BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
softwar (75)
use (67)
system (66)
model (65)
base (55)

Stem analyz$ (all stems)

612 papers:

CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
HTHT-2015-JangHL #process
No Reciprocity in “Liking” Photos: Analyzing Like Activities in Instagram (JYJ, KH, DL), pp. 273–282.
HTHT-2015-PeraN #recommendation
Analyzing Book-Related Features to Recommend Books for Emergent Readers (MSP, YKN), pp. 221–230.
FASEFASE-2015-BornAHT #dependence #rule-based
Analyzing Conflicts and Dependencies of Rule-Based Transformations in Henshin (KB, TA, FH, GT), pp. 165–168.
ICPCICPC-2015-SohTAW #android #detection #user interface
Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
ICSMEICSME-2015-AggarwalHS #energy #evolution #named
GreenAdvisor: A tool for analyzing the impact of software evolution on energy consumption (KA, AH, ES), pp. 311–320.
SANERSANER-2015-HashimotoMI #fine-grained #scalability #source code
A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
SANERSANER-2015-IzquierdoCRBC #git #named
GiLA: GitHub label analyzer (JLCI, VC, BR, AB, JC), pp. 479–483.
SANERSANER-2015-SinghGN #data type #graph #memory management
MG++: Memory graphs for analyzing dynamic data structures (VS, RG, IN), pp. 291–300.
FMFM-2015-Hauck-Stattelmann #behaviour #industrial
Analyzing the Restart Behavior of Industrial Control Applications (SHS, SB, BS, SK, RJ), pp. 585–588.
HCIDHM-EH-2015-MeryS #modelling #requirements #using
Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
HCISCSM-2015-PervinPDTT #hashtag #multi #twitter
Hashtag Popularity on Twitter: Analyzing Co-occurrence of Multiple Hashtags (NP, TQP, AD, HT, FT), pp. 169–182.
ICEISICEIS-v1-2015-ZhengLL #contest
A Game-theory based Model for Analyzing E-marketplace Competition (JZ, WL, DLL), pp. 650–657.
ICEISICEIS-v2-2015-FariasNOCM #case study #commit #email #mining #repository
Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
ICEISICEIS-v2-2015-MagnavitaNM #evolution #using
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEISICEIS-v2-2015-SarmientoALS #modelling #petri net
Mapping Textual Scenarios to Analyzable Petri-Net Models (ES, EA, JCSdPL, GS), pp. 494–501.
ICEISICEIS-v3-2015-BhatRM #architecture #enterprise #evolution #metric #tool support
Tool Support for Analyzing the Evolution of Enterprise Architecture Metrics (MB, TR, FM), pp. 154–161.
KDDKDD-2015-DhurandharGRME #big data #risk management
Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
KDDKDD-2015-MomtazpourZRSR #cyber-physical #invariant #using
Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
SEKESEKE-2015-DingZ #modelling #petri net #using
Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKESEKE-2015-ElerDE #exception #execution #generative #symbolic computation #testing
Analyzing Exceptions in the Context of Test Data Generation Based on Symbolic Execution (MME, VHSD, ATE), pp. 346–351.
SEKESEKE-2015-FanYC #adaptation #composition #energy #modelling
Modeling and Analyzing Adaptive Energy Consumption for Service Composition (GF, HY, LC), pp. 585–588.
SEKESEKE-2015-LiuH #petri net #pipes and filters #verification
PIPE+Verifier — A Tool for Analyzing High Level Petri Nets (SL, XH), pp. 575–580.
SIGIRSIGIR-2015-LiDDCZB #behaviour #markov #process #query
Analyzing User’s Sequential Behavior in Query Auto-Completion via Markov Processes (LL, HD, AD, YC, HZ, RABY), pp. 123–132.
POPLPOPL-2015-GiacobazziLR #analysis #metaprogramming
Analyzing Program Analyses (RG, FL, FR), pp. 261–273.
POPLPOPL-2015-JourdanLBLP #c
A Formally-Verified C Static Analyzer (JHJ, VL, SB, XL, DP), pp. 247–259.
REFSQREFSQ-2015-LiHM #requirements #security #specification
Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
SACSAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SACSAC-2015-JuniorSPM #developer
Developers assignment for analyzing pull requests (MLdLJ, DMS, AP, LM), pp. 1567–1572.
ESEC-FSEESEC-FSE-2015-BarikJM #research #social
I heart hacker news: expanding qualitative research findings by analyzing social news websites (TB, BJ, ERMH), pp. 882–885.
ICSEICSE-v2-2015-MenziesMP #data analysis
The Art and Science of Analyzing Software Data; Quantitative Methods (TM, LLM, FP), pp. 959–960.
ICLPICLP-2015-Nys #deduction #roadmap
Advances in Analyzing Coroutines by Abstract Conjunctive Partial Deduction (VN).
VMCAIVMCAI-2015-Christakis0W #evaluation
An Experimental Evaluation of Deliberate Unsoundness in a Static Program Analyzer (MC, PM, VW), pp. 336–354.
ASEASE-2014-ArifulinaWBP #composition #modelling #named
SeSAME: modeling and analyzing high-quality service compositions (SA, SW, MB, MCP), pp. 839–842.
ASEASE-2014-HigoK #consistency #named #nondeterminism #source code
MPAnalyzer: a tool for finding unintended inconsistencies in program source code (YH, SK), pp. 843–846.
ASEASE-2014-ZuddasJPMO #comprehension #debugging #named
MIMIC: locating and understanding bugs by analyzing mimicked executions (DZ, WJ, FP, LM, AO), pp. 815–826.
DATEDATE-2014-GhalatyAS #analysis #fault
Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
HTHT-2014-AbbasiZTL #network #social
Am i more similar to my followers or followees?: analyzing homophily effect in directed social networks (MAA, RZ, JT, HL), pp. 200–205.
HTHT-2014-SquicciariniCB #image #privacy #web
Analyzing images’ privacy for the modern web (ACS, CC, RB), pp. 136–147.
SIGMODSIGMOD-2014-SimitsisWBW #named #query
VQA: vertica query analyzer (AS, KW, JB, JW), pp. 701–704.
TACASTACAS-2014-AlbertAFGGMPR #concurrent #named
SACO: Static Analyzer for Concurrent Objects (EA, PA, AFM, SG, MGZ, EMM, GP, GRD), pp. 562–567.
TACASTACAS-2014-DudkaPV #contest #graph #memory management #named
Predator: A Shape Analyzer Based on Symbolic Memory Graphs — (Competition Contribution) (KD, PP, TV), pp. 412–414.
TACASTACAS-2014-EssenG #generative
Analyzing the Next Generation Airborne Collision Avoidance System (CvE, DG), pp. 620–635.
TACASTACAS-2014-MullerV #contest #named
CPAlien: Shape Analyzer for CPAChecker — (Competition Contribution) (PM, TV), pp. 395–397.
SANERCSMR-WCRE-2014-HillSK #php #rascal
PHP AiR: Analyzing PHP systems with Rascal (MH, PK), pp. 454–457.
SANERCSMR-WCRE-2014-KlammerP #legacy #tool support #towards
Towards tool support for analyzing legacy systems in technical domains (CK, JP), pp. 371–374.
SANERCSMR-WCRE-2014-MeuriceC #database #evolution #named #visual notation
DAHLIA: A visual analyzer of database schema evolution (LM, AC), pp. 464–468.
ICPCICPC-2014-ThungLOC #classification #design #diagrams #metric #network #using
Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSMEICSME-2014-BiazziniMB #commit #distributed #on the #version control
On Analyzing the Topology of Commit Histories in Decentralized Version Control Systems (MB, MM, BB), pp. 261–270.
ICSMEICSME-2014-ThongtanunamYYKCFI #bibliography #code review #dataset #named #visualisation
ReDA: A Web-Based Visualization Tool for Analyzing Modern Code Review Dataset (PT, XY, NY, RGK, AECC, KF, HI), pp. 605–608.
ICSMEICSME-2014-ZouH #modelling #topic
LDA Analyzer: A Tool for Exploring Topic Models (CZ, DH), pp. 593–596.
SCAMSCAM-2014-CaraccioloCSL #corpus #multi #named
Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora (AC, AC, BS, ML), pp. 71–76.
SASSAS-2014-ChenHTWW #recursion #source code #using #verification
Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
SASSAS-2014-LeeOY
A Progress Bar for Static Analyzers (WL, HO, KY), pp. 184–200.
STOCSTOC-2014-DworkTT0 #analysis #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
AFLAFL-2014-BerglundDM #backtracking #behaviour #regular expression
Analyzing Catastrophic Backtracking Behavior in Practical Regular Expression Matching (MB, FD, BvdM), pp. 109–123.
FMFM-2014-SanatiMM #decidability #guidelines #logic #metric #using
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
CHICHI-2014-RoudautRHS #assembly #design #named
Changibles: analyzing and designing shape changing constructive assembly (AR, RR, TH, SS), pp. 2593–2596.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDUXU-TMT-2014-FaroughiM #design #idea #on the
On the Idea of Design: Analyzing the Ideal Form of Cars (AF, SM), pp. 64–73.
HCIDUXU-TMT-2014-InoueSNTMHKWK #physics #process
Attempts to Quantitative Analyze for the Change of Human Brain Activity with Physical and Psychological Load (HI, SS, HN, TT, FM, NH, SK, EW, SK), pp. 240–249.
HCIHCI-TMT-2014-FangZ #approach #online
A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
HCIHIMI-DE-2014-BoscarioliVTR #clustering #human-computer #tool support
Analyzing HCI Issues in Data Clustering Tools (CB, JV, MFT, VHR), pp. 22–33.
HCIHIMI-DE-2014-SuzukiSI #interactive #multi
Analyzing Structure of Multiparty Interaction: Group Size Effect in Story-Retelling Task (NS, MS, NI), pp. 261–270.
HCILCT-NLE-2014-RotheSG #video
Analyzing Interactivity in Asynchronous Video Discussions (HR, JS, MG), pp. 226–237.
HCISCSM-2014-Fu #microblog #network #social
Can Network Help Chinese Microblogs Diffuse? Analyzing 118 Networks of Reposts About Social Issues in China (KwF), pp. 331–341.
CAiSECAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #using #variability
Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
ICEISICEIS-v1-2014-MezghaniPZAS #detection #social
Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
CIKMCIKM-2014-ZhangLLW #graph #multi #named
PatentDom: Analyzing Patent Relationships on Multi-View Patent Graphs (LZ, LL, TL, DW), pp. 1369–1378.
ECIRECIR-2014-KapteinBL #case study #twitter
Analyzing Discussions on Twitter: Case Study on HPV Vaccinations (RK, EB, DL), pp. 474–480.
ECIRECIR-2014-KasterenUSN #twitter
Analyzing Tweets to Aid Situational Awareness (TvK, BU, VS, MEN), pp. 700–705.
KDDKDD-2014-BiKWC #resource management #topic
Who are experts specializing in landscape photography?: analyzing topic-specific authority on content sharing services (BB, BK, CW, JC), pp. 1506–1515.
KDDKDD-2014-SunSTLKTY #behaviour #collaboration #network
Analyzing expert behaviors in collaborative networks (HS, MS, ST, YL, LMK, ST, XY), pp. 1486–1495.
KRKR-2014-StrassW #approximate #complexity #fixpoint #framework
Analyzing the Computational Complexity of Abstract Dialectical Frameworks via Approximation Fixpoint Theory (HS, JPW).
RecSysRecSys-2014-KrishnanPFG #bias #learning #recommendation #social
A methodology for learning, analyzing, and mitigating social influence bias in recommender systems (SK, JP, MJF, KG), pp. 137–144.
SEKESEKE-2014-SantosBSC #game studies #learning #programming #semantics #source code
A Semantic Analyzer for Simple Games Source Codes to Programming Learning (ECOdS, GBB, VHVdS, EC), pp. 522–527.
SIGIRSIGIR-2014-AlamD #web
Analyzing the content emphasis of web search engines (MAA, DD), pp. 1083–1086.
SIGIRSIGIR-2014-YeniterziC #bias #testing
Analyzing bias in CQA-based expert finding test sets (RY, JC), pp. 967–970.
