YoungW #analysis #concept #fault #predict #using
- Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
- ML-1990-AndersonM #analysis #categorisation
- A Rational Analysis of Categorization (JRA, MM), pp. 76–84.
- ML-1990-ChanW #analysis #induction #learning #performance #probability
- Performance Analysis of a Probabilistic Inductive Learning System (KCCC, AKCW), pp. 16–23.
- ML-1990-Cohen #analysis #concept #learning #representation
- An Analysis of Representation Shift in Concept Learning (WWC), pp. 104–112.
- ML-1990-PazzaniS #algorithm #analysis #learning
- Average Case Analysis of Conjunctive Learning Algorithms (MJP, WS), pp. 339–347.
- SIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using
- Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
- PLILP-1990-BoeckC #analysis #correctness #prolog #static typing
- Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
- PLILP-1990-SagivFRW #analysis #approach #data flow #problem
- A Logic-Based Approach to Data Flow Analysis Problem (SS, NF, MR, RW), pp. 277–292.
- POPL-1990-Burn #abstract interpretation #analysis
- A Relationship Between Abstract Interpretation and Projection Analysis (GLB), pp. 151–156.
- POPL-1990-Field #analysis #lazy evaluation #on the #specification #tool support
- On Laziness and Optimality in λ Interpreters: Tools for Specification and Analysis (JF), pp. 1–15.
- POPL-1990-MarloweR #algorithm #analysis #data flow #hybrid #incremental #performance
- An Efficient Hybrid Algorithm for Incremental Data Flow Analysis (TJM, BGR), pp. 184–196.
- POPL-1990-SekarPR #analysis #performance #strict
- Small Domains Spell Fast Strictness Analysis (RCS, SP, IVR), pp. 169–183.
- PPoPP-1990-CallahanKS #analysis #parallel #programming
- Analysis of Event Synchronization in A Parallel Programming Tool (DC, KK, JS), pp. 21–30.
- PPoPP-1990-Nicol #analysis #parallel
- Analysis of Synchronization in Massively Parallel Discrete-Event Sumulations (DMN), pp. 89–98.
- CAV-1990-BerthelotJP #analysis #named #petri net
- PAPETRI: Environment for the Analysis of Petri Nets (GB, CJ, LP), pp. 13–22.
- CAV-1990-Ness #analysis
- Issues Arising in the Analysis of L.0 (LAN), pp. 106–115.
- CLP-1990-MulkersWB90 #analysis #data type
- Analysis of Shared Data Structures for Compile-Time Garbage (AM, WHW, MB), pp. 747–762.
- NACLP-1990-MarriottS #analysis #constraints #logic programming #source code
- Analysis of Constraint Logic Programs (KM, HS), pp. 531–547.
- NACLP-1990-Pereira #analysis #prolog
- Prolog and Natural-Language Analysis: Into the Third Decade (FCNP), pp. 813–832.
- NACLP-1990-RoyD #analysis #compilation #data flow #optimisation #prolog
- The Benefits of Global Dataflow Analysis for an Optimizing Prolog Compiler (PVR, AMD), pp. 501–515.
- DAC-1989-BolsensRCM #analysis #behaviour #debugging #logic
- Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
- DAC-1989-Coppola #algorithm #analysis #logic
- New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
- DAC-1989-DuYG #analysis #on the #problem
- On the General False Path Problem in Timing Analysis (DHCD, SHY, SG), pp. 555–560.
- DAC-1989-PerremansCM #analysis
- Static Timing Analysis of Dynamically Sensitizable Paths (SP, LJMC, HDM), pp. 568–573.
- DAC-1989-PillageHR #analysis #evaluation #named
- AWEsim: Asymptotic Waveform Evaluation for Timing Analysis (LTP, XH, RAR), pp. 634–637.
- DAC-1989-WeinerS #analysis #logic #synthesis
- Timing Analysis in a Logic Synthesis Environment (NW, ALSV), pp. 655–661.
- DAC-1989-YenDG #algorithm #analysis #performance
- Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
- PLDI-1989-HorwitzPR #analysis #dependence #pointer
- Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
- PLDI-1989-Venkatesh #evaluation #framework #program analysis #specification
- A Framework for Construction and Evaluation of High-Level Specifications for Program Analysis Techniques (GAV), pp. 1–12.
- STOC-1989-Motwani #algorithm #analysis #graph #problem
- Expanding Graphs and the Average-case Analysis of Algorithms for Matchings and Related Problems (RM), pp. 550–561.
- ICALP-1989-Kenyon-MathieuV #analysis #data type
- General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (Extended Abstract) (CKM, JSV), pp. 473–487.
- ICALP-1989-LouchardRS #algorithm #analysis #probability
- Dynamic Algorithms in D. E. Knuth’s Model: A Probabilistic Analysis (GL, BR, RS), pp. 521–533.
- FPCA-1989-BjernerH #analysis #approach #composition #first-order #functional #lazy evaluation #source code
- A Composition Approach to Time Analysis of First Order Lazy Functional Programs (BB, SH), pp. 157–165.
- FPCA-1989-Bloss #analysis #functional #implementation #performance
- Update Analysis and the Efficient Implementation of Functional Aggregates (AGB), pp. 26–38.
- FPCA-1989-JonesM #analysis #garbage collection
- Computer-Time Garbage Collection by Sharing Analysis (SBJ, DLM), pp. 54–74.
- FPCA-1989-KuoM #analysis #strict #type inference
- Strictness Analysis: A New Perspective Based on Type Inference (TMK, PM), pp. 260–272.
- FPCA-1989-Rosendahl #analysis #automation #complexity
- Automatic Complexity Analysis (MR), pp. 144–156.
- CHI-1989-EganRLLG #analysis #behaviour #evaluation #hypermedia
- Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
- CAiSE-1989-HakkarainenIO #analysis #embedded #knowledge-based
- A Knowledge-Based Support System for Embedded Computer Software Analysis (KH, TI, MO).
- CAiSE-1989-HernbackL #analysis #automation #classification #framework #implementation #tool support
- A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
- KR-1989-Nebel #analysis
- A Knowledge Level Analysis of Belief Revision (BN), pp. 301–311.
- ML-1989-Greiner #analysis #formal method #towards
- Towards a Formal Analysis of EBL (RG), pp. 450–453.
- ML-1989-Hsu #analysis
- A Knowledge-Level Analysis of Informing (JYjH), pp. 485–488.
- ML-1989-Schaffer #data analysis
- Bacon, Data Analysis and Artificial Intelligence (CS), pp. 174–179.
- ML-1989-Shavlik #analysis #empirical #learning
- An Empirical Analysis of EBL Approaches for Learning Plan Schemata (JWS), pp. 183–187.
