BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (1207)
model (742)
system (524)
softwar (453)
use (407)

Stem approach$ (all stems)

5417 papers:

ECSAECSA-2015-AngelovB #agile #approach #architecture #development #education
An Approach to Software Architecting in Agile Software Development Projects in Education (SA, PdB), pp. 157–168.
ECSAECSA-2015-BaresiS #approach #architecture
An Architecture-Centric Approach for Dynamic Smart Spaces (LB, AS), pp. 277–284.
ECSAECSA-2015-GroherW #architecture #requirements
Collecting Requirements and Ideas for Architectural Group Decision-Making Based on Four Approaches (IG, RW), pp. 181–192.
ECSAECSA-2015-SporerMKB #agile #approach #design #requirements
A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability (HS, GM, CK, EB), pp. 251–258.
QoSAQoSA-2015-Kramer #approach #consistency #generative #modelling #multi
A Generative Approach to Change-Driven Consistency in Multi-View Modeling (MEK), pp. 129–134.
WICSAWICSA-2015-CaraccioloLN #approach #architecture #consistency
A Unified Approach to Architecture Conformance Checking (AC, MFL, ON), pp. 41–50.
WICSAWICSA-2015-HauptLP #api #approach #modelling #rest
A Conversation Based Approach for Modeling REST APIs (FH, FL, CP), pp. 165–174.
CASECASE-2015-AlfonsoXA #approach #capacity #programming #representation #scheduling
A simulation-optimization approach for capacity planning and appointment scheduling of blood donors based on mathematical programming representation of event dynamics (EA, XX, VA), pp. 728–733.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChuFRSKT #approach #automation #hardware #integration
A LC-MS integration approach in life science automation: Hardware integration and software integration (XC, HF, TR, NS, MK, KT), pp. 979–984.
CASECASE-2015-DiganiHSS #approach #coordination #multi #polynomial #programming
A Quadratic Programming approach for coordinating multi-AGV systems (VD, MAH, LS, CS), pp. 600–605.
CASECASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism #using
A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASECASE-2015-FerrerALVLH #approach #assembly #automation #process
An approach for knowledge-driven product, process and resource mappings for assembly automation (BRF, BA, AL, DAV, JLML, RH), pp. 1104–1109.
CASECASE-2015-KouiderHOO #approach #graph #integer #linear #scheduling #source code
Mixed integer linear programs and tabu search approach to solve mixed graph coloring for unit-time job shop scheduling (AK, HAH, SO, AO), pp. 1177–1181.
CASECASE-2015-LiDLZ #approach #composition #problem
A decomposition approach to colored traveling salesman problems (JL, XD, HL, MZ), pp. 51–56.
CASECASE-2015-LuSJSX #approach #multi #nondeterminism #programming
A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
CASECASE-2015-MaP #approach #black box #programmable #testing
Design-to-test approach for black-box testing of programmable controllers (CM, JP), pp. 1018–1024.
CASECASE-2015-SathishRB #approach #detection #industrial #simulation
A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASECASE-2015-SemeniutaF #approach #data flow #formal method #industrial #specification
Discrete event dataflow as a formal approach to specification of industrial vision systems (OS, PF), pp. 849–854.
CASECASE-2015-SenfeldsVMB #approach #industrial
Power smoothing approach within industrial DC microgrid with supercapacitor storage for robotic manufacturing application (AS, MV, DM, OB), pp. 1333–1338.
CASECASE-2015-SustoM #approach #machine learning #multi #predict
Slow release drug dissolution profile prediction in pharmaceutical manufacturing: A multivariate and machine learning approach (GAS, SFM), pp. 1218–1223.
CASECASE-2015-XieZLSD #agile #analysis #approach #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
DACDAC-2015-ChaariENTK #approach #modelling #safety
A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
DACDAC-2015-HanF #analysis #approach #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KadjoAKG #approach #cpu #energy #gpu #mobile #performance
A control-theoretic approach for energy efficient CPU-GPU subsystem in mobile platforms (DK, RA, MK, PVG), p. 6.
DACDAC-2015-SripadaP #approach #graph
A timing graph based approach to mode merging (SS, MP), p. 6.
DACDAC-2015-ZhanOGZ0 #approach #named #network #power management #towards
DimNoC: a dim silicon approach towards power-efficient on-chip network (JZ, JO, FG, JZ, YX), p. 6.
DATEDATE-2015-0001CY #approach #optimisation #process #robust
A robust approach for process variation aware mask optimization (JK, WKC, EFYY), pp. 1591–1594.
DATEDATE-2015-BiewerAGSH #approach #coordination #realtime #synthesis
A symbolic system synthesis approach for hard real-time systems based on coordinated SMT-solving (AB, BA, JG, TS, CH), pp. 357–362.
DATEDATE-2015-Bogdan #approach #challenge #cyber-physical #manycore #personalisation
A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms (PB), pp. 253–258.
DATEDATE-2015-HoqueMS #analysis #approach #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-LiuLY #approach #effectiveness
An effective triple patterning aware grid-based detailed routing approach (ZL, CL, EFYY), pp. 1641–1646.
DATEDATE-2015-ReehmanCCS #approach #architecture #hardware #memory management #parallel
In-place memory mapping approach for optimized parallel hardware interleaver architectures (SUR, CC, PC, AS), pp. 896–899.
DATEDATE-2015-RuizMK #approach #reuse
Systematic application of ISO 26262 on a SEooC: Support by applying a systematic reuse approach (AR, AM, TK), pp. 393–396.
DATEDATE-2015-TrinadhBSPK #approach #named #programming #testing
DP-fill: a dynamic programming approach to X-filling for minimizing peak test power in scan tests (ST, CSB, SGS, SP, VK), pp. 836–841.
DocEngDocEng-2015-AzevedoLS #3d #approach
An Approach to Convert NCL Applications into Stereoscopic 3D (RGDAA, GAFL, LFGS), pp. 177–186.
DocEngDocEng-2015-DumasCBS #approach #design
An Approach for Designing Proofreading Views in Publishing Chains (LD, SC, BB, SS), pp. 215–218.
DocEngDocEng-2015-RastanPS #approach #comprehension #named
TEXUS: A Task-based Approach for Table Extraction and Understanding (RR, HYP, JS), pp. 25–34.
DocEngDocEng-2015-SarkisCD #approach #multi #named #segmentation #web
MSoS: A Multi-Screen-Oriented Web Page Segmentation Approach (MS, CC, JCD), pp. 85–88.
DRRDRR-2015-PengCN #approach #using
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
SIGMODSIGMOD-2015-ArmenatzoglouPN #approach #clustering #game studies #graph #multi #realtime #social
Real-Time Multi-Criteria Social Graph Partitioning: A Game Theoretic Approach (NA, HP, VN, DP, CS), pp. 1617–1628.
SIGMODSIGMOD-2015-DeshpandeRDA #approach #named
ShareInsights: An Unified Approach to Full-stack Data Processing (MD, DR, SD, AA), pp. 1925–1940.
SIGMODSIGMOD-2015-GurukarRR #approach #commit #communication #mining #named #network #scalability
COMMIT: A Scalable Approach to Mining Communication Motifs from Dynamic Networks (SG, SR, BR), pp. 475–489.
SIGMODSIGMOD-2015-ShinJSK #approach #graph #named #random #scalability
BEAR: Block Elimination Approach for Random Walk with Restart on Large Graphs (KS, JJ, LS, UK), pp. 1571–1585.
SIGMODSIGMOD-2015-TangSX #approach
Influence Maximization in Near-Linear Time: A Martingale Approach (YT, YS, XX), pp. 1539–1554.