SIGIRSIGIR-2014-ZhangLLZ #evolution #graph #multi #named
PatentLine: analyzing technology evolution on multi-view patent graphs (LZ, LL, TL, QZ), pp. 1095–1098.
OOPSLAOOPSLA-2014-PradelSNS #generative #latency #named #testing #user interface
EventBreak: analyzing the responsiveness of user interfaces through performance-guided test generation (MP, PS, GCN, KS), pp. 33–47.
LOPSTRLOPSTR-2014-CornishGNSSS #array #program transformation #source code
Analyzing Array Manipulating Programs by Program Transformation (JRMC, GG, JAN, PS, HS, PJS), pp. 3–20.
REFSQREFSQ-2014-Condori-FernandezESDG #collaboration #interactive #performance #requirements #validation
Analyzing the Effect of the Collaborative Interactions on Performance of Requirements Validation (NCF, SE, KS, MD, AG), pp. 216–231.
SACSAC-2014-BaeLKWP #network #privacy #social
Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SACSAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
ICSEICSE-2014-BegelZ #exclamation #re-engineering
Analyze this! 145 questions for data scientists in software engineering (AB, TZ), pp. 12–13.
PPoPPPPoPP-2014-LiuM #architecture #parallel #performance #source code #thread
A tool to analyze the performance of multithreaded programs on NUMA architectures (XL, JMMC), pp. 259–272.
CAVCAV-2014-PaolettiYHWK #logic
Analyzing and Synthesizing Genomic Logic Functions (NP, BY, YH, CMW, HK), pp. 343–357.
LICSLICS-CSL-2014-FredriksonJ #approach #privacy #satisfiability
Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
VMCAIVMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability
Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
CASECASE-2013-KernschmidtV #approach #modelling
An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
DocEngDocEng-2013-WuDLMG #documentation #online
Searching online book documents and analyzing book citations (ZW, SD, ZL, PM, CLG), pp. 81–90.
ICDARICDAR-2013-GotoIFU #graph #scalability #set #using
Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
SIGMODSIGMOD-2013-ChengBK #named #twitter
Peckalytics: analyzing experts and interests on Twitter (AC, NB, NK), pp. 973–976.
SIGMODSIGMOD-2013-GoasdoueKKLMZ #web
Fact checking and analyzing the web (FG, KK, YK, JL, IM, SZ), pp. 997–1000.
CSEETCSEET-2013-MacKellar #coordination #re-engineering #student
Analyzing coordination among students in a software engineering project course (BM), pp. 279–283.
CSMRCSMR-2013-BergerSK #architecture #security
Extracting and Analyzing the Implemented Security Architecture of Business Applications (BJB, KS, RK), pp. 285–294.
CSMRCSMR-2013-BorgPR #network
Analyzing Networks of Issue Reports (MB, DP, PR), pp. 79–88.
CSMRCSMR-2013-BusingeSB #api #developer #eclipse
Analyzing the Eclipse API Usage: Putting the Developer in the Loop (JB, AS, MvdB), pp. 37–46.
CSMRCSMR-2013-ForsterKKB #component #dependence
Recovering Component Dependencies Hidden by Frameworks-Experiences from Analyzing OSGi and Qt (TF, TK, JK, MCB), pp. 295–304.
MSRMSR-2013-AllamanisS #stack overflow #topic #what #why
Why, when, and what: analyzing stack overflow questions by topic, type, and code (MA, CAS), pp. 53–56.
MSRMSR-2013-IacobH #feature model #mobile #online
Retrieving and analyzing mobile apps feature requests from online reviews (CI, RH), pp. 41–44.
SCAMSCAM-2013-MattsenCS #bound
Driving a sound static software analyzer with branch-and-bound (SM, PC, SS), pp. 63–68.
WCREWCRE-2013-AeschlimannLNW #case study #ecosystem #experience #legacy #pl-i
Analyzing PL/1 legacy ecosystems: An experience report (EA, ML, ON, CFW), pp. 441–448.
PLDIPLDI-2013-BoddenTRBBM #named #product line
SPLLIFT: statically analyzing software product lines in minutes instead of years (EB, TT, MR, CB, PB, MM), pp. 355–364.
LATALATA-2013-Etessami #algorithm #infinity #probability #recursion #verification
Algorithms for Analyzing and Verifying Infinite-State Recursive Probabilistic Systems (KE), p. 12.
CHICHI-2013-AndersenGP #education #framework
A trace-based framework for analyzing and synthesizing educational progressions (EA, SG, ZP), pp. 773–782.
CHICHI-2013-AnthonyKF #people
Analyzing user-generated youtube videos to understand touchscreen use by people with motor impairments (LA, YK, LF), pp. 1223–1232.
CHICHI-2013-LeeKYSG #mobile
Analyzing crowd workers in mobile pay-for-answer q&a (UL, JK, EY, JS, MG), pp. 533–542.
CHICHI-2013-SchildBLM #3d #game studies #user interface #visual notation
Creating and analyzing stereoscopic 3D graphical user interfaces in digital games (JS, LB, JJLJ, MM), pp. 169–178.
CHICHI-2013-TuchTH #experience #interactive
Analyzing users’ narratives to understand experience with interactive products (ANT, RT, KH), pp. 2079–2088.
CSCWCSCW-2013-IntroneD
Analyzing the flow of knowledge in computer mediated teams (JI, MD), pp. 341–356.
CSCWCSCW-2013-NicholsZYKS #quality #social #social media
Analyzing the quality of information solicited from targeted strangers on social media (JN, MXZ, HY, JHK, XS), pp. 967–976.
HCIDUXU-PMT-2013-KimKK #experience #usability #user interface
System for Evaluating Usability and User Experience by Analyzing Repeated Patterns (YBK, SJK, CHK), pp. 322–329.
HCIHCI-AMTE-2013-ColetiMN #automation #evaluation #recognition #speech #usability
Analyzing Face and Speech Recognition to Create Automatic Information for Usability Evaluation (TAC, MM, FdLdSN), pp. 184–192.
HCIHCI-AMTE-2013-HoroldMK
Analyzing Varying Environmental Contexts in Public Transport (SH, CM, HK), pp. 85–94.
HCIHIMI-LCCB-2013-HayashiON #collaboration #interactive #learning
An Experimental Environment for Analyzing Collaborative Learning Interaction (YH, YO, YIN), pp. 43–52.
HCIOCSC-2013-LeeKS #case study #experience #social
Assessing the Possibility of a Social e-Book by Analyzing Reader Experiences (SL, JIK, CS), pp. 50–57.
VISSOFTVISSOFT-2013-WallerWFDH #3d #concurrent #monitoring #named #visualisation
Synchrovis: 3D visualization of monitoring traces in the city metaphor for analyzing concurrency (JW, CW, FF, PD, WH), pp. 1–4.
CAiSECAiSE-2013-Eid-SabbaghW #architecture #process
Analyzing Business Process Architectures (RHES, MW), pp. 208–223.
CAiSECAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net #using
Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
ICEISICEIS-J-2013-BevacquaCFGP13a #data-driven #framework #monitoring #predict #process
A Data-Driven Prediction Framework for Analyzing and Monitoring Business Process Performances (AB, MC, FF, MG, LP), pp. 100–117.
ICEISICEIS-v2-2013-ToureSA #enterprise #modelling #source code #validation
A2MO and ETREOSys — Analyzing, Modeling and Validation of Enterprise Training Programs (FT, MS, EA), pp. 310–316.
ICMLICML-c3-2013-TangSH
Tensor Analyzers (YT, RS, GEH), pp. 163–171.
SEKESEKE-2013-AdamE #approach #multi
A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
SEKESEKE-2013-DingXG #approach #petri net #specification
An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
SEKESEKE-2013-IqbalKH #behaviour #communication #developer #social
Analyzing Social Behavior of Software Developers Across Different Communication Channels (S) (AI, MK, MH), pp. 113–118.
SEKESEKE-2013-NetoMGA #effectiveness #product line #testing
Analyzing the Effectiveness of a System Testing Tool for Software Product Line Engineering (S) (CRLN, IdCM, VCG, ESdA), pp. 584–588.
SEKESEKE-2013-SilvaVMA #approach #product line
Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
SEKESEKE-2013-YuFCL #in the cloud #modelling
Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
MODELSMoDELS-2013-FariasGWL #case study #design #industrial #modelling #scalability
Analyzing the Effort of Composing Design Models of Large-Scale Software in Industrial Case Studies (KF, AG, JW, CJPdL), pp. 639–655.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MODELSMoDELS-2013-FariasGWL #case study #design #industrial #modelling #scalability
Analyzing the Effort of Composing Design Models of Large-Scale Software in Industrial Case Studies (KF, AG, JW, CJPdL), pp. 639–655.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
PADLPADL-2013-LiangK #automation #logic programming #named #scalability #source code
Terminyzer: An Automatic Non-termination Analyzer for Large Logic Programs (SL, MK), pp. 173–189.
REFSQREFSQ-2013-DelaterP #development #perspective #requirements #research #source code
Analyzing the Tracing of Requirements and Source Code during Software Development — A Research Preview (AD, BP), pp. 308–314.
REFSQREFSQ-2013-Zorn-PauliPBKR #case study #industrial #process #release planning
Analyzing an Industrial Strategic Release Planning Process — A Case Study at Roche Diagnostics (GZP, BP, TB, HK, GR), pp. 269–284.
SACSAC-2013-BusseSDMR #architecture #manycore #scheduling
Analyzing resource interdependencies in multi-core architectures to improve scheduling decisions (AB, JHS, MD, GM, JR), pp. 1595–1602.
ICSEICSE-2013-DyerNRN #framework #named #repository #scalability
Boa: a language and infrastructure for analyzing ultra-large-scale software repositories (RD, HAN, HR, TNN), pp. 422–431.
ICSEICSE-2013-PintoSO #evolution #named #testing
TestEvol: a tool for analyzing test-suite evolution (LSP, SS, AO), pp. 1303–1306.
ICSEICSE-2013-Romano #industrial #perspective
Analyzing the change-proneness of service-oriented systems from an industrial perspective (DR), pp. 1365–1368.
ISMMISMM-2013-RavitchL #c #library #memory management
Analyzing memory ownership patterns in C libraries (TR, BL), pp. 97–108.
SOSPSOSP-2013-WangZKS #behaviour #towards
Towards optimization-safe systems: analyzing the impact of undefined behavior (XW, NZ, MFK, ASL), pp. 260–275.
CAVCAV-2013-BiondiLTW #imperative #named #security
QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
CAVCAV-2013-ChenAS #hybrid
Flow*: An Analyzer for Non-linear Hybrid Systems (XC, , SS), pp. 258–263.
ICTSSICTSS-2013-PellegrinoCM #developer #protocol #security
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
HTHT-2012-KontopoulouPKG #graph #matrix #metric
Graph and matrix metrics to analyze ergodic literature for children (EMK, MP, TK, EG), pp. 133–142.
VLDBVLDB-2012-MartensNNS
Developing and Analyzing XSDs through BonXai (WM, FN, MN, TS), pp. 1994–1997.
WRLAWRLA-2012-BruniCGLV #adaptation #maude #modelling #self
Modelling and Analyzing Adaptive Self-assembly Strategies with Maude (RB, AC, FG, ALL, AV), pp. 118–138.
CSMRCSMR-2012-DavisGHMM #assembly #experience #industrial
Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience (IJD, MWG, RCH, SM, NM), pp. 467–470.
ICSMEICSM-2012-HmoodEKR #open source #predict
Applying technical stock market indicators to analyze and predict the evolvability of open source projects (AH, ME, IK, JR), pp. 613–616.
WCREWCRE-2012-KimF #android #named #query
AQUA: Android QUery Analyzer (CJK, PF), pp. 395–404.
WCREWCRE-2012-RomanoRPK #fine-grained #source code #using
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
PEPMPEPM-2012-AlbertAGGP #named #termination
COSTABS: a cost and termination analyzer for ABS (EA, PA, SG, MGZ, GP), pp. 151–154.
FMFM-2012-AndreFKS #problem #robust #scheduling
IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling Problems (ÉA, LF, UK, RS), pp. 33–36.