- SEKE-1989-TsaiYLCH #analysis #specification
- Knowledge-oriented Specification Analysis and Transformation (STT, CCY, CCL, STC, CHH), pp. 110–115.
- SIGIR-1989-Pejtersen #analysis #information retrieval #interface #library
- A Library System for Information Retrieval Based on a Cognitive Task Analysis and Supported by an Icon-Based Interface (AMP), pp. 40–47.
- SIGIR-1989-SaltonS #analysis #automation #on the
- On the Application of Syntactic Methodologies in Automatic Text Analysis (GS, MS), pp. 137–150.
- POPL-1989-CooperK #alias #analysis #interprocedural #performance
- Fast Interprocedural Alias Analysis (KDC, KK), pp. 49–59.
- POPL-1989-SagivEFR #analysis #attribute grammar #data flow
- Resolving Circularity in Attribute Grammars with Applications to Data Flow Analysis (SS, OE, NF, MR), pp. 36–48.
- ESEC-1989-FranceD #analysis #specification #using
- Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
- ESEC-1989-Ince #analysis #data flow #design #empirical #metric
- Martin J. Shepperd: An Empirical and Theoretical Analysis of an Information Flow-Based System Design Metric (DCI), pp. 86–99.
- ESEC-1989-ManfrediOT #analysis #approach #object-oriented
- An Object-oriented Approach to the System Analysis (FM, GO, PT), pp. 395–410.
- ESEC-1989-Shutt #development #program analysis #specification #tool support #using
- A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
- ICSE-1989-BendifallahS #analysis #empirical #specification
- Work Structures and Shifts: An Empirical Analysis of Software Specification Teamwork (SB, WS), pp. 260–270.
- ICSE-1989-Hsieh #analysis #concurrent #source code
- Timing Analysis of Cyclic Concurrent Programs (CSH), pp. 312–318.
- ICSE-1989-LongC #analysis #concurrent #graph #interactive
- Task Interaction Graphs for Concurrency Analysis (DLL, LAC), pp. 44–52.
- ICSE-1989-VernerTJH #analysis #bibliography #case study #dependence #perspective
- Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
- ICSE-1989-Yue #composition #dynamic analysis #functional #requirements #validation
- Validating System Requirements by Functional Decomposition and Dynamic Analysis (KY), pp. 188–196.
- ASPLOS-1989-AdamsZ #analysis #set #source code
- An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
- ASPLOS-1989-WeberG #analysis #multi
- Analysis of Cache Invalidation Patterns in Multiprocessors (WDW, AG), pp. 243–256.
- SOSP-1989-Duchamp #analysis #performance #transaction
- Analysis of Transaction Management Performance (DD), pp. 177–190.
- NACLP-1989-Mudambi #analysis #multi #performance
- Performance Analysis of Aurora on a Switch-Based Multiprocessor (SM), pp. 697–712.
- NACLP-1989-Szeredi #analysis #performance #prolog
- Performance Analysis of the Aurora Or-Parallel Prolog System (PS), pp. 713–732.
- NACLP-1989-Winsborough #analysis #multi #reachability
- Path-Dependent Reachability Analysis for Multiple Specialization (WHW), pp. 133–153.
- TAV-1989-AvruninWD #analysis #automation #concurrent
- Experiments in Automated Analysis of Concurrent Software Systems (GSA, JCW, LKD), pp. 124–130.
- TAV-1989-KotikM #analysis #automation #program transformation #testing #using
- Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
- TAV-1989-YoungTFB #analysis #concurrent #development
- Integrated Concurrency Analysis in a Software Development Enviornment (MY, RNT, KF, DB), pp. 200–209.
- DAC-1988-BeattyB #analysis #incremental #performance #using
- Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
- DAC-1988-BurchNYH #analysis #estimation #independence #reliability
- Pattern-Independent Current Estimation for Reliability Analysis of CMOS Circuits (RB, FNN, PY, DEH), pp. 294–299.
- DAC-1988-ChiangNL #algorithm #analysis #performance
- Time Efficient VLSI Artwork Analysis Algorithms in GOALIE2 (KWC, SN, CYL), pp. 471–475.
- DAC-1988-Cirit #analysis #random #testing
- Switch Level Random Pattern Testability Analysis (MAC), pp. 587–590.
- DAC-1988-Sherman #algorithm #analysis #generative
- Algorithms for Timing Requirement Analysis and Generation (SKS), pp. 724–727.
- DAC-1988-YenGD #algorithm #analysis
- A Path Selection Algorithm for Timing Analysis (HCY, SG, DHCD), pp. 720–723.
- PODS-1988-RamakrishnaM #analysis #bound
- Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
- SIGMOD-1988-ChristodoulakisF #analysis #performance
- Performance Analysis and Fundamental Performance Trade Offs for CLV Optical Disks (SC, DAF), pp. 286–294.
- SIGMOD-1988-DeWittGS #analysis #database #performance
- A Performance Analysis of the Gamma Database Machine (DJD, SG, DAS), pp. 350–360.
- SIGMOD-1988-Hanson #analysis #database #performance #query
- Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
- SIGMOD-1988-Ramakrishna #analysis
- Hashing in Practive, Analysis of Hashing and Universal Hashing (MVR), pp. 191–199.
- VLDB-1988-Bhide #analysis #architecture #transaction
- An Analysis of Three Transaction Processing Architectures (AB), pp. 339–350.
- SEI-1988-LaviW #analysis #embedded #industrial #requirements #specification
- Embedded Computer Systems. Requirements Analysis & Specification — An Industrial Course (JZL, MW), pp. 81–105.
- ESOP-1988-Takayama #analysis #compilation #named #proving
- QPC: QJ-based Proof Compiler — Simple Examples and Analysis (YT), pp. 49–63.
- PLDI-1988-BallanceBG #abstraction #analysis #editing #incremental #syntax
- Grammatical Abstraction and Incremental Syntax Analysis in a Language-Based Editor (RAB, JB, SLG), pp. 185–198.
- PLDI-1988-Callahan #analysis #data flow #graph #interprocedural #summary
- The Program Summary Graph and Flow-Sensitive Interprocedural Data Flow Analysis (DC), pp. 47–56.
- PLDI-1988-CooperK #analysis #interprocedural #linear
- Interprocedural Side-Effect Analysis in Linear Time (KDC, KK), pp. 57–66.
- PLDI-1988-JainT #analysis #approach #data flow #multi #performance
- An Efficient Approach to Data Flow Analysis in a Multi Pass Global Optimizer (SJ, CLT), pp. 154–163.
- PLDI-1988-SeshadriWJWYS #analysis #compilation #concurrent #semantics
- Semantic Analysis in a Concurrent Compiler (VS, DBW, MDJ, SW, CPY, IS), pp. 233–240.