SIGMODSIGMOD-2015-WangLYXZ #approach #network #performance
Efficient Route Planning on Public Transportation Networks: A Labelling Approach (SW, WL, YY, XX, SZ), pp. 967–982.
SIGMODSIGMOD-2015-WangXL #adaptation #approach
Crowd-Based Deduplication: An Adaptive Approach (SW, XX, CHL), pp. 1263–1277.
SIGMODSIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel #using
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-ZhengZLYSZ #approach #graph #how #nondeterminism #rdf #similarity
How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
VLDBVLDB-2015-AkidauBCCFLMMPS #approach #bound #correctness #data flow #latency
The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (TA, RB, CC, SC, RFM, RL, SM, DM, FP, ES, SW), pp. 1792–1803.
VLDBVLDB-2015-GreenOW #approach #live programming #programming
Live Programming in the LogicBlox System: A MetaLogiQL Approach (TJG, DO, GW), pp. 1782–1793.
VLDBVLDB-2015-JhaHLCH #approach #in memory #memory management
Improving Main Memory Hash Joins on Intel Xeon Phi Processors: An Experimental Approach (SJ, BH, ML, XC, HPH), pp. 642–653.
VLDBVLDB-2015-LiCM #approach #data-driven #query
Query From Examples: An Iterative, Data-Driven Approach to Query Construction (HL, CYC, DM), pp. 2158–2169.
VLDBVLDB-2015-SH #approach #big data #named #testing
CODD: A Dataless Approach to Big Data Testing (AS, JRH), pp. 2008–2019.
VLDBVLDB-2015-YangMFLK #approach #lens #named #on-demand
Lenses: An On-Demand Approach to ETL (YY, NM, RF, ZHL, OK), pp. 1578–1589.
VLDBVLDB-2015-ZhangC0 #approach #distributed #graph #set
Bonding Vertex Sets Over Distributed Graph: A Betweenness Aware Approach (XZ, HC, LC), pp. 1418–1429.
ITiCSEITiCSE-2015-BarbaC
Tangible Media Approaches to Introductory Computer Science (EB, SC), pp. 207–212.
ITiCSEITiCSE-2015-Patitsas #approach #education #student
A Numpy-First Approach to Teaching CS1 to Natural Science Students (EP), p. 333.
ITiCSEITiCSE-2015-Silvis-Cividjian #approach #education #multi #pervasive
Teaching Pervasive Computing to CS Freshmen: A Multidisciplinary Approach (NSC), pp. 195–200.
ITiCSEITiCSE-2015-XhakajL #approach #education
A New Approach To Teaching Red Black Tree (FX, CWL), pp. 278–283.
ESOPESOP-2015-CastagnaI0B #calculus #pattern matching #xquery
A Core Calculus for XQuery 3.0 — Combining Navigational and Pattern Matching Approaches (GC, HI, KN, VB), pp. 232–256.
ESOPESOP-2015-TerauchiU #approach #refinement
Relaxed Stratification: A New Approach to Practical Complete Predicate Refinement (TT, HU), pp. 610–633.
FASEFASE-2015-StruberRCT #approach #model transformation #performance #reuse #variability
A Variability-Based Approach to Reusable and Efficient Model Transformations (DS, JR, MC, GT), pp. 283–298.
ICSMEICSME-2015-Verebi #approach #modelling #refactoring
A model-based approach to software refactoring (IV), pp. 606–609.
MSRMSR-2015-Marder #approach #behaviour #stack overflow
Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
SANERSANER-2015-NagyMC #approach #concept #query #sql
Where was this SQL query executed? a static concept location approach (CN, LM, AC), pp. 580–584.
SANERSANER-2015-NayrollesHTL #approach #debugging #model checking #named #using
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-SaeidiHKJ #approach #clustering #multi #search-based
A search-based approach to multi-view clustering of software systems (AS, JH, RK, SJ), pp. 429–438.
SANERSANER-2015-ThongtanunamTKY #approach #bibliography #code review #perspective #recommendation
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
PLDIPLDI-2015-EmaniO #approach #runtime
Celebrating diversity: a mixture of experts approach for runtime mapping in dynamic environments (MKE, MFPO), pp. 499–508.
ICALPICALP-v1-2015-BerkholzG #algebra #graph #morphism #testing
Limitations of Algebraic Approaches to Graph Isomorphism Testing (CB, MG), pp. 155–166.
ICALPICALP-v2-2015-KariS #algebra #approach #geometry
An Algebraic Geometric Approach to Nivat’s Conjecture (JK, MS), pp. 273–285.
ICALPICALP-v2-2015-Zetzsche #approach
An Approach to Computing Downward Closures (GZ), pp. 440–451.
LATALATA-2015-GonzeJ #on the #probability
On the Synchronizing Probability Function and the Triple Rendezvous Time — New Approaches to Černý’s Conjecture (FG, RMJ), pp. 212–223.
LATALATA-2015-Peltier #approach #reasoning
Reasoning on Schemas of Formulas: An Automata-Based Approach (NP), pp. 263–274.
GaMGaM-2015-ValletKPM #approach #modelling #network #social #visual notation
A Visual Analytics Approach to Compare Propagation Models in Social Networks (JV, HK, BP, GM), pp. 65–79.
CHICHI-2015-EdgeGMRSWY #editing
Mixed-Initiative Approaches to Global Editing in Slideware (DE, SG, NMF, MR, RAS, CW, KY), pp. 3503–3512.
CHICHI-2015-GannonGF #approach #design #named
Tactum: A Skin-Centric Approach to Digital Design and Fabrication (MG, TG, GWF), pp. 1779–1788.
CHICHI-2015-GiaccardiK #approach #experience #human-computer
Foundations of Materials Experience: An Approach for HCI (EG, EK), pp. 2447–2456.
CHICHI-2015-HillmanW #approach #social #social media
Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHICHI-2015-KoemanKR #approach #distributed #exclamation #quote #visualisation
“Everyone Is Talking about It!”: A Distributed Approach to Urban Voting Technology and Visualisations (LK, VK, YR), pp. 3127–3136.
CHICHI-2015-MunteanuMMROV #human-computer #interactive #requirements
Situational Ethics: Re-thinking Approaches to Formal Ethics Requirements for Human-Computer Interaction (CM, HM, WM, MR, SO, JV), pp. 105–114.
CHICHI-2015-NoroozMJMF #approach #learning #named #smarttech #visualisation
BodyVis: A New Approach to Body Learning Through Wearable Sensing and Visualization (LN, MLM, AJ, BM, JEF), pp. 1025–1034.
CHICHI-2015-OLearyEKVRP #approach #comprehension #design #health #trade-off
Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
CHICHI-2015-PengZG #3d #approach #design #modelling #named
D-Coil: A Hands-on Approach to Digital 3D Models Design (HP, AZ, FG), pp. 1807–1815.
CHICHI-2015-RamakersTL #approach #design #named
PaperPulse: An Integrated Approach for Embedding Electronics in Paper Designs (RR, KT, KL), pp. 2457–2466.
CHICHI-2015-ZhaoDFZ #approach #named
CoFaçade: A Customizable Assistive Approach for Elders and Their Helpers (JCZ, RCD, PSF, SZ), pp. 1583–1592.
CSCWCSCW-2015-VinesWSWO #authentication #collaboration #information management
Authenticity, Relatability and Collaborative Approaches to Sharing Knowledge about Assistive Living Technology (JV, PCW, DS, MW, PO), pp. 82–94.