CHICHI-2012-DunneRLMR #multi #named #network #scalability
GraphTrail: analyzing large multivariate, heterogeneous networks while supporting exploration history (CD, NHR, BL, RAM, GGR), pp. 1663–1672.
CHICHI-2012-HourcadeB #how #visual notation
How small can you go?: analyzing the effect of visual angle in pointing tasks (JPH, NEBR), pp. 213–216.
CHICHI-2012-PedroS #exclamation #social
Your opinion counts!: leveraging social comments for analyzing aesthetic perception of photographs (JSP, PS), pp. 2519–2522.
CSCWCSCW-2012-SuzukiKUII #collaboration #multi
Analyzing the structure of the emergent division of labor in multiparty collaboration (NS, TK, IU, SI, SI), pp. 1233–1236.
CAiSECAiSE-2012-BinderDDDFGGHHRRW #case study #clustering #experience #on the #process
On Analyzing Process Compliance in Skin Cancer Treatment: An Experience Report from the Evidence-Based Medical Compliance Cluster (EBMC2) (MB, WD, GD, RD, KAF, WG, WG, KH, MH, SRM, CR, SW), pp. 398–413.
CIKMCIKM-2012-BiyaniCSM #exclamation #online #thread #what
I want what i need!: analyzing subjectivity of online forum threads (PB, CC, AS, PM), pp. 2495–2498.
CIKMCIKM-2012-HerschelE #comprehension #data transformation #debugging
The nautilus analyzer: understanding and debugging data transformations (MH, HE), pp. 2731–2733.
CIKMCIKM-2012-MukherjeeMRB #multi #named #sentiment #twitter
TwiSent: a multistage system for analyzing sentiment in twitter (SM, AM, BAR, PB), pp. 2531–2534.
ECIRECIR-2012-ChelaruAS #query
Analyzing the Polarity of Opinionated Queries (SC, ISA, SS), pp. 463–467.
ICMLICML-2012-LiuW #modelling #multi #probability
TrueLabel + Confusions: A Spectrum of Probabilistic Models in Analyzing Multiple Ratings (CL, YMW), p. 6.
ICPRICPR-2012-JiangDPL #word
Analyzing the information entropy of states to optimize the number of states in an HMM-based off-line handwritten Arabic word recognizer (ZJ, XD, LP, CL), pp. 697–700.
ICPRICPR-2012-KhalifaBGE #image #novel
A novel CAD system for analyzing cardiac first-pass MR images (FK, GMB, GLG, AEB), pp. 77–80.
ICPRICPR-2012-MartinTT #gesture
Optical flow based Head Movement and Gesture Analyzer (OHMeGA) (SM, CT, MMT), pp. 605–608.
KDDKDD-2012-SchifanellaCCA #dependence #named #web
D-INDEX: a web environment for analyzing dependences among scientific collaborators (CS, LDC, MC, MAA), pp. 1520–1523.
KDDKDD-2012-YangGRP #framework #twitter
A framework for summarizing and analyzing twitter feeds (XY, AG, YR, SP), pp. 370–378.
SEKESEKE-2012-CuiWLBZL #aspect-oriented #diagrams #petri net #process #verification
Verifying Aspect-Oriented Activity Diagrams Against Crosscutting Properties with Petri Net Analyzer (ZC, LW, XL, LB, JZ, XL), pp. 369–374.
SIGIRSIGIR-2012-TranF #information retrieval #interactive #using
Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
ECMFAECMFA-2012-QureshiCT #constraints #specification
A Timed Automata-Based Method to Analyze EAST-ADL Timing Constraint Specifications (TNQ, DJC, MT), pp. 303–318.
PLATEAUPLATEAU-2012-MeyerovichR12a #bibliography #case study #developer #experience #how #repository
How not to survey developers and repositories: experiences analyzing language adoption (LAM, ASR), pp. 7–16.
TOOLSTOOLS-EUROPE-2012-CorralSSSV #development #mobile #named #process #proximity
DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity (LC, AS, GS, JS, JV), pp. 17–33.
LOPSTRLOPSTR-2012-GieslSSEF #evaluation #graph #logic programming #source code #symbolic computation #term rewriting
Symbolic Evaluation Graphs and Term Rewriting — A General Methodology for Analyzing Logic Programs (JG, TS, PSK, FE, CF), p. 1.
PPDPPPDP-2012-GieslSSEF #evaluation #graph #logic programming #source code #symbolic computation #term rewriting
Symbolic evaluation graphs and term rewriting: a general methodology for analyzing logic programs (JG, TS, PSK, FE, CF), pp. 1–12.
REFSQREFSQ-2012-BeckersFKS #identification
A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
SACSAC-2012-DayehH #biology #network #using
Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
SACSAC-2012-GocicS #paradigm #process
Service-oriented paradigm for analyzing hydrological processes (MG, DS), pp. 1994–1995.
SACSAC-2012-SaidJA #collaboration
Analyzing weighting schemes in collaborative filtering: cold start, post cold start and power users (AS, BJJ, SA), pp. 2035–2040.
FSEFSE-2012-AlbertFG #concurrent #named
MayPar: a may-happen-in-parallel analyzer for concurrent objects (EA, AFM, SG), p. 14.
FSEFSE-2012-KwonS #component #detection
Detecting and analyzing insecure component usage (TK, ZS), p. 5.
ICSEICSE-2012-SongHLSLD #approach #model checking #multi #probability
Analyzing multi-agent systems with probabilistic model checking approach (SS, JH, YL, JS, HfL, JSD), pp. 1337–1340.
SPLCSPLC-2012-HeiderRGL #impact analysis #modelling #testing #using #variability
Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
ASPLOSASPLOS-2012-HariANR #equivalence #fault #named
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults (SKSH, SVA, HN, PR), pp. 123–134.
CAVCAV-2012-BenqueBCCFIPTV #biology #modelling #named #network #visual notation
Bma: Visual Tool for Modeling and Analyzing Biological Networks (DB, SB, CC, BC, JF, SI, NP, AST, MYV), pp. 686–692.
CAVCAV-2012-KieferMOWW #named #probability #source code
APEX: An Analyzer for Open Probabilistic Programs (SK, ASM, JO, BW, JW), pp. 693–698.
ICSTICST-2012-GrooteOW #formal method #using
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
WICSAWICSA-2011-BouwersCDV #architecture
Quantifying the Analyzability of Software Architectures (EB, JPC, AvD, JV), pp. 83–92.
ASEASE-2011-UddinDR #api
Analyzing temporal API usage patterns (GU, BD, MPR), pp. 456–459.
ASEASE-2011-Vakili #modelling
Analyzing temporal properties of abstract models (AV), pp. 656–659.
ASEASE-2011-VakiliD #declarative #model checking #modelling #using
Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
ASEASE-2011-XingXJ #difference #named
CloneDifferentiator: Analyzing clones by differentiation (ZX, YX, SJ), pp. 576–579.
DACDAC-2011-KimS #data access #memory management #named
CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
DRRDRR-2011-MaronezeCL #documentation #image #recognition #statistics
Introduction of statistical information in a syntactic analyzer for document image recognition (AOM, BC, AL), pp. 1–10.
FASEFASE-2011-GharaibehRC #framework #question
Analyzing Software Updates: Should You Build a Dynamic Updating Infrastructure? (BG, HR, JMC), pp. 371–385.
CSMRCSMR-2011-AnquetilL #legacy
Legacy Software Restructuring: Analyzing a Concrete Case (NA, JL), pp. 279–286.
CSMRCSMR-2011-SiddiqueM #clustering
Analyzing Term Weighting Schemes for Labeling Software Clusters (FS, OM), pp. 85–88.
ICSMEICSM-2011-GrooteOW #development #formal method #industrial
Analyzing the effects of formal methods on the development of industrial control software (JFG, AO, JHW), pp. 467–472.
ICSMEICSM-2011-YazdanshenasM #bound #component
Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
SCAMSCAM-2011-SchulzeJF #preprocessor
Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
WCREWCRE-2011-DuszynskiKB #multi #reuse #source code
Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
WCREWCRE-2011-ZhuWPXZ #composition #evolution #monitoring #quality #roadmap
Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views (TZ, YW, XP, ZX, WZ), pp. 229–238.
STOCSTOC-2011-Haeupler #network
Analyzing network coding gossip made easy (BH), pp. 293–302.
ICALPICALP-v2-2011-Cord-LandwehrDFHKKKKMHRSWWW #algorithm #approach #convergence #mobile
A New Approach for Analyzing Convergence Algorithms for Mobile Robots (ACL, BD, MF, MH, BK, AK, PK, SK, MM, FMadH, CR, KS, DW, CW, DW), pp. 650–661.
AGTIVEAGTIVE-2011-RungeET #algebra #graph transformation #specification
AGG 2.0 — New Features for Specifying and Analyzing Algebraic Graph Transformations (OR, CE, GT), pp. 81–88.
CHICHI-2011-MedlerJL #game studies #online #visual notation
Data cracker: developing a visual game analytic tool for analyzing online gameplay (BM, MJ, JL), pp. 2365–2374.
CSCWCSCW-2011-BardramD #analysis #process
Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
CSCWCSCW-2011-Bouz-AsalII #education #web
Analyzing patterns in composing teaching materials from the web (NBA, RI, TI), pp. 605–608.
HCIHCD-2011-NazemiBPBK #adaptation #user interface #visualisation
Adapting User Interfaces by Analyzing Data Characteristics for Determining Adequate Visualizations (KN, DB, AP, MB, AK), pp. 566–575.
HCIHCI-ITE-2011-JohnsonLNY #behaviour
Analyzing User Behavior within a Haptic System (SLJ, YL, CSN, TY), pp. 62–70.
HCIHIMI-v1-2011-YamamotoSYNW #development #interactive
Development of an Eye-Tracking Pen Display for Analyzing Embodied Interaction (MY, HS, KY, TN, TW), pp. 651–658.
VISSOFTVISSOFT-2011-NovaisLCPM #approach #difference #evolution #interactive #visual notation
An interactive differential and temporal approach to visually analyze software evolution (RLN, CANL, GdFC, RMSP, MGM), pp. 1–4.
ICEISICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEISICEIS-v2-2011-YeL #theory and practice
Analyzing Data from AVL/APC System for Improving Transit Management — Theory and Practice (YY, JL), pp. 267–274.
ICEISICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEISICEIS-v3-2011-WangWWL #modelling #using #workflow
Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
ICEISICEIS-v4-2011-XieH #approach #architecture #quality
An Architectural Approach to Analyze Information Quality for Inter-organizational Service (SX, MH), pp. 438–443.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
SEKESEKE-2011-YuLFC #composition #testing
A Regression Test Technique for Analyzing the Functionalities of Service Composition (HY, DL, GF, LC), pp. 578–582.
SIGIRSIGIR-2011-HuggettR #generative
The Meta-Dex Suite: generating and analyzing indexes and meta-indexes (MH, ER), pp. 1285–1286.
ECMFAECMFA-2011-SvendsenHM #semantics #variability
Analyzing Variability: Capturing Semantic Ripple Effects (AS, ØH, BMP), pp. 253–269.
PLATEAUPLATEAU-2011-YoonM #editing #low level
Capturing and analyzing low-level events from the code editor (YY, BAM), pp. 25–30.
SACSAC-2011-FragidisT
Analyzing value co-creation in service systems: contribution from GORE (GF, KAT), pp. 705–707.
SACSAC-2011-FreitasHCFPWL
Analyzing different levels of geographic context awareness in agent ferrying over VANETs (EPdF, TH, LAGC, AMF, CEP, FRW, TL), pp. 413–418.
SACSAC-2011-HaBKBJ #analysis #network #perspective #social
Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
SACSAC-2011-HorkoffY #how #modelling
Analyzing goal models: different approaches and how to choose among them (JH, ESKY), pp. 675–682.
SACSAC-2011-SingerNVKL
Search-logger analyzing exploratory search tasks (GS, UN, EV, HK, DL), pp. 751–756.
