7059 papers:
CBSE-2015-KimBNMLSLP #analysis #probability #scheduling- Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
ECSA-2015-StierKGR #analysis #architecture #energy #modelling #performance- Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
ECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability- Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
WICSA-2015-AbukwaikNR #analysis #concept- A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASE-2015-HanZ #analysis #energy- Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
CASE-2015-JiaZAX #analysis #performance- Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASE-2015-NonakaSLNKK #analysis #simulation #statistics- The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
CASE-2015-SaezMBT #analysis #hybrid #performance #realtime #simulation- Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
CASE-2015-XiePLLY #analysis- Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
CASE-2015-XieZLSD #agile #analysis #approach #multi #process- Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CASE-2015-ZhongLBM #analysis #modelling- Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
DAC-2015-ChangHLW #analysis #encoding #functional #named- TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DAC-2015-ChenTSHK #analysis #modelling #multi #reliability- Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
DAC-2015-EspinosaHAAR #analysis #correlation #robust #set #verification- Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
DAC-2015-HanF #analysis #approach #cpu #gpu #graph #scalability- Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DAC-2015-KrishnaNRT #analysis #composition #modelling #product line- Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
DAC-2015-LiuZWYX #analysis #difference #encryption #fault #named- DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DAC-2015-RoseM #analysis #design #performance- Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DAC-2015-ThieleAE #analysis #scheduling- Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DAC-2015-YangTJ #analysis- Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATE-2015-AhmadyanGNCV #analysis #diagrams #performance- Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
DATE-2015-AndradeMVAPL #analysis #data flow #modelling- Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
DATE-2015-BaldwinBRPB #analysis #array #predict #using- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATE-2015-BiondiB #analysis #modelling- Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
DATE-2015-ChangD #analysis #model checking #modelling #using- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATE-2015-DeyCAM #analysis #difference #fault- Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
DATE-2015-FeldS #analysis #dependence- Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
DATE-2015-GuanTW0 #analysis #realtime- Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
DATE-2015-HoqueMS #analysis #approach #maintenance #model checking #probability #reliability #towards- Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATE-2015-IqtedarHSH #analysis #distributed #probability- Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
DATE-2015-KhosraviMGT #analysis #optimisation #reliability- Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
DATE-2015-KriebelRSASH #analysis #combinator #configuration management #fault #named #performance- ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
DATE-2015-LezosDM #analysis #distance #locality #optimisation #reuse- Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
DATE-2015-MacherSBAK #analysis #named- SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATE-2015-MajumderLBP #analysis #architecture #manycore #probability- NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
DATE-2015-RamboE #analysis #communication #worst-case- Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
DATE-2015-SeylerSGNT #analysis #formal method- Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
DATE-2015-SonghoriMLK #automation #data analysis #framework #hardware #named- AHEAD: automated framework for hardware accelerated iterative data analysis (EMS, AM, XL, FK), pp. 942–947.
DATE-2015-ThangamuthuCCL #analysis #network- Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
DATE-2015-WartelKGBSTQLMB #analysis #case study #hardware- Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
DocEng-2015-NicholasB #analysis #documentation- Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
DRR-2015-ChenSWLHI #analysis #dataset #documentation #layout- Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
HT-2015-ApaolazaHJ #analysis #behaviour #interactive #low level #web- Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HT-2015-Baeza-YatesS #analysis #generative- Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
HT-2015-BurnapCS #analysis #classification #communication #twitter- Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
HT-2015-MishraDBS #analysis #incremental #learning #sentiment- Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
SIGMOD-2015-0002KBDHKFG #coordination #program analysis #protocol #transaction- The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
SIGMOD-2015-ElgamalYAMH #analysis #big data #component #distributed #named #scalability- sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
SIGMOD-2015-ZengADAS #analysis #big data #interactive #named #online- G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
VLDB-2015-BrancotteYBBDH #analysis #rank- Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
VLDB-2015-YangCLW #analysis #nearest neighbour #query- Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
ITiCSE-2015-BellettiniLMMMT #analysis #how #performance #student- How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
ITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSE-2015-UraiUO #analysis #distributed #programming- Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
ESOP-2015-0002S #automation #cost analysis #parallel #source code- Automatic Static Cost Analysis for Parallel Programs (JH, ZS), pp. 132–157.
ESOP-2015-CernyHKRZ #abstraction #analysis #execution #worst-case- Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
ESOP-2015-ChengR #detection #spreadsheet #static analysis- Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
ESOP-2015-EmmiGMR #analysis #source code- Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
ESOP-2015-VasconcelosJFH #analysis #functional #lazy evaluation #recursion #type system- Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
TACAS-2015-AlbertFR #analysis #cumulative- Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
TACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification- SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
TACAS-2015-DjoudiB #analysis #low level #named- BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
TACAS-2015-FleuryLPV #analysis #framework #named- Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
TACAS-2015-GuanTAS0 #analysis #refinement #scalability- Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
TACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACAS-2015-Immler #analysis #reachability- Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
TACAS-2015-KongGCC #analysis #hybrid #named- dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
TACAS-2015-NamjoshiT #analysis #network #process- Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
TACAS-2015-Sankur #analysis #automaton #robust- Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
ICPC-2015-LafetaMR #dynamic analysis #framework #using- Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPC-2015-MartinCAA #analysis #empirical #open source- Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic- ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICPC-2015-Zeller #dynamic analysis- Test complement exclusion: guarantees from dynamic analysis (AZ), pp. 1–2.
ICSME-2015-DongAS #fault #static analysis #using- Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSME-2015-DorningerPK #industrial #static analysis #user interface #using- Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSME-2015-GoeminneM #analysis #database #framework #java #towards- Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
ICSME-2015-JongelingDS #analysis #re-engineering #research #sentiment #tool support- Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
ICSME-2015-KhadkaSKSHJDB #analysis #case study #legacy #what- Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
ICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards- Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
ICSME-2015-Yamashita #analysis #assessment #benchmark #case study #experience #metric #quality #visualisation- Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
ICSME-2015-YamashitaZFW #analysis #comparative #industrial #open source #replication #smell- Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
MSR-2015-ClaesMCV #analysis- A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
MSR-2015-MalikZG #analysis #energy- Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
MSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANER-2015-Abi-AntounWKGR #graph #impact analysis- Impact analysis based on a global hierarchical Object Graph (MAA, YW, EK, AG, VR), pp. 221–230.
SANER-2015-AlawnehHH #analysis #metamodelling #performance #towards- Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
SANER-2015-CaiS #dependence #effectiveness #framework #impact analysis- A framework for cost-effective dependence-based dynamic impact analysis (HC, RAS), pp. 231–240.
SANER-2015-CaiS15a #analysis #dependence #fine-grained #named- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
SANER-2015-KoboriMI #analysis #evolution #java- Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
SANER-2015-LaverdiereBM #analysis #composition #graph #using- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANER-2015-Martin #analysis #framework #towards- Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
SANER-2015-MattsenWS #abstract domain #analysis- A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SANER-2015-MedicherlaK #analysis #approximate #precise #scalability- Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
SANER-2015-MuskeB #on the #static analysis #tool support- On implementational variations in static analysis tools (TM, PB), pp. 512–515.
SANER-2015-NairJNH #analysis- A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support- Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
SANER-2015-SilvaCMS #analysis #fine-grained- Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
SCAM-2015-DarizRS #analysis #programmable- A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAM-2015-PintoKT #analysis #automation #multi #performance- Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
PEPM-2015-HoekH #analysis #php- Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
PEPM-2015-KootH #analysis #exception #functional #higher-order #semantics #strict #type system- Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
PEPM-2015-VerstoepH #analysis #functional #higher-order #strict- Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
PLDI-2015-DeligiannisDKLT #analysis #programming #state machine #testing- Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
PLDI-2015-SinghPV #performance #program analysis- Making numerical program analysis fast (GS, MP, MTV), pp. 303–313.
PLDI-2015-WeijiangBLK #analysis #dependence- Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
SAS-2015-AlbertCJR #cost analysis #distributed #parallel- Parallel Cost Analysis of Distributed Systems (EA, JC, EBJ, GRD), pp. 275–292.
SAS-2015-AlbertGG #analysis #interprocedural #source code- May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
SAS-2015-AldousM #low level #static analysis- Static Analysis of Non-interference in Expressive Low-Level Languages (PA, MM), pp. 1–17.
SAS-2015-BakhirkinBP #analysis #set- A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
SAS-2015-CastelnuovoNRSY #analysis #bottom-up #case study #composition #top-down- Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
SAS-2015-CattaruzzaASK #analysis #bound- Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
SAS-2015-LeeHYC #static analysis- Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
SAS-2015-LiRC #analysis- Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
SAS-2015-LiTX #analysis #effectiveness- Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
SAS-2015-RapoportLT #analysis #correlation #data flow #precise- Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
STOC-2015-DworkFHPRR #adaptation #data analysis #statistics- Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
STOC-2015-SchulmanS #algorithm #analysis #matrix- Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
DLT-2015-BrandlS #analysis #automaton #complexity #finite #monad- Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
ICALP-v2-2015-Boreale #analysis #approximate #generative #probability- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
FM-2015-AlbertACGGMPR #analysis #concurrent #distributed #source code- Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
FM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FM-2015-Damm #analysis #automation #lessons learnt #named #verification- AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
FM-2015-LiuH #analysis #android #case study #kernel #security- Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
FM-2015-NelsonFK #difference #network #program analysis- Static Differential Program Analysis for Software-Defined Networks (TN, ADF, SK), pp. 395–413.
SEFM-2015-KamaliHKP #analysis #distributed #formal method- Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
ICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGT-2015-TaentzerG #analysis #confluence #graph transformation #towards- Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
CHI-2015-AmershiCDLSS #analysis #machine learning #named #performance #tool support- ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
CHI-2015-AsthanaSG #analysis #assessment #human-computer- Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
CHI-2015-ButlerASGP #analysis #automation #design #game studies- Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
CHI-2015-DerbovenMS #analysis #case study #design #multimodal- Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
CHI-2015-HourcadeMWP #analysis #exclamation #using- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHI-2015-HoyleTACK #analysis #privacy #smarttech- Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHI-2015-HuangSHH #analysis #how- How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHI-2015-LesselAK #analysis #people- Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
CHI-2015-OskampBHG #analysis #design #evaluation #multi #named- TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
CHI-2015-PandeyRSNB #analysis #empirical #how #visualisation- How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHI-2015-TinatiKSLSS #case study #data analysis #design #framework #multi- Designing for Citizen Data Analysis: A Cross-Sectional Case Study of a Multi-Domain Citizen Science Platform (RT, MVK, EPBS, MLR, RJS, NS), pp. 4069–4078.
CHI-2015-VatavuW #analysis #elicitation #formal method #metric #tool support- Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
CHI-2015-Wacharamanotham #analysis #named #statistics- Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
CSCW-2015-MacLeanGLMH #analysis #health #named #online- Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
CSCW-2015-SavageM #analysis #online- Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
DHM-EH-2015-Hu0LZY #3d #analysis #development #finite- Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
DHM-EH-2015-HuDLZY #analysis- Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
DHM-EH-2015-HuZZRL #analysis #correlation- Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
DHM-EH-2015-KanazawaOWWTGH15a #analysis #experience- Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
DHM-EH-2015-LiuCKQF #data analysis #power management- Balancing Power Consumption and Data Analysis Accuracy Through Adjusting Sampling Rates: Seeking for the Optimal Configuration of Inertial Sensors for Power Wheelchair Users (TL, CC, MK, GQ, JF), pp. 184–192.
DHM-EH-2015-TianLYJCS #analysis #scalability #video- Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
DHM-EH-2015-UchidaHKEMOUG #analysis #process #using- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
DHM-EH-2015-ZhouYLXZ #analysis- Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
DHM-HM-2015-BoringJM #analysis #modelling #performance #reliability- Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
DHM-HM-2015-GotoLTYH #analysis #eye tracking- Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
DHM-HM-2015-IkaiMKIH #analysis- Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
DHM-HM-2015-KitajimaKMMMH #analysis #comprehension #process- Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
DHM-HM-2015-KurataniHHKUGH #analysis #comparison #process- Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
DHM-HM-2015-SendaSKST #analysis #process- Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
DHM-HM-2015-SudaTHYGH #analysis #process- Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
DHM-HM-2015-SugimotoYNG #analysis #process- EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
DHM-HM-2015-WangTTITGH #analysis- Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
DHM-HM-2015-WangTTTGH #analysis #process- Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
DHM-HM-2015-WangTTTGH15a #analysis #process- Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
DUXU-DD-2015-EmanuelRM #analysis #interactive- Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
DUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive- Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
DUXU-DD-2015-OliveiraMMM #analysis #behaviour #design- Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
DUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability- Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
DUXU-IXD-2015-IwamotoKM #analysis #case study #using- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
DUXU-IXD-2015-KoshiyamaPR #analysis #architecture #repository #usability- Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
DUXU-IXD-2015-Naskova #analysis #usability- Usability Analysis of IxDA.org (JN), pp. 63–73.
DUXU-IXD-2015-OliveiraVSBRS #analysis #interactive #usability- Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
DUXU-IXD-2015-RaffaeleAJCPCS #analysis #game studies #legacy #multi #usability- Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
DUXU-UI-2015-DaggeFR #analysis #comparative #named #process- HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
DUXU-UI-2015-KronbauerMS #analysis #evaluation #experience #interactive #mobile #user interface- Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
DUXU-UI-2015-LeeKK #analysis #case study #experience #user interface- A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
DUXU-UI-2015-MarcusB #analysis #design- Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
DUXU-UI-2015-MarczalJ #analysis #behaviour #mobile- Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
DUXU-UI-2015-Nawrot #data analysis #difference #gender #question #towards #women- Gender Differences in Temporal Data Analysis — Toward Women or Men Empowerment? (IN), pp. 232–242.