HCIDHM-EH-2015-CheffiRBBS #approach #cost analysis #feedback #optimisation
A Bi-level Optimization Approach to Get an Optimal Combination of Cost Functions for Pilot’s Arm Movement: The Case of Helicopter’s Flying Aid Functions with Haptic Feedback (SC, TR, LB, PB, JCS), pp. 248–257.
HCIDHM-EH-2015-HeftSBR #approach #visualisation
An Approach for Intuitive Visualization of Ergonomic Issues (WH, MS, ACB, PR), pp. 26–36.
HCIDUXU-DD-2015-BarrosSRTBS #approach #human-computer #interface #usability
A Usability Study of a Brain-Computer Interface Apparatus: An Ergonomic Approach (RQB, GS, CR, RT, MQB, MMS), pp. 224–236.
HCIDUXU-DD-2015-DiasVSVPSE #approach #testing #usability
A Living Labs Approach for Usability Testing of Ambient Assisted Living Technologies (MSD, EV, FS, AV, FMP, NS, SE), pp. 167–178.
HCIDUXU-DD-2015-Lera #approach #design #interactive #matter
Emotion-Centered-Design (ECD) New Approach for Designing Interactions that Matter (EdL), pp. 406–416.
HCIDUXU-DD-2015-PaelkeR #challenge #cyber-physical #user interface
User Interfaces for Cyber-Physical Systems: Challenges and Possible Approaches (VP, CR), pp. 75–85.
HCIDUXU-IXD-2015-Gasparini #approach #experience #interactive #library #user interface
A Holistic Approach to User Experience in the Context of an Academic Library Interactive System (AAG), pp. 173–184.
HCIDUXU-UI-2015-EshetB #design #development #mobile
Approaching Users and Context of Use in the Design and Development of Mobile Systems (EE, HB), pp. 508–519.
HCIDUXU-UI-2015-SoutoFS #approach #comprehension #design #process #towards #women
The Creative Process in Digital Design: Towards an Understanding of Women’s Approach (VTS, PCLAF, FAdS), pp. 252–263.
HCIHCI-DE-2015-Bakke #approach #process
An Activity Theory Approach to Intuitiveness: From Artefact to Process (SB), pp. 3–13.
HCIHCI-DE-2015-ChamunZMOS #approach #design #documentation #what
What About Document Folding? User Impressions and a Design Approach (RC, AdCAZ, IHM, JBSdO, MSS), pp. 307–319.
HCIHCI-DE-2015-GhoshP #approach #design #mobile
Designing of a Natural Voice Assistants for Mobile Through User Centered Design Approach (SG, JP), pp. 320–331.
HCIHCI-DE-2015-Uchida #approach #security
A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
HCIHCI-IT-2015-EskerudSOH #approach #automation #design #interface
Controlling the Home — A User Participatory Approach to Designing a Simple Interface for a Complex Home Automation System (ME, AS, CSO, HH), pp. 717–728.
HCIHCI-IT-2015-PoirierB #named
UniWatch — Some Approaches Derived from UniGlyph to Allow Text Input on Tiny Devices Such as Connected Watches (FP, MB), pp. 554–562.
HCIHCI-UC-2015-AzhariF #approach #experience #social #social media #user interface #using
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-HessBFHKMNRLT #approach #ecosystem #mobile
Building Mobile Software Ecosystems — A Practical Approach (SH, SB, JF, MH, FK, DM, MN, DR, TL, MT), pp. 165–177.
HCIHCI-UC-2015-OhJK #approach #human-computer #simulation #using
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHIMI-IKC-2015-HasegawaD #approach #framework #learning #ubiquitous
A Ubiquitous Lecture Archive Learning Platform with Note-Centered Approach (SH, JD), pp. 294–303.
HCIHIMI-IKC-2015-LiangG #approach #information management #ontology #safety #semantics #web
Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
HCIHIMI-IKD-2015-0002S #approach #visualisation
An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
HCIHIMI-IKD-2015-GonzalezCB #approach #design #modelling #sentiment
Modeling User’s Sentiment in User Segmentations: An Argumentation Approach for User Centered Design (MPG, CIC, RFB), pp. 595–606.
HCIHIMI-IKD-2015-NoseLBK #approach #network
Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
HCILCT-2015-Sirisaengtaksin #approach #design #education #mobile #online #recommendation #research
A Notification and Recommender Mobile App for Educational Online Discussion: A Design Research Approach (KS, LO, NA), pp. 325–336.
CAiSECAiSE-2015-AbubahiaC #approach #clustering
A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
CAiSECAiSE-2015-FukusumiMK #approach #crowdsourcing #data transformation #game studies
Game Aspect: An Approach to Separation of Concerns in Crowdsourced Data Management (SF, AM, HK), pp. 3–19.
CAiSECAiSE-2015-KhouriSB #approach #data transformation #lifecycle #traceability
Managing Data Warehouse Traceability: A Life-Cycle Driven Approach (SK, KS, LB), pp. 199–213.
CAiSECAiSE-2015-SunB #approach #clustering #novel #top-down
A Novel Top-Down Approach for Clustering Traces (YS, BB), pp. 331–345.
CAiSECAiSE-2015-YeddulaDR #approach #enterprise #migration #modelling
A Model-Driven Approach to Enterprise Data Migration (RRY, PD, SR), pp. 230–243.
ICEISICEIS-v1-2015-AbakumovK #performance
Approaches to Enhancing Efficiency of Production Management on Shop Floor Level (EMA, SBK), pp. 559–564.
ICEISICEIS-v1-2015-ArevaloRC #approach #information management #legacy #modelling #process
Discovering Business Models for Software Process Management — An Approach for Integrating Time and Resource Perspectives from Legacy Information Systems (CA, IMR, MJEC), pp. 353–359.
ICEISICEIS-v1-2015-BorgesDRAS #approach #generative #using
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-CarboneraA15a #approach #information management #knowledge-based #representation
A Cognition-inspired Knowledge Representation Approach for Knowledge-based Interpretation Systems (JLC, MA), pp. 644–649.
ICEISICEIS-v1-2015-FerrandinENSA #approach #classification
A Centroid-based Approach for Hierarchical Classification (MF, FE, JCN, EES, BCÁ), pp. 25–33.
ICEISICEIS-v1-2015-GharbiGB #approach #configuration management #embedded #hybrid #realtime #scheduling #search-based
A Hybrid Genetic based Approach for Real-time Reconfigurable Scheduling of OS Tasks in Uniprocessor Embedded Systems (IG, HG, SB), pp. 385–390.
ICEISICEIS-v1-2015-JuniorS #approach #compilation #optimisation #reasoning #set
Finding Good Compiler Optimization Sets — A Case-based Reasoning Approach (NLQJ, AFdS), pp. 504–515.
ICEISICEIS-v1-2015-MendoncaMSS #approach #named #query
CORE — A Context-based Approach for Rewriting User Queries (AM, PM, DS, ACS), pp. 391–398.
ICEISICEIS-v1-2015-SabelnikovaCT #approach #case study #outsourcing
Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
ICEISICEIS-v1-2015-SilvaHL #approach #hybrid #memory management
A Hybrid Memory Data Cube Approach for High Dimension Relations (RRS, CMH, JdCL), pp. 139–149.
ICEISICEIS-v2-2015-AizebojeP #approach #pointer #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-BayaADM #approach #composition #product line #scalability
Dynamic Large Scale Product Lines through Modularization Approach (AB, BEA, ID, ZM), pp. 439–444.
ICEISICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-DuarteOB #approach #architecture
Smart Cities — An Architectural Approach (AD, CO, JB), pp. 563–573.
ICEISICEIS-v2-2015-EttaziHNE #adaptation #approach #towards #transaction
Towards a Context-Aware Adaptation Approach for Transactional Services (WE, HH, MN, SE), pp. 553–562.