LDTALDTA-2011-JorgensenEF #generative #named #tool support #visualisation
VLex: visualizing a lexical analyzer generator — tool demonstration (AJ, GRE, BF), p. 12.
PLEASEPLEASE-2011-Li #evolution #identification #product line
Identifying best practice by analyzing the evolution of the FISCAN MTMSIS software product line (DL), pp. 40–44.
CAVCAV-2011-RamanK #behaviour #specification #using
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
ICSTSAT-2011-ArgelichLMP #evaluation #satisfiability
Analyzing the Instances of the MaxSAT Evaluation (JA, CML, FM, JP), pp. 360–361.
ECSAECSA-2010-SuYZ #architecture #specification
An ADL-Approach to Specifying and Analyzing Centralized-Mode Architectural Connection (GS, MY, CZ), pp. 8–23.
ASEASE-2010-Abi-AntounB #architecture #security
Analyzing security architectures (MAA, JMB), pp. 3–12.
ASEASE-2010-LiHG #ajax #behaviour #detection #interactive #web
Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
ASEASE-2010-RederE #design #detection #fault #named #uml #visualisation
Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML (AR, AE), pp. 347–348.
DACDAC-2010-ThalmaierNWSBK #induction #invariant #satisfiability
Analyzing k-step induction to compute invariants for SAT-based property checking (MT, MDN, MW, DS, JB, WK), pp. 176–181.
DRRDRR-2010-ChazalonC #definite clause grammar #documentation #using
Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
SIGMODSIGMOD-2010-ChuiKLC #named #sequence
S-OLAP: an OLAP system for analyzing sequence data (CKC, BK, EL, DWC), pp. 1131–1134.
SIGMODSIGMOD-2010-TsirogiannisHS #database #energy #performance
Analyzing the energy efficiency of a database server (DT, SH, MAS), pp. 231–242.
VLDBVLDB-2010-CormodeLLS
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
VLDBVLDB-2010-SchadDQ #in the cloud #metric #runtime
Runtime Measurements in the Cloud: Observing, Analyzing, and Reducing Variance (JS, JD, JAQR), pp. 460–471.
FASEFASE-2010-ChatterjeeARS #concurrent #multi #source code #thread
Analyzing the Impact of Change in Multi-threaded Programs (KC, LdA, VR, CS), pp. 293–307.
FASEFASE-2010-HashimotoM #evolution
A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
TACASTACAS-2010-BuchsHMR #algebra #named #petri net
AlPiNA: An Algebraic Petri Net Analyzer (DB, SH, AM, MR), pp. 349–352.
ICSMEICSM-2010-HasanSBA #process
Analyzing natural-language artifacts of the software process (MH, ES, DB, MHA), pp. 1–5.
WCREWCRE-2010-DavisG #assembly #detection #source code
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
WCREWCRE-2010-RupakhetiH #approach #java #similarity
An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java (CRR, DH), pp. 205–214.
CHICHI-2010-HourcadeNPD
Pointassist for older adults: analyzing sub-movement characteristics to aid in pointing tasks (JPH, CMN, KBP, NLD), pp. 1115–1124.
CAiSECAiSE-2010-HolmesZDD #internet #monitoring
Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment (TH, UZ, FD, SD), pp. 98–112.
ICEISICEIS-HCI-2010-KisilevichKR #framework #named
GEO-SPADE — A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data (SK, DAK, LR), pp. 13–20.
ECIRECIR-2010-Martinez-RomoA #information retrieval #web
Analyzing Information Retrieval Methods to Recover Broken Web Links (JMR, LA), pp. 26–37.
ICPRICPR-2010-JiangZWZ
Distinguishing Patients with Gastritis and Cholecystitis from the Healthy by Analyzing Wrist Radial Arterial Doppler Blood Flow Signals (XJ, DZ, KW, WZ), pp. 2492–2495.
ICPRICPR-2010-LiaoH #detection #energy
Slip and Fall Events Detection by Analyzing the Integrated Spatiotemporal Energy Map (TL, CLH), pp. 1718–1721.
SEKESEKE-2010-GuedesV #multi #requirements #uml
A UML Profile Oriented to the Requirements Collecting and Analyzing for the Multi-Agent Systems Project (GTAG, RMV), p. 2833.
SEKESEKE-2010-MauczkaBG #case study #classification #metric #process
Analyzing the Relationship of Process Metrics And Classified Changes — A Pilot Study (AM, MB, TG), pp. 269–272.
ECOOPECOOP-2010-HeideggerT #scripting language
Recency Types for Analyzing Scripting Languages (PH, PT), pp. 200–224.
SACSAC-2010-HansenI #alloy #architecture #modelling
Modeling and analyzing architectural change with alloy (KMH, MI), pp. 2257–2264.
SACSAC-2010-LuNB #dependence #execution
Timing analyzing for systems with execution dependencies between tasks (YL, TN, IB), pp. 357–358.
FSEFSE-2010-KneussSK #named #php
Phantm: PHP analyzer for type mismatch (EK, PS, VK), pp. 373–374.
FSEFSE-2010-LiuSD #realtime
Analyzing hierarchical complex real-time systems (YL, JS, JSD), pp. 365–366.
SPLCSPLC-2010-BelategiSE #embedded #product line #variability
MARTE Mechanisms to Model Variability When Analyzing Embedded Software Product Lines (LB, GS, LE), pp. 466–470.
SPLCSPLC-2010-Duszynski #diagrams #matrix #variability #visualisation
Visualizing and Analyzing Software Variability with Bar Diagrams and Occurrence Matrices (SD), pp. 481–485.
ASPLOSASPLOS-2010-WeeratungeZJ #concurrent #debugging #manycore
Analyzing multicore dumps to facilitate concurrency bug reproduction (DW, XZ, SJ), pp. 155–166.
PPoPPPPoPP-2010-TallentMP #parallel #thread
Analyzing lock contention in multithreaded applications (NRT, JMMC, AP), pp. 269–280.
CAVCAV-2010-RepsLTBL #verification
There’s Plenty of Room at the Bottom: Analyzing and Verifying Machine Code (TWR, JL, AVT, GB, AL), pp. 41–56.
ISSTAISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing #using
Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
WICSA-ECSAWICSA-ECSA-2009-AngelovGG #architecture #classification #effectiveness
A classification of software reference architectures: Analyzing their success and effectiveness (SA, PWPJG, DG), pp. 141–150.
WICSA-ECSAWICSA-ECSA-2009-BielG #architecture #towards #usability
Towards a Method for Analyzing Architectural Support Levels of Usability (BB, VG), pp. 273–276.
ASEASE-2009-KroeningSTTW #named #source code
Loopfrog: A Static Analyzer for ANSI-C Programs (DK, NS, ST, AT, CMW), pp. 668–670.
ASEASE-2009-SardinhaCWGR #aspect-oriented #automation #detection #named #requirements
EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements (AS, RC, NW, PG, AR), pp. 530–534.
CASECASE-2009-GoswamiSBC
A DECOMSYS based tool-chain for analyzing FlexRay based automotive control applications (DG, PS, UDB, SC), pp. 403–408.
DACDAC-2009-BurnhamYH #probability
A stochastic jitter model for analyzing digital timing-recovery circuits (JRB, CKKY, HAH), pp. 116–121.
DACDAC-2009-TsaiH
A false-path aware formal static timing analyzer considering simultaneous input transitions (ST, CYH), pp. 25–30.
DATEDATE-2009-RedaN #metric #modelling #novel #parametricity #process
Analyzing the impact of process variations on parametric measurements: Novel models and applications (SR, SRN), pp. 375–380.
ICDARICDAR-2009-WangSY #comprehension #online
The Understanding and Structure Analyzing for Online Handwritten Chemical Formulas (XW, GS, JY), pp. 1056–1060.
VLDBVLDB-2009-HerschelHT #named
Artemis: A System for Analyzing Missing Answers (MH, MAH, WCT), pp. 1550–1553.
ITiCSEITiCSE-2009-AhoniemiK
Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
ITiCSEITiCSE-2009-BrabrandD #taxonomy #using
Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
WRLAWRLA-2008-RiescoV09 #implementation #maude #protocol
Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol (AR, AV), pp. 249–266.
FASEFASE-2009-AguirreFMMW #alloy #behaviour #specification #using
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
CSMRCSMR-2009-AbebeHMTA #evolution #source code
Analyzing the Evolution of the Source Code Vocabulary (SLA, SH, AM, PT, GA), pp. 189–198.
CSMRCSMR-2009-Laitila #analysis #comprehension #named
SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
ICSMEICSM-2009-HouW #case study #eclipse #evolution
Analyzing the evolution of user-visible features: A case study with Eclipse (DH, YW), pp. 479–482.
ICSMEICSM-2009-KnabFGP #interactive #problem
Interactive views for analyzing problem reports (PK, BF, HG, MP), pp. 527–530.
MSRMSR-2009-OssherBLBL #java #named #open source #repository
SourcererDB: An aggregated repository of statically analyzed and cross-linked open source Java projects (JO, SKB, EL, PB, CVL), pp. 183–186.
PLDIPLDI-2009-TorreMP #calculus #fixpoint #recursion #source code #using
Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
SASSAS-2009-NiedzielskiRGP #bound #constraints #control flow
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination (DN, JvR, AG, KP), pp. 137–153.
SEFMSEFM-2009-Ferrara #java #named #parallel #source code #thread
Checkmate: A Generic Static Analyzer of Java Multithreaded Programs (PF), pp. 169–178.
CHICHI-2009-SuhmP #experience
Call browser: a system to improve the caller experience by analyzing live calls end-to-end (BS, PP), pp. 1313–1322.
HCIDHM-2009-Butler #3d #using
Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
HCIDHM-2009-YucelHDR #communication #coordination
Analyzing the Effects of a BCMA in Inter-Provider Communication, Coordination and Cooperation (GY, BH, VGD, MR), pp. 744–753.
HCIHCI-AUII-2009-Heimgartner #identification #interactive
Identification of the User by Analyzing Human Computer Interaction (RH), pp. 275–283.
HCIHCI-VAD-2009-KiriyamaS #behaviour #interactive
Analyzing Human Behaviors in an Interactive Art Installation (TK, MS), pp. 345–352.
HCIHIMI-DIE-2009-FuchigamiOT #process
Brain Activities Supporting Finger Operations, Analyzed by Neuro-NIRS (MF, AO, HT), pp. 495–504.
HCIHIMI-II-2009-BehalGKCLCQ #monitoring #named #visualisation
COBRA — A Visualization Solution to Monitor and Analyze Consumer Generated Medias (AB, JG, LK, YC, SL, WC, WQ), pp. 229–238.
HCIHIMI-II-2009-ShiraishiMT #category theory #representation #visual notation
A Tool for Analyzing Categorical Data Visually with Granular Representation (KS, KM, JT), pp. 342–351.
CAiSECAiSE-2009-MutschlerR #cost analysis #enterprise #evaluation #information management
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems (BM, MR), pp. 379–394.
EDOCEDOC-2009-WetzsteinLRBDL #monitoring #performance #process
Monitoring and Analyzing Influential Factors of Business Process Performance (BW, PL, FR, IB, SD, FL), pp. 141–150.
CIKMCIKM-2009-DriesNR #network #query
A query language for analyzing networks (AD, SN, LDR), pp. 485–494.
CIKMCIKM-2009-HuangE #query #web
Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
ICMLICML-2009-RamanFWDR
The Bayesian group-Lasso for analyzing contingency tables (SR, TJF, PJW, ED, VR), pp. 881–888.
KDDKDD-2009-GuoTCZZ #generative #network #online #social
Analyzing patterns of user content generation in online social networks (LG, ET, SC, XZ, YEZ), pp. 369–378.
KDDKDD-2009-ZhangFPGS #streaming #towards
Toward autonomic grids: analyzing the job flow with affinity streaming (XZ, CF, JP, CGR, MS), pp. 987–996.
KEODKEOD-2009-Aussenac-GillesK #documentation #learning #ontology #xml
Ontology Learning by Analyzing XML Document Structure and Content (NAG, MK), pp. 159–165.
SEKESEKE-2009-BiancoSS #development #process
Analyzing the Software Development Process with SyQL and Lagrein (MB, AS, GS), pp. 682–687.