DUXU-UI-2015-RodriguesEM #analysis #collaboration- Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
HCI-DE-2015-GrobelnyM #algorithm #analysis #comparative #design #grid #visual notation- Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
HCI-DE-2015-HashizumeK #analysis #smarttech #usability- Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
HCI-IT-2015-MurataM #analysis #eye tracking #using- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCI-IT-2015-MutoM #analysis #development #interactive- Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
HCI-IT-2015-SarsharNR #analysis #human-computer #on the #smarttech #usability- On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
HCI-IT-2015-SatoAOO #analysis #automation #classification #image- Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
HCI-IT-2015-ZhuF #analysis #game studies #online- A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
HCI-UC-2015-Ujita #analysis #reliability #using- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HIMI-IKC-2015-HayashiH #analysis #concept #learning #process- Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
HIMI-IKC-2015-MakhtarI #analysis #evaluation- An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HIMI-IKC-2015-WangN #analysis #identification #matrix- Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HIMI-IKC-2015-YamadaAY #analysis #internet- An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
HIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation- Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
HIMI-IKD-2015-MorizumiA #analysis #using- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
LCT-2015-AltanC #analysis #animation #education- An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, KÇ), pp. 3–13.
LCT-2015-DalipiYK #analysis #performance #semantics #using- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
SCSM-2015-GerritsenB #analysis #predict- Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
SCSM-2015-KastratiIYD #analysis #network #online #social #using- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
SCSM-2015-KinclNPS #analysis #independence #sentiment- Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
AdaEurope-2015-JaradatBP #analysis #maintenance #safety #using- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEurope-2015-ZamoranoG #analysis #scheduling- Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
ICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation- Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEIS-v2-2015-Judrups #analysis #information management #integration- Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEIS-v2-2015-PerezNGD #analysis #development #process- A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEIS-v2-2015-SouzaVS #analysis #semantics- Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy- Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEIS-v3-2015-BauerBTR #analysis #flexibility #maintenance #repository- A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
ICEIS-v3-2015-ThabetGG #analysis #mining #petri net #process- Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
ICEIS-v3-2015-ValentimCM #analysis #case study #specification- Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIR-2015-BansalBV #analysis #semantics #towards- Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
ECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIR-2015-CaoC #analysis #behaviour #detection #social #social media- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIR-2015-HienertHWK #analysis #named- WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
ECIR-2015-HuynhHR #analysis #learning #sentiment #strict- Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
ECIR-2015-Kelly #analysis #estimation #information retrieval #statistics- Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
ECIR-2015-KoolenBBK #analysis #social #social media- Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
ECIR-2015-Moghaddam #analysis #fault #feedback #mining #sentiment- Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
ECIR-2015-SabetghadamLBR #analysis #graph #reachability- Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
ICML-2015-GanCHCC #analysis #modelling #scalability #topic- Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
ICML-2015-GongY #analysis #convergence #memory management- A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICML-2015-HuangGS #analysis #component #independence- Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
ICML-2015-KomiyamaHN #analysis #multi #probability #problem- Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
ICML-2015-MaLF #analysis #canonical #correlation #dataset #linear #scalability- Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
ICML-2015-NishiharaLRPJ #analysis #convergence- A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
ICML-2015-PerrotH #analysis #learning #metric- A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
ICML-2015-PrasadPR #analysis #axiom #rank- Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
ICML-2015-WangWS #analysis #clustering- A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
ICML-2015-YangX15a #analysis #component #streaming- Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
ICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order- ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDD-2015-ChaoHZ #analysis #kernel- Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
KDD-2015-EmbarBPV #analysis #online #social #topic- Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
KDD-2015-NagarajanWBNBHT #analysis #predict- Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
KDD-2015-OkumuraST #analysis #classification #incremental #linear #problem- Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
KDD-2015-ZhangLZSKYJ #analysis #biology #image #learning #modelling #multi- Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
KDD-2015-ZhouLB #analysis #clustering #graph- Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
MLDM-2015-AlzahraniAAB #data analysis- Data Analysis for Courses Registration (NA, RA, NA, GB), pp. 357–367.
MLDM-2015-CoralloFMACCGS #analysis #approach #sentiment- Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDM-2015-KarkkainenS #analysis #component #robust- Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
MLDM-2015-KrasotkinaM15a #analysis #approach- A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
MLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDM-2015-ShaluntsB #analysis #named #sentiment- SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
RecSys-2015-SifaOB #analysis #migration- User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
RecSys-2015-SousaDBM #analysis #named #network #recommendation- CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
SEKE-2015-BarchetSF #analysis #collaboration #dependence #risk management- Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
SEKE-2015-GokhaleE #analysis #network #social- Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
SEKE-2015-RamosCRSAP #analysis #architecture #recommendation- Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
SEKE-2015-SaputriL #analysis #machine learning #perspective- Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKE-2015-Tasse #analysis #identification #metric #using- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKE-2015-ValeSSA #agile #analysis #evaluation #industrial #named #process- RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
SEKE-2015-ZhangGAU #analysis #mobile- Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
SEKE-2015-ZouCH #impact analysis #mobile #topic #user interface- Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps (QZ, XC, YH), pp. 477–482.
SIGIR-2015-Dori-Hacohen #analysis #detection- Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards- Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
SIGIR-2015-KrstovskiSK #analysis #modelling #retrieval- Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
SIGIR-2015-SeverynM15a #analysis #network #sentiment #twitter- Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
MoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml- A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
MoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml- A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
AMT-2015-GholizadehDKM #analysis #model transformation- Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
BX-2015-HidakaBTM #analysis #approach #bidirectional #graph transformation- Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFA-2015-BerardinelliMPP #analysis #design #energy- Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
MoDELS-2015-Rodriguez-Echeverria #analysis #approach #evolution #model transformation #statistics- A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
ECOOP-2015-Alimadadi0P #hybrid #impact analysis #javascript- Hybrid DOM-Sensitive Change Impact Analysis for JavaScript (SA, AM, KP), pp. 321–345.
ECOOP-2015-CentonzePT #analysis- Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ECOOP-2015-HauzarK #framework #php #static analysis- Framework for Static Analysis of PHP Applications (DH, JK), pp. 689–711.
ECOOP-2015-ParkR #javascript #precise #scalability #static analysis- Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity (CP, SR), pp. 735–756.
ECOOP-2015-WeiR #adaptation #analysis #javascript- Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
OOPSLA-2015-DaraisMH #composition #program analysis #reuse- Galois transformers and modular abstract interpreters: reusable metatheory for program analysis (DD, MM, DVH), pp. 552–571.
OOPSLA-2015-DietrichHS #analysis #java #points-to- Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
OOPSLA-2015-FuBS #analysis #automation #fault- Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
OOPSLA-2015-MadsenTL #javascript #static analysis- Static analysis of event-driven Node.js JavaScript applications (MM, FT, OL), pp. 505–519.
OOPSLA-2015-OhYY #adaptation #learning #optimisation #program analysis- Learning a strategy for adapting a program analysis via bayesian optimisation (HO, HY, KY), pp. 572–588.
OOPSLA-2015-ToffolaPG #dynamic analysis #performance #problem- Performance problems you can fix: a dynamic analysis of memoization opportunities (LDT, MP, TRG), pp. 607–622.
GPCE-2015-El-SharkawyKS #analysis #semantics #tool support- Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
PPDP-2015-GarciaLL #static analysis- Static analysis of cloud elasticity (AG, CL, ML), pp. 125–136.
PPDP-2015-Hofmann #analysis #automation- Automatic amortized analysis (MH), p. 5.
QAPL-2015-RosendahlK #analysis #probability- Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
POPL-2015-ChatterjeePV #analysis #interprocedural- Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
POPL-2015-PredaGLM #analysis #automaton #bytecode #semantics #similarity- Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
POPL-2015-TangWZXZM #analysis #data flow- Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SAC-2015-DuanZHX #analysis #framework #network #performance- Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SAC-2015-FerreiraMME #analysis #comparison #kernel #memory management- An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SAC-2015-GimenesGRG #analysis #graph #multimodal #repository- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SAC-2015-IqbalKK #analysis #sentiment- Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SAC-2015-IsraelHS #analysis #multi #semantics #summary- Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SAC-2015-Jung0B #analysis #embedded #encoding #identification #power management- Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SAC-2015-KrutzMS #analysis #detection #effectiveness #using- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SAC-2015-LopezR #analysis #metaprogramming- Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SAC-2015-MaltaPSBF #analysis #bibliography #case study #distance #information management- A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation- Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SAC-2015-OjameruayeB #analysis #framework- A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SAC-2015-PiMMG #analysis #health #ontology #security- Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SAC-2015-Puffitsch #analysis #bound #branch #predict- Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SAC-2015-RaniseTV #analysis #automation #constraints #policy- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SAC-2015-SilvaMS #analysis #quality- Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
ESEC-FSE-2015-0002SGBZ #automation #impact analysis #named #natural language #requirements- NARCIA: an automated tool for change impact analysis in natural language requirements (CA, MS, AG, LCB, FZ), pp. 962–965.
ESEC-FSE-2015-BusanyM #analysis #behaviour #statistics- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer- Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSE-2015-LiLWH #analysis #android #java #string- String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ESEC-FSE-2015-MangalZNN #approach #program analysis- A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSE-2015-SmithJMCL #developer #security #static analysis- Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
ICSE-v1-2015-AvgustinovBHLMM #developer #static analysis- Tracking Static Analysis Violations over Time to Capture Developer Characteristics (PA, AIB, ASH, RGL, GM, OdM, MS, JT), pp. 437–447.
ICSE-v1-2015-HuangLR #analysis #concurrent #named #predict- GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
ICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSE-v1-2015-PanW0G #analysis #javascript- Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
ICSE-v1-2015-PradelSS #analysis #consistency #javascript #named #nondeterminism- TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
ICSE-v1-2015-SadowskiGJSW #ecosystem #named #program analysis- Tricorder: Building a Program Analysis Ecosystem (CS, JvG, CJ, ES, CW), pp. 598–608.
ICSE-v1-2015-WeissRL #fault #program analysis #scalability- Database-Backed Program Analysis for Scalable Error Propagation (CW, CRG, BL), pp. 586–597.
ICSE-v1-2015-YangYWWR #analysis #android #control flow- Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSE-v1-2015-YiYLZW #analysis #testing- A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSE-v2-2015-AlexandruG #agile #analysis #multi- Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSE-v2-2015-Berghe #analysis #security #towards- Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSE-v2-2015-Bichhawat #analysis- Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
ICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards- Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
ICSE-v2-2015-HermansM #analysis #dataset #email #spreadsheet- Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
ICSE-v2-2015-KlasBDSH #analysis #evaluation #modelling #scalability #testing- A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
ICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSE-v2-2015-Palomba #analysis #detection #smell- Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSE-v2-2015-SadeghiBM #analysis #android #security #using- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSE-v2-2015-Zieris #analysis #information management #programming- Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
SLE-2015-Bagge #analysis #library- Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
SPLC-2015-BeekFG #adaptation #analysis #paradigm #product line- Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
SPLC-2015-BeekFGM #analysis #product line #using- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLC-2015-BeekLLV #analysis #constraints #modelling #probability #product line #statistics- Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
SPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLC-2015-KassmeyerSS #impact analysis #process #safety #variability- A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
SPLC-2015-LiangGCR #analysis #feature model #modelling #satisfiability #scalability- SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
SPLC-2015-YueAS #analysis #case study #cyber-physical #experience #product line- Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
ASPLOS-2015-SenguptaBZBK #bound #dynamic analysis #hybrid- Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
CC-2015-AllenSK #analysis #points-to #scalability #staged- Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CGO-2015-NagarajG #analysis #approximate #mining #pointer #using- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGO-2015-OanceaR #analysis #induction #scalability- Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
HPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability- Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
HPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
HPDC-2015-SuWA #data analysis #generative #performance- In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps (YS, YW, GA), pp. 61–72.
LCTES-2015-0001HL #analysis #kernel #realtime- Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
LCTES-2015-BarijoughHKG #analysis #streaming #trade-off- Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
LCTES-2015-StilkerichLES #analysis #embedded #realtime- A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
LCTES-2015-ZhangK #abstract interpretation #analysis #persistent #precise- Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
PPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread- Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
SOSP-2015-HooffLZZ #analysis #named #scalability- Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
CAV-2015-AbateBCK #adaptation #analysis #markov #network- Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
CAV-2015-BozzanoCGM #analysis #modelling #performance #safety- Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAV-2015-BozzanoCPJKPRT #analysis #design #safety- Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CSL-2015-ClementeL #analysis #automaton #first-order #reachability- Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
CSL-2015-SchwentickVZ #source code #static analysis- Static Analysis for Logic-based Dynamic Programs (TS, NV, TZ), pp. 308–324.
ICLP-2015-KieslST #analysis #on the #source code- On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT).
ICLP-J-2015-GangeNSSS #horn clause #program analysis #program transformation #representation- Horn clauses as an intermediate representation for program analysis and transformation (GG, JAN, PS, HS, PJS), pp. 526–542.
ICST-2015-0001YPGS #analysis #generative #testing #using- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICST-2015-MidtgaardM #static analysis- QuickChecking Static Analysis Properties (JM, AM), pp. 1–10.
ICST-2015-NardoPB #analysis #generative #modelling #mutation testing #testing- Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
ISSTA-2015-AquinoBCDP #constraints #program analysis #proving #reuse- Reusing constraint proofs in program analysis (AA, FAB, MC, GD, MP), pp. 305–315.
ISSTA-2015-DimjasevicG #analysis #assurance #generative #runtime #testing #verification- Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
ISSTA-2015-HuangDMD #analysis #android #precise #scalability- Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTA-2015-QiLAR #analysis #correctness #generative- An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
RTA-2015-GenetS #analysis #reachability- Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
RTA-2015-NageleFM #analysis #automation #confluence #term rewriting- Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
SAT-2015-FalknerLH #analysis #automation #named #performance #satisfiability- SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
TAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
TLCA-2015-HofmannM #analysis #multi #term rewriting- Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
VMCAI-2015-BackesR #abstraction #analysis #clustering #graph transformation #infinity- Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
VMCAI-2015-NagarS #analysis #using- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
VMCAI-2015-PrabhakarS #abstraction #analysis #hybrid- Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
ECSA-2014-BerardinelliMP #analysis #design #network #performance- fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
ECSA-2014-XiongFPM #architecture #as a service #cost analysis #performance #scalability- Scalable Architectures for Platform-as-a-Service Clouds: Performance and Cost Analysis (HX, FF, CP, NM), pp. 226–233.