- PLDI-1988-Shivers #analysis #control flow
- Control-Flow Analysis in Scheme (OS), pp. 164–174.
- STOC-1988-HalpernMT #analysis #knowledge-based
- A Knowledge-Based Analysis of Zero Knowledge (Preliminary Report) (JYH, YM, MRT), pp. 132–147.
- STOC-1988-LuekerM #analysis
- More Analysis of Double Hashing (GSL, MM), pp. 354–359.
- STOC-1988-PapadimitriouY88b #algorithm #analysis #architecture #independence #parallel #towards
- Towards an Architecture-Independent Analysis of Parallel Algorithms (Extended Abstract) (CHP, MY), pp. 510–513.
- Best-of-PLDI-1988-CooperK88a #analysis #interprocedural #linear
- Interprocedural side-effect analysis in linear time (with retrospective) (KDC, KK), pp. 217–228.
- Best-of-PLDI-1988-Shivers88a #analysis #control flow #higher-order #lessons learnt
- Higher-order control-flow analysis in retrospect: lessons learned, lessons abandoned (with retrospective) (OS), pp. 257–269.
- ICALP-1988-AlbertF #algorithm #analysis #complexity #multi
- Average Case Complexity Analysis of the Rete Multi-Pattern Match Algorithm (LA, FF), pp. 18–37.
- ICALP-1988-LengauerW #analysis #graph #performance
- Efficient Analysis of Graph Properties on Context-free Graph Languages (Extended Abstract) (TL, EW), pp. 379–393.
- CSCW-1988-Greenbaum #analysis
- In Search of Cooperation: An Historical Analysis of Work Organization and Management Strategies (JG), pp. 102–114.
- SIGIR-1988-BollmannR #analysis
- A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
- OOPSLA-1988-Alabiso #analysis #data flow #design #modelling #object-oriented
- Transformation of Data Flow Analysis Models to Object-Oriented Design (BA), pp. 335–354.
- PLILP-1988-Lindstrom #functional #logic #source code #static analysis
- Static Analysis Of Functional Programs With Logic Variables (GL), pp. 1–19.
- POPL-1988-CarrollR #analysis #data flow #incremental
- Incremental Data Flow Analysis via Dominator and Attribute Updates (MDC, BGR), pp. 274–284.
- POPL-1988-Debray #analysis #data flow #logic programming #performance #source code
- Efficient Dataflow Analysis of Logic Programs (SKD), pp. 260–273.
- POPL-1988-MontenyohlW #analysis #continuation #semantics
- Correct Flow Analysis in Continuation Semantics (MM, MW), pp. 204–218.
- POPL-1988-NielsonN #analysis #automation #λ-calculus
- Automatic Binding Time Analysis for a Typed λ-Calculus (HRN, FN), pp. 98–106.
- POPL-1988-RuggieriM #analysis
- Lifetime Analysis of Dynamically Allocated Objects (CR, TPM), pp. 285–293.
- POPL-1988-Wadler #analysis #strict
- Strictness Analysis Aids Time Analysis (PW), pp. 119–132.
- ICSE-1988-ChaLS #analysis #fault #safety #using #verification
- Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
- ICSE-1988-Hagemann #analysis #automation #realtime #requirements
- Requirements Analysis for Real-Time Automation Projects (MH), pp. 122–129.
- ICSE-1988-Narayanaswamy #evolution #framework #lisp #static analysis
- Static Analysis-Based Program Evolution Support in the Common Lisp Framework (KN), pp. 222–230.
- PPEALS-1988-LiY #analysis #interprocedural #parallel #performance
- Efficient Interprocedural Analysis for Program Parallelization and Restructuring (ZL, PCY), pp. 85–99.
- JICSCP-1988-Debray88 #logic programming #parallel #source code #static analysis
- Static Analysis of Parallel Logic Programs (SKD), pp. 711–732.
- JICSCP-1988-Docker88 #analysis #implementation #named #prolog
- SAME — A Structured Analysis Tool and its Implementation in Prolog (TWGD), pp. 82–95.
- JICSCP-1988-GorlickK88 #analysis #logic programming #named #performance #source code
- Gauge: A Workbench for the Performance Analysis of Logic Programs (MMG, CK), pp. 548–561.
- JICSCP-1988-HuynhL88 #analysis
- A CLP(R) Options Trading Analysis System (TH, CL), pp. 59–69.
- JICSCP-1988-WarrenHD88 #analysis #logic programming #on the #source code
- On the Practicality of Global Flow Analysis of Logic Programs (RW, MVH, SKD), pp. 684–699.
- DAC-1987-KoukaS #data analysis #design
- An Application of Exploratory Data Analysis Techniques to Floorplan Design (EFMK, GS), pp. 654–658.
- DAC-1987-Parks #analysis #design #named #tutorial
- Tutorial: Reading and Reviewing the Common Schema for Electrical Design and Analysis (CHP), pp. 479–483.
- PODS-1987-Hadzilacos #analysis #protocol
- A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
- PODS-1987-Marchetti-SpaccamelaPS #analysis #complexity #implementation #logic #query #worst-case
- Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
- SIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
- Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
- SIGMOD-1987-Hanson #analysis #performance
- A Performance Analysis of View Materialization Strategies (ENH), pp. 440–453.
- SIGMOD-1987-NelsonS #analysis #data type
- A Population Analysis for Hierarchical Data Structures (RCN, HS), pp. 270–277.
- VLDB-1987-DiasIRY #analysis #design
- Design and Analysis of Integrated Concurrency-Coherence Controls (DMD, BRI, JTR, PSY), pp. 463–471.
- PLDI-1987-OffuttK #analysis #fortran #interpreter #mutation testing
- A Fortran 77 interpreter for mutation analysis (AJO, KNK), pp. 177–188.
- STOC-1987-Bach #algorithm #analysis #random
- Realistic Analysis of Some Randomized Algorithms (EB), pp. 453–461.
- STOC-1987-HastadLR #analysis #multi #protocol
- Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) (JH, FTL, BR), pp. 241–253.
- ICALP-1987-Dybjer #analysis #image
- Inverse Image Analysis (PD), pp. 21–30.
- FPCA-1987-WadlerH #analysis #strict
- Projections for strictness analysis (PW, RJMH), pp. 385–407.
- HCI-CE-1987-LuekePB #analysis #protocol #requirements
- User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
- HCI-SES-1987-Malt #analysis #approach #human-computer #interface
- Skills Analysis in Human-Computer Interface: A Holistic Approach (LGM), pp. 319–326.