SACSAC-2009-KobayashiOOT #bibliography #modelling #web
Modeling and analyzing review information on the web focusing on credibility (TK, HO, SO, KT), pp. 1316–1317.
SACSAC-2009-SinghB #identification #multi #web
Information-theoretic identification of content pages for analyzing user information needs and actions on the multimedia web (RS, BDB), pp. 1806–1810.
ESEC-FSEESEC-FSE-2009-KnabKP #problem
Smart views for analyzing problem reports: tool demo (PK, HG, MP), pp. 289–290.
ESEC-FSEESEC-FSE-2009-ShaoKP #named #parallel #semantics
SCA: a semantic conflict analyzer for parallel changes (DS, SK, DEP), pp. 291–292.
ICSEICSE-2009-DamasLRL #behaviour #modelling #process #synthesis
Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
CAVCAV-2009-BouissouGPTV #named #source code
HybridFluctuat: A Static Analyzer of Numerical Programs within a Continuous Environment (OB, EG, SP, KT, FV), pp. 620–626.
CAVCAV-2009-KanadeAIRSS #generative #modelling
Generating and Analyzing Symbolic Traces of Simulink/Stateflow Models (AK, RA, FI, SR, SS, KCS), pp. 430–445.
CAVCAV-2009-PanBL #named #specification
TASS: Timing Analyzer of Scenario-Based Specifications (MP, LB, XL), pp. 689–695.
ISSTAISSTA-2009-StengelB #contract
Analyzing singularity channel contracts (ZS, TB), pp. 13–24.
FATESTestCom-FATES-2009-ZeissG #consistency #nondeterminism #testing
Analyzing Response Inconsistencies in Test Suites (BZ, JG), pp. 195–210.
WICSAWICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability #using
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
WICSAWICSA-2008-SozerT #modelling
Introducing Recovery Style for Modeling and Analyzing System Recovery (HS, BT), pp. 167–176.
CASECASE-2008-DuanZPWYA
Analyzing human skill through control trajectories and motion capture data (FD, YZ, NP, KW, HY, TA), pp. 454–459.
DATEDATE-2008-AsianVR #implementation #network
Practical Implementation of a Network Analyzer for Analog BIST Applications (MJBA, DV, AR), pp. 80–85.
DATEDATE-2008-TcheghoMS
Optimal High-Resolution Spectral Analyzer (AT, HM, SS), pp. 62–67.
DATEDATE-2008-Young #design #metric
Capturing and Analyzing IC Design Productivity Metrics (JY), pp. 936–937.
VLDBVLDB-2008-ChaiSDRS #integration
Analyzing and revising data integration schemas to improve their matchability (XC, MS, AD, AR, LS), pp. 773–784.
ITiCSEITiCSE-2008-GunawardenaBO #comprehension
A method for analyzing reading comprehension in computer science courses (AG, JB, AO), p. 348.
TACASTACAS-2008-BalakrishnanR #bytecode
Analyzing Stripped Device-Driver Executables (GB, TWR), pp. 124–140.
ICPCICPC-2008-Kothari #comprehension #fault #scalability
Scalable Program Comprehension for Analyzing Complex Defects (SCK), pp. 3–4.
MSRMSR-2008-WermelingerY #eclipse #evolution #plugin
Analyzing the evolution of eclipse plugins (MW, YY), pp. 133–136.
WCREWCRE-2008-AriasAA #dependence #execution #scalability
Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies (TBCA, PA, PA), pp. 49–58.
ICALPICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability #using
Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
SOFTVISSOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #using #visualisation
Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
CAiSECAiSE-2008-MutschlerR #information management #modelling #on the
On Modeling and Analyzing Cost Factors in Information Systems Engineering (BM, MR), pp. 510–524.
SEKESEKE-2008-BaratK #approach #enterprise #integration #modelling #process #tool support
A Model-driven Toolset to Support an Approach for Analyzing Integration of Business Process Aspect of Enterprise Application Integration (SB, VK), pp. 625–630.
SEKESEKE-2008-Chavarria-BaezL #approach #confluence #petri net #termination
Analyzing Termination and Confluence in Active Rule Base via a Petri Net Approach (LCB, XL), pp. 363–366.
SEKESEKE-2008-FollecoKB #classification #quality
Analyzing the Impact of Attribute Noise on Software Quality Classification (AF, TMK, LAB), pp. 73–78.
SEKESEKE-2008-LiuLZL #logic #protocol #security
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
SEKESEKE-2008-Rodriguez-EliasMLV #process
Analyzing Manufacturing Process Knowledge Flows with KoFI (OMRE, ALM, JIL, AV), pp. 428–433.
SIGIRSIGIR-2008-WeiPD #query #web
Analyzing web text association to disambiguate abbreviation in queries (XW, FP, BD), pp. 751–752.
OOPSLAOOPSLA-2008-ProkopskiV #performance #virtual machine
Analyzing the performance of code-copying virtual machines (GBP, CV), pp. 403–422.
SACSAC-2008-AtallaMAGA #behaviour #peer-to-peer #quality #web
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
ICSEICSE-2008-ChenAHCOH #process
Analyzing medical processes (BC, GSA, EAH, LAC, LJO, PLH), pp. 623–632.
ICSEICSE-2008-WenzelK #evolution
Analyzing model evolution (SW, UK), pp. 831–834.
SLESLE-2008-RiveraGLV #behaviour #maude #modelling #rule-based #semantics #visual notation
Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude (JER, EG, JdL, AV), pp. 54–73.
CCCC-2008-LimR #bytecode #generative
A System for Generating Static Analyzers for Machine Instructions (JL, TWR), pp. 36–52.
ICSTICST-2008-RamirezC #adaptation #logic #modelling #uml #verification
Verifying and Analyzing Adaptive Logic through UML State Models (AJR, BHCC), pp. 529–532.
CBSECBSE-2007-CortellessaG #approach #component #fault #modelling #reliability
A Modeling Approach to Analyze the Impact of Error Propagation on Reliability of Component-Based Systems (VC, VG), pp. 140–156.
ECSAECSA-2007-CorderoS #architecture #composition #perspective
Analyzing Styles of the Modular Software Architecture View (RNLC, IRS), pp. 275–278.
DACDAC-2007-KaoHL #embedded #integration #multi
An Embedded Multi-resolution AMBA Trace Analyzer for Microprocessor-based SoC Integration (CFK, IJH, CHL), pp. 477–482.
ITiCSEITiCSE-2007-MyllerLK #algorithm #collaboration #taxonomy #visualisation
Analyzing engagement taxonomy in collaborative algorithm visualization (NM, ML, AK), pp. 251–255.
TACASTACAS-2007-ChatterjeeLQR #bytecode #low level #reachability
A Reachability Predicate for Analyzing Low-Level Software (SC, SKL, SQ, ZR), pp. 19–33.
TACASTACAS-2007-FriasPM #alloy #analysis #specification #verification
Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
TACASTACAS-2007-WojtczakE
PReMo : An Analyzer for P robabilistic Re cursive Mo dels (DW, KE), pp. 66–71.
MSRMSR-2007-KimE #category theory
Prioritizing Warning Categories by Analyzing Software History (SK, MDE), p. 27.
CIAACIAA-2007-BrabrandGM #ambiguity #context-free grammar
Analyzing Ambiguity of Context-Free Grammars (CB, RG, AM), pp. 214–225.
IFMIFM-2007-PodorozhnyKPZ #alloy #multi #using #verification
Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
SEFMSEFM-2007-DengRH #algorithm #execution #object-oriented #source code #symbolic computation #towards
Towards A Case-Optimal Symbolic Execution Algorithm for Analyzing Strong Properties of Object-Oriented Programs (XD, R, JH), pp. 273–282.
HCIDHM-2007-ZhangCZZFD
A New Virtual Dynamic Dentomaxillofacial System for Analyzing Mandibular Movement, Occlusal Contact, and TMJ Condition (CZ, LC, FZ, HZ, HF, GD), pp. 747–756.
HCIHCI-AS-2007-MorDML #approach #behaviour
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships (EM, MGD, JM, SL), pp. 971–980.
HCIHCI-MIE-2007-BaranDC #approach #eye tracking #how #problem
How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, ), pp. 555–563.
HCIHIMI-IIE-2007-CollinsNMRBCPFHP #collaboration #dataset
The Karst Collaborative Workspace for Analyzing and Annotating Scientific Datasets (LMC, DEN, MLBM, JVR, MAB, CRC, JEP, BFS, SKH, JCP), pp. 3–12.
VISSOFTVISSOFT-2007-BohnetD07a #compilation #comprehension #graph
CGA Call Graph Analyzer — Locating and Understanding Functionality within the Gnu Compiler Collection’s Million Lines of Code (JB, JD), pp. 161–162.
CAiSECAiSE-2007-MutschlerRR #approach #information management #modelling
Analyzing the Dynamic Cost Factors of Process-Aware Information Systems: A Model-Based Approach (BM, MR, SR), pp. 589–603.
CAiSECAiSE-2007-PijpersG #comprehension #named
e3forces: Understanding Strategies of Networked e 3 value Constellations by Analyzing Environmental Forces (VP, JG), pp. 188–202.
ICEISICEIS-EIS-2007-GmatiN #framework #information management #requirements
A Framework for Analyzing Business/Information System Alignment Requirements (IG, SN), pp. 401–409.
ICMLICML-2007-ParrPLL #approximate #generative
Analyzing feature generation for value-function approximation (RP, CPW, LL, MLL), pp. 737–744.
MLDMMLDM-2007-MendezCGRD #performance
Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes (JRM, BC, DGP, FFR, FD), pp. 364–378.
SEKESEKE-2007-Condori-FernandezP #evaluation #functional #metric
Analyzing the Applicability of a Theoretical Model in the Evaluation of Functional Size Measurement Procedures (NCF, OP), pp. 736–739.
SEKESEKE-2007-HuangL #configuration management #process #repository
Analyzing Configuration Management Repository Data for Software Process Improvement (SH, CL), p. 67–?.
SIGIRSIGIR-2007-HeCL #detection
Analyzing feature trajectories for event detection (QH, KC, EPL), pp. 207–214.
MODELSMoDELS-2007-BasinCDE #approach #metamodelling #modelling
A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
MODELSMoDELS-2007-BasinCDE #approach #metamodelling #modelling
A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
SACSAC-2007-SoleimaniADDBA #detection #named #reliability
RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
ICSEICSE-2007-Egyed07a #consistency #modelling #named #uml
UML/Analyzer: A Tool for the Instant Consistency Checking of UML Models (AE), pp. 793–796.
LCTESLCTES-2007-WaltherHN #behaviour #embedded #realtime
Analyzing the real-time behaviour of deeply embedded event driven systems (KW, RH, JN), pp. 149–151.
CAVCAV-2007-GulwaniT #abstract domain #bytecode #low level
An Abstract Domain for Analyzing Heap-Manipulating Low-Level Software (SG, AT), pp. 379–392.
RTARTA-2007-BoichutGJR #approximate #performance #prototype
Rewriting Approximations for Fast Prototyping of Static Analyzers (YB, TG, TPJ, LLR), pp. 48–62.
VMCAIVMCAI-2007-Logozzo #abstract interpretation #analysis #composition #java #named #verification
Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
DATEDATE-2006-ReddyWM #architecture #nondeterminism
Analyzing timing uncertainty in mesh-based clock architectures (SMR, GRW, RM), pp. 1097–1102.
HTHT-2006-Ruddle #hypermedia #navigation #string #using
Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
PODSPODS-2006-CaldersDHP #workflow
Analyzing workflows implied by instance-dependent access rules (TC, SD, JH, JP), pp. 100–109.
TACASTACAS-2006-BolligKSS #named #specification
MSCan — A Tool for Analyzing MSC Specifications (BB, CK, MS, VS), pp. 455–458.
CSMRCSMR-2006-LewisMS #architecture #component #legacy #migration #reuse
Analyzing the Reuse Potential of Migrating Legacy Components to a Service-Oriented Architecture (GAL, EJM, DBS), pp. 15–23.