WICSA-2014-FuZBX #analysis- A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
ASE-2014-AbalBW #analysis #debugging #kernel #linux #variability- 42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
ASE-2014-Angerer #impact analysis #multi #product line #variability- Variability-aware change impact analysis of multi-language product lines (FA), pp. 903–906.
ASE-2014-CaiS #dependence #impact analysis #named #precise #using- Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASE-2014-EllisHKLLLMM #analysis #automation #requirements- Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
ASE-2014-MarasSC #analysis #named #reuse #web- Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
ASE-2014-NearJ #analysis #interactive #named #security #web- Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASE-2014-RamaK #dynamic analysis #refactoring- A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
ASE-2014-SeguraSC #analysis #automation #case study #e-commerce #experience #testing #variability- Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
ASE-2014-StephenSSE #big data #program analysis- Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
ASE-2014-TarvoR #analysis #automation #modelling #parallel #performance #source code #thread- Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
CASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASE-2014-GargSYPCHPAG #analysis #automation #reachability- Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
CASE-2014-HanZH #analysis- System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
CASE-2014-HuYLC #analysis #automation #modelling #multi #petri net- Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
CASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASE-2014-JiaZAX #analysis- Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
CASE-2014-LiaoLCHF #analysis- Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
CASE-2014-PengHHW #analysis #effectiveness #metric- An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
CASE-2014-WangGWG #analysis #behaviour #generative #multi- Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
CASE-2014-WuCT #analysis #memory management #modelling #multi- Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
CASE-2014-ZhuWQZ #analysis #clustering #constraints #modelling #multi #petri net #scheduling #tool support- Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
DAC-2014-AthavaleMHV #analysis #source code #test coverage #using- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DAC-2014-IyengarG #analysis #embedded #memory management #modelling #power management #robust- Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
DAC-2014-KiamehrOTN #analysis #approach #fault- Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DAC-2014-KleebergerMS #analysis- Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
DAC-2014-LiangC #analysis #clustering #named #network #probability #reduction #scalability #smarttech- ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
DAC-2014-LinL #analysis #parallel #reachability #verification- Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
DAC-2014-NandakumarM #analysis- System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
DAC-2014-QuintonBHNNE #analysis #design #network- Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DAC-2014-SchneiderPP #agile #analysis #multi- MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
DAC-2014-ShankarSWP #analysis #concept #design #specification- Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
DAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
DAC-2014-ShrivastavaRJW #analysis #control flow #fault- Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
DAC-2014-SiyoumGC #analysis #data flow- Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
DAC-2014-WaksmanRSS #analysis #assessment #functional #identification- A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DAC-2014-XueQBYT #analysis #framework #manycore #scalability- Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
DAC-2014-ZhengBB #analysis #identification #named #robust #towards- CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATE-2014-AltmeyerD #analysis #correctness #on the #precise #probability- On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
DATE-2014-BeneventiBVDB #analysis #identification #logic- Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATE-2014-ButtazzoBB #adaptation #analysis #design- Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
DATE-2014-ChenHD #analysis #graph #modelling- May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
DATE-2014-ChienYHLC #analysis #geometry #image- Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
DATE-2014-EbrahimiETSCA #analysis #embedded #fault- Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
DATE-2014-FischerCM #analysis #design #modelling- Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
DATE-2014-FrijnsASVGSC #analysis #graph- Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
DATE-2014-GanapathyCACGR #analysis #framework #memory management #named #robust- INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
DATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance- Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATE-2014-GhalatyAS #analysis #fault- Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
DATE-2014-Guan0 #analysis #performance #scheduling- General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
DATE-2014-HoffmanRAA #analysis #fault #memory management- Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATE-2014-KarakonstantisSSAB #analysis #approach #energy #variability- A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATE-2014-KhanAHKKRC #analysis #bias- Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
DATE-2014-LongLY #analysis #bound #evaluation #modelling #multi- Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf- Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATE-2014-PandeyV #analysis #fault #safety- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATE-2014-RadojicicGMP #analysis- Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
DATE-2014-RamboTDAE #analysis #realtime- Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATE-2014-RanaC #analysis #named #reduction #scalability #simulation- SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DATE-2014-SalunkheMB #analysis #data flow #modelling- Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
DATE-2014-SiddiqueT #analysis #formal method #towards- Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
DATE-2014-SinghSWPWC #analysis #specification- Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
DATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction- Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATE-2014-VijaykumarV #analysis #canonical #statistics #using- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATE-2014-VillenaS #analysis #network #performance #variability- Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
DATE-2014-ZhangB #analysis #probability- Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
DATE-2014-ZhangYW #analysis #performance #problem- Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
DocEng-2014-DiemKS #analysis #classification #documentation- Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
DocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DRR-2014-FengLLLT #analysis #geometry- Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
DRR-2014-LiPLD #analysis #online #verification- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
DRR-2014-LiuWTLG #analysis #automation #comprehension #image- Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
HT-2014-KimWWO #analysis #multi #twitter- Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
HT-2014-ZhangBR #analysis #empirical #network #social #social media- Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
PODS-2014-Cohen #analysis #graph #sketching- All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
PODS-2014-NgoNRR #analysis #worst-case- Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
SIGMOD-2014-BlanasWBDS #data analysis #parallel- Parallel data analysis directly on scientific file formats (SB, KW, SB, BD, AS), pp. 385–396.
SIGMOD-2014-GulwaniM #data analysis #interactive #named #natural language #programming #spreadsheet- NLyze: interactive programming by natural language for spreadsheet data analysis and manipulation (SG, MM), pp. 803–814.
SIGMOD-2014-Musleh #analysis #twitter #visual notation- Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
SIGMOD-2014-ZhuGCL #analysis #clustering #graph #sentiment #social #social media- Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
VLDB-2014-DeutchMT #analysis #framework #process- A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
VLDB-2014-JacobKS #analysis- A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
VLDB-2014-Markl #big data #data analysis #declarative #independence- Breaking the Chains: On Declarative Data Analysis and Data Independence in the Big Data Era (VM), pp. 1730–1733.
VLDB-2014-MortonBGM #challenge- Support the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems (KM, MB, DG, JDM), pp. 453–456.
VLDB-2014-ProserpioGM #data analysis- Calibrating Data to Sensitivity in Private Data Analysis (DP, SG, FM), pp. 637–648.
VLDB-2014-ZhangTCO #analysis #data transformation #in memory #performance- Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
CSEET-2014-Steppe #analysis #dependence #design #education #graph #using- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSE-2014-KohNBR #analysis #validation- Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
ESOP-2014-Fu #abstraction #analysis #memory management- Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
ESOP-2014-MangalNY #analysis #interprocedural- A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FASE-2014-CohenM #analysis #configuration management #semantics #specification- Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
FASE-2014-FerraraSB #cost analysis #named- TouchCost: Cost Analysis of TouchDevelop Scripts (PF, DS, LB), pp. 109–124.
FASE-2014-HuangDM #analysis #java #type system #web- Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
FASE-2014-KowalST #analysis #performance- Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
FASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using- Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASE-2014-SadeghiEM #analysis #mining #repository #security- Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FoSSaCS-2014-BonnetKL #analysis #parallel #probability #process- Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
TACAS-2014-BrockschmidtEFFG #analysis #complexity #integer #runtime #source code- Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
WRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using- Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
WRLA-2014-RochaMM #analysis #smt- Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
CSMR-WCRE-2014-AlalfiCD #analysis #clustering #experience #industrial- Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
CSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPC-2014-BinkleyHLO #analysis #comprehension #source code- Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICPC-2014-GuptaS #program analysis #quality- A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
ICSME-2014-ChaikalisLMC #analysis #evolution #named- SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
ICSME-2014-KlattKS #analysis #dependence- Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
ICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability- Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
ICSME-2014-MondalRS #analysis #fine-grained- A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSME-2014-Muske #analysis #bibliography #clustering- Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSME-2014-SajnaniSOL #analysis #component #quality- Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSME-2014-TaoQ #analysis #concurrent #java #refactoring #source code- Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
ICSME-2014-WongXZHZM #analysis #fault #locality #segmentation- Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
MSR-2014-BloemenAKO #analysis #database #dependence #open source- Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
MSR-2014-FarahTC #analysis #architecture #named #quality #scalability- OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
MSR-2014-GuzmanAL #analysis #commit #empirical #git #sentiment- Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
MSR-2014-HanamTHL #ranking #static analysis- Finding patterns in static analysis alerts: improving actionable alert ranking (QH, LT, RH, PL), pp. 152–161.
MSR-2014-MurgiaTAO #analysis #developer- Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
MSR-2014-PleteaVS #analysis #git #security #sentiment- Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
MSR-2014-SteidlHJ #analysis #incremental #source code- Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
MSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code- Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
SCAM-2014-CaiJSZZ #analysis #named #predict- SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread- C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAM-2014-LiangSM #analysis #performance- Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAM-2014-LiangSMKH #analysis #automaton #exception- Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support- Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAM-2014-YadegariD #analysis- Bit-Level Taint Analysis (BY, SD), pp. 255–264.
PEPM-2014-HanusS #analysis #composition #functional #logic programming #source code- A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
PEPM-2014-KerneisSH #continuation #named #performance #static analysis- QEMU/CPC: static analysis and CPS conversion for safe, portable, and efficient coroutines (GK, CS, SH), pp. 83–94.
PLDI-2014-ArztRFBBKTOM #analysis #android #named #precise- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDI-2014-BorgesFdPV #analysis #composition #probability #quantifier- Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
PLDI-2014-MitraLABSG #analysis #debugging #parallel #scalability- Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
PLDI-2014-OhLHYY #context-sensitive grammar- Selective context-sensitivity guided by impact pre-analysis (HO, WL, KH, HY, KY), p. 49.
PLDI-2014-SmaragdakisKB #analysis #context-sensitive grammar- Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
PLDI-2014-ZhangMNY #analysis #bottom-up #hybrid #interprocedural #top-down- Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
SAS-2014-AlbertFR #cost analysis #distributed- Peak Cost Analysis of Distributed Systems (EA, JCF, GRD), pp. 18–33.
SAS-2014-BakhirkinBP #abstraction #analysis #approximate- Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
SAS-2014-BessonJV #java #named #static analysis- SawjaCard: A Static Analysis Tool for Certifying Java Card Applications (FB, TPJ, PV), pp. 51–67.
SAS-2014-CoxCR #analysis #automation #source code- Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
SAS-2014-MadsenM #analysis #data flow #pointer #reachability- Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SAS-2014-YeSX #analysis #pointer- Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
STOC-2014-BhaskaraCMV #analysis- Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
STOC-2014-DworkTT0 #analysis #bound #component #privacy- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
FLOPS-2014-HoffmannS #analysis #array #integer #type system- Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
ICALP-v1-2014-DosaS #analysis- Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
LATA-2014-FelgenhauerT #analysis #automaton #reachability- Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
LATA-2014-SeidlK #analysis #data flow #interprocedural #xml- Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
FM-2014-AntoninoSW #analysis #concurrent #csp #network #process #refinement- A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
FM-2014-BaeOM #analysis #multi #semantics- Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
FM-2014-ButinM #analysis- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
FM-2014-ForejtKNS #analysis #communication #precise #predict #source code- Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
FM-2014-KordyLMP #algorithm #analysis #automaton #robust- A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
FM-2014-LakshmiAK #analysis #liveness #reachability #using- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FM-2014-LiuGL #analysis #reliability- MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
FM-2014-WenMM #analysis #formal method #information management #towards- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
IFM-2014-BruniSNN #analysis #protocol #security- Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFM-2014-CalvaneseKSVZ #analysis #data type- Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
IFM-2014-GilmoreTV #analysis #evaluation- An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
IFM-2014-RamsdellDGR #analysis #hybrid #protocol #security- A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
SEFM-2014-BeckerSAB #analysis #constraints #deployment #fault tolerance #formal method- A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
SEFM-2014-BratNSV #abstract interpretation #framework #named #static analysis- IKOS: A Framework for Static Analysis Based on Abstract Interpretation (GB, JAN, NS, AV), pp. 271–277.
SEFM-2014-DeganoFG #adaptation #reliability #static analysis- A Two-Phase Static Analysis for Reliable Adaptation (PD, GLF, LG), pp. 347–362.
SEFM-2014-GrovO #analysis #consistency #formal method #multi- Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
SFM-2014-BubelMH #analysis #execution #modelling- Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
ICFP-2014-ChenE #analysis #parametricity #product line #type system- Type-based parametric analysis of program families (SC, ME), pp. 39–51.
ICFP-2014-KakiJ #analysis #framework #higher-order #relational- A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
IFL-2014-AdsitF #analysis #control flow #performance #system f- An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
ILC-2014-LevineY #analysis #assessment #profiling- Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
GRAPHITE-2014-DelzannoRT #analysis #protocol- Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
GRAPHITE-2014-FernandezKP #analysis #framework #graph grammar #interactive #modelling- Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
ICGT-2014-AnjorinLST #graph grammar #model transformation #performance #static analysis- A Static Analysis of Non-confluent Triple Graph Grammars for Efficient Model Transformation (AA, EL, AS, GT), pp. 130–145.
CHI-2014-GoyalLCF #analysis #collaboration- Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
CHI-2014-LeeSS #analysis #bound #design #research- Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHI-2014-LiuGFXHK #analysis- CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
CHI-2014-ShelleyLMDSS #data analysis #design #student- Information-building applications: designing for data exploration and analysis by elementary school students (TS, LL, TM, CD, BLS, AS), pp. 2123–2132.