- HCI-SES-1987-Saito #analysis #evaluation #eye tracking
- Quantitative Evaluation of VDT Operations Through the Analysis of Spatio-Temporal Characteristics of Eye Movement (SS), pp. 197–202.
- SIGIR-1987-Harman #analysis #online
- A Failure Analysis on the Limitations of Suffixing in an Online Environment (DH), pp. 102–107.
- SIGIR-1987-SmithWF #analysis #named #retrieval
- MICROARRAS: An Advanced Full-Text Retrieval and Analysis System (JBS, SFW, GJF), pp. 187–195.
- OOPSLA-1987-KerrP #analysis #object-oriented #programming
- Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
- POPL-1987-KuoM #analysis #on the #strict
- On Strictness and its Analysis (TMK, PM), pp. 144–155.
- POPL-1987-Nielson #abstract interpretation #analysis #strict
- Strictness Analysis and Denotational Abstract Interpretation (FN), pp. 120–131.
- ESEC-1987-RobinsonE #analysis #database #requirements
- Requirements Analysis for a Database Administration Support Environment (HMR, JME), pp. 377–386.
- SLP-1987-Debray87 #analysis #logic programming #source code
- Flow Analysis of a Simple Class of Dynamic Logic Programs (SKD), pp. 307–316.
- SLP-1987-MannilaU87 #analysis #prolog #source code
- Flow Analysis of Prolog Programs (HM, EU), pp. 205–214.
- DAC-1986-BarzilaiBHIS #analysis #fault #named #performance #verification
- SLS — a fast switch level simulator for verification and fault coverage analysis (ZB, DKB, LMH, VSI, GMS), pp. 164–170.
- DAC-1986-Hartoog #analysis #layout #standard
- Analysis of placement procedures for VLSI standard cell layout (MRH), pp. 314–319.
- DAC-1986-JacobNP #analysis #empirical #multi #performance
- An empirical analysis of the performance of a multiprocessor-based circuit simulator (GKJ, ARN, DOP), pp. 588–593.
- DAC-1986-Larsen #analysis #clustering #data type #synthesis
- Rules-based object clustering: a data structure for symbolic VLSI synthesis and analysis (RPL), pp. 768–777.
- DAC-1986-ToyoshimaTMHHKT #analysis #design #effectiveness #scalability
- An effective delay analysis system for a large scale computer design (RT, YT, KM, HH, MH, RK, KT), pp. 398–403.
- DAC-1986-VidigalND #analysis #integration #named #network
- CINNAMON: coupled integration and nodal analysis of MOS networks (LMV, SRN, SWD), pp. 179–185.
- ESOP-1986-KastensS #analysis #parametricity
- Lifetime Analysis for Procedure Parameters (UK, MS), pp. 53–69.
- STOC-1986-LeightonS #algorithm #analysis #bound #grid
- Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
- Best-of-PLDI-1986-BurkeC #analysis #dependence #interprocedural #parallel
- Interprocedural dependence analysis and parallelization (with retrospective) (MGB, RC), pp. 139–154.
- ICALP-1986-BrzozowskiS #analysis #network #simulation #summary
- Correspondence between Ternary Simulation and Binary Race Analysis in Gate Networks (Extended Summary) (JAB, CJHS), pp. 69–78.
- LFP-1986-BlossH #analysis #strict
- Variations on Strictness Analysis (AGB, PH), pp. 132–142.
- GG-1986-MoldovanP #analysis #graph grammar #parallel #rule-based #using
- Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
- CSCW-1986-ApplegateKN #analysis #generative #idea
- A group decision support system for idea generation and issue analysis in organization planning (LMA, BRK, JFN), pp. 16–34.
- CSCW-1986-BegemanCEGRS #analysis
- Project Nick: meetings augmentation and analysis (MLB, PC, CAE, MG, GLR, TS), pp. 1–6.
- SIGIR-1986-TruckenmullerR #analysis #design #perspective #topic
- Methodological Issues for the Design of an Office Information Server — Focal Topics for the Analysis from an Office System Perspective (TWT, MR), pp. 39–48.
- POPL-1986-Coutant #alias #analysis
- Retargetable High-Level Alias Analysis (DSC), pp. 110–118.
- POPL-1986-HudakY #analysis #higher-order #strict #λ-calculus
- Higher-Order Strictness Analysis in Untyped λ Calculus (PH, JY), pp. 97–109.
- POPL-1986-JonesM #analysis #data flow #graph #source code #using
- Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
- POPL-1986-SneltingH #algebra #analysis #incremental #semantics #unification
- Unification in Many-Sorted Algebras as a Device for Incremental Semantic Analysis (GS, WH), pp. 229–235.
- CADE-1986-Jager #analysis #logic
- Some Contributions to the Logical Analysis of Circumscrition (GJ), pp. 154–171.
- ICLP-1986-Matsumoto86 #analysis #natural language #parallel #parsing
- A Parallel Parsing System for Natural Language Analysis (YM), pp. 396–409.
- LICS-1986-Coquand #analysis
- An Analysis of Girard’s Paradox (TC), pp. 227–236.
- DAC-1985-Chan #analysis #development #multi #network
- Development of a timing analysis program for multiple clocked network (EC), pp. 816–819.
- DAC-1985-MuraokaIKMH #analysis #named
- ACTAS: an accurate timing analysis system for VLSI (MM, HI, HK, MM, KH), pp. 152–158.
- DAC-1985-PerryMP #analysis #modelling
- Yield analysis modeling (SP, MM, DJP), pp. 425–428.
- DAC-1985-PierroD #analysis #design #integration
- Mechanical design/analysis integration on Apollo workstations (JAP, GFD), pp. 96–101.
- DAC-1985-RoseBT #analysis #design #performance #probability #tool support
- Integrating stochastic performance analysis with system design tools (CWR, MB, YT), pp. 482–488.
- DAC-1985-SchefferS #abstraction #analysis
- Hierarchical analysis of IC artwork with user defined abstraction rules (LS, RS), pp. 293–298.
- DAC-1985-Tendolkar #analysis #fault #random
- Analysis of timing failures due to random AC defects in VLSI modules (NNT), pp. 709–714.
- DAC-1985-Wunderlich #analysis #named #probability #testing
- PROTEST: a tool for probabilistic testability analysis (HJW), pp. 204–211.
- SIGMOD-1985-DemoK #analysis #database #dependence
- Analysis of the Context Dependency of CODASYL Find-Statements with Application to Database Program Conversion (GBD, SK), pp. 354–361.
- SIGMOD-1985-KamelK #analysis
- A Model of Data Distribution Based on Texture Analysis (NK, RK), pp. 319–325.
- VLDB-1985-LausenSW #concurrent #policy
- Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
- ICALP-1985-KurtzM #algorithm #analysis #distributed #probability #set
- A Probabilistic Distributed Algorithm for Set Intersection and Its Analysis (Preliminary Version) (TGK, UM), pp. 356–362.