MSRMSR-2006-TsunodaMKKM #developer #using
Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
ICGTICGT-2006-BaresiS #alloy #graph transformation #on the
On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
CSCWCSCW-2006-AokiSPTWY #multi
Where’s the “party” in “multi-party”?: analyzing the structure of small-group sociable talk (PMA, MHS, LDP, JDT, AW, WY), pp. 393–402.
EDOCEDOC-2006-MiaoSC #architecture #formal method
Formalizing and analyzing service oriented software architecture style (HM, JS, XC), pp. 387–390.
EDOCEDOC-2006-MutschlerBR06a #approach #evaluation #perspective #workflow
An Evaluation Approach for Analyzing Workflow Management Systems from a Value-based Perspective (BM, JB, MR), pp. 477–482.
ICPRICPR-v1-2006-YinWLB #3d #interactive #using
Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
ICPRICPR-v2-2006-PungprasertyingCK #analysis #approach #learning #migration #performance
Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
LOPSTRLOPSTR-2006-BagnaraDHMZ #named
Grids: A Domain for Analyzing the Distribution of Numerical Values (RB, KD, PMH, MM, EZ), pp. 219–235.
SACSAC-2006-Wang #case study #domain-specific language #modelling
Modeling and analyzing applications with domain-specific languages by reflective rewriting: a case study (BYW), pp. 1773–1778.
SACSAC-2006-WuH #interactive #mining #network
Mining and analyzing the topological structure of protein-protein interaction networks (DDW, XH), pp. 185–189.
ICSEICSE-2006-MoriISI #detection #mobile
A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
LDTALDTA-2006-LiSWKM #modelling
Analyzing the Uses of a Software Modeling Tool (XL, DS, JW, SK, DM), pp. 3–18.
LDTALDTA-2006-ZengME #data flow #domain-specific language #generative
A Domain-Specific Language for Generating Dataflow Analyzers (JZ, CM, SAE), pp. 103–119.
LCTESLCTES-2006-CoopriderR #abstract domain #embedded
Pluggable abstract domains for analyzing embedded software (NC, JR), pp. 44–53.
LCTESLCTES-2006-RegehrD #embedded
Deriving abstract transfer functions for analyzing embedded software (JR, UD), pp. 34–43.
ICLPICLP-2006-Lam #datalog #question #source code #why
Why Use Datalog to Analyze Programs? (MSL), p. 1.
ICLPICLP-2006-SzaboS #prolog #standard
Improving the ISO Prolog Standard by Analyzing Compliance Test Results (PS, PS), pp. 257–269.
ICTSSTestCom-2006-SubramaniamP #protocol #testing
Analyzing the Impact of Protocol Changes on Tests (MS, ZP), pp. 197–212.
VMCAIVMCAI-2006-GhafariT
Piecewise FIFO Channels Are Analyzable (NG, RJT), pp. 252–266.
HTHT-2005-DavisMP #hypermedia
Analyzing history in hypermedia collections (PD, AM, SP), pp. 171–173.
HTHT-2005-ToyodaK #evolution #graph #visualisation #web
A system for visualizing and analyzing the evolution of the web with a time series of graphs (MT, MK), pp. 151–160.
ICDARICDAR-2005-ZhangBZ #fuzzy #logic #using
Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions (LZ, DB, RZ), pp. 972–976.
SIGMODSIGMOD-2005-LiuZWM #database
A system for analyzing and indexing human-motion databases (GL, JZ, WW, LM), pp. 924–926.
VLDBVLDB-2005-ReddyH #database #diagrams #query
Analyzing Plan Diagrams of Database Query Optimizers (NR, JRH), pp. 1228–1240.
ITiCSEITiCSE-2005-BassL #education #using
Teaching to analyze solutions using FGA (IB, DL), p. 360.
ITiCSEITiCSE-2005-SohSPNL #process
Analyzing relationships between closed labs and course activities in CS1 (LKS, AS, SP, GN, JL), pp. 183–187.
ESOPESOP-2005-CousotCFMMMR
The ASTREÉ Analyzer (PC, RC, JF, LM, AM, DM, XR), pp. 21–30.
ESOPESOP-2005-MauborgneR #abstract interpretation #clustering
Trace Partitioning in Abstract Interpretation Based Static Analyzers (LM, XR), pp. 5–20.
ESOPESOP-2005-Thiemann #javascript #source code #towards #type system
Towards a Type System for Analyzing JavaScript Programs (PT), pp. 408–422.
FASEFASE-2005-Martens #process #web #web service
Analyzing Web Service Based Business Processes (AM), pp. 19–33.
ICSMEICSM-2005-GarridoJ #c #multi
Analyzing Multiple Configurations of a C Program (AG, REJ), pp. 379–388.
ICSMEICSM-2005-GreevyDG #analysis #evolution #semantics
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
WCREWCRE-2005-CanforaP #architecture #testing
Architecting, Analyzing and Testing Service-Oriented Systems (GC, MDP), p. 237.
SASSAS-2005-JungKSY #analysis #c #statistics
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
ICALPICALP-2005-AbadiW #encryption
Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
CIKMCIKM-2005-HaradaH #order #using
Order checking in a CPOE using event analyzer (LH, YH), pp. 549–555.
SIGIRSIGIR-2005-AslamYP #metric #retrieval
The maximum entropy method for analyzing retrieval measures (JAA, EY, VP), pp. 27–34.
RERE-2005-BreauxA #semantics
Analyzing Goal Semantics for Rights, Permissions, and Obligations (TDB, AIA), pp. 177–188.
SACSAC-2005-WangPSV #ranking
Variable selection and ranking for analyzing automobile traffic accident data (HW, ASP, RKS, SVV), pp. 32–37.
CCCC-2005-BalakrishnanGRT #bytecode #framework #named
CodeSurfer/x86 — A Platform for Analyzing x86 Executables (GB, RG, TWR, TT), pp. 250–254.
CAVCAV-2005-GardeyLMR #named #petri net
Romeo: A Tool for Analyzing Time Petri Nets (GG, DL, MM, OHR), pp. 418–423.
ICSTSAT-2005-DurairajK #constraints #dependence #performance #satisfiability
Variable Ordering for Efficient SAT Search by Analyzing Constraint-Variable Dependencies (VD, PK), pp. 415–422.
ASEASE-2004-DwyerRTV #interactive #model checking #order
Analyzing Interaction Orderings with Model Checking (MBD, R, OT, WV), pp. 154–163.
DATEDATE-v2-2004-LoghiABBZ #communication
Analyzing On-Chip Communication in a MPSoC Environment (ML, FA, DB, LB, RZ), pp. 752–757.
DRRDRR-2004-HeDP #documentation #logic
Hierarchical logical structure extraction of book documents by analyzing tables of contents (FH, XD, LP), pp. 6–13.
VLDBVLDB-2004-SharifzadehSNPR #adaptation #named
AIDA: an Adaptive Immersive Data Analyzer (MS, CS, BN, FP, AAR), pp. 1369–1372.
CSMRCSMR-2004-PashovRP #architecture #feature model #modelling
Supporting Architectural Restructuring by Analyzing Feature Models (IP, MR, IP), pp. 25–36.
PASTEPASTE-2004-Martel #assembly #source code #validation
Validation of assembler programs for DSPs: a static analyzer (MM), pp. 8–13.
WCREWCRE-2004-GschwindPG #c++ #named
TUAnalyzer — Analyzing Templates in C++ Code (TG, MP, HG), pp. 48–57.
CIAACIAA-2004-Ibarra #infinity
Automata-Theoretic Techniques for Analyzing Infinite-State Systems (OHI), p. 1.
ICEISICEIS-v4-2004-LohGLBRSAP #chat #library #recommendation #web
Analyzing Web Chat Messages for Recommending Items from a Digital Library (SL, RSG, DL, TB, RR, GS, LA, TP), pp. 41–48.
ICEISICEIS-v4-2004-LokeL #behaviour #workflow
Analyzing Observable Behaviours of Device Ecology Workflows (SWL, SL), pp. 78–83.
CIKMCIKM-2004-ZhangLPY #enterprise #named #taxonomy
InfoAnalyzer: a computer-aided tool for building enterprise taxonomies (LZ, SL, YP, LY), pp. 477–483.
ICMLICML-2004-SuD #automation #component #probability
Automated hierarchical mixtures of probabilistic principal component analyzers (TS, JGD).
ICPRICPR-v2-2004-WeiXMJS #hybrid
A Hybrid SOM-SVM Method for Analyzing Zebra Fish Gene Expression (WW, LX, XM, PJ, RS), pp. 323–326.
ICPRICPR-v2-2004-ZhangN
Surface Tortuosity and its Application to Analyzing Cracks in Concrete (TZ, GN), pp. 851–854.
ICPRICPR-v3-2004-MaoSCA #3d
Constructing Dense Correspondences to Analyze 3D Facial Change (ZM, JPS, WPC, AFA), pp. 144–148.
SEKESEKE-2004-SetiadiNKM #invariant #java
Analyzing Invariant Condition of Running Java Program (TES, KN, YK, MM), pp. 350–353.
GPCEGPCE-2004-McDirmidH #aspect-oriented #named #source code
Splice: Aspects That Analyze Programs (SM, WCH), pp. 19–38.
ASPLOSASPLOS-2004-RegehrR #automation #embedded #named
HOIST: a system for automatically deriving static analyzers for embedded systems (JR, AR), pp. 133–143.
CCCC-2004-BalakrishnanR #bytecode #memory management
Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
IJCARIJCAR-2004-Subramani #integer #quantifier #source code
Analyzing Selected Quantified Integer Programs (KS), pp. 342–356.
ITiCSEITiCSE-2003-Fone #education #performance #using
Using semiotics to analyze the efficiency of a model in teaching (WF), p. 232.
FASEFASE-2003-Muccini #branch #detection
Detecting Implied Scenarios Analyzing Non-local Branching Choices (HM), pp. 372–386.
IWPCIWPC-2003-PinzgerOG #architecture #component #comprehension
Analyzing and Understanding Architectural Characteristics of COM+ Components (MP, JO, HCG), pp. 54–63.
WCREWCRE-2003-Clermont #scalability #source code #spreadsheet
Analyzing Large Spreadsheet Programs (MC), pp. 306–315.
WCREWCRE-2003-FischerPG #debugging
Analyzing and Relating Bug Report Data for Feature Tracking (MF, MP, HG), pp. 90–101.
PLDIPLDI-2003-BlanchetCCFMMMR #safety #scalability
A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
SASSAS-2003-BaldanKK #abstraction #graph transformation #logic
A Logic for Analyzing Abstractions of Graph Transformation Systems (PB, BK, BK), pp. 255–272.
EDOCEDOC-2003-JengSC #architecture #enterprise #process #realtime
An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises (JJJ, JS, HC), pp. 86–97.
ICEISICEIS-v1-2003-TsengVC #enterprise
Planning for Enterprise Computing Services: Issues and Necessities Analyzed (JT, EV, TC), pp. 414–420.
CIKMCIKM-2003-HaradaHAKOT
Event analyzer: a tool for sequential data processing (LH, YH, NA, KK, TO, RT), pp. 172–174.
KDDKDD-2003-AliK #clustering #divide and conquer #using #web
Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
KDDKDD-2003-KoyuturkG #dataset #framework #named
PROXIMUS: a framework for analyzing very high dimensional discrete-attributed datasets (MK, AG), pp. 147–156.
KDDKDD-2003-Weigend #behaviour
Analyzing customer behavior at Amazon.com (ASW), p. 5.
MLDMMLDM-2003-KimJ #network #using
Using Bayesian Networks to Analyze Medical Data (ICK, YGJ), pp. 317–327.
SEKESEKE-2003-BarberL #architecture #framework #specification #using
Specifying and Analyzing Agent Architectures using the Agent Competency Framework (KSB, DNL), pp. 232–239.
UMLUML-2003-HaugenS #interactive #named #refinement #semantics
STAIRS — Steps to Analyze Interactions with Refinement Semantics (ØH, KS), pp. 388–402.
RERE-2003-FuxmanLPRM #requirements #specification
Specifying and Analyzing Early Requirements: Some Experimental Results (AF, LL, MP, MR, JM), p. 105–?.