ICEISICEIS-v2-2015-Judrups #analysis #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEISICEIS-v2-2015-JuniorP #approach #identification #named #ontology #requirements
OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
ICEISICEIS-v2-2015-KhlifKKD #approach #architecture #multi #uml
A UML-based Approach for Multi-scale Software Architectures (IK, MHK, AHK, KD), pp. 374–381.
ICEISICEIS-v2-2015-LucenaAAAJ #approach #modelling
Integrating User Stories and i* Models — A Systematic Approach (ML, CA, FMRA, EA, AJ), pp. 428–438.
ICEISICEIS-v2-2015-MeloFOS #approach #diagrams #modelling #process #uml
A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity Diagrams (MdSM, JMSF, EAOJ, MSS), pp. 92–101.
ICEISICEIS-v3-2015-GhezziCRB #agile #approach #case study #comparative #design #mobile #performance
A Comparative Study on the Impact of Business Model Design & Lean Startup Approach versus Traditional Business Plan on Mobile Startups Performance (AG, AC, AR, RB), pp. 196–203.
ICEISICEIS-v3-2015-KhiderB #case study #comparative #process #social
Social Business Process Management Approaches — A Comparative Study (HK, AB), pp. 340–345.
ICEISICEIS-v3-2015-NicastroPAMBT #approach #case study #guidelines #interface #mobile
A Semiotic-informed Approach to Interface Guidelines for Mobile Applications — A Case Study on Phenology Data Acquisition (FN, RP, BA, LPCM, CB, RdST), pp. 34–43.
ICEISICEIS-v3-2015-ProencaNBB #approach #risk management
Digital Curation Costs — A Risk Management Approach Supported by the Business Model Canvas (DP, AN, RB, JLB), pp. 299–306.
ICEISICEIS-v3-2015-Wissotzki #approach #identification #process
A Process Approach for Capability Identification and Management (MW), pp. 204–212.
ECIRECIR-2015-AmigoGM #approach #clustering #effectiveness #formal method #information management #metric #retrieval
A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
ECIRECIR-2015-JungL #approach #predict
A Discriminative Approach to Predicting Assessor Accuracy (HJJ, ML), pp. 159–171.
ECIRECIR-2015-LiangCC #approach #detection #social #social media
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIRECIR-2015-SchindlerR #approach #classification #music
An Audio-Visual Approach to Music Genre Classification through Affective Color Features (AS, AR), pp. 61–67.
ICMLICML-2015-JerniteRS #approach #learning #markov #modelling #performance #random
A Fast Variational Approach for Learning Markov Random Field Language Models (YJ, AMR, DS), pp. 2209–2217.
ICMLICML-2015-PachecoS #approach #pseudo
Proteins, Particles, and Pseudo-Max-Marginals: A Submodular Approach (JP, EBS), pp. 2200–2208.
ICMLICML-2015-Romera-ParedesT #approach #learning
An embarrassingly simple approach to zero-shot learning (BRP, PHST), pp. 2152–2161.
ICMLICML-2015-SzorenyiBWH #approach #multi
Qualitative Multi-Armed Bandits: A Quantile-Based Approach (BS, RBF, PW, EH), pp. 1660–1668.
ICMLICML-2015-TangS #approach #composition
Guaranteed Tensor Decomposition: A Moment Approach (GT, PS), pp. 1491–1500.
ICMLICML-2015-YenLZRD #approach #modelling #process
A Convex Exemplar-based Approach to MAD-Bayes Dirichlet Process Mixture Models (IEHY, XL, KZ, PKR, ISD), pp. 2418–2426.
ICMLICML-2015-ZhuE #approach #hybrid #probability #random #using
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-BabaKNKGIAKIHKS #low cost #predict
Predictive Approaches for Low-Cost Preventive Medicine Program in Developing Countries (YB, HK, YN, EK, PPG, RIM, AA, MK, SI, TH, MK, SS, KK, KT, MS, MB, NU, MK, NN), pp. 1681–1690.
KDDKDD-2015-BarajasA #approach #health #modelling
Dynamically Modeling Patient’s Health State from Electronic Medical Records: A Time Series Approach (KLCB, RA), pp. 69–78.
KDDKDD-2015-RenEWH #approach #automation #corpus #mining #network #recognition #type system
Automatic Entity Recognition and Typing from Massive Text Corpora: A Phrase and Network Mining Approach (XR, AEK, CW, JH), pp. 2319–2320.
KDDKDD-2015-SethiYRVR #classification #machine learning #scalability #using
Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDDKDD-2015-SunWH #approach #named #predict #risk management
LINKAGE: An Approach for Comprehensive Risk Prediction for Care Management (ZS, FW, JH), pp. 1145–1154.
KDDKDD-2015-WangLSH #approach #composition #interactive #recursion #topic #towards
Towards Interactive Construction of Topical Hierarchy: A Recursive Tensor Decomposition Approach (CW, XL, YS, JH), pp. 1225–1234.
KDDKDD-2015-ZhouM #approach #kernel #predict
Predicting Ambulance Demand: a Spatio-Temporal Kernel Approach (ZZ, DSM), pp. 2297–2303.
MLDMMLDM-2015-CoralloFMACCGS #analysis #approach #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-GovadaJMS #approach #hybrid #induction #learning #using
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-KrasotkinaM #approach #optimisation #ranking
A Bayesian Approach to Sparse Learning-to-Rank for Search Engine Optimization (OK, VM), pp. 382–394.
MLDMMLDM-2015-KrasotkinaM15a #analysis #approach
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
RecSysRecSys-2015-GuoD #approach #bias #category theory
Uncovering Systematic Bias in Ratings across Categories: a Bayesian Approach (FG, DBD), pp. 317–320.
SEKESEKE-2015-AdamEA #approach #design
An approach for classifying design artifacts (SA, GEB, AA), pp. 164–167.
SEKESEKE-2015-GomedeSB #approach #lifecycle
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management (EG, RTDS, RMdB), pp. 320–325.
SEKESEKE-2015-MagalhaesAM #approach #framework #independence #model transformation #on the #specification
On the Specification of Model Transformations through a Platform Independent Approach (APM, AMSA, RSPM), pp. 558–561.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based #using
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NoureddineJHKM #approach #correlation #named #profiling #research
CARP: Correlation Based Approach for Researcher Profiling (HN, IJ, HH, OAK, EM), pp. 461–464.
SEKESEKE-2015-SaharAA #approach #case study #detection #image #modelling #prototype
A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKESEKE-2015-SampaioMLM #adaptation #approach #learning #research
Reflecting, adapting and learning in small software organizations: an action research approach (SS, MM, AL, HPM), pp. 46–50.
SEKESEKE-2015-TironiMRM #approach #identification #learning
An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
SEKESEKE-2015-WangG #approach #hybrid #novel #predict
A Novel Hybrid Approach for Diarrhea Prediction (YW, JG), pp. 168–173.
SIGIRSIGIR-2015-CanutoGSRM #approach #classification #documentation #parallel #performance #scalability
An Efficient and Scalable MetaFeature-based Document Classification Approach based on Massively Parallel Computing (SDC, MAG, WS, TR, WM), pp. 333–342.
SIGIRSIGIR-2015-SantoMMO #query
Comparing Approaches for Query Autocompletion (GDS, RM, CM, IO), pp. 775–778.
ECMFAECMFA-J-2012-BaresiBKMMPRR15 #approach #embedded #uml #validation #verification
Formal verification and validation of embedded systems: the UML-based MADES approach (LB, GB, DSK, NDM, AM, RFP, AR, MR), pp. 343–363.