- FPCA-1985-ClackJ85 #analysis #approach #strict
- Strictness Analysis — A Practical Approach (CDC, SLPJ), pp. 35–49.
- FPCA-1985-PatelSE85 #algorithm #analysis #hardware #multi #named #specification #synthesis
- vFP: An Environment for the Multi-level Specification, Analysis, and Synthesis of Hardware Algorithms (DP, MDFS, MDE), pp. 238–255.
- ICSE-1985-GirgisW #analysis #data flow #testing #using
- An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
- ICSE-1985-StephensW #analysis #design
- The Analyst — A Workstation for Analysis and Design (MS, KW), pp. 364–371.
- SOSP-1985-OusterhoutCHKKT #analysis #file system
- A Trace-Driven Analysis of the UNIX 4.2 BSD File System (JKO, HDC, DH, JAK, MDK, JGT), pp. 15–24.
- SLP-1985-ChangD85 #analysis #backtracking #dependence #prolog
- Semi-Intelligent Backtracking of Prolog Based on Static Data Dependency Analysis (JHC, AMD), pp. 10–21.
- DAC-1984-GeusRRW #analysis #named
- IDA: Interconnect delay analysis for integrated circuits (AJdG, JBR, MR, GW), pp. 536–541.
- DAC-1984-JhonK #analysis #concurrent #data flow #design
- Deadlock analysis in the design of data-flow circuits (CSJ, RMK), pp. 705–707.
- VLDB-1984-BennR #analysis #image #relational #retrieval #sequence
- Retrieval of Relational Structures for Image Sequence Analysis (WB, BR), pp. 533–536.
- VLDB-1984-JooPM #data analysis #database #design #logic #named
- Datadict — A Data Analysis and Logical Database Design Tool (TTJ, TKP, GAM), pp. 71–77.
- SCC-1984-Koskimies #analysis #semantics #specification
- A specification language for one-pass semantic analysis (KK), pp. 179–189.
- SCC-1984-Zadeck #analysis #data flow #editing #incremental
- Incremental data flow analysis in a structured program editor (FKZ), pp. 132–143.
- STOC-1984-KarpLM #analysis #multi #probability #problem
- A Probabilistic Analysis of Multidimensional Bin Packing Problems (RMK, ML, AMS), pp. 289–298.
- ICALP-1984-KirschenhoferP #algorithm #analysis #recursion #traversal
- Recursion Depth Analysis for Special Tree Traversal Algorithms (PK, HP), pp. 303–311.
- ICALP-1984-Lagarias #analysis #performance
- Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
- SIGIR-1984-NiedermairTB #analysis #named #retrieval
- MARS: A Retrieval Tool on the Basis of Morphological Analysis (GTN, GT, IB), pp. 369–381.
- SIGIR-1984-Tolle #analysis #evaluation #information management #monitoring #transaction
- Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
- ICSE-1984-ToriiMSK #analysis #functional #logic #problem #programming
- Functional Programming and Logical Programming for the Telegram Analysis Problem (KT, YM, YS, TK), pp. 463–472.
- CADE-1984-Plaisted #analysis #dependence #graph #proving #theorem proving #using
- Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
- DAC-1983-Jouppi #analysis
- Timing analysis for nMOS VLSI (NPJ), pp. 411–418.
- DAC-1983-SzymanskiW #algorithm #analysis #performance
- Space efficient algorithms for VLSI artwork analysis (TGS, CJVW), pp. 734–739.
- DAC-1983-TamuraON #analysis #layout
- Path delay analysis for hierarchical building block layout system (ET, KO, TN), pp. 403–410.
- VLDB-1983-Demo #database #interface #navigation #program analysis #specification
- Program Analysis for Conversion from a Navigation to a Specification Database Interface (GBD), pp. 387–398.
- STOC-1983-Turner #algorithm #analysis #probability
- Probabilistic Analysis of Bandwidth Minimization Algorithms (JST), pp. 467–476.
- SIGIR-1983-BrooksB #analysis #design #information retrieval #interactive #using
- Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
- SIGIR-1983-Somers #analysis #file system #recommendation #user interface
- The User View of File Management: Recommendations for a User Interface Based in an Analysis of UNIX File System Use (PS), p. 161.
- SIGIR-1983-Tolle #analysis #online #transaction
- Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
- POPL-1983-Ryder #analysis #data flow #incremental
- Incremental Data Flow Analysis (BGR), pp. 167–176.
- DAC-1982-Agrawal #analysis
- Synchronous path analysis in MOS circuit simulator (VDA), pp. 629–635.
- DAC-1982-BeningLAS #analysis #logic #network
- Developments in logic network path delay analysis (LB, TAL, CRA, JES), pp. 605–615.
- DAC-1982-GoelM82a #analysis #interactive #testing
- An interactive testability analysis program — ITTAP (DKG, RMM), pp. 581–586.
- DAC-1982-Sr #analysis #verification
- Timing Verification and the Timing Analysis program (RBHS), pp. 594–604.
- SIGMOD-1982-BatesBD #analysis #database #framework #research #statistics
- A Framework for Research in Database Management for Statistical Analysis (DMB, HB, DJD), pp. 69–78.
- SIGMOD-1982-Cooper #analysis #commit #distributed #protocol
- Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
- SIGMOD-1982-Finkelstein #analysis #database
- Common Subexpression Analysis in Database Applications (SJF), pp. 235–245.
- POPL-1982-JonesM #analysis #approach #data flow #data type #flexibility #interprocedural #recursion #source code
- A Flexible Approach to Interprocedural Data Flow Analysis and Programs with Recursive Data Structures (NDJ, SSM), pp. 66–74.
- POPL-1982-Reps #analysis #editing #incremental #semantics
- Optimal-Time Incremental Semantic Analysis for Syntax-Directed Editors (TWR), pp. 169–176.
- ICSE-1982-Forman #analysis #composition #data flow
- Global Data Flow Analysis by Decomposition into Primes (IRF), pp. 386–392.
- ICSE-1982-RappsW #analysis #data flow #testing
- Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
- ASPLOS-1982-McDaniel #analysis #set #using
- An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
- ASPLOS-1982-SweetS #analysis #empirical #set
- Empirical Analysis of the Mesa Instruction Set (RES, JGSJ), pp. 158–166.
- DAC-1981-DewhirstH #analysis #design #modelling
- Application of volumetric modeling to mechanical design and analysis (DLD, RCH), pp. 171–178.
- DAC-1981-HaferP #analysis #design #formal method #logic #specification
- A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
- DAC-1981-McDermott #analysis #fault #random
- Random fault analysis (RMM), pp. 360–364.