CHI-2014-Smith #analysis #comprehension #game studies #generative- Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
CHI-2014-XuYRFHB #analysis #exclamation- Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
CSCW-2014-BackstromK #analysis #facebook #network #social- Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
CSCW-2014-KangKK #analysis #collaboration #information management #tool support- Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
DHM-2014-ItoTGK #analysis #research- Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
DHM-2014-KarlovicPMSRRS #analysis #case study #comparison- Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
DHM-2014-MirandaRV #analysis #development #memory management #mobile #testing- Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
DHM-2014-OhgiriYYKH #analysis #comparison- Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
DHM-2014-OkaGTNH #analysis- Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
DHM-2014-SugimotoYG #analysis- Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
DHM-2014-WongpatikasereeKT #analysis- Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
DHM-2014-ZhouLXZZ #analysis #metric #parametricity- Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
DUXU-DI-2014-ChammasQM #analysis #design #interactive- An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
DUXU-DI-2014-NovickVSG #analysis #empirical #game studies #usability- Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
DUXU-DI-2014-ShafiqICRAAR #analysis #case study #learning #smarttech #usability #user satisfaction #what- To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
DUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
DUXU-DP-2014-SilvaPS #analysis #concept #using- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
DUXU-TMT-2014-FilippiB #analysis #aspect-oriented #functional #human-computer #interactive #nondeterminism- In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
DUXU-TMT-2014-NieminenRTN #analysis #collaboration #industrial #information management- Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
DUXU-TMT-2014-QuaresmaG #analysis #smarttech #usability- Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
DUXU-TMT-2014-Tao #analysis #identification #user interface- Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics- Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCI-AS-2014-HooeyABF #analysis #design #fault- Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
HCI-AS-2014-LandyLNPLM #analysis #comparative #development #predict- Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
HCI-AS-2014-RafalakBW #analysis #evaluation- Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
HIMI-AS-2014-Coelho #analysis- Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
HIMI-AS-2014-JangKJS #analysis #framework #reliability- A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HIMI-AS-2014-TanikawaA #analysis #bibliography- User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
HIMI-DE-2014-KimitaNS #analysis #education- Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
HIMI-DE-2014-LinKT #analysis #collaboration #design #learning- A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HIMI-DE-2014-NazemiRKK #adaptation #analysis #similarity #visualisation- User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
LCT-NLE-2014-BrayshawGNWB #analysis #case study #evaluation #heuristic- Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
LCT-NLE-2014-IbanezN #analysis #architecture #interactive- An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
LCT-NLE-2014-Jo0L #analysis #empirical #people- Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
SCSM-2014-AhangamaLKP #analysis #mobile #monitoring- Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
SCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter- Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
SCSM-2014-IoannidisPKKFA #analysis #named #social #social media- SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
SCSM-2014-LopesMP #analysis #social #web- Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
SCSM-2014-MendesFFC #analysis #classification #how #social #using- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
VISSOFT-2014-VoineaT #analysis #visual notation- Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
AdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis- Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
AdaEurope-2014-QamhiehM #analysis #graph #multi #scheduling- Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
CAiSE-2014-NobauerSG #analysis #approach #automation #evaluation #product line #similarity- Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
CAiSE-2014-RuizCEFP #analysis #information management #process- Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
EDOC-2014-FlorezSV #analysis #approach #automation #enterprise #modelling- Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
EDOC-2014-Franke #analysis #architecture #enterprise- Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
EDOC-2014-MukkamalaHV #analysis #sentiment #social- Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
EDOC-2014-NardiFA #analysis #modelling #ontology- An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
ICEIS-v1-2014-LettnerZ #data analysis #framework #industrial #product line- A Data Analysis Framework for High-variety Product Lines in the Industrial Manufacturing Domain (CL, MZ), pp. 209–216.
ICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management- Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEIS-v2-2014-BeenK #analysis #approach #internet #online #people- Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEIS-v2-2014-PanfilenkoEML #impact analysis #independence #model transformation #recommendation #requirements- Recommendations for Impact Analysis of Model Transformations — From the Requirements Model to the Platform-independent Model (DVP, AE, CM, PL), pp. 428–434.
ICEIS-v2-2014-PereiraZS #concept analysis- Extraction of Classes Through the Application of Formal Concept Analysis (DP, LZ, MS), pp. 275–282.
ICEIS-v2-2014-ProcaciSA #analysis #community #metric #online #people #reduction #reliability- Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
ICEIS-v2-2014-VieiraJF #analysis #network- A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEIS-v3-2014-AlvesVS #analysis #architecture- Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
ICEIS-v3-2014-NaranjoSV #analysis #architecture #enterprise #named- PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
CIKM-2014-ArapakisLV #analysis #comprehension #gesture- Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
CIKM-2014-CarmelMPS #analysis #community #using- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKM-2014-JiaDGZ #analysis #community #network- Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
CIKM-2014-LinJXWCW #analysis #sentiment- A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
CIKM-2014-MengCS #analysis #approximate #keyword #query #semantics- Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
CIKM-2014-PhanDXPK #analysis #health #network #physics #process #social- Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
CIKM-2014-RahimiSK #analysis #axiom #information retrieval- Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
CIKM-2014-RosenthalJ #analysis #enterprise- Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
CIKM-2014-ShangLCC #analysis #component #robust- Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
CIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social- People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKM-2014-TaoIWS #analysis #canonical #correlation- Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
CIKM-2014-TaxidouF #agile #analysis #information management #named #realtime #twitter- RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
CIKM-2014-WilkieA #analysis #bias #performance #retrieval- A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
CIKM-2014-YilmazVCRB #analysis #documentation- Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
ECIR-2014-MonizJ #analysis #sentiment- Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
ECIR-2014-WilkieA #analysis #bias #empirical #retrieval- Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
ICML-c1-2014-ChazalGLM #convergence #data analysis #diagrams #estimation #persistent- Convergence rates for persistence diagram estimation in Topological Data Analysis (FC, MG, CL, BM), pp. 163–171.
ICML-c1-2014-MillerBAG #analysis #process- Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
ICML-c1-2014-TangMNMZ #analysis #comprehension #modelling #topic- Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
ICML-c2-2014-Lopez-PazSSGS #analysis #component #random- Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
ICML-c2-2014-MukutaH #analysis #canonical #correlation #probability- Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
ICML-c2-2014-NguyenMVEB #analysis #correlation #multi- Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
ICML-c2-2014-NieYH #analysis #component #robust- Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
ICML-c2-2014-SatoKN #analysis #normalisation- Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
ICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICML-c2-2014-SunZZ #analysis #convergence- A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
ICML-c2-2014-TaylorGP #analysis #approximate #linear #programming- An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
ICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics- Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICML-c2-2014-TuZWQ #analysis #scalability- Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
ICML-c2-2014-ZhaoMXZZ #analysis #component #robust- Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
ICPR-2014-AhmadKM #analysis- Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
ICPR-2014-AndreuLMG #analysis #automation #classification #gender #image- Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
ICPR-2014-ArvanitopoulosBT #analysis #learning- Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
ICPR-2014-BauckhageM #analysis #clustering #kernel #web- Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
ICPR-2014-BiswasZLMV #analysis #detection #image #using- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPR-2014-ChengY #analysis- Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICPR-2014-ChenYJ #analysis #feature model #linear #robust- An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
ICPR-2014-DengHXC #analysis #composition #matrix #rank- Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
ICPR-2014-FernandezT #analysis #documentation #layout- EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPR-2014-FuscoEM #data analysis #locality #network- Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
ICPR-2014-Hess-FloresRJ #analysis #multi #nondeterminism- Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
ICPR-2014-HongZP #analysis #estimation #image- Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
ICPR-2014-HuDGX #analysis #distance #reduction- Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
ICPR-2014-KrytheL #analysis #linear- Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
ICPR-2014-KurtekS #analysis #segmentation #using- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPR-2014-LinCCLH #analysis #detection- Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPR-2014-LinH #analysis #using- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPR-2014-LiuS #analysis- Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
ICPR-2014-LiuXYZ #analysis- Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
ICPR-2014-LiWQXG #analysis #estimation- Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
ICPR-2014-MoilanenZP #agile #analysis #difference #using- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPR-2014-MollerPB #analysis #quantifier #using- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPR-2014-MoriKO #analysis #collaboration #framework #online #search-based- Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
ICPR-2014-OhPKHB #analysis #image #personalisation #social- Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
ICPR-2014-OkadaFWP #analysis #random- Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
ICPR-2014-OnalAVFOOY #analysis #modelling- Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, IÖ, FTYV), pp. 3339–3344.
ICPR-2014-SariE #analysis #detection #fault #independence #using- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPR-2014-SeckDT #3d #analysis #geometry #using- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPR-2014-SlitiHBA #analysis #robust #using- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPR-2014-TavakoliYRHS #analysis #eye tracking #recognition- Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
ICPR-2014-TuXN #analysis #detection #process- Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPR-2014-WangGLYWY #analysis #canonical #correlation- Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
ICPR-2014-WatanabeW #analysis #component #distance #learning #metric #performance- Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
ICPR-2014-YanRLSS #analysis #clustering #invariant #linear #multi #recognition- Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
ICPR-2014-YeWH #analysis #component #graph- Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
ICPR-2014-ZhangWGZZ #analysis #using #verification- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
KDD-2014-AkibaMK #analysis #network- Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
KDD-2014-JiangCWXZY #analysis #behaviour #flexibility #multi #named- FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDD-2014-LanSB #analysis #learning- Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
KDD-2014-TamhaneISDA #analysis #predict #risk management #student- Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDD-2014-YuH0 #analysis #detection #named #social #social media- GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDD-2014-ZhuSY #analysis #mining #network #social- Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
KDIR-2014-CastelltortL #analysis #graph- NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
KDIR-2014-HafethAC #analysis #case study #classification- Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
KDIR-2014-LiuF #analysis #classification #sentiment #topic #web- Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
KDIR-2014-LiuF14a #analysis #classification #n-gram #sentiment #similarity #web- Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
KDIR-2014-PsomakelisTAV #analysis #sentiment #twitter- Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIR-2014-WanJLL #analysis #challenge #sentiment #web- Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
KEOD-2014-AzaiezA #analysis #how #question #towards- How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KR-2014-BhattST #analysis #architecture #design #experience #industrial #user interface- Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
KR-2014-Delgrande #analysis #towards- Towards a Knowledge Level Analysis of Forgetting (JPD).
RecSys-2014-NoiaORTS #analysis #recommendation #towards- An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
SEKE-2014-BarnesL #analysis #clustering- Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
SEKE-2014-ChenHQJ #performance #static analysis #using- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKE-2014-El-KharboutlyGF #analysis #security- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKE-2014-Garcia-NunesSZB #analysis #collaboration #fuzzy #modelling- Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
SEKE-2014-JuniorCMS #data analysis #gpu #repository- Exploratory Data Analysis of Software Repositories via GPU Processing (JRDSJ, EC, LM, AS), pp. 495–500.
SEKE-2014-PaikariF #analysis #design #implementation #simulation- Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
SEKE-2014-SalmanSD14a #concept analysis #impact analysis #using- Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKE-2014-SchotsRS #analysis #performance #process- A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
SEKE-2014-VianaCS #analysis #information management- Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
SEKE-2014-WangC #analysis #approach #social #visualisation- User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKE-2014-WanZWS #analysis #graph #performance #points-to- Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
SEKE-2014-YangWSFC #analysis #debugging #fault- Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
SIGIR-2014-FangZ #analysis #axiom #information retrieval #modelling #optimisation- Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
SIGIR-2014-GoeuriotKL #analysis #information retrieval #query- An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
SIGIR-2014-LourencoVPMFP #analysis #sentiment- Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
SIGIR-2014-NiuLGCG #data analysis #learning #rank #robust #what- What makes data robust: a data analysis in learning to rank (SN, YL, JG, XC, XG), pp. 1191–1194.
SIGIR-2014-PelejaSM #analysis #sentiment- Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
SIGIR-2014-ThomasL #composition #data analysis #distance #information retrieval- Compositional data analysis (CoDA) approaches to distance in information retrieval (PT, DL), pp. 991–994.
SIGIR-2014-TsolmonL #analysis #modelling #timeline- An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
SIGIR-2014-UstaAVOU #analysis #education #how #learning #student- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIR-2014-ZhangL0ZLM #analysis #modelling #recommendation #sentiment- Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
AMT-2014-GogollaHH #dynamic analysis #modelling #ocl #on the #uml- On Static and Dynamic Analysis of UML and OCL Transformation Models (MG, LH, FH), pp. 24–33.
ECMFA-2014-Moreno-DelgadoDZT #analysis #composition #domain-specific language #flexibility- Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
ICMT-2014-GonzalezC #analysis #constraints #generative #model transformation #testing- Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
ICMT-2014-GuanaS #analysis- ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
ECOOP-2014-LiT #analysis #fault #python #source code- Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
ECOOP-2014-WeiR #analysis #behaviour #javascript #points-to- State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLA-2014-AndreasenM #static analysis- Determinacy in static analysis for jQuery (EA, AM), pp. 17–31.
OOPSLA-2014-BrutschyF0 #developer #independence #static analysis- Static analysis for independent app developers (LB, PF, PM), pp. 847–860.
OOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using- Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web- Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLA-2014-ParrHF #adaptation #dynamic analysis #ll #parsing #power of- Adaptive LL(*) parsing: the power of dynamic analysis (TP, SH, KF), pp. 579–598.
OOPSLA-2014-ZhangXZYS #alias #analysis #c #performance- Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
POPL-2014-ChaudhuriFK #analysis #consistency #source code- Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
POPL-2014-CoughlinC #analysis #composition #invariant- Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
POPL-2014-SergeyVJ #analysis #composition #higher-order #theory and practice- Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
POPL-2014-SharmaNA #program analysis #trade-off- Bias-variance tradeoffs in program analysis (RS, AVN, AA), pp. 127–138.