AMTAMT-2015-RabbiLYK #approach #diagrams
A Diagrammatic Approach to Model Completion (FR, YL, IY, LK), pp. 56–65.
BXBX-2015-AnjorinLKSS #approach #graph grammar #guidelines
A Systematic Approach and Guidelines to Developing a Triple Graph Grammar (AA, EL, RK, AS, PS), pp. 81–95.
BXBX-2015-HidakaBTM #analysis #approach #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BousseMCB #approach #generative #metamodelling
A Generative Approach to Define Rich Domain-Specific Trace Metamodels (EB, TM, BC, BB), pp. 45–61.
ECMFAECMFA-2015-JahanbanifarKT #approach #integration #modelling
A Model-Based Approach for the Integration of Configuration Fragments (AJ, FK, MT), pp. 125–136.
MoDELSMoDELS-2015-AtkinsonGK15a #approach #modelling #multi
A unifying approach to connections for multi-level modeling (CA, RG, TK), pp. 216–225.
MoDELSMoDELS-2015-HajriGBS #approach #case study #embedded #industrial #lessons learnt #modelling #product line
Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELSMoDELS-2015-IftikharIKM #approach #automation #framework #game studies #modelling #testing
An automated model based testing approach for platform games (SI, MZI, MUK, WM), pp. 426–435.
MoDELSMoDELS-2015-Rodriguez-Echeverria #analysis #approach #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
OOPSLAOOPSLA-2015-CrafaP #approach #programming
The chemical approach to typestate-oriented programming (SC, LP), pp. 917–934.
OOPSLAOOPSLA-2015-HagueLO #approach #css #detection #html
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
OOPSLAOOPSLA-2015-MarrD #partial evaluation #self
Tracing vs. partial evaluation: comparing meta-compilation approaches for self-optimizing interpreters (SM, SD), pp. 821–839.
GPCEGPCE-2015-KabacC #approach #development
Orchestrating masses of sensors: a design-driven development Approach (MK, CC), pp. 117–120.
QAPLQAPL-2015-MartinelliMS #security #specification
Semiring-based Specification Approaches for Quantitative Security (FM, IM, FS), pp. 95–109.
REFSQREFSQ-2015-GhaziSG #approach #named #requirements #visualisation
FlexiView: A Magnet-Based Approach for Visualizing Requirements Artifacts (PG, NS, MG), pp. 262–269.
SACSAC-2015-0001RMW #approach #behaviour #constraints #process
Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
SACSAC-2015-AliK #approach #effectiveness #recommendation
An effective approach to group recommendation based on belief propagation (IA, SWK), pp. 1148–1153.
SACSAC-2015-AwadBESAS #anti #approach #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-BadouelHKM #approach #collaboration #distributed
A grammatical approach to data-centric case management in a distributed collaborative environment (EB, LH, GEK, CM), pp. 1834–1839.
SACSAC-2015-BarnPB #approach #evaluation #privacy #requirements
An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
SACSAC-2015-BekkoucheCR #approach #constraints #fault #locality #named
LocFaults: a new flow-driven and constraint-based error localization approach (MB, HC, MR), pp. 1773–1780.
SACSAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-BurityE #approach #recommendation
A quantitative, evidence-based approach for recommending software modules (TB, GEdS), pp. 1449–1456.
SACSAC-2015-DAddioM #approach #collaboration #sentiment
A sentiment-based item description approach for kNN collaborative filtering (RMD, MGM), pp. 1060–1065.
SACSAC-2015-FauconnierKR #approach #machine learning #recognition #taxonomy
A supervised machine learning approach for taxonomic relation recognition through non-linear enumerative structures (JPF, MK, BR), pp. 423–425.
SACSAC-2015-GassaraRJ #approach #architecture #deployment #modelling #multi
A multi-scale modeling approach for software architecture deployment (AG, IBR, MJ), pp. 1405–1410.
SACSAC-2015-JoCKBO #algorithm #approach #collaboration #cpu #data-driven #on the
On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach (YYJ, SC, SWK, DHB, HO), pp. 2060–2065.
SACSAC-2015-JuniorRSM #approach #deployment #multi #non-functional #requirements
A multi-criteria approach for assessing cloud deployment options based on non-functional requirements (RGJ, TR, AS, NCM), pp. 1383–1389.
SACSAC-2015-JuniorSM #approach #semantics
An approach for building lexical-semantic resources based on heterogeneous information sources (JGdAJ, US, LBM), pp. 402–408.
SACSAC-2015-Khenfri #approach #architecture #optimisation #synthesis
A holistic optimization approach for the synthesis of AUTOSAR E/E architecture (FK), pp. 1960–1961.
SACSAC-2015-KhlifKKD #approach #architecture #modelling #multi #towards
Towards a multi-scale modeling approach for software architectures (IK, MHK, AHK, KD), pp. 1468–1470.
SACSAC-2015-LabibPCG #approach #development #learning #product line #reuse
Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
SACSAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-NascimentoBJ #approach #geometry #recognition
A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
SACSAC-2015-PedrosaT #approach #encoding #visual notation #word
Compact and discriminative approach for encoding spatial-relationship of visual words (GVP, AJMT), pp. 92–95.
SACSAC-2015-PerkusichMSGAP #approach #metric #network
A Bayesian network approach to assist on the interpretation of software metrics (MP, AM, LCeS, KCG, HOdA, AP), pp. 1498–1503.
SACSAC-2015-ReddySC #approach #aspect-oriented #incremental #learning #performance #weaving
Incremental aspect weaving: an approach for faster AOP learning (YRR, AS, MC), pp. 1480–1485.
SACSAC-2015-RegoMP #approach #detection #folksonomy #learning
A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SACSAC-2015-RodriguesAFSB #approach #ontology #simulation
An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
SACSAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-SantiagoPH #approach #detection #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SACSAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
SACSAC-2015-SilvaMR #algorithm #approach #problem #using
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-Soares0W #approach #modelling #named #recognition #requirements #speech
VoiceToModel: an approach to generate requirements models from speech recognition mechanisms (FS, JA, FW), pp. 1350–1357.
SACSAC-2015-VielMT #approach #multi
An approach for controlling synchronous remote instances of a multimedia presentation (CCV, ELM, CACT), pp. 1285–1290.
SACSAC-2015-XiongN #estimation #low cost #power management
Cost-efficient and attack-resilient approaches for state estimation in power grids (KX, PN), pp. 2192–2197.
SACSAC-2015-XuanLXT #empirical #fault #metric #predict #set #using
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
ESEC-FSEESEC-FSE-2015-MangalZNN #approach #program analysis
A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSEESEC-FSE-2015-MorenoCGS #adaptation #approach #model checking #nondeterminism #probability #self
Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
ESEC-FSEESEC-FSE-2015-VasquezBBOPP #android #approach #energy #multi #optimisation #user interface
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach (MLV, GB, CEBC, RO, MDP, DP), pp. 143–154.
ICSEICSE-v1-2015-JoblinMASR #approach #community #developer #fine-grained #network
From Developer Networks to Verified Communities: A Fine-Grained Approach (MJ, WM, SA, JS, DR), pp. 563–573.
ICSEICSE-v1-2015-SahaZKP #approach #information retrieval #testing
An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes (RKS, LZ, SK, DEP), pp. 268–279.
ICSEICSE-v1-2015-WhalenPRSG #approach #flexibility #metric
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
ICSEICSE-v1-2015-YuBC #approach #fault #multi #testing
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests (ZY, CB, KYC), pp. 924–935.
ICSEICSE-v2-2015-Baia #approach #multi #project management #simulation
An Integrated Multi-Agent-Based Simulation Approach to Support Software Project Management (DdMB), pp. 911–914.