- DAC-1981-Ruehli #analysis #bibliography #logic #modelling #scalability #simulation
- Survey of analysis, simulation and modeling for large scale logic circuits (AER), pp. 124–129.
- VLDB-1981-MenonH #analysis #design #relational
- Design and Analysis of a Relational Join Operation for VLSI (JM, DKH), pp. 44–55.
- VLDB-1981-MontgomeryR #analysis #data-driven #information management
- The Active Information System: A Data-Driven System for the Analysis of Imprecise Data (CAM, EHR), pp. 376–384.
- STOC-1981-GonnetM #analysis #linear
- A Linear Probing Sort and its Analysis (Preliminary Draft) (GHG, JIM), pp. 90–95.
- ICALP-1981-Jones #analysis
- Flow Analysis of λ Expressions (Preliminary Version) (NDJ), pp. 114–128.
- ICALP-1981-Schnorr #algorithm #analysis
- Refined Analysis and Improvements on Some Factoring Algorithms (CPS), pp. 1–15.
- ICALP-1981-Sharir #analysis #data flow #source code
- Data Flow Analysis of Applicative Programs (MS), pp. 98–113.
- SIGIR-1981-Carroll #analysis
- Content Analysis as a Word-Processing Option (JMC), pp. 126–131.
- ICSE-1981-BasiliW #analysis #documentation #evaluation #requirements
- Evaluation of a Software Requirements Document by Analysis of Change Data (VRB, DMW), pp. 314–324.
- ICSE-1981-ChenZ #analysis #clustering #re-engineering
- Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
- ICSE-1981-FutamuraKHT #analysis #development #diagrams #problem #source code
- Development of Computer Programs by Problem Analysis Diagram (PAD) (YF, TK, HH, MT), pp. 325–332.
- ICSE-1981-KomodaHKS #analysis #approach #modelling #requirements #using
- An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
- ICSE-1981-RichardsonC #analysis #reliability
- A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
- ICSE-1981-ZeilW #analysis #testing
- Sufficient Tset Sets for Path Analysis Testing Strategies (SJZ, LJW), pp. 184–194.
- DAC-1980-AbramoviciB #analysis #fault
- Fault diagnosis based on effect-cause analysis: An introduction (MA, MAB), pp. 69–76.
- DAC-1980-AltmanP #analysis #design
- The SLIDE simulator: A facility for the design and analysis of computer interconnections (AHA, ACP), pp. 148–155.
- DAC-1980-Goel #analysis #generative #testing
- Test generation costs analysis and projections (PG), pp. 77–84.
- DAC-1980-GoldsteinT #analysis #named
- SCOAP: Sandia controllability/observability analysis program (LHG, ELT), pp. 190–196.
- DAC-1980-LeinwandL #algebra #analysis #behaviour #nondeterminism
- Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
- DAC-1980-MitsuhashiCTY #analysis
- An integrated mask artwork analysis system (TM, TC, MT, KY), pp. 277–284.
- DAC-1980-Powell #analysis
- Justification and financial analysis for CAD (REP), pp. 564–571.
- DAC-1980-Yates #analysis #design #metric #process
- Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
- VLDB-1980-Badal #analysis #concurrent #database #distributed #performance
- The Analysis of the Effects of Concurrency Control on Distributed Database System Performance (DZB), pp. 376–383.
- VLDB-1980-EpsteinS #analysis #database #distributed
- Analysis of Distributed Data Base Processing Strategies (RSE, MS), pp. 92–101.
- ICALP-1980-CousotC #analysis #communication #csp #process #semantics
- Semantic Analysis of Communicating Sequential Processes (Shortened Version) (PC, RC), pp. 119–133.
- ICALP-1980-FlajoletS #algorithm #analysis #on the
- On the Analysis of Tree-Matching Algorithms (PF, JMS), pp. 208–219.
- ICALP-1980-PapadimitriouB #analysis #nearest neighbour #worst-case
- A Worst-Case Analysis of Nearest Neighbor Searching by Projection (CHP, JLB), pp. 470–482.
- SIGIR-1980-KracsonyKM #analysis #comparative #hardware
- Comparative Analysis of Hardware Versus Software Text Search (PK, GJK, AM), pp. 268–279.
- POPL-1980-Kfoury #analysis #set #source code
- Analysis of Simple Programs Over Different Sets of Primitives (AJK), pp. 56–61.
- POPL-1980-Suzuki #analysis #pointer
- Analysis of Pointer Rotation (NS), pp. 1–11.
- POPL-1980-Weihl #analysis #data flow #interprocedural #pointer
- Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
- CADE-1980-Bruynooghe #analysis #behaviour #dependence #logic programming #source code
- Analysis of Dependencies to Improve the Behaviour of Logic Programs (MB), pp. 293–305.
- DAC-1979-LoslebenT #analysis
- Topological analysis for VLSI circuits (PL, KT), pp. 461–473.
- SIGMOD-1979-BadalP #analysis #performance #semantics #validation
- Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
- SIGMOD-1979-HawthornS #analysis #database #performance #relational
- Performance Analysis of a Relational Data Base Management System (PBH, MS), pp. 1–12.
- SIGMOD-1979-YuLSO #analysis #performance #problem
- Performance Analysis of three Related Assignment Problems (CTY, KL, MKS, ZMÖ), pp. 82–92.
- ICALP-1979-Karp #algorithm #analysis #graph #probability
- Recent Advances in the Probabilistic Analysis of Graph-Theoretic Algorithms (Abstract) (RMK), pp. 338–339.
- SIGIR-1979-DominickP #analysis #automation #evaluation #information management #monitoring
- Automated Monitoring to Support the Analysis and Evaluation of Information Systems (WDD, WDP), pp. 2–9.
- POPL-1979-CousotC #design #framework #program analysis
- Systematic Design of Program Analysis Frameworks (PC, RC), pp. 269–282.
- POPL-1979-JonesM #analysis #optimisation
- Flow Analysis and Optimization of Lisp-Like Structures (NDJ, SSM), pp. 244–256.
- POPL-1979-Reif #analysis #communication #data flow #process
- Data Flow Analysis of Communicating Processes (JHR), pp. 257–268.
- ICSE-1979-AbeSA #analysis
- An Analysis of Software Project Failure (JA, KS, HA), pp. 378–385.
- ICSE-1979-Cohen #source code
- Computer-Aided Micro-Analysis of Programs (JC), pp. 79–84.
- ICSE-1979-Ploedereder #program analysis #verification
- Pragmatic Techniques for Program Analysis and Verification (EP), pp. 63–72.
- SOSP-1979-KumarG #analysis #distributed #modelling
- Modelling and Analysis of Distributed Software Systems (BK, TAG), pp. 2–8.