RE-2014-AnishG #analysis #requirements- Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
RE-2014-BadgerTC #analysis #design #named #requirements #verification- VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
RE-2014-GuzmanM #analysis #fine-grained #how #sentiment- How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RE-2014-NguyenGA #analysis #automation #named #ontology #requirements- GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
RE-2014-SaxenaC #agile #analysis #named #requirements- Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
REFSQ-2014-AlebrahimFHM #analysis #interactive #problem #requirements- Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
REFSQ-2014-NairVMTdB #analysis #problem #safety #traceability- Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
REFSQ-2014-RiegelD #analysis #elicitation #heuristic #optimisation #performance- An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
REFSQ-2014-SannierB #analysis #approach #modelling #named #requirements- INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
REFSQ-2014-SethiaP #analysis #elicitation #empirical #performance #requirements- The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
REFSQ-2014-YangLJC #adaptation #analysis #bibliography #modelling #requirements #self- A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
SAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology- Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SAC-2014-ChangCHKL #analysis #behaviour #mobile- Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SAC-2014-HalderZC #analysis #database #information management #query- Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SAC-2014-HuangLD #analysis #modelling #multi #network #performance- Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SAC-2014-HuangYKYLYGFQ #analysis #clustering #self- Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SAC-2014-KangI #dynamic analysis- Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SAC-2014-KangS #analysis #implementation #scheduling- Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SAC-2014-KumeNNS #dynamic analysis #framework- A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
SAC-2014-OliveiraO #analysis #kernel #linux- Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SAC-2014-OliveiraSB #analysis #coordination- Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SAC-2014-ParkH #analysis #network #performance- Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SAC-2014-QuilleTR #analysis- Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SAC-2014-SeoKTC #analysis #framework #network #social- A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SAC-2014-TragatschnigTZ #impact analysis #using- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SAC-2014-XiaLWZ #analysis #predict- Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SAC-2014-ZhanLS #analysis #in the cloud #mobile- A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
FSE-2014-Banerjee #energy #performance #static analysis #testing- Static analysis driven performance and energy testing (AB), pp. 791–794.
FSE-2014-DevroeyPCPLS #analysis #mutation testing #variability- A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
FSE-2014-FengADA #android #detection #named #semantics #static analysis- Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSE-2014-Gao #program analysis #testing- Numerical program analysis and testing (ZG), pp. 779–782.
FSE-2014-Gui00ND #agile #analysis #named #nondeterminism #reliability #tool support- RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
FSE-2014-KashyapDKWGSWH #framework #javascript #named #static analysis- JSAI: a static analysis platform for JavaScript (VK, KD, EAK, JW, KG, JS, BW, BH), pp. 121–132.
FSE-2014-LerchHBM #analysis #named #performance #scalability- FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
FSE-2014-LuoHEM #analysis #empirical #testing- An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
FSE-2014-XiaoCK #analysis #architecture #named #quality #tool support- Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
FSE-2014-Yang #analysis #bibliography #network #open source #perspective #social- Social network analysis in open source software peer review (XY), pp. 820–822.
ICSE-2014-AndroutsopoulosCDHH #analysis #fault #testing- An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
ICSE-2014-BagheriTS #automation #dynamic analysis #named- TradeMaker: automated dynamic analysis of synthesized tradespaces (HB, CT, KJS), pp. 106–116.
ICSE-2014-HuangMSZ #analysis #performance #testing- Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSE-2014-NguyenKWF #dynamic analysis #invariant #using- Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSE-2014-SuR #analysis #empirical #parametricity #probability- Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICSE-2014-YaoHJ #analysis #case study #equivalence #using- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
LDTA-J-2011-SauthoffG #analysis #domain-specific language #optimisation #programming- Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
SPLC-2014-DomisSGAK #analysis #case study #experience #industrial #reuse- Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
CC-2014-MadsenA #analysis #string- String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
CGO-2014-RountevY #analysis #android #user interface- Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
CGO-2014-StadlerWM #analysis #java- Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
CGO-2014-YeSX #analysis #detection- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPDC-2014-BeaumontM #analysis #matrix #multi #scheduling- Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
HPDC-2014-SuAWBS #analysis #correlation #dataset #distributed #parallel- Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
HPDC-2014-YinWFZZ #analysis #middleware #named #scalability #visualisation- SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
ISMM-2014-RatnakarN #analysis #constraints #graph #performance #points-to- Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
LCTES-2014-BallabrigaCR #analysis- Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
LCTES-2014-RoyRWW #analysis #approximate #automation #named- ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
OSDI-2014-ChowMFPW #analysis #internet #performance #scalability- The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
OSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
PPoPP-2014-MaAC #algorithm #analysis #manycore #thread- Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
CAV-2014-AlglaveKNP #approach #automation #static analysis- Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAV-2014-ChatterjeeCD #analysis #probability- CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
CAV-2014-EsparzaLMMN #analysis #approach #smt- An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAV-2014-HeizmannHP #analysis #learning #source code #termination- Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
CAV-2014-ItzhakyBRST #analysis- Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
CAV-2014-LeGQC #analysis #higher-order- Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
CAV-2014-SinnZV #bound #complexity #scalability #static analysis- A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICST-2014-HaysHB #testing #validation- Validation of Software Testing Experiments: A Meta-Analysis of ICST 2013 (MH, JHH, ACB), pp. 333–342.
ICST-2014-LiO #analysis #empirical #modelling #testing- An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
ICST-2014-MiicBT #analysis #automation #multi #test coverage #testing- Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing- Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
ICST-2014-WiklundSEL #analysis #automation #empirical #testing- Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
ISSTA-2014-Chen #constraints #program analysis #proving #reuse #scalability- Reusing constraint proofs for scalable program analysis (MC), pp. 449–452.
ISSTA-2014-HendersonPYHWZY #analysis #framework #performance- Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
ISSTA-2014-Just #analysis #framework #java #mutation testing #performance #scalability- The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
ISSTA-2014-JustEF #analysis #clustering #execution #mutation testing #performance- Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
ISSTA-2014-MarinescuHC #analysis #evolution #framework #named- Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web- Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
ISSTA-2014-XiaoBIMGC #analysis #dependence #effectiveness #type system- ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
LICS-CSL-2014-BaierDK #analysis #model checking #probability #trade-off- Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
RTA-TLCA-2014-HirokawaM #analysis #automation #complexity- Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
RTA-TLCA-2014-LiuDJ #analysis #confluence- Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
SAT-2014-BacchusN #algorithm #analysis #satisfiability- Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
SMT-2014-CarlssonGP #analysis #constraints #programming #protocol- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
SMT-2014-FremontS #program analysis #smt- Speeding Up SMT-Based Quantitative Program Analysis (DJF, SAS), pp. 3–13.
VMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability- Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
VMCAI-2014-GustavssonGL #analysis #execution #parallel #using- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAI-2014-Mine #abstract interpretation #analysis #relational #thread- Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAI-2014-SchwarzSVA #analysis #precise #source code- Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
CBSE-2013-LednickiCS #analysis #execution #worst-case- Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
ECSA-2013-BuchgeherW #analysis #architecture #consistency #towards- Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
ECSA-2013-GoknilSPM #analysis #constraints #modelling- Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
QoSA-2013-BeckerLB #adaptation #analysis #performance #requirements #self #validation- Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
QoSA-2013-BerardinelliLM #analysis #execution #non-functional- Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
QoSA-2013-KlattK #analysis #architecture #difference- Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
QoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance- Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
ASE-2013-AnnervazKSS #analysis #domain model #modelling #natural language #quality #requirements- Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
ASE-2013-GarciaIM #analysis #architecture #comparative- A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
ASE-2013-LetsholoZC #analysis #modelling #named #requirements- TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
ASE-2013-OhmannL #analysis #control flow #debugging #lightweight- Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
ASE-2013-PalepuXJ #dependence #dynamic analysis #performance #summary- Improving efficiency of dynamic analysis with dynamic dependence summaries (VKP, G(X, JAJ), pp. 59–69.
ASE-2013-RosnerSAKF #alloy #analysis #clustering #modelling #named #parallel- Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
ASE-2013-Servant #analysis #debugging #using- Supporting bug investigation using history analysis (FS), pp. 754–757.
ASE-2013-Wu0LD #analysis #automation #component #dependence #using- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASE-2013-ChenZAX #analysis #finite- Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
CASE-2013-ChenZH #analysis #modelling #performance- Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
CASE-2013-FantiIRU #analysis #scheduling #simulation- A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
CASE-2013-GiulianiCP #analysis #optimisation- A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
CASE-2013-LanzaKPSS #analysis #automation #detection #fault #using- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASE-2013-Markovski #analysis #synthesis- Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
CASE-2013-SaidiM #analysis #configuration management #development #self- Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
CASE-2013-WuCY #analysis #policy #reachability- A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASE-2013-XieLSD #analysis #approach #markov #modelling #process- Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASE-2013-ZhangH #algorithm #analysis #convergence #coordination #implementation #optimisation #parallel- Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
CASE-2013-ZhaoL #analysis #exponential #multi- Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
CASE-2013-ZhongLEHF #analysis #modelling #process #testing- Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
CASE-2013-ZhouKZS #analysis- Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
DAC-2013-AgostaBMP #analysis- Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DAC-2013-AlleMD #analysis #dependence #pipes and filters #runtime #synthesis- Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
DAC-2013-AndalamGSRR #analysis #precise- Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
DAC-2013-ChippaCRR #analysis #approximate- Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
DAC-2013-DingLM #analysis #multi #realtime- Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
DAC-2013-EbrahimiAT #analysis #approach #multi- A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DAC-2013-KuruvillaSPVC #analysis #optimisation #set #statistics- Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
DAC-2013-LinLM #analysis #hybrid #kernel #reachability #verification- Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
DAC-2013-MallikZLCBBBCRBMV #analysis #evaluation #framework #named- TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
DAC-2013-Miskov-ZivanovMF #analysis #automation #behaviour #design #network- Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
DAC-2013-RaiSST #algorithm #analysis #distributed #network #process- Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
DATE-2013-AhmadyanV #analysis #reachability #reduction #set- Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
DATE-2013-AitkenFKRR #analysis #how #question #reliability- Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
DATE-2013-AlieeGRT #analysis #automation #fault #reliability- Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
DATE-2013-BanaiyanMofradDG #analysis #distributed #fault tolerance #modelling- Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
DATE-2013-BoleyCAC #analysis #estimation #performance- Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
DATE-2013-BundMS #analysis- Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
DATE-2013-CaiHMM #analysis #memory management #modelling- Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
DATE-2013-CastellanaF #analysis #independence #liveness #scheduling #synthesis- Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
DATE-2013-ChenM #analysis #modelling #reliability- System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
DATE-2013-ChenRSIFC #analysis #process- A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
DATE-2013-DiazSSR #analysis #network #performance #security #simulation- Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
DATE-2013-DoganBCABA #analysis #embedded #execution #multi #power management- Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATE-2013-FirouziKTN #analysis #runtime- Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
DATE-2013-GuanYL0 #analysis #approach #estimation- FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATE-2013-HasanA #analysis #fault #feedback #formal method #using- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATE-2013-HellwegeHPP #analysis #metric #reliability- Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATE-2013-ImagawaTOS #analysis #architecture #configuration management #effectiveness- A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
DATE-2013-KosmidisCQABC #analysis #design #probability- Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
DATE-2013-LishernessLC #analysis #mutation testing- Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
DATE-2013-LiZCZ #analysis #multi #simulation- Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
DATE-2013-MalburgFF #analysis #comprehension #data flow #design- Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
DATE-2013-MaYGGTBH #analysis #architecture #towards #validation- Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
DATE-2013-NegreanKE #analysis #manycore- Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
DATE-2013-NeukirchnerQMAE #analysis #realtime- Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
DATE-2013-PollexFSMMW #analysis #constant #realtime- Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
DATE-2013-QianJBTMM #analysis #named #performance #using- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATE-2013-QuintonNE #analysis #formal method #realtime- Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
DATE-2013-RaminiGBB #3d #analysis #manycore #power management #using- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATE-2013-SchneiderZGMC #analysis #composition- Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
DATE-2013-ShahKA #analysis #bound- Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATE-2013-StanisicVCDMLM #analysis #embedded #performance #power management- Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
DATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATE-2013-TheissingMSSS #analysis #fault- Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
DATE-2013-WagnerW #analysis #performance #statistics- Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
DATE-2013-WildermannZT #analysis #distributed #game studies #manycore- Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
DATE-2013-YaoYW #adaptation #analysis #modelling #online #performance- Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
DATE-2013-YilmazSWO #analysis #fault #industrial #scalability #simulation- Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
DRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRR-2013-SimistiraPKC #analysis #online- Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
HT-2013-WangQS #analysis #realtime #social #twitter- Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
HT-2013-WeiHGLZW #analysis #behaviour #case study #twitter- Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
ICDAR-2013-AlkalaiBSL #analysis #identification- Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDAR-2013-AntonacopoulosCPP #analysis #contest #layout- ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
ICDAR-2013-GriechischML #analysis #online- Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDAR-2013-KirbyH #analysis #using- Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDAR-2013-LiPXW #analysis #consistency #online #order #verification- A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDAR-2013-StammLD #analysis #approach #documentation #multi #partial order- Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDAR-2013-TangHF #analysis #approach #recognition- A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDAR-2013-WangLD #analysis #recognition- Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
ICDAR-2013-WeiBSI #analysis #classification #documentation #evaluation #layout- Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
ICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel- A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation #using- A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
PODS-2013-CalvaneseGM #analysis #database #perspective #process- Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
SIGMOD-2013-GuilleFHZ #analysis #framework #mining #named #open source #social- SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
SIGMOD-2013-HuangB0 #data analysis #in the cloud #named #optimisation #statistics- Cumulon: optimizing statistical data analysis in the cloud (BH, SB, JY), pp. 1–12.
SIGMOD-2013-LapeineHHG #data analysis #interactive #mobile #query- Mobile interaction and query optimizationin a protein-ligand data analysis system (ML, KGH, EH, NMG), pp. 1291–1292.