ICSEICSE-v2-2015-Caracciolo #approach #architecture #automation #constraints #testing
A Unified Approach to Automatic Testing of Architectural Constraints (AC), pp. 871–874.
ICSEICSE-v2-2015-Hecht #android #approach #detection
An Approach to Detect Android Antipatterns (GH), pp. 766–768.
ICSEICSE-v2-2015-Ouriques #modelling #testing
Strategies for Prioritizing Test Cases Generated Through Model-Based Testing Approaches (JFSO), pp. 879–882.
PLEASEPLEASE-2015-TzeremesG #approach #development #product line
A Software Product Line Approach for End User Development of Smart Spaces (VT, HG), pp. 23–26.
SPLCSPLC-2015-0002Z #agile #approach
Lean variation management: increasing business value with a diversified approach (MB, BZ), p. 385.
SPLCSPLC-2015-MartinezZBKT #approach #bottom-up #product line
Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
SPLCSPLC-2015-Munoz-Fernandez #adaptation #approach #named #requirements #self #simulation
REFAS: a PLE approach for simulation of self-adaptive systems requirements (JCMF, GT, IR, RM, CS), pp. 121–125.
ASPLOSASPLOS-2015-MishraZLH #approach #constraints #energy #modelling #performance #probability #visual notation
A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
CGOCGO-2015-ZhengLHWJ #approach #debugging #manycore #on the #performance
On performance debugging of unnecessary lock contentions on multicore processors: a replay-based approach (LZ, XL, BH, SW, HJ), pp. 56–67.
HPCAHPCA-2015-MeswaniBRSIL #approach #architecture #memory management
Heterogeneous memory architectures: A HW/SW approach for mixing die-stacked and off-package memories (MRM, SB, DR, JS, MI, GHL), pp. 126–136.
HPCAHPCA-2015-WangM #approach #architecture #manycore #named #resource management #scalability
XChange: A market-based approach to scalable dynamic multi-resource allocation in multicore architectures (XW, JFM), pp. 113–125.
HPDCHPDC-2015-KaxirasKNRS #approach #distributed #execution #memory management #scalability
Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
PPoPPPPoPP-2015-HarshvardhanAR #algorithm #approach #communication #graph #parallel
A hierarchical approach to reducing communication in parallel graph algorithms (H, NMA, LR), pp. 285–286.
CAVCAV-2015-DietschHLP #approach #ltl #model checking #modulo theories
Fairness Modulo Theory: A New Approach to LTL Software Model Checking (DD, MH, VL, AP), pp. 49–66.
CAVCAV-2015-ReinkingP #approach #program repair
A Type-Directed Approach to Program Repair (AR, RP), pp. 511–517.
CSLCSL-2015-Kaiser0LL #approach #bound
A Unified Approach to Boundedness Properties in MSO (LK, ML, SL, CL), pp. 441–456.
ICLPICLP-2015-AlrajehG #approach #comprehension
A Logic-Based Approach to Understanding Lone-Actor Terrorism (DA, PG).
ICLPICLP-2015-AngelopoulosG #approach #biology #database #logic
A Logical Approach to Working with Biological Databases (NA, GG).
ICLPICLP-J-2015-BlackmoreRE #approach #compilation #effectiveness #embedded #logic programming #predict
A logic programming approach to predict effective compiler settings for embedded software (CB, OR, KE), pp. 481–494.
ICSTICST-2015-CastillosWW #approach
Show Me New Counterexamples: A Path-Based Approach (KCC, HW, VW), pp. 1–10.
ICSTICST-2015-ErmanTBRA #approach #automation #clustering #development #information management #multi #navigation #testing
Navigating Information Overload Caused by Automated Testing — a Clustering Approach in Multi-Branch Development (NE, VT, MB, PR, AA), pp. 1–9.
ICSTICST-2015-XuLCK #approach #bound #detection #lightweight #thread
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ISSTAISSTA-2015-WangGMC #android #approach #clone detection #detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
LICSLICS-2015-LicataB #approach
A Cubical Approach to Synthetic Homotopy Theory (DRL, GB), pp. 92–103.
LICSLICS-2015-MoninN #approach
A Unifying Approach to the Gamma Question (BM, AN), pp. 585–596.
ICSTSAT-2015-Zielke0 #approach
A New Approach to Partial MUS Enumeration (CZ, MK), pp. 387–404.
CBSECBSE-2014-DidierM #approach #component #detection
A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
ECSAECSA-2014-WeinreichG #bibliography #fresh look #perspective
A Fresh Look at Codification Approaches for SAKM: A Systematic Literature Review (RW, IG), pp. 1–16.
QoSAQoSA-2014-RaatikainenSM #approach #architecture #case study #evaluation #experience #lightweight #maturity
Architecture management and evaluation in mature products: experiences from a lightweight approach (MR, JS, TM), pp. 73–82.
WICSAWICSA-2014-DragomirLB #approach #architecture
Systematic Architectural Decision Management, A Process-Based Approach (AD, HL, TB), pp. 255–258.
WICSAWICSA-2014-ZernadjiTC #approach #evolution #quality #requirements #web #web service
Processing the Evolution of Quality Requirements of Web Service Orchestrations: A Pattern-Based Approach (TZ, CT, CF), pp. 139–142.
ASEASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
CASECASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChenS #approach #markov #modelling #novel #using
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-FantiLIMUA #approach
A Decision Support System approach for the postal delivery operations (MPF, RL, GI, AMM, WU, LA), pp. 588–593.
CASECASE-2014-GlorieuxDSL #approach #optimisation #using
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HuangNXCSD #3d #approach #geometry #modelling #predict
Predictive modeling of geometric deviations of 3D printed products — A unified modeling approach for cylindrical and polygon shapes (QH, HN, KX, YC, SS, TD), pp. 25–30.
CASECASE-2014-HuangYL #approach #identification
An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
CASECASE-2014-HuCLY #approach #automation #comparative #petri net #using
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-LiXG #approach #capacity
A queuing approach for radiotherapy treatment capacity planning (SL, XX, NG), pp. 540–545.
CASECASE-2014-LiZLM #approach #capacity #scheduling
An intercell scheduling approach considering transportation capacity (ML, HZ, DL, XM), pp. 594–599.
CASECASE-2014-Murakami #approach #generative #multi #problem
A column generation approach for the multi-vehicle covering tour problem (KM), pp. 1063–1068.
CASECASE-2014-NagataO #approach #multi #using
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-RahmanCBM #approach #assessment #safety
Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
CASECASE-2014-TiengYHC #approach #multi #optimisation #process
A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
CASECASE-2014-TrikiGX #approach #health
A two-phase approach for periodic home health care planning (NT, TG, XX), pp. 518–523.
CASECASE-2014-WantiaLR #approach #industrial
Symbolic planning for industrial applications — the eRobotics approach (NW, DL, JR), pp. 367–372.
CASECASE-2014-WuBZ #approach #linear #scheduling
Linear programming-based approach to scheduling of crude oil operations in refinery with oil type mixing requirement (NW, LB, MZ), pp. 430–435.
CASECASE-2014-YuM #approach #data-driven #detection #statistics
Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
DACDAC-2014-AgostaBPS #approach #embedded #encryption #execution #multi
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
DACDAC-2014-KiamehrOTN #analysis #approach #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-Rodriguez-NavasSHNLL #approach #automation #functional #safety #specification #verification
Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
DATEDATE-2014-BahrebarS #approach #network
Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
DATEDATE-2014-BraojosDBAA #approach #hardware #manycore #power management
Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
DATEDATE-2014-CannellaBS #approach #realtime #scheduling #streaming #using
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-EckerVZG #approach #metamodelling #synthesis
The metamodeling approach to system level synthesis (WE, MV, LZ, AG), pp. 1–2.