ICSEICSE-2003-RobillardM #source code
FEAT. A Tool for Locating, Describing, and Analyzing Concerns in Source Code (MPR, GCM), pp. 822–823.
CSLCSL-2003-ChevalierKRTV #bound
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
RTARTA-2003-KapurNW #algorithm #composition #protocol
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
WICSAWICSA-2002-BruinVB #design
Documenting and Analyzing a Context-Sensitive Design Space (HdB, HvV, ZB), pp. 127–141.
WICSAWICSA-2002-DePrinceH #component #modelling
Analyzing Commercial Component Models (WDJ, CH), pp. 205–219.
WICSAWICSA-2002-ShiH #architecture #communication #modelling #protocol #using
Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
ASEASE-2002-VieiraR #component #dependence #scalability
Analyzing Dependencies in Large Component-Based Systems (MERV, DJR), pp. 241–244.
SCAMSCAM-J-2001-AntoniolVMP02 #evolution #kernel #linux
Analyzing cloning evolution in the Linux kernel (GA, UV, EM, MDP), pp. 755–765.
SASSAS-2002-Masse #abstract interpretation #semantics
Semantics for Abstract Interpretation-Based Static Analyzes of Temporal Properties (DM), pp. 428–443.
ICGTICGT-2002-PadbergE #graph transformation #invariant #safety
Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
CSCWCSCW-2002-BegoleTSY #distributed #visualisation
Work rhythms: analyzing visualizations of awareness histories of distributed groups (JB, JCT, RBS, NY), pp. 334–343.
CAiSECAiSE-2002-AalstHV #graph #workflow
An Alternative Way to Analyze Workflow Graphs (WMPvdA, AH, EV), pp. 535–552.
ICEISICEIS-2002-SanchezSVACD #data mining #mining #using
Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
ICPRICPR-v2-2002-GuillametSV #classification #image #matrix
Analyzing Non-Negative Matrix Factorization for Image Classification (DG, BS, JV), pp. 116–119.
ICPRICPR-v2-2002-TaoIS
Extracting Fractal Features for Analyzing Protein Structure (YT, TRI, JCS), pp. 482–485.
OOPSLAOOPSLA-2002-KhurshidMJ
An analyzable annotation language (SK, DM, DJ), pp. 231–245.
POPLPOPL-2002-AbadiB #logic programming #protocol #security #source code
Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
RERE-2002-AntonER #privacy #requirements #taxonomy #using
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
ICSEICSE-2002-Robillard #representation #source code
A representation for describing and analyzing concerns in source code (MPR), pp. 721–722.
VMCAIVMCAI-2002-Shyamasundar #encryption #framework #protocol
Analyzing Cryptographic Protocols in a Reactive Framework (RKS), pp. 46–64.
ASEASE-2001-GannodG #automation #petri net #using
An Automated Tool for Analyzing Petri Nets Using SPIN (GCG, SG), pp. 404–407.
VLDBVLDB-2001-AmirKN #database #image
Analyzing Quantitative Databases: Image is Everything (AA, RK, NSN), pp. 89–98.
VLDBVLDB-2001-AnSVKIG #behaviour #data access #energy
Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
ICSMEICSM-2001-ONealC #requirements
Analyzing the Impact of Changing Requirements (JSO, DLC), p. 190–?.
ICSMEICSM-2001-SchauerK #behaviour #metric
The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
SASSAS-2001-BouajjaniCLS #automaton #parametricity
Analyzing Fair Parametric Extended Automata (AB, ACA, YL, MS), pp. 335–355.
FMFME-2001-AlagarX #approach #architecture #e-commerce #modelling
A Rigorous Approach to Modeling and Analyzing E-Commerce Architectures (VSA, ZX), pp. 173–196.
AdaEuropeAdaEurope-2001-KuchumovRS #ada #library #named #object-oriented
OASIS — An ASIS Secondary Library for Analyzing Object-Oriented Ada Code (AK, SR, AS), pp. 113–122.
LSOLSO-2001-LewerentzRS #development #feedback #metric
A Model for Analyzing Measurement Based Feedback Loops in Software Development Projects (CL, HR, FS), pp. 135–151.
SEKESEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
TOOLSTOOLS-EUROPE-2001-TranG #corba #scalability #transaction
Analyzing the Scalability of Transactional CORBA Applications (PT, IG), pp. 102–110.
FSEESEC-FSE-2001-EngelsKHG #behaviour #consistency #modelling #object-oriented #specification
A methodology for specifying and analyzing consistency of object-oriented behavioral models (GE, JMK, RH, LG), pp. 186–195.
ASEASE-2000-KhurshidJ #automation #constraints #design
Exploring the Design of an Intentional Naming Scheme with an Automatic Constraint Analyzer (SK, DJ), pp. 13–22.
ASEASE-2000-MartinWTG #kernel
Formal Construction of the Mathematically Analyzed Separation Kernel (WM, PW, FST, AG), pp. 133–142.
DATEDATE-2000-RufK #realtime
Analyzing Real-Time Systems (JR, TK), pp. 243–248.
ITiCSEITiCSE-2000-Odekirk #source code #student
Analyzing student programs (poster session) (EO), p. 191.
FASEFASE-2000-FradetIR #mobile #non-functional
Analyzing Non-functional Properties of Mobile Agents (PF, VI, SR), pp. 319–333.
WRLAWRLA-2000-OlveczkyM #hybrid #maude #realtime #simulation
Real-Time Maude: A Tool for Simulating and Analyzing Real-Time and Hybrid Systems (PCÖ, JM), pp. 361–382.
CSMRCSMR-2000-SystaYM #java #metric #visualisation
Analyzing Java Software by Combining Metrics and Program Visualization (TS, PY, HAM), pp. 199–208.
WCREWCRE-2000-CzeranskiEKKS #tool support #using
Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
WCREWCRE-2000-MartinWWM #using
Analyzing xfig Using the Rigi Tool Suite (JM, KW, BW, HAM), pp. 207–209.
WCREWCRE-2000-Riediger
Analyzing XFIG with GUPRO (VR), pp. 194–196.
CHICHI-2000-ChiPP #predict #usability #web
The scent of a site: a system for analyzing and predicting information scent, usage, and usability of a Web site (EHhC, PP, JEP), pp. 161–168.
CIKMCIKM-2000-LawrenceCFPKNKG #persistent #research #web
Persistence of information on the web: Analyzing citations contained in research articles (SL, FC, GWF, DMP, RK, FÅN, AK, CLG), pp. 235–242.
CIKMCIKM-2000-NigamG #effectiveness
Analyzing the Effectiveness and Applicability of Co-training (KN, RG), pp. 86–93.
ICMLICML-2000-GiordanaSSB #framework #learning #relational
Analyzing Relational Learning in the Phase Transition Framework (AG, LS, MS, MB), pp. 311–318.
ICMLICML-2000-McLachlanP
Mixtures of Factor Analyzers (GJM, DP), pp. 599–606.
ICPRICPR-v4-2000-GuestFPD #aspect-oriented
Analyzing Constructional Aspects of Figure Completion for the Diagnosis of Visuospatial Neglect (RMG, MCF, JMP, ND), pp. 4316–4319.
ICPRICPR-v4-2000-NakamuraOO #process
Structuring Personal Activity Records Based on Attention — Analyzing Videos from Head-Mounted Camera (YN, YO, JO), pp. 4222–4225.
ICPRICPR-v4-2000-YamadaIN #documentation #image
A Method of Analyzing the Handling of Paper Documents in Motion Images (KY, KI, NN), pp. 4413–4416.
SACSAC-2000-Caraca-ValenteLM #modelling
Functions, Rules and Models: Three Complementary Techniques for Analyzing Strength Data (JPCV, ILC, CM), pp. 60–64.
SACSAC-2000-KohleM #detection
Analyzing Human Gait Patterns for Malfunction Detection (MK, DM), pp. 41–45.
SACSAC-2000-SrinivasaS #behaviour #transaction
Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
ICSEICSE-2000-JacksonSS #alloy #constraints #named
Alcoa: the alloy constraint analyzer (DJ, IS, IS), pp. 730–733.
ICSEICSE-2000-KazmanK #architecture #design #tutorial #using
Designing and analyzing software architectures using ABASs (tutorial session) (RK, MK), p. 820.
ICSEICSE-2000-VieiraDR #architecture
Analyzing software architectures with Argus-I (MERV, MSD, DJR), pp. 758–761.
HPDCHPDC-2000-WuTGLLSHJ #distributed #framework #modelling #named #parallel #performance
Prophesy: An Infrastructure for Analyzing and Modeling the Performance of Parallel and Distributed Applications (XW, VET, JG, XL, ZL, RLS, MH, IRJ), pp. 302–303.
ICDARICDAR-1999-HaffnerBHL #documentation #internet #named
DjVu: Analyzing and Compressing Scanned Documents for Internet Distribution (PH, LB, PGH, YL), pp. 625–628.
TACASTACAS-1999-GardnerL #probability #realtime
Analyzing Stochastic Fixed-Priority Real-Time Systems (MKG, JWSL), pp. 44–58.
ICSMEICSM-1999-LiuAQ #behaviour #legacy #modelling #requirements
Requirements Recovery from Legacy Systems by Analyzing and Modelling Behavior (KL, AA, ZQ), pp. 3–12.
WCREWCRE-1999-CaprileT #identifier
Nomen Est Omen: Analyzing the Language of Function Identifiers (BC, PT), pp. 112–122.
FMFM-v2-1999-Droschl #data access #requirements #using
Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
HCIHCI-CCAD-1999-OhyaOUIS #communication #image #towards
Towards the realization of non-verbal communication — computer vision based technologies for analyzing human images (JO, TO, AU, SI, TS), pp. 172–176.
HCIHCI-EI-1999-ChenL #development #interface #multi
Development of an Interface for Computing and Analyzing Multidimensional Perceptual Space (LLC, JWL), pp. 621–625.
ICEISICEIS-1999-BouneffaBD #source code
Analyzing the Impact of Schema Change on Application Programs (MB, HB, LD), pp. 37–44.
TOOLSTOOLS-USA-1999-MeziniPDB #detection #evolution #java
Detecting Evolution Incompatibilities by Analyzing Java Binaries (MM, JUP, TD, WB), pp. 126–135.
ESECESEC-FSE-1999-RobillardM #exception #java #source code
Analyzing Exception Flow in Java Programs (MPR, GCM), pp. 322–327.
ICSEICSE-1999-DangK #mobile #model checking #using
Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
ICSEICSE-1999-Monroe #architecture #modelling
Modeling and Analyzing software Architectures (RTM), pp. 690–691.
FASEFASE-1998-AllenDG #architecture #specification
Specifying and Analyzing Dynamic Software Architectures (RA, RD, DG), pp. 21–37.
TACASTACAS-1998-ShermanM #automation #named
Factotum: Automatic and Systematic Sharing Support for Systems Analyzers (DJS, NM), pp. 249–262.
ICPRICPR-1998-HiranoHOMTE #3d #image
Three dimensional concentration index-a local feature for analyzing three dimensional digital line patterns and its application to chest X-ray CT images (YH, JiH, HO, YM, JiT, KE), pp. 1040–1043.
SIGIRSIGIR-1998-KornfeldW #automation
Automatically Locating, Extracting and Analyzing Tabular Data (WK, JW), pp. 347–348.
ICSEICSE-1998-MizunoKITS #estimation #quality
Analyzing Effects of Cost Estimation Accuracy on Quality and Productivity (OM, TK, KI, YT, KS), pp. 410–419.
CCCC-1998-Boyland #attribute grammar #dependence
Analyzing Direct Non-local Dependencies in Attribute Grammars (JB), pp. 31–49.
LCTESLCTES-1998-KollochF #case study #embedded #network #realtime #specification
Mapping an Embedded Hard Real-Time Systems SDL Specification to an Analyzable Task Network — A Case Study (TK, GF), pp. 156–165.
CAVCAV-1998-HeitmeyerKLB #requirements #specification #tool support
SCR*: A Toolset for Specifying and Analyzing Software Requirements (CLH, JK, BGL, RB), pp. 526–531.