SIGMOD-2013-MoustafaMDG #analysis #declarative #interactive #named #network- GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
SIGMOD-2013-SuZWHZ #analysis #similarity- Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
SIGMOD-2013-TaoYLBCHKSWWW #analysis #named #network #research- Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
VLDB-2013-DeutchMT #analysis #named #process- PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
VLDB-2013-MoyersSWKVBC #analysis #array #image #parallel- A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
VLDB-2013-OkcanRPF #analysis #named- Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
VLDB-2013-SeoPSL #analysis #distributed #graph #scalability- Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
VLDB-2013-SowellSCDG #analysis #in memory #memory management- An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
VLDB-2013-Taxidou #analysis #information management #realtime #social #social media- Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
ITiCSE-2013-HerreroLOST13a #analysis #empirical #performance- An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
ITiCSE-2013-Trakhtenbrot #algorithm #analysis #complexity #concept #problem #student- Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
ESOP-2013-AlpuenteBFS #analysis #logic #specification- Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
ESOP-2013-CollingbourneDKQ #analysis #gpu #kernel #semantics #verification- Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
ESOP-2013-HofmannR #analysis #automation #type inference- Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
FASE-2013-LinPEHR #analysis #behaviour #requirements #sequence #specification #string- Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
FASE-2013-TrippPCCG #analysis #named #scalability #security #web- Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
FoSSaCS-2013-HainryMP #analysis #complexity #process #type system- Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
TACAS-2013-BalasubramanianPKL #analysis #multi #named #statechart- Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
TACAS-2013-FerraraMP #analysis #data access #policy #self- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACAS-2013-GodefroidY #analysis #source code- Analysis of Boolean Programs (PG, MY), pp. 214–229.
TACAS-2013-Lowe #analysis #contest- CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
TACAS-2013-VizelGS #analysis #reachability #using- Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
TACAS-2013-Wendler #analysis #contest- CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
CSMR-2013-BhattacharyaUNK #analysis #android #debugging #empirical #open source- An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing- Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMR-2013-JezekHB #analysis #compilation #library- Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
CSMR-2013-LehnertFR #impact analysis #rule-based- Rule-Based Impact Analysis for Heterogeneous Software Artifacts (SL, QuaF, MR), pp. 209–218.
CSMR-2013-Nagy #data-driven #static analysis- Static Analysis of Data-Intensive Applications (CN), pp. 435–438.
ICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPC-2013-PruijtKB #analysis #architecture #dependence #on the- On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICPC-2013-SteidlHJ #analysis #quality #source code- Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSM-2013-AnandEKSBK #abstraction #analysis #bytecode #framework #memory management #stack- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
ICSM-2013-Beck #analysis #multi- Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support- srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSM-2013-MartinezDM #abstract syntax tree #analysis #automation- Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSM-2013-OsmanCP #algorithm #analysis #diagrams #machine learning- An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
ICSM-2013-SahaRS #analysis #evolution #named- gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
ICSM-2013-TianLS #analysis #debugging #multi #named #predict- DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
ICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics- Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSM-2013-YukselS #analysis #automation #case study #classification- Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSR-2013-DemeyerMWL #analysis #exclamation- Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
MSR-2013-FuLLDZX #analysis #behaviour #comprehension- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSR-2013-VasquezDP #analysis #development #mobile #stack overflow #using- An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
SCAM-2013-BiallasOCH #analysis #named #pointer- PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SCAM-2013-FabryRJ #analysis #source code- Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAM-2013-MuskeBS #bibliography #clustering #reduction #static analysis- Review efforts reduction by partitioning of static analysis warnings (TBM, AB, TS), pp. 106–115.
SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SCAM-2013-SvajlenkoRD #analysis #generative #named #similarity #tool support- ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
WCRE-2013-ClearyGVSSP #analysis #interactive #memory management #multi- Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
WCRE-2013-FryW #clustering #fault #maintenance #static analysis- Clustering static analysis defect reports to reduce maintenance costs (ZPF, WW), pp. 282–291.
WCRE-2013-SaeidiHKJ #analysis #legacy #modelling #named #tool support- Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
PEPM-2013-SunCZ #analysis #constraints #locality #source code- Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
PLDI-2013-KastrinisS #analysis #context-sensitive grammar #hybrid #points-to- Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
PLDI-2013-SankaranarayananCG #probability #source code #static analysis- Static analysis for probabilistic programs: inferring whole program properties from finitely many paths (SS, AC, SG), pp. 447–458.
PLDI-2013-SchaferSDT #analysis- Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
PLDI-2013-ZhangLYS #algorithm #alias #analysis #performance- Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
PLDI-2013-ZhangNY #abstraction #analysis #data flow #parametricity- Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
SAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification- Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
SAS-2013-DragoiES #analysis #data type- Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
SAS-2013-Goubault #abstract interpretation #source code #static analysis- Static Analysis by Abstract Interpretation of Numerical Programs and Systems, and FLUCTUAT (EG), pp. 1–3.
SAS-2013-Sankaranarayanan #static analysis- Static Analysis in the Continuously Changing World (SS), pp. 4–5.
SAS-2013-WhiteM #algebra #analysis #memory management #optimisation #using- Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
STOC-2013-HardtR #analysis #worst-case- Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
STOC-2013-KwokLLGT #algorithm #analysis #clustering #difference #higher-order- Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
CIAA-2013-DreyfusHK #analysis #approximate #reachability- Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
ICALP-v1-2013-DeDS #algorithm #analysis #difference #fourier #geometry #robust- A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
ICALP-v2-2013-HartungNNS #analysis #complexity #graph- A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
ICALP-v2-2013-PetricekOM #named #static analysis- Coeffects: Unified Static Analysis of Context-Dependence (TP, DAO, AM), pp. 385–397.
LATA-2013-FernauHV #analysis #automaton #multi #problem- A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
IFM-2013-GiachinoGLLW #analysis #concurrent #theory and practice- Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
IFM-2013-Song00LD #analysis #divide and conquer #reachability- Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
SEFM-2013-TranST #composition #static analysis #transaction- Compositional Static Analysis for Implicit Join Synchronization in a Transactional Setting (TMTT, MS, HT), pp. 212–228.
SFM-2013-GratieIP #analysis #biology- ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
SFM-2013-KopfR #analysis #automation #data flow- Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
GT-VMT-2013-MaximovaEE #analysis #graph transformation- Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
CHI-2013-AlperBRIF #analysis #comparison #graph- Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHI-2013-BrownML #analysis #mobile #video- iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHI-2013-GoyalLF #analysis #visualisation- Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
CHI-2013-HarpsteadMA #data analysis #education #game studies #learning- In search of learning: facilitating data analysis in educational games (EH, BAM, VA), pp. 79–88.
CHI-2013-VellosoBG #analysis #modelling #named- MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
CHI-2013-WalshFYD #analysis #design #framework- FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
CHI-2013-WangBK #analysis #facebook #gender #topic- Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
CSCW-2013-AlmuhimediWLSA #analysis #scalability #twitter- Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
CSCW-2013-Hautasaari #analysis #process #quote #wiki- “Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
CSCW-2013-Robert #analysis #multi- A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
CSCW-2013-SmithQC #analysis #identification #using- Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
DHM-SET-2013-ChiLC #analysis- The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
DHM-SET-2013-HungCSC #analysis #case study #comparative #education #effectiveness #women- A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
DUXU-CXC-2013-AsanoY #analysis #design- Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
DUXU-CXC-2013-CarvalhoSNM #analysis #comparative #game studies #interactive #usability- Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
DUXU-NTE-2013-BarrosSFCC #analysis #artificial reality #people- Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
DUXU-NTE-2013-Danylak #analysis #gesture #human-computer #interactive- Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
DUXU-NTE-2013-Gyoda #ad hoc #analysis #communication #evaluation #network #performance- Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
DUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability #using- Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
DUXU-PMT-2013-KohnoYSN #analysis #approach #design- Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
DUXU-PMT-2013-ZhangD #analysis #interactive- User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
DUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation- Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
DUXU-WM-2013-Kim13a #analysis #query- Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
HCI-III-2013-IteyaMK #analysis #using #visual notation- Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCI-III-2013-KimKAPW #analysis #artificial reality #social- Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
HCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow- Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCI-IMT-2013-Farhadi-NiakiEA #analysis #design #gesture #usability- Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
HCI-IMT-2013-SakataKN #analysis #collaboration #communication #scalability- Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
HCI-IMT-2013-SrivastavaT #analysis #realtime #using- Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCI-UC-2013-TajimaIK #analysis- Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
HIMI-D-2013-KobayashiYA #analysis #behaviour- Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HIMI-D-2013-KotaniKSA #analysis #development #memory management #using- Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HIMI-D-2013-SusukiTOM #analysis #behaviour- Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HIMI-HSM-2013-ChiangWCH #analysis #performance #smarttech- An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
HIMI-HSM-2013-HerronV #analysis #bibliography- Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
HIMI-HSM-2013-LeeJ #analysis #simulation #using- Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HIMI-HSM-2013-Noda #analysis #industrial #monitoring #performance #statistics- Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
HIMI-LCCB-2013-AntolosLLV #analysis #using- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HIMI-LCCB-2013-KuritaKWS #analysis- A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HIMI-LCCB-2013-YajimaHY #analysis #communication #design- Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
OCSC-2013-Abascal-MenaLZ #analysis #behaviour #mining #twitter- User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
OCSC-2013-AdnanHAT #analysis #behaviour #eye tracking #network #online #social- Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
OCSC-2013-YamauchiHN #analysis #source code #twitter- Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
VISSOFT-2013-KarranTD #analysis #named #thread #visual notation- SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
AdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILT-2013-CarterFHHT #analysis #named- SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
HILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability #using- Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
CAiSE-2013-BeheshtiBN #ad hoc #analysis #aspect-oriented #process- Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
CAiSE-2013-PapottiPSCP #analysis #code generation #modelling- A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
EDOC-2013-TranZ #analysis #approach #architecture #verification- Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEIS-J-2013-BouneffaA13a #approach #graph grammar #impact analysis #ontology- The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata- An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEIS-J-2013-RothPS13a #analysis #twitter- Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
ICEIS-v1-2013-BentayebK #adaptation #analysis #constraints #semantics- Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
ICEIS-v1-2013-ChiuFW #analysis #collaboration #integration #performance #social- An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
ICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear #using- Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEIS-v1-2013-ZaamouneBPB #analysis #approach #multi #relational- A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEIS-v2-2013-CuzzocreaF #analysis #comparative #exclamation #metamodelling #power of #state of the art- Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
ICEIS-v2-2013-SampaioM #analysis- Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
ICEIS-v2-2013-SuB #analysis #composition #data flow #graph #web #web service- Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
ICEIS-v3-2013-AndargoliBK #analysis- Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
ICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #using #web- Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
CIKM-2013-ArdonBMRSTT #analysis #topic #twitter- Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
CIKM-2013-FangHZ #analysis #bibliography #sentiment- Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
CIKM-2013-KellerMWB #adaptation #analysis #flexibility- Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
CIKM-2013-SubbianAS #analysis #mining #social- Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
ECIR-2013-ChenC #analysis #multi #network #topic #using- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIR-2013-HuiGHL #analysis #keyword- Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
ECIR-2013-NarangNMSD #analysis #evolution #microblog #social #topic- Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
ECIR-2013-PicaultR #analysis #interactive #multi #named #social- SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
ICML-c1-2013-AvronBTZ #analysis #canonical #correlation #performance #reduction- Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
ICML-c1-2013-HanL13a #analysis #component- Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
ICML-c1-2013-LivniLSNSG #analysis #component- Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
ICML-c1-2013-ZhangC #analysis #linear- Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
ICML-c2-2013-ChangKKZ #analysis #canonical #correlation #independence #kernel- Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
ICML-c2-2013-Goerg #analysis #component- Forecastable Component Analysis (GMG), pp. 64–72.
ICML-c3-2013-AndrewABL #analysis #canonical #correlation- Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
ICML-c3-2013-BaktashmotlaghHBLS #analysis #classification #video- Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
ICML-c3-2013-Kuleshov #algorithm #analysis #component #performance- Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
KDD-2013-CaiQ #analysis #linear #on the #rank- On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
KDD-2013-ChenTTY #analysis #kernel #modelling #performance- Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
KDD-2013-DavidsonGCW #analysis #network- Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
KDD-2013-KermanyMBNM #analysis #framework- Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
KDD-2013-MaiyaTLR #analysis #documentation- Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
KDD-2013-SunXY #analysis #component #robust- Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
KDD-2013-WangLLWWC #analysis #named #twitter- SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
KDD-2013-Wright #data analysis #learning #optimisation- Optimization in learning and data analysis (SJW), p. 3.
KDD-2013-ZhuYGM #analysis #modelling #scalability #topic- Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
KDIR-KMIS-2013-Gonzalez-BrambilaJG #analysis #database #research- Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIR-KMIS-2013-LlavoriLGNAS #analysis #framework #named #sentiment #towards- i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
KDIR-KMIS-2013-OliveiraCL #analysis #concept- Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
KDIR-KMIS-2013-PapulaVH #analysis #enterprise #network #process- Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
KDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process- An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
MLDM-2013-NikovskiWESSMT #data analysis #detection- Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDM-2013-SentzH #analysis- Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
MLDM-2013-YasojimaFBOS #analysis #case study #generative #power management- Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
RecSys-2013-ChowJKS #data analysis #difference #recommendation- Differential data analysis for recommender systems (RC, HJ, BPK, GS), pp. 323–326.
RecSys-2013-DoerfelJ #analysis #evaluation #recommendation- An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
SEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using- Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKE-2013-ChaoY #analysis #order #reachability #scalability- A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
SEKE-2013-HansenM #analysis #ecosystem #network #towards- Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
SEKE-2013-JanesMSS #analysis #problem #programming #requirements- Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (S) (AJ, SM, AS, GS), pp. 226–231.
SEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKE-2013-NishiuraMWH #analysis #mutation testing #testing- Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
SEKE-2013-SantosBC #analysis #education #game studies #modelling #programming #semantics- A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
SEKE-2013-WangWMX #analysis #how #performance- How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (S) (YW, JW, JM, BX), pp. 537–541.