DATEDATE-2014-FrancillonNRT #approach
A minimalist approach to Remote Attestation (AF, QN, KBR, GT), pp. 1–6.
DATEDATE-2014-KarakonstantisSSAB #analysis #approach #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KimHPSL #approach #implementation #modelling #testing
A layered approach for testing timing in the model-based implementation (BK, HIH, TP, SHS, IL), pp. 1–4.
DATEDATE-2014-RiefertCSBRB #approach #automation #effectiveness #fault #functional #generative #testing
An effective approach to automatic functional processor test generation for small-delay faults (AR, LMC, MS, PB, MSR, BB), pp. 1–6.
DocEngDocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #using #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DRRDRR-2014-HajiABSP #approach #documentation #keyword
Two-stage approach to keyword spotting in handwritten documents (MMH, MRA, TDB, CYS, DP), p. ?–12.
HTHT-2014-KotoulasLSSTA #approach #coordination #linked data #open data
A linked data approach to care coordination (SK, VL, MLS, MS, PT, PMA), pp. 77–87.
HTHT-2014-KumarHL #approach #behaviour #identification #twitter
A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
SIGMODSIGMOD-2014-LongWZX #approach
Hypersphere dominance: an optimal approach (CL, RCWW, BZ, MX), pp. 111–122.
SIGMODSIGMOD-2014-RoyS #approach #database #formal method #query
A formal approach to finding explanations for database queries (SR, DS), pp. 1579–1590.
SIGMODSIGMOD-2014-TranNST #approach #clustering #named
JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
SIGMODSIGMOD-2014-XiongHN #approach #distributed #network #performance #query
A software-defined networking based approach for performance management of analytical queries on distributed data stores (PX, HH, JFN), pp. 955–966.
SIGMODSIGMOD-2014-ZhuLWX #approach #graph #order #query #reachability #scalability
Reachability queries on large dynamic graphs: a total order approach (ADZ, WL, SW, XX), pp. 1323–1334.
SIGMODSIGMOD-2014-ZouHWYHZ #approach #data-driven #graph #natural language #rdf
Natural language question answering over RDF: a graph data driven approach (LZ, RH, HW, JXY, WH, DZ), pp. 313–324.
VLDBVLDB-2014-AltowimKM #approach #relational
Progressive Approach to Relational Entity Resolution (YA, DVK, SM), pp. 999–1010.
VLDBVLDB-2014-ArenasDFKS #approach #graph
A Principled Approach to Bridging the Gap between Graph Data and their Schemas (MA, GID, AF, AK, KS), pp. 601–612.
VLDBVLDB-2014-DuttNH #approach #named #query #robust
QUEST: An Exploratory Approach to Robust Query Processing (AD, SN, JRH), pp. 1585–1588.
VLDBVLDB-2014-WeiYLJ #approach #independence #permutation #query #reachability
Reachability Querying: An Independent Permutation Labeling Approach (HW, JXY, CL, RJ), pp. 1191–1202.
VLDBVLDB-2015-LiLGSZDFH14 #approach
A Confidence-Aware Approach for Truth Discovery on Long-Tail Data (QL, YL, JG, LS, BZ, MD, WF, JH), pp. 425–436.
ITiCSEITiCSE-2014-Dorge #approach
A methodological approach to key competencies in informatics (CD), pp. 201–206.
ESOPESOP-2014-MangalNY #analysis #interprocedural
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FoSSaCSFoSSaCS-2014-Cirstea #algebra #approach #linear #logic
A Coalgebraic Approach to Linear-Time Logics (CC), pp. 426–440.
SANERCSMR-WCRE-2014-AlawnehHML #approach #communication #effectiveness
A contextual approach for effective recovery of inter-process communication patterns from HPC traces (LA, AHL, SSM, YL), pp. 274–282.
SANERCSMR-WCRE-2014-UjhelyiHVCSVF #comparison #detection #query
Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
SANERCSMR-WCRE-2014-VidacsBTSG #approach #detection #fault #locality #reduction #testing
Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPCICPC-2014-PerezA #approach #comprehension
A diagnosis-based approach to software comprehension (AP, RA), pp. 37–47.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICSMEICSME-2014-AlomariCM #approach #estimation #maintenance
A Slice-Based Estimation Approach for Maintenance Effort (HWA, MLC, JIM), pp. 81–90.
ICSMEICSME-2014-BauerVJ #approach #detection #novel
A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSMEICSME-2014-BhattacharyaNF #approach #developer #graph
Determining Developers’ Expertise and Role: A Graph Hierarchy-Based Approach (PB, IN, MF), pp. 11–20.
ICSMEICSME-2014-KevicFS #approach #named #navigation
CoMoGen: An Approach to Locate Relevant Task Context by Combining Search and Navigation (KK, TF, DCS), pp. 61–70.
ICSMEICSME-2014-KhanIA #approach #behaviour #heuristic #state machine #uml
A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
PEPMPEPM-2014-CheneyLRW #effectiveness #query
Effective quotation: relating approaches to language-integrated query (JC, SL, GR, PW), pp. 15–26.
PLDIPLDI-2014-StorkNSMFMA #approach #named #programming language
Æminium: a permission based concurrent-by-default programming language approach (SS, KN, JS, MM, AF, PM, JA), p. 4.
STOCSTOC-2014-DinurS #approach #parallel
Analytical approach to parallel repetition (ID, DS), pp. 624–633.
STOCSTOC-2014-GavinskyMWW #approach #bound #complexity #composition #towards
Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture (DG, OM, OW, AW), pp. 213–222.
ICALPICALP-v1-2014-GolovnevKM #approach #problem #product line
Families with Infants: A General Approach to Solve Hard Partition Problems (AG, ASK, IM), pp. 551–562.
LISPILC-2014-Nunes-Harwitt14a #approach #code generation #evaluation #semantics
Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
CHICHI-2014-DunwellFPHALS #approach #game studies #learning #safety
A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CHICHI-2014-HashishBY #approach #collaboration
Involving children in content control: a collaborative and education-oriented content filtering approach (YH, AB, JEY), pp. 1797–1806.
CHICHI-2014-LaureyssensCCMCM #approach #component #composition #game studies #named #network
ZWERM: a modular component network approach for an urban participation game (TL, TC, LC, PM, JC, AVM), pp. 3259–3268.
CHICHI-2014-LeeLKKHC #approach
An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
CHICHI-2014-SunH #approach #relational
Binding the material and the discursive with a relational approach of affordances (HS, WHD), pp. 3533–3542.
CSCWCSCW-2014-XiaLSLDG #approach #mobile #replication
A partial replication approach for anywhere anytime mobile commenting (HX, TL, BS, GL, XD, NG), pp. 530–541.
HCIDHM-2014-GaoH #approach #fault #nondeterminism #research
Research on the Continuous Descent Approach (CDA) Operational Error of Pilot Base on Cloud Model and Uncertainty Theory (YG, YH), pp. 91–100.
HCIDUXU-DI-2014-Bockermann #approach #big data #data analysis #programming #visual notation
A Visual Programming Approach to Big Data Analytics (CB), pp. 393–404.
HCIDUXU-DI-2014-CastroRG #approach #design
Information Design — Qualitative Approach for Corporative App in iPad (JAGFdC, MVR, JYLG), pp. 203–212.
HCIDUXU-DI-2014-WojdziakG #3d #approach #design #interface #modelling
Beyond Perspective — A Model-Based Approach for Camera-Based 3D-Interface Design (JW, RG), pp. 488–498.