- DAC-1978-Gianfagna #approach #data analysis #testing
- A unified approach to test data analysis (MAG), pp. 117–124.
- DAC-1978-ShahY #cost analysis #design
- A practical technique for benefit-cost analysis of Computer-Aided Design and Drafting Systems (RRS, GYY).
- DAC-1978-Weste #analysis #design
- A color graphics system for I.C. mask design and analysis (NW), pp. 199–205.
- DAC-1978-Willis #analysis #automation #design #named
- DAS: An automated system to support design analysis (RRW), pp. 359–365.
- DAC-1978-Wold #analysis #design #performance #verification
- Design verification and performance analysis (MAW), pp. 264–270.
- SIGMOD-1978-NationsS #program analysis #sequence
- Some DML Instruction Sequences for Application Program Analysis and Conversion (JN, SYWS), pp. 120–131.
- VLDB-1978-Ashany #analysis #classification #database #matrix #retrieval #scalability
- Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
- VLDB-1978-Mason #analysis #architecture
- A DBMS Architecture to Support Information Analysis (Abstract) (PJM), p. 332.
- VLDB-1978-NakamuraM #analysis
- An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
- STOC-1978-Baudet #algorithm #analysis
- An Analysis of the Full αβ Pruning Algorithm (GMB), pp. 296–313.
- GG-1978-RosendahlM #analysis #reduction #source code
- Analysis of Programs by Reduction of Their Structure (MR, KPM), pp. 409–417.
- GG-1978-Wileden #analysis #concurrent #design #graph grammar
- Relationships Between Graph Grammars and the Design and Analysis of Concurrent Software (JCW), pp. 456–463.
- SIGIR-1978-Hill #analysis #database
- Analysis of An Inverted Data Base Structure (EHJ), pp. 37–64.
- POPL-1978-Reif #analysis #linear #programming
- Symbolic Programming Analysis in Almost Linear Time (JHR), pp. 76–83.
- POPL-1978-Rosen #agile #analysis #data flow #monad
- Monoids for Rapid Data Flow Analysis (BKR), pp. 47–59.
- ICSE-1978-BrowneJ #generative #named #performance #program analysis
- FAST: A Second Generation Program Analysis System (JCB, DBJ), pp. 142–148.
- ICSE-1978-HerndonK #analysis #fault #validation
- Analysis of Error Remediation Expenditures During Validation (MAH, APK), pp. 202–206.
- ICSE-1978-McClure #analysis #complexity
- A Model for Program Complexity Analysis (CLM), pp. 149–157.
- ICSE-1978-Willis #analysis #automation #design #named
- DAS: An Automated System to Support Design Analysis (RRW), pp. 109–115.
- DAC-1977-Baird #algorithm #analysis #performance
- Fast algorithms for LSI artwork analysis (HSB), pp. 303–311.
- DAC-1977-Domaszewicz #analysis
- Flight test analysis of missile control systems (MD), pp. 101–108.
- SIGMOD-1977-Merrett #approach #cost analysis #database #top-down
- Database Cost Analysis: a Top-Down Approach (THM), pp. 135–143.
- SIGMOD-1977-SuL #database #program analysis #semantics
- A Methodology of Application Program Analysis and Conversion Based on Database Semantics (SYWS, BJL), pp. 75–87.
- VLDB-1977-HultenS #analysis #database #performance #scalability #simulation
- A Simulation Model for Performance Analysis of Large Shared Data Bases (CH, LS), pp. 524–532.
- VLDB-1977-Navathe #analysis #database
- Schema Analysis for Database Restructuring (SBN), p. 326.
- STOC-1977-GonnetM #analysis
- The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
- POPL-1977-Barth #algorithm #analysis #data flow #interprocedural
- An Interprocedural Data Flow Analysis Algorithm (JMB), pp. 119–131.
- POPL-1977-CousotC #abstract interpretation #approximate #fixpoint #source code #static analysis
- Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints (PC, RC), pp. 238–252.
- POPL-1977-KennedyZ #analysis #control flow #graph grammar
- Applications of Graph Grammar for Program Control Flow Analysis (KK, LZ), pp. 72–85.
- SOSP-1977-Potier #analysis #policy #set
- Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
- SOSP-1977-Snyder #analysis #on the #synthesis
- On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
- DAC-1976-BuntineP #analysis #design
- Design rule checking and analysis of IC mask designs (WLB, BP), pp. 301–308.
- DAC-1976-Case #analysis #fault #logic
- Analysis of actual fault mechanisms in CMOS logic gates (GRC), pp. 265–270.
- DAC-1976-Ho #analysis #preprocessor #source code
- A preprocessor for structural analysis programs (PKH), pp. 17–24.
- DAC-1976-PreasBG #analysis #automation
- Automatic circuit analysis based on mask information (BP, WLB, CWG), pp. 309–317.
- STOC-1976-GuibasS #analysis
- The Analysis of Double Hashing (Extended Abstract) (LJG, ES), pp. 187–191.
- POPL-1976-Franck #2d #analysis #graph grammar #named #precedence
- PLAN2D — Syntactic Analysis of Precedence Graph Grammars (RF), pp. 134–139.
- ICSE-1976-EhrenbergerRO #program analysis #verification
- Program Analysis — A Method for the Verification of Software for the Control of a Nuclear Reactor (WDE, GR, KO), pp. 611–616.
- ICSE-1976-GoudaM #analysis #design #modelling #on the #protocol
- On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.
- ICSE-1976-PimontR #analysis #assessment #behaviour #reliability #source code
- A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
- ICSE-1976-RossS #analysis #requirements
- Structured Analysis for Requirements Definition (Abstract) (DTR, KESJ), p. 1.
- ICSE-1976-Stephenson #analysis #development
- An Analysis of the Resources Used in the SAFEGUARD System Software Development (WES), pp. 312–321.
- ICSE-1976-TeichroewH #analysis #documentation #information management #named
- PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (Abstract) (DT, EAHI), p. 2.
- ICSE-1976-WensleyGLS #analysis #design #fault tolerance #verification
- The Design, Analysis, and Verification of the SIFT Fault-Tolerant System (JHW, MWG, KNL, RES), pp. 458–469.
- ICSE-1976-Zelkowitz #automation #evaluation #program analysis
- Automatic Program Analysis and Evaluation (MVZ), pp. 158–163.
- SOSP-J-1975-ChuO76 #algorithm #analysis #markov
- Analysis of the PFF Replacement Algorithm via a Semi-Markov Model (WWC, HO), pp. 298–304.
- DAC-1975-Foster #analysis #source code
- Prerouting analysis programs (JCF), pp. 306–310.