SEKE-2013-WangZLBCT #analysis #modelling #non-functional #object-oriented #requirements- Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (S) (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
SEKE-2013-WeiX #analysis #e-commerce #effectiveness #evaluation- A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
SIGIR-2013-AnH #analysis #information retrieval #probability #semantics- Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
SIGIR-2013-ChaBHC #analysis #modelling #network #social #topic- Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
SIGIR-2013-GippMBLN #analysis #detection- Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIR-2013-GolbusA #analysis #framework #information retrieval- A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
SIGIR-2013-PappasP #analysis #collaboration #sentiment- Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
SIGIR-2013-SonKP #analysis #locality #recommendation #semantics- A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
AMT-2013-AgirreES #architecture #automation #development #impact analysis #migration #modelling- Automatic Impact Analysis of Software Architecture Migration on Model Driven Software Development (JAA, LE, GS), pp. 52–61.
MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MoDELS-2013-SaadB #analysis #data flow- Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MoDELS-2013-StorrleF #analysis #physics #towards #visual notation- Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MoDELS-2013-SaadB #analysis #data flow- Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MoDELS-2013-StorrleF #analysis #physics #towards #visual notation- Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
ECOOP-2013-AliL #named #program analysis- Averroes: Whole-Program Analysis without the Whole Program (KA, OL), pp. 378–400.
ECOOP-2013-AnsaloniKZBBT #composition #java #program analysis #tool support #virtual machine- Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine (DA, SK, YZ, LB, WB, PT), pp. 352–377.
Onward-2013-Repenning #interactive #program analysis #programming- Conversational programming: exploring interactive program analysis (AR), pp. 63–74.
Onward-2013-RossoJ #analysis #concept #design #git #what- What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
Onward-2013-ValleeWZFK #modelling #problem #reasoning #security- Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
OOPSLA-2013-BhattacharyaGN #detection #program analysis- Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLA-2013-ChongDKKQ #abstraction #analysis #gpu #invariant #kernel- Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
OOPSLA-2013-MeyerovichR #analysis #empirical #programming language- Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
OOPSLA-2013-SmaragdakisBK #analysis #points-to #preprocessor- Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
OOPSLA-2013-TetaliLMM #named #static analysis- MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
GPCE-2013-MarekKZBBTASS #framework #java #named #program analysis #robust- ShadowVM: robust and comprehensive dynamic program analysis for the java platform (LM, SK, YZ, LB, WB, PT, DA, AS, AS), pp. 105–114.
LOPSTR-2013-AlbertGG #analysis #approach- A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
LOPSTR-2013-LiqatKSGLGHE #analysis #energy #modelling #source code- Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
PPDP-2013-MontenegroPS #analysis #functional #regular expression #using- Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
QAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread- Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
PADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi #using- A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
RE-2013-BreauxR #analysis #formal method #multi #privacy #requirements #specification- Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
RE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements- Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
RE-2013-NistalaK #analysis #approach #consistency #requirements #validation- An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
REFSQ-2013-BonBGALTBFGATA #analysis #case study #requirements- Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
REFSQ-2013-BreauxG #analysis #requirements #specification #traceability #using- Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
SAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving #safety- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
SAC-2013-AbeniM #analysis #interactive- Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
SAC-2013-CameronSNMM #analysis #component #performance #realtime #rule-based- Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
SAC-2013-ChenLWW #abstraction #source code #static analysis- Static analysis of list-manipulating programs via bit-vectors and numerical abstractions (LC, RL, XW, JW), pp. 1204–1210.
SAC-2013-DelahayeKS #c #dynamic analysis #source code #specification- Common specification language for static and dynamic analysis of C programs (MD, NK, JS), pp. 1230–1235.
SAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet- An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SAC-2013-HogenboomBFBJK #analysis #sentiment- Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
SAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SAC-2013-KalyanC #analysis #navigation #using- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SAC-2013-KoPH #analysis #design #realtime #video- Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
SAC-2013-MeloAOAMB #analysis #approach #concept #visual notation- A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SAC-2013-PayetDKV #analysis #execution #scalability- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
SAC-2013-SenatoreP #collaboration #concept analysis #fuzzy #navigation- Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis (SS, GP), pp. 920–926.
SAC-2013-TsukudaOYIT #analysis #coordination- Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
SAC-2013-VeeraragavanBMVNM #analysis #comprehension #distributed #experience #interactive #metric #multi #quality- Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
SAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech- A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SAC-2013-ZhongM #analysis #empirical #game studies- Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
ESEC-FSE-2013-ClaretRNGB #analysis #data flow #using- Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSE-2013-JiangZLSHGS #analysis #reliability #runtime- System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
ESEC-FSE-2013-KimMKBSBd #combinator #configuration management #dynamic analysis #lightweight #named #testing- SPLat: lightweight dynamic analysis for reducing combinatorics in testing configurable systems (CHPK, DM, SK, DSB, SS, PB, Md), pp. 257–267.
ESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability- Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSE-2013-KumarN #static analysis #tool support- The economics of static analysis tools (RK, AVN), pp. 707–710.
ESEC-FSE-2013-LiebigRKADL #analysis #scalability- Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
ESEC-FSE-2013-MadsenLF #framework #javascript #library #static analysis- Practical static analysis of JavaScript applications in the presence of frameworks and libraries (MM, BL, MF), pp. 499–509.
ESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical- An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSE-2013-SenKBG #dynamic analysis #framework #javascript #named- Jalangi: a selective record-replay and dynamic analysis framework for JavaScript (KS, SK, TGB, SG), pp. 488–498.
ESEC-FSE-2013-SenKBG13a #dynamic analysis #framework #javascript #named #testing- Jalangi: a tool framework for concolic testing, selective record-replay, and dynamic analysis of JavaScript (KS, SK, TGB, SG), pp. 615–618.
ESEC-FSE-2013-WangZCZZ #javascript #program analysis- Extracting URLs from JavaScript via program analysis (QW, JZ, YC, YZ, JZ), pp. 627–630.
ESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault- Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ESEC-FSE-2013-ZhengZG #analysis #named #string #web- Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
ICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using- Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSE-2013-CarrenoW #analysis #approach #evolution #requirements- Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSE-2013-FilieriPV #analysis #reliability- Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
ICSE-2013-HaoLHG #energy #mobile #program analysis #using- Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSE-2013-Johnson04a #comprehension #program analysis- Novice understanding of program analysis tool notifications (BJ), pp. 1432–1434.
ICSE-2013-JohnsonSMB #debugging #developer #question #static analysis #tool support #why- Why don’t software developers use static analysis tools to find bugs? (BJ, YS, ERMH, RWB), pp. 672–681.
ICSE-2013-Le #analysis- Segmented symbolic analysis (WL), pp. 212–221.
ICSE-2013-Muslu #analysis #development #maintenance- Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
ICSE-2013-NguyenQRC #analysis #named #program repair #semantics- SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
ICSE-2013-SchwankeXC #analysis #architecture #quality- Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
ICSE-2013-ZhengZ #detection #execution #static analysis #web- Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
LDTA-J-2009-SoderbergEHM #abstract syntax tree #analysis #syntax- Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
SLE-2013-WachsmuthKVGV #analysis #incremental #independence- A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
PLEASE-2013-HuangYKHU #analysis #domain-specific language #mining #repository #towards- Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
SPLC-2013-EichelbergerS #analysis #modelling #variability- A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
SPLC-2013-KoziolekGGDS #analysis #case study #experience #identification #reuse- Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
SPLC-2013-McGregor #analysis #ecosystem #modelling #tutorial- Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
CC-2013-KastrinisS #analysis #effectiveness #exception #java #performance #points-to- Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
CC-2013-LuSXX #analysis #incremental #points-to- An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
CC-2013-SiegelS #analysis #named- FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
CGO-2013-JeonGT #named #performance #program analysis- Skadu: Efficient vector shadow memories for poly-scopic program analysis (DJ, SG, MBT), p. 12.
CGO-2013-KruijfS #analysis #code generation #evaluation #implementation- Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
CGO-2013-LaiS #analysis #bound #optimisation #performance- Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
CGO-2013-PienaarH #javascript #memory management #named #static analysis- JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
ISMM-2013-LiCK #analysis #graph #pointer #precise #scalability- Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
LCTES-2013-HuberPP #analysis #control flow #graph #using- Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTES-2013-MorenoFH #analysis #debugging #embedded- Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
PLOS-2013-BurtsevMER #analysis #named #performance #streaming- Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
PPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management- Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
PPoPP-2013-YukiFRS #analysis #array #data flow #source code- Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
SOSP-2013-HuangBRLKL #analysis #facebook- An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
CADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #protocol #symmetry #unification- Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAV-2013-ChakarovS #probability #program analysis- Probabilistic Program Analysis with Martingales (AC, SS), pp. 511–526.
CAV-2013-FarzanK #bound #named #parallel #static analysis- Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
CAV-2013-HolikLRSV #analysis #automation #automaton- Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
CAV-2013-MeierSCB #analysis #protocol #proving #security- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAV-2013-Sankur #analysis #automaton #named #robust- Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
ICLP-J-2013-LiangK #analysis #logic programming #scalability #source code- A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
ICLP-J-2013-MaLWRL #analysis #approach #declarative #distributed #execution #specification- A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICST-2013-CarrozzaCNPR #analysis #industrial #predict- Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
ICST-2013-GargantiniGM #analysis #automation #named #robust- AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
ICST-2013-ShuSHP #analysis #dependence #framework #named- JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
ISSTA-2013-Ghaith #analysis #performance #testing #transaction- Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
ISSTA-2013-HillsKV #empirical #perspective #php #static analysis- An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
ISSTA-2013-HowarGR #analysis #generative #hybrid #interface #learning- Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
ISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement- Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
ISSTA-2013-WeiR #analysis #javascript- Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
LICS-2013-ChaudhuriSV #analysis- Regular Real Analysis (SC, SS, MYV), pp. 509–518.
RTA-2013-BauLNW #analysis #term rewriting #termination- Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
TAP-2013-GogollaBC #analysis #benchmark #metric #ocl #tool support #uml- Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
VMCAI-2013-DAntoniV #static analysis #string- Static Analysis of String Encoders and Decoders (LD, MV), pp. 209–228.
VMCAI-2013-SamantaDC #analysis #robust- Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
VMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support #using- Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
CBSE-2012-BenesBCO #analysis #component #development #model checking #probability #reliability- Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
CBSE-2012-Carlson #analysis #component #embedded- Timing analysis of component-based embedded systems (JC), pp. 151–156.
WICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
WICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling- Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSA-2012-SuYZ #analysis #architecture #component #semantics- Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
WICSA-ECSA-2012-TauschPA #analysis #domain-specific language #named #traceability- TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
ASE-2012-AlmorsyGI #analysis #automation #using- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to #using- Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASE-2012-Shang0X #analysis #experience #incremental #performance #points-to #precise #summary- Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
ASE-2012-TamrawiNNN #analysis #named #refactoring- SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASE-2012-XiaoTFHM #analysis #privacy- User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
CASE-2012-ChenF #analysis #rule-based- Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
CASE-2012-ChenZAB #analysis #approach #performance #realtime- Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
CASE-2012-ChoiFN #analysis #assembly- Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
CASE-2012-CostantinoDEFS #analysis #evaluation #fuzzy #novel #performance- A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
CASE-2012-HoerningSWS #analysis #robust #simulation #tool support- Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
CASE-2012-Kim #analysis #fuzzy #robust- Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
CASE-2012-LinKH #analysis #functional #modelling- Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
CASE-2012-LiuJCLX #analysis #canonical #correlation #fault #identification #linear #research- Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
CASE-2012-QiaoWZ #analysis #clustering #petri net #scheduling #tool support- Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
CASE-2012-ShinPKA #analysis #linear- Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
CASE-2012-WangHDS #agile #analysis #protocol #simulation #using- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASE-2012-YumKK #analysis #bibliography #perspective- Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
DAC-2012-AgostaBP #analysis- A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DAC-2012-ChungJ #analysis #functional #performance- Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
DAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics- Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DAC-2012-JungPL #3d #reliability- Chip/package co-analysis of thermo-mechanical stress and reliability in TSV-based 3D ICs (MJ, DZP, SKL), pp. 317–326.
DAC-2012-KumarBKV #analysis #predict #source code #using- Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DAC-2012-LoS #analysis #execution #monitoring #parallel #runtime #worst-case- Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
DAC-2012-MeirR #analysis #biology #named #network #performance #using- BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DAC-2012-RajendranPSK #analysis #logic #obfuscation #security- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
DAC-2012-RoyC #analysis #predict- Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
DAC-2012-UkhovBEP #analysis #embedded #multi #optimisation #reliability- Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
DAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics- PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DAC-2012-ZhaoSL #3d #analysis- Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
DAC-2012-ZolotovSHFVXLV #analysis #statistics- Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
DATE-2012-BesteT #analysis #robust #standard- Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
DATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support- State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
DATE-2012-CaiHMM #analysis #fault #memory management #metric- Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
DATE-2012-ChangCM #analysis- RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
DATE-2012-Chaturvedi #static analysis- Static analysis of asynchronous clock domain crossings (SC), pp. 1122–1125.
DATE-2012-JafariJL #analysis #scheduling #worst-case- Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
DATE-2012-KnothJS #analysis #modelling- Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
DATE-2012-LiH #analysis #logic #named #performance #reliability- RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
DATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability- A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATE-2012-LiuTW #analysis #approach #graph #parallel #statistics- Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
DATE-2012-MaricauJG #analysis #learning #multi #reliability #using- Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATE-2012-MarinhoNPP #analysis #float #scheduling- Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
DATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid #protocol- Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATE-2012-MengC #3d #analysis #energy #performance #runtime- Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
DATE-2012-MiryalaCMP #analysis #network- IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
DATE-2012-NeogyR #analysis #design #injection- Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
DATE-2012-OzTKT #analysis #parallel #thread #trade-off- Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
DATE-2012-PerinTBM #analysis #implementation- Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
DATE-2012-PiscitelliP #analysis #design #hybrid- Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
DATE-2012-QuintonEBY #analysis #challenge #probability #roadmap- Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
DATE-2012-QuintonHE #analysis #formal method #realtime- Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
DATE-2012-RahimiBG #analysis- Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
DATE-2012-RajendranPSK #analysis #encryption #fault #logic #perspective- Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
DATE-2012-RoxEG #analysis #design #network #using- Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATE-2012-SchrijenL #analysis #comparative- Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
DATE-2012-TangZBM #analysis #correlation #modelling #statistics- Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
DATE-2012-ThieleE #analysis #data flow #graph #optimisation #performance- Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
DATE-2012-TsaiLL #analysis #configuration management #design- Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
DATE-2012-XuLHRHT #analysis #power management- Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
DATE-2012-ZhangPM #3d #analysis #grid #power management- Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DATE-2012-ZimmermannBR #analysis #multi #power management- Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
DATE-2012-ZohnerKSH #analysis- Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
DocEng-2012-JunediGL #analysis #independence #revisited #xml- XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
DRR-2012-ChazalonC #analysis #documentation #interactive #performance- Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
HT-2012-AisoposPTV #analysis #comparative #microblog #sentiment- Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
HT-2012-KlienS #analysis #network- Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
HT-2012-NakajimaZIN #analysis #detection #scalability- Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
PODS-2012-LetelierPPS #optimisation #query #semantics #static analysis #web- Static analysis and optimization of semantic web queries (AL, JP, RP, SS), pp. 89–100.
PODS-2012-Mahoney #approximate #data analysis #scalability- Approximate computation and implicit regularization for very large-scale data analysis (MWM), pp. 143–154.
SIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance #using- Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
SIGMOD-2012-MohanTSSC #data analysis #named #privacy- GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
SIGMOD-2012-YangZMWX #analysis #difference #privacy- Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
VLDB-2012-AlsubaieeAABBBCGHKLOPVW #analysis #big data #data transformation #named #open source- ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
VLDB-2012-DalviMP #analysis #web- An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
VLDB-2012-DasTADY #analysis #framework #what- Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
VLDB-2012-GawadeK #analysis #execution #framework #interactive #named #query #visual notation- Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
VLDB-2012-LetelierPPS #analysis #named- SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
VLDB-2012-RoyDMSW #analysis- Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
VLDB-2012-Shim #algorithm #big data #data analysis #pipes and filters- MapReduce Algorithms for Big Data Analysis (KS), pp. 2016–2017.
VLDB-2012-SunHYY #analysis #approach #mining #network- Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDB-2012-XuLGC #analysis #big data #clustering #in the cloud #interactive #named #visual notation- CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
VLDB-2012-ZhangZXYW #analysis #difference #functional #privacy- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
VLDB-2013-ZhaoT12 #analysis #network #scalability #social #visual notation- Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
ITiCSE-2012-BrownPSE #analysis #complexity #generative #named- JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
TACAS-2012-BouajjaniE #analysis #bound #message passing #source code- Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACAS-2012-DSilvaHKT #analysis #bound #learning- Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACAS-2012-FehnkerGHMPT #analysis #automation #using- Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACAS-2012-FriedmannL #analysis #automaton- Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
TACAS-2012-LoweW #analysis #contest- CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
TACAS-2012-ShvedMM #analysis #contest- Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
TACAS-2012-WangTGLS #analysis #formal method- Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
WRLA-2012-FadlisyahOA #analysis #formal method #modelling- Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, EÁ), pp. 139–161.
WRLA-2012-HillsKV #program analysis #rascal- Program Analysis Scenarios in Rascal (MH, PK, JJV), pp. 10–30.
WRLA-2012-WirsingEMM #analysis #architecture #design #maude- Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
CSMR-2012-Dovgalyuk #debugging #dynamic analysis #execution #multi- Deterministic Replay of System’s Execution with Multi-target QEMU Simulator for Dynamic Analysis and Reverse Debugging (PD), pp. 553–556.
CSMR-2012-GauthierM #case study #concept analysis #data access #modelling- Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
CSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict #using- Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMR-2012-HashimotoM #analysis #fine-grained #mining- Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
CSMR-2012-HoraADBCVM #analysis #debugging #visual notation- Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
CSMR-2012-JaszSBOG #impact analysis #using- Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMR-2012-KazatoHOMHS #concept analysis #feature model #multi- Feature Location for Multi-Layer System Based on Formal Concept Analysis (HK, SH, SO, SM, TH, MS), pp. 429–434.
CSMR-2012-KimKKB #analysis #database- Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
CSMR-2012-LamkanfiD #analysis #debugging- Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
CSMR-2012-PerezDGM #analysis #ecosystem #named- SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
CSMR-2012-TerceiroMCC #analysis #complexity #comprehension #evolution- Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
ICPC-2012-TenevD #analysis- Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
ICSM-2012-BauerHHJC #analysis #framework #incremental #quality #scalability- A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
ICSM-2012-BavotaQOLB #analysis #empirical #maintenance #smell #testing- An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
ICSM-2012-ChaikalisMC #analysis #evolution #named #network- SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
ICSM-2012-HindleBZN #analysis #developer #implementation #question #requirements #topic- Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
ICSM-2012-KimuraHIK #dynamic analysis #refactoring- Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
ICSM-2012-Pollock #analysis #challenge #natural language- Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
ICSM-2012-QuAR #impact analysis #testing #using- Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSM-2012-RaemaekersDV #analysis #library- Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
ICSM-2012-RungtaPB #behaviour #evolution #impact analysis- A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
ICSM-2012-Wilkerson #impact analysis #taxonomy- A software change impact analysis taxonomy (JWW), pp. 625–628.
ICSM-2012-YazdanshenasM #component #fine-grained #impact analysis #product line- Fine-grained change impact analysis for component-based product families (ARY, LM), pp. 119–128.
MSR-2012-GigerPG #analysis #empirical #predict- Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
MSR-2012-GuanaRHS #analysis #android #architecture #multi- Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
MSR-2012-HarmanJZ #analysis #mining- App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
MSR-2012-RotellaC #analysis #bibliography- Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
SCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using- Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAM-2012-GutzmannLL #analysis #framework #points-to- Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
SCAM-2012-KargenS #analysis #comprehension #data flow #named- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
SCAM-2012-LazarescuL #analysis #c #dependence #parallel #source code- Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
SCAM-2012-MayerS #analysis #refactoring- Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
SCAM-2012-Xie #analysis #testing- Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
SCAM-2012-ZollerS #java #named- AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
WCRE-2012-ClearySCSP #analysis #assembly #named- ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
WCRE-2012-HanZFHWS #analysis #android #comprehension #debugging #topic- Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
WCRE-2012-JanaN #detection #dynamic analysis #precise #using- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCRE-2012-Kinder #obfuscation #static analysis #towards- Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
WCRE-2012-SteidlHJ #analysis #network #recommendation #using- Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
PEPM-2012-AlbertCPR #analysis #incremental #resource management- Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
PLDI-2012-BenzHH #float #problem #program analysis- A dynamic program analysis to find floating-point accuracy problems (FB, AH, SH), pp. 453–462.
PLDI-2012-ChiwKRSS #analysis #domain-specific language #image #named #parallel #visualisation- Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
PLDI-2012-HolewinskiRRFPRS #analysis- Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
PLDI-2012-KruijfSJ #compilation #design #static analysis- Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
PLDI-2012-LeeCFN #hybrid #named #program analysis- Chimera: hybrid program analysis for determinism (DL, PMC, JF, SN), pp. 463–474.
PLDI-2012-WuTHCY #analysis #parallel #precise #source code- Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
SAS-2012-Alonso-BlasG #approach #cost analysis #on the- On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
SAS-2012-CalvertM #analysis #calculus #control flow- Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
SAS-2012-GoubaultPV #composition #static analysis- Modular Static Analysis with Zonotopes (EG, SP, FV), pp. 24–40.
SAS-2012-HenryMM #abstract interpretation #algorithm #analysis #evaluation- Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
SAS-2012-HoweK #analysis #parametricity #using- Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SAS-2012-KhedkerMR #analysis #pointer- Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
SAS-2012-Ledesma-GarzaR #analysis #functional #higher-order #reachability #source code- Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
SAS-2012-LeePMH #analysis #parallel #performance- Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
SAS-2012-MadhavanRV #analysis #composition #higher-order #source code- Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
STOC-2012-BrandtIKK #analysis- An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
STOC-2012-BrunschR #analysis #multi #optimisation- Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
STOC-2012-ChanP #analysis #bound #fourier #network- Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
FLOPS-2012-TobitaTK #analysis #higher-order #model checking- Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
LATA-2012-NikolicS #analysis #array- Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
FM-2012-BeekMS #analysis #named #variability- VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
FM-2012-MinamideM #analysis #html #parsing #reachability #specification #testing- Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
FM-2012-NguyenSLDL #analysis- Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
FM-2012-OwreSS #analysis #automation #cyber-physical- Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
IFM-2012-BorgerCG #analysis #framework #web- Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
IFM-2012-KazemeyniJOB #analysis #modelling #network #probability- MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
IFM-2012-ZhangNN #model checking #revisited #static analysis- Model Checking as Static Analysis: Revisited (FZ, FN, HRN), pp. 99–112.
SEFM-2012-AyraultBDP #analysis #dependence #ml- ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
SEFM-2012-CuoqKKPSY #analysis #named #perspective- Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
SFM-2012-Becker #analysis #model transformation #non-functional- Model Transformations in Non-functional Analysis (SB), pp. 263–289.
SFM-2012-CortellessaMT #analysis #modelling #performance- Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
ICFP-2012-EarlSMH #analysis #automaton #higher-order #source code- Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
ICFP-2012-SimoesVFJH #analysis #automation #functional #lazy evaluation #memory management #source code- Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
IFL-2012-Fluet #analysis #control flow #system f- A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
GRAPHITE-2012-BeckmannFKM #analysis #graph- A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
CHI-2012-BaurBB #analysis #component #music #scalability- Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
CHI-2012-BrechtEBG #analysis #network #social- Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
CHI-2012-ChuangRMH #analysis #design #modelling #trust #visualisation- Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHI-2012-DixonFW #analysis #interface #using #visual notation- A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHI-2012-FolstadLH #analysis #bibliography #evaluation #usability- Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
CHI-2012-KapteinR #analysis #statistics- Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHI-2012-MustafaLM #analysis #visual notation- EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
CHI-2012-WallnerK #analysis #approach #visualisation- A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CHI-2012-WillettHA #crowdsourcing #data analysis #social- Strategies for crowdsourcing social data analysis (WW, JH, MA), pp. 227–236.
CHI-2012-ZiemkiewiczGL #analysis #graph #visualisation- Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
CSCW-2012-BorgeGSC #analysis #process- Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
CSCW-2012-EhrlichC #analysis #communication #development #distributed #multi #performance- All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
CSCW-2012-HarboeMIH #collaboration #data analysis #diagrams- Computer support for collaborative data analysis: augmenting paper affinity diagrams (GH, JM, II, EMH), pp. 1179–1182.
CSCW-2012-KeeganGC #analysis #collaboration #editing #multi #network #statistics #wiki- Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
CSCW-2012-McDonaldGZ #analysis #prototype #social #type system- Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
CSCW-2012-NguyenF #analysis #how- How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
HILT-2012-LiSRM #analysis #protocol #realtime #scheduling- Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
CAiSE-2012-ZawawyKMM #analysis #logic #markov #network #using- Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
EDOC-2012-BinzLNS #analysis #enterprise #graph transformation #segmentation- Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
EDOC-2012-BurattinMAS #analysis #declarative #process- Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
EDOC-2012-WangWART #analysis #composition #ecosystem #modelling- Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
ICEIS-J-2012-AmarGMHLN12a #automation #concept analysis- Finding Semi-Automatically a Greatest Common Model Thanks to Formal Concept Analysis (BA, AOG, AM, MH, TL, CN), pp. 72–91.
ICEIS-J-2012-GeJG #analysis #recommendation- Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
ICEIS-v1-2012-AmarGMHLN #concept analysis #using- Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEIS-v2-2012-ChenIAPGLMW #enterprise #impact analysis #scalability- Change Impact Analysis for Large-scale Enterprise Systems (WC, AI, AA, JP, CG, ML, TSEM, AW), pp. 359–368.
ICEIS-v2-2012-FonteBCGH #evaluation #program analysis #using- Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEIS-v2-2012-PolasikGWKPT #analysis #mobile #process- Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
ICEIS-v2-2012-SemenovV #analysis #architecture #social #social media- Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
ICEIS-v3-2012-BauerEFH #analysis #consistency #process- Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
ICEIS-v3-2012-BonacinHRPB #analysis #aspect-oriented #challenge #problem #social- Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
ICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi #using- Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
CIKM-2012-AmatiAG #analysis #microblog- Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
CIKM-2012-AshkanC #analysis #behaviour #modelling- Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
CIKM-2012-DengSZ #analysis #documentation #performance #scalability- Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
CIKM-2012-DybalaRAS #analysis #comparative #generative #ranking- Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKM-2012-EldardiryN #analysis #classification #graph #how #predict- An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
CIKM-2012-HuHXLUZ #analysis #mining- Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
CIKM-2012-JatowtT #analysis #scalability- Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
CIKM-2012-JatowtT12a #analysis #comparative #readability #wiki- Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
CIKM-2012-Jin #analysis #multi #process #profiling- User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
CIKM-2012-KazaiCYT #analysis #fault #information retrieval- An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
CIKM-2012-LeelanupabZJ #analysis #cumulative #parametricity- A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
CIKM-2012-LiuW #analysis #on the #semantics- On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
CIKM-2012-LiuZG #analysis #ranking- Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
CIKM-2012-RahmanBH #algorithm #analysis #approximate #graph #named #scalability- GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
CIKM-2012-YueJHH #analysis #collaboration #query #web- Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
ECIR-2012-AlbakourKNASFR #analysis #query #web- Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
ECIR-2012-Bloom #analysis #graph- Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
ECIR-20