HCIDUXU-DP-2014-GokturkS #approach #development #interface
A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
HCIDUXU-TMT-2014-GoodeLSGB #approach #research
A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
HCIHCI-AIMT-2014-LiapisKKX #approach #experience #human-computer
Evaluating User’s Emotional Experience in HCI: The PhysiOBS Approach (AL, NK, CK, MNX), pp. 758–767.
HCIHCI-AS-2014-SjolinderEBFHSNB #approach #development #multi
A Multi-disciplinary Approach in the Development of a Stroke Rehabilitation Tool (MS, ME, ILB, MF, PH, DS, SN, JB), pp. 351–362.
HCIHCI-TMT-2014-AssilaOE #approach #evaluation #human-computer #integration #quality #towards
Towards Qualitative and Quantitative Data Integration Approach for Enhancing HCI Quality Evaluation (AA, KMdO, HE), pp. 469–480.
HCIHCI-TMT-2014-Bakke #approach #process #user interface
Immediacy in User Interfaces: An Activity Theoretical Approach (SB), pp. 14–22.
HCIHCI-TMT-2014-EngelHM #development #evaluation #modelling #user interface
Evaluation of Model-Based User Interface Development Approaches (JE, CH, CM), pp. 295–307.
HCIHCI-TMT-2014-FangZ #approach #online
A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
HCIHIMI-DE-2014-Lucas #approach #constraints #interactive #visualisation
An Interactive Approach to Constraint-Based Visualizations (WTL), pp. 54–63.
HCILCT-NLE-2014-ElciD #approach #case study #education #experience #research #social #social media
A Narrative Research Approach: The Experiences of Social Media Support in Higher Education (AE, BÇD), pp. 36–42.
HCILCT-TRE-2014-AlmazovaK #approach #student
Computer Assisted Individual Approach to Acquiring Foreign Vocabulary of Students Major (NA, MK), pp. 248–257.
HCILCT-TRE-2014-Hayes14a #approach #development #game studies #learning #simulation
An Approach to Holistic Development of Serious Games and Learning Simulations (ATH), pp. 42–49.
HCISCSM-2014-FardounA #approach #community #feedback #framework
Feedback Platform for Community Colleges: An Approach to Knowledge Excellence (HMF, AAMAG), pp. 306–313.
HCISCSM-2014-Kanawati #community #detection #network
Seed-Centric Approaches for Community Detection in Complex Networks (RK), pp. 197–208.
HCISCSM-2014-LeeLS #approach #network #social
A New Approach to Exploring Spatiotemporal Space in the Context of Social Network Services (JGL, KCL, DHS), pp. 221–228.
HCISCSM-2014-PlikynasM #approach #social
Agent-Based Nonlocal Social Systems: Neurodynamic Oscillations Approach (DP, SM), pp. 253–264.
HCISCSM-2014-SolingerHHFL #approach #facebook #multi #predict #social #social media
Beyond Facebook Personality Prediction: — A Multidisciplinary Approach to Predicting Social Media Users’ Personality (CS, LMH, SHH, RF, CL), pp. 486–493.
VISSOFTVISSOFT-2014-BarikLCM #approach #compilation #developer #how #visualisation
How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
VISSOFTVISSOFT-2014-SchotsW #framework #using #visualisation
Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
AdaEuropeAdaEurope-2014-IliasovLR #approach #formal method
Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
AdaEuropeAdaEurope-2014-ZhouLL #approach #embedded #requirements #safety #validation
A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
CAiSECAiSE-2014-GarciaDC #adaptation #approach #model-to-text #sql
An Adapter-Based Approach to Co-evolve Generated SQL in Model-to-Text Transformations (JG, OD, JC), pp. 518–532.
CAiSECAiSE-2014-LiH #approach #requirements #security
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
CAiSECAiSE-2014-NobauerSG #analysis #approach #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
EDOCEDOC-2014-FlorezSV #analysis #approach #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
ICEISICEIS-v1-2014-AmaralCRGTS #approach #data mining #framework #image #mining
The SITSMining Framework — A Data Mining Approach for Satellite Image Time Series (BFA, DYTC, LASR, RRdVG, AJMT, EPMdS), pp. 225–232.
ICEISICEIS-v1-2014-BouzidCFP #approach #enterprise #retrieval #semantics
A Pattern-based Approach for Semantic Retrieval of Information Resources in Enterprises — Application Within STMicroelectronics (SB, CC, CSF, JP), pp. 193–200.
ICEISICEIS-v1-2014-CaetanoLC #approach #case study #data-driven #predict
A Data-driven Approach to Predict Hospital Length of Stay — A Portuguese Case Study (NC, RMSL, PC), pp. 407–414.
ICEISICEIS-v1-2014-KammererN #approach #comparison #named #sql
Application-Mimes — An Approach for Quantitative Comparison of SQL — and NoSQL-databases (MK, JN), pp. 256–263.
ICEISICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v1-2014-Tribolet #adaptation #approach #bottom-up #enterprise #top-down
An Engineering Approach to Natural Enterprise Dynamics — From Top-down Purposeful Systemic Steering to Bottom-up Adaptive Guidance Control (JT), p. XIII.
ICEISICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-FerreiraS #approach #enterprise #implementation #named #semantics #towards #web
e-swim: Enterprise Semantic Web Implementation Model — Towards a Systematic Approach to Implement the Semantic Web in Enterprises (RF, IS), pp. 653–658.
ICEISICEIS-v2-2014-Kupper #approach #research #social
Measuring the Success of Social CRM — First Approach and Future Research (TK), pp. 573–582.
ICEISICEIS-v2-2014-MachadoLPWO #approach
A Reactive and Proactive Approach for Ambient Intelligence (AM, DL, AMP, LKW, JPMdO), pp. 501–512.
ICEISICEIS-v2-2014-MahmoudBAG #approach #learning
A New Approach Based on Learning Services to Generate Appropriate Learning Paths (CBM, FB, MHA, FG), pp. 643–646.
ICEISICEIS-v2-2014-MarcolinoOG #approach #diagrams #effectiveness #sequence chart #towards #variability
Towards the Effectiveness of the SMarty Approach for Variability Management at Sequence Diagram Level (AM, EAOJ, IMdSG), pp. 249–256.
ICEISICEIS-v2-2014-MerouaniMS #approach #consistency #formal method #process #testing #towards
Formalizing Artifact-Centric Business Processes — Towards a Conformance Testing Approach (HM, FM, HSB), pp. 368–374.
ICEISICEIS-v2-2014-MurianaMG #approach #development #information management #open source
Development of Open Source Software, a Qualitative View in a Knowledge Management Approach (LMM, CM, ACBG), pp. 391–399.
ICEISICEIS-v2-2014-SarmientoLRS #approach #automation #concurrent #generative #requirements #testing
An Automated Approach of Test Case Generation for Concurrent Systems from Requirements Descriptions (ES, JCSdPL, NR, AvS), pp. 339–347.
ICEISICEIS-v3-2014-AndradeFBP
New Approaches for Geographic Location Propagation in Digital Photograph Collections (DOSdA, HFdF, CdSB, ACdP), pp. 92–99.
ICEISICEIS-v3-2014-BaldominosCC #approach #information management #interactive
An Approach to Circumstantial Knowledge Management for Human-Like Interaction (AB, FJCG, DC), pp. 71–78.
ICEISICEIS-v3-2014-BarrosFSA #approach #towards
Deriving Service Level Agreements from Business Level Agreements — An Approach Towards Strategic Alignment in Organizations (VAB, MF, GMBS, JPdA), pp. 214–225.
ICEISICEIS-v3-2014-PereiraV