- VLDB-1975-Chin #analysis #behaviour
- Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
- VLDB-1975-HofferS #analysis #clustering #database #design #physics
- The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
- VLDB-1975-Miyamoto #analysis #database #modelling #performance
- Hierarchical Performance Analysis Models for Data Base Systems (IM), pp. 322–352.
- STOC-1975-Pratt #analysis #modelling #optimisation
- Four Models for the Analysis of Optimization of Program Control Structures (TWP), pp. 167–176.
- POPL-1975-GrahamW #algorithm #analysis #linear #performance
- A Fast and Usually Linear Algorithm for Global Flow Analysis (SLG, MNW), pp. 22–34.
- POPL-1975-Kennedy #analysis #data flow
- Node Listings Applied to Data Flow Analysis (KK), pp. 10–21.
- SOSP-1975-LamS #algorithm #analysis #scheduling
- Analysis of a Level Algorithm for Preemptive Scheduling (SL, RS), pp. 178–186.
- SOSP-1975-Sadeh #algorithm #analysis #fault #performance
- An Analysis of the Performance of the Page Fault Frequency (PFF) Replacement Algorithm (ES), pp. 6–13.
- DAC-1974-Garrett #analysis #modelling
- Transmission line models for transient analysis (SJG), pp. 209–219.
- DAC-1974-MitchellG #analysis #automation #named
- MAP: A user-controlled automated Mask Analysis Program (CLM, JMG), pp. 107–118.
- DAC-1974-ThompsonSBP #analysis #fault #simulation #using
- Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
- SIGFIDET-1974-BehymerOM #analysis
- Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
- STOC-1973-GentlemanJ #algorithm #analysis #case study
- Analysis of Algorithms, a Case Study: Determinants of Polynomials (WMG, SCJ), pp. 135–141.
- STOC-1973-Kosaraju #analysis #source code
- Analysis of Structured Programs (SRK), pp. 240–252.
- STOC-1973-Teitelbaum #algebra #analysis #evaluation #fault
- Context-Free Error Analysis by Evaluation of Algebraic Power Series (RT), pp. 196–199.
- SIGIR-1973-MartinP #analysis #comparative #interactive #retrieval
- Comparative Analysis of Interactive Retrieval Systems (THM, EBP), pp. 75–85.
- POPL-1973-HechtU #algorithm #analysis #problem
- Analysis of a Simple Algorithm for Global Flow Problems (MSH, JDU), pp. 207–217.
- DAC-1972-ChangDE #analysis #fault #logic #self #simulation
- Logic simulation and fault analysis of a self-checking switching processor (HYC, RCD, RAE), pp. 128–137.
- DAC-1972-UlrichBW #analysis #logic #simulation
- Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
- STOC-1972-GareyGU #algorithm #analysis #memory management #worst-case
- Worst-Case Analysis of Memory Allocation Algorithms (MRG, RLG, JDU), pp. 143–150.
- SOSP-J-1973-TeoreyP72 #analysis #comparative #policy #scheduling
- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
- DAC-1971-HarrisonO #analysis #logic #simulation
- Race analysis of digital systems without logic simulation (RAH, DJO), pp. 82–94.
- DAC-1971-TsudaKGN #analysis #named #network #simulation
- NONLISA: Nonlinear network simulation and analysis program (TT, TK, SG, TN), pp. 347–357.
- DAC-1971-VishnubhotlaC #analysis #approach
- A path analysis approach to the diagnosis of combinational circuits (SRV, YHC), pp. 222–230.
- SIGFIDET-1971-Engles #analysis #database
- An Analysis of the April 1971 Data Base Task Group Report (RWE), pp. 69–91.
- SOSP-1971-TeoreyP #analysis #comparative #policy #scheduling
- A Comparative Analysis of Disk Scheduling Policies (Abstract) (TJT, TBP), pp. 114–121.
- DAC-1970-Chace #dynamic analysis #named #network #prototype
- DAMN — a prototype program for the Dynamic Analysis of Mechanical Networks (MAC), pp. 158–172.
- DAC-1970-MitchellG #analysis #design #monte carlo #simulation
- A simulation program for monte carlo analysis and design (EELM, DG), pp. 265–270.
- DAC-1970-RockwellP #analysis #finite
- Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
- DAC-1970-Sr #analysis #clustering #graph #logic #reduction
- Partitioning of logic graphs: A theoretical analysis of pin reduction (RBHS), pp. 54–63.
- STOC-1970-Chang #2d #analysis #using
- The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
- DAC-1969-BoehmLMR #analysis #interactive
- Interactive trajectory analysis: the graphic rocket system (BWB, VRL, RLM, JER), pp. 205–232.
- STOC-1969-PetersR #analysis #context-free grammar #revisited
- Context-Sensitive Immediate Constituent Analysis — Context-Free Languages Revisited (PSPJ, RWR), pp. 1–8.
- SOSP-1969-BryanS #analysis #performance
- The UTS time-sharing system: performance analysis and instrumentation (GEB, JES), pp. 147–158.
- DAC-1968-Anstiss #analysis #named
- MDELTA — a digital program for control system analysis (BHA).
- DAC-1968-Bernstein #analysis #graph #online
- Electronic circuit analysis with on-line graphs via a time-sharing terminal (SB).
- DAC-1968-GarrettV #analysis #worst-case
- Circuit frequency response analysis program with worst-case capabilities (FRWC) (SJG, THV).
- DAC-1968-Murray-LassoK #analysis #online #optimisation
- On-line circuit analysis and optimization with commercially available time-shared computer systems (MAML, FJK).
- DAC-1967-Branin #analysis #network
- Computer methods of network analysis (FHBJ).
- DAC-1967-CalvinCEM #analysis #design
- Design and analysis of electronic circuits (ELC, LCC, JRE, RSM).
- DAC-1967-Malakoff #analysis
- Coupling graphics and circuit analysis techniques (JLM).
- DAC-1967-Pritchard #analysis #bibliography #source code
- A survey of transient circuit analysis programs (GKP).
- DAC-1967-WilliamsMCE #analysis
- A package of computer subprograms for control system analysis (GJW, RSM, LCC, JPE).
- SHARE-1965-BitontiCFH #analysis
- A computer-aided linkage analysis system (FB, DWC, DNF, HHH).
- SHARE-1964-Branin #analysis #network #using
- D-C and transient analysis of networks using a digital computer (FHBJ).
- SHARE-1964-SimpsonA #analysis
- Space frame analysis and applications to other types of structures (HS, JA).
- LISP-1963-Yates #analysis #compilation #lisp #source code #word
- LISP. Group Analysis programs. Λ LISP Compiler for a variable word machine (Gamma 30 Scientific) (RY), p. 15.