ICTSSIWTCS-1998-OgishiIKS #exception #protocol
Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
DATEEDTC-1997-FlottesPR #behaviour #testing
Analyzing testability from behavioral to RT level (MLF, RP, BR), pp. 158–165.
ICDARICDAR-1997-MenierL #self
Lexical Analyzer based on a Self-Organizing Feature Map (GM, GL), pp. 1067–1071.
SASSAS-1997-EmelianovB #semantics
Semantic Analyzer of Modula-Programs (PGE, DEB), pp. 361–363.
HCIHCI-CC-1997-ItohMGA #behaviour #process
Analyzing Qualitative Data with SPROT (Structural Process Chart of a Task Oriented Behavior) (MI, YM, SG, TA), pp. 541–544.
HCIHCI-SEC-1997-RauterbergF #human-computer #interactive #modelling
An Analyzing and Modelling Tool Kit for Human-Computer Interaction (MR, MF), pp. 589–592.
HCIHCI-SEC-1997-SawaY #architecture #modelling #simulation
New Modeling/Analyzing Architecture and Simulation Mechanism for Complex Structure (TS, MY), pp. 363–366.
KDDKDD-1997-LiuHC #classification #using
Using General Impressions to Analyze Discovered Classification Rules (BL, WH, SC), pp. 31–36.
OOPSLAOOPSLA-1997-PriceD #design #object-oriented #reuse
Analyzing and Measuring Reusability in Object-Oriented Designs (MWP, SAD), pp. 22–33.
TOOLSTOOLS-USA-1997-GolubskiP #named #object-oriented
SOLAT — A Simple Object-Oriented Language Analyzing Tool (WG, BP), p. 99–?.
RERE-1997-HunterN #consistency #specification
Analyzing Inconsistent Specifications (AH, BN), pp. 78–86.
SACSAC-1997-Li97a #execution #parallel #source code
Analyzing the expected execution times of parallel programs (KL), pp. 488–495.
ICSEICSE-1997-AvruninCD #realtime
Analyzing Partially-Implemented Real-Time Systems (GSA, JCC, LKD), pp. 228–238.
TACASTACAS-1996-MoserM #automaton #probability #realtime
Probabilistic Duration Automata for Analyzing Real-Time Systems (LEM, PMMS), pp. 369–390.
SASSAS-1996-Handjieva #abstract interpretation #named
STAN: A Static Analyzer for CLP(R) Based on Abstract Interpretation (MH), pp. 383–384.
SASSAS-1996-MullerGS96a #named #prolog
PAN — The Prolog Analyzer (MM, TG, KS), pp. 387–388.
CSCWCSCW-1996-HalversonR #design #distributed #implementation #social #tutorial
An Introduction to Distributed Cognition: Analyzing the Organizational, the Social and the Cognitive for Designing and Implementing CSCW Applications (Tutorial) (CH, YR), p. 4.
CSCWCSCW-1996-McDanielOM #identification #multi #thread
Identifying and Analyzing Multiple Threads in Computer-Mediated and Face-to-Face Conversations (SEM, GMO, JCM), pp. 39–47.
ICPRICPR-1996-Hirayama #image #using
Analyzing form images by using line-shared-adjacent cell relations (YH), pp. 768–772.
SACSAC-1996-MengelA #network #protocol #tutorial
A network protocol analyzer with tutorial (SM, SA), pp. 115–119.
ICSEICSE-1996-DuesterwaldGS #data flow #integration #testing
A Demand-Driven Analyzer for Data Flow Testing at the Integration Level (ED, RG, MLS), pp. 575–584.
ICSEICSE-1996-DwyerC #architecture #data flow #flexibility
A Flexible Architecture for Building Data Flow Analyzers (MBD, LAC), pp. 554–564.
ICSEICSE-1996-LiuY #framework #requirements #specification
An Analytic Framework for Specifying and Analyzing Imprecise Requirements (XFL, JY), pp. 60–69.
ASPLOSASPLOS-1996-ErlichsonNCH #clustering #distributed #memory management #named #performance
SoftFLASH: Analyzing the Performance of Clustered Distributed Virtual Shared Memory (AE, NN, GC, JLH), pp. 210–220.
ISSTAISSTA-1996-JacksonD #design #detection
Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector (DJ, CD), pp. 239–249.
ICDARICDAR-v2-1995-ButlerGST #data flow #diagrams #documentation #logic
Analyzing the logical structure of data flow diagrams in software documents (GB, PG, RS, IAT), pp. 575–578.
WCREWCRE-1995-FioreLV #empirical #reverse engineering
Analyzing Empirical Data from a Reverse Engineering Project (PF, FL, GV).
PEPMPEPM-1995-Colby #communication #concurrent #source code
Analyzing the Communication Topology of Concurrent Programs (CC), pp. 202–213.
SASSAS-1995-AltM #generative #interprocedural #performance
Generation of Efficient Interprocedural Analyzers with PAG (MA, FM), pp. 33–50.
SASSAS-1995-Fecht #generative #named #prolog #specification
GENA — A Tool for Generating Prolog Analyzers from Specifications (CF), pp. 418–419.
SASSAS-1995-NordinLM #data flow #named #prolog
IGOR: A Tool for Developing Prolog Dataflow Analyzers (MN, TL, HM), pp. 420–421.
KDDKDD-1995-DjokoCH
Analyzing the Benefits of Domain Knowledge in Substructure Discovery (SD, DJC, LBH), pp. 75–80.
ICLPICLP-1995-SahlinS #concurrent #constraints
An Analyzer for a Concurrent Constraint Language (DS, TS), p. 828.
LISPLFP-1994-JagannathanW #parallel
Analyzing Stores and References in a Parallel Symbolic Language (SJ, SW), pp. 294–305.
KRKR-1994-Kambhampati #algorithm #framework #refinement
Refinement Search as a Unifying Framework for Analyzing Planning Algorithms (SK), pp. 329–340.
POPLPOPL-1994-MarriottBH #logic programming #scheduling #source code
Analyzing Logic Programs with Dynamic Scheduling (KM, MJGdlB, MVH), pp. 240–253.
ICSEICSE-1994-KazmanBWA #architecture #named
SAAM: A Method for Analyzing the Properties of Software Architectures (RK, LJB, MW, GDA), pp. 81–90.
ISSTAISSTA-1994-Kapur #automation #equation #specification
An Automated Tool for Analyzing Completeness of Equational Specifications (DK), pp. 28–43.
ISSTAISSTA-1994-MurrillM #approach #fault #semantics #using
An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (Abstract) (BWM, LJM), p. 200.
HCIHCI-ACS-1993-SuzukiH #effectiveness #on the #variability
On a Simple and Effective Method to Analyze Heart Rate Variability (KS, YH), pp. 914–919.
AdaTRI-Ada-1993-CommonsG #architecture #reuse
A Model for Analyzing Megaprogramming, Reuse and Domain Specific Software Architectures (JCC, MG), pp. 58–64.
AdaTRI-Ada-1993-LeifSBKLD #ada #development
The Development of Software in the Ada Language for a Mid-Range Hematology Analyzer (RCL, JS, IB, MK, SBL, TD), pp. 340–346.
SEKESEKE-1993-Porter #classification #component #predict
Developing and Analyzing Classification Rules for Predicting Faulty Software Components (AAP), pp. 453–461.
OOPSLAOOPSLA-1993-BrueggeGL #framework
A Framework for Dynamic Program Analyzers (BB, TG, BL), pp. 65–82.
RERE-1993-Lutz #embedded #fault #requirements #safety
Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
SACSAC-1993-Yaung #process
A Linkage Analyzer for Process Management (ATY), pp. 215–221.
ISSTAISSTA-1993-AtleeG #requirements
Analyzing Timing Requirements (JMA, JDG), pp. 117–127.
ISSTAISSTA-1993-FelderGP #specification
Analyzing Refinements of State Based Specifications: The Case of TB Nets (MF, CG, MP), pp. 28–39.
DACDAC-1992-LinLE
Analyzing Cycle Stealing on Synchronous Circuits with Level-Sensitive Latches (IL, JAL, KE), pp. 393–398.
PLDIPLDI-1992-DhamdhereRZ #how #scalability #source code
How to Analyze Large Programs Efficiently and Informatively (DMD, BKR, FKZ), pp. 212–223.
ICSEICSE-1992-Devanbu #independence #named
GENOA: A Customizable Language- and Front-End Independent Code Analyzer (PTD), pp. 307–317.
AdaEuropeAdaEurope-1991-ChengU #ada #petri net #using
Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets (JC, KU), pp. 125–146.
ICGTGG-1990-Wanke #graph grammar #named #tool support
PLEXUS: Tools for Analyzing Graph Grammars (EW), pp. 68–69.
CAVCAV-1990-BuyM #liveness #proving
A Proof Lattice-Based Technique for Analyzing Liveness of Resource Controllers (UAB, RM), pp. 292–301.
ICMLML-1989-Chien #learning
Learning by Analyzing Fortuitous Occurrences (SAC), pp. 249–251.
ICMLML-1989-Rendell #induction
Comparing Systems and analyzing Functions to Improve Constructive Induction (LAR), pp. 461–464.
ISSTATAV-1989-OlenderO #constraints #named
Cesar: A Static Sequencing Constraint Analyzer (KMO, LJO), pp. 66–74.
DACDAC-1988-Cherry #named
Pearl: A CMOS Timing Analyzer (JJC), pp. 148–153.
DACDAC-1988-StarkH #network #power management #using
Analyzing CMOS Power Supply Networks Using Ariel (DS, MH), pp. 460–464.
ICLPJICSCP-1988-Hemmendinger88 #compilation #semantics
A Compiler and Semantic Analyzer Based on Categorial Grammar (DH), pp. 1474–1489.
DACDAC-1987-CanrightH #logic
Reflections of High Speed Signals Analyzed as a Delay in Timing for Clocked Logic (REC, ARH), pp. 133–139.
HCIHCI-CE-1987-Williges87a #human-computer #interface
Analyzing Human-Computer Dialogue Interfaces (BHW), pp. 67–74.
ESECESEC-1987-Selby #design #reuse
Analyzing Software Reuse at the Project and Module Design Levels (RWS), pp. 212–220.
POPLPOPL-1985-Cooper #alias #parametricity
Analyzing Aliases of Reference Formal Parameters (KDC), pp. 281–290.
ICSEICSE-1985-RamseyB #process #testing #using
Analyzing the Test Process Using Structural Coverage (JR, VRB), pp. 306–312.
ICSEICSE-1985-StavelyBOT #concurrent #design #tool support
A Collection of Software Tools for Analyzing Design of Concurrent Software Systems (AMS, DCB, SPO, GBT), pp. 111–118.
PLDISCC-1984-FraserMW #assembly
Analyzing and compressing assembly code (CWF, EWM, ALW), pp. 117–121.
PLDISCC-1982-ChowR #data flow #design
The Design of a Data Flow Analyzer (ALC, AR), pp. 106–113.
PLDISCC-1982-MorganR #code generation
Analyzing Exotic Instructions for a Retargetable Code Generator (TMM, LAR), pp. 197–204.
ICALPICALP-1982-GuttagKM #term rewriting #tool support
Derived Pairs, Overlap Closures, and Rewrite Dominoes: New Tools for Analyzing Term rewriting Systems (JVG, DK, DRM), pp. 300–312.
ICSEICSE-1978-BasiliRZ #development
Analyzing Medium-Scale Software Development (VRB, MVZ), pp. 116–123.
VLDBVLDB-1975-Hackathorn #database #empirical #process #scalability #transaction
Analyzing Transaction Activity to a Large Data Base: An Empirical Study (RDH), pp. 502–504.
POPLPOPL-1975-JonesM #source code
Even Simple Programs are Hard to Analyze (NDJ, SSM), pp. 106–118.
DACDAC-1971-Bening #fault #logic #maintenance
Application of a logic fault analyzer to the manufacture and maintenance of the CONTROL DATA 7600 computer (LCBJ), pp. 231–235.
DACDAC-1971-Veit #named
Analyze — Compose — Display computer aided space planning (FSV), pp. 180–192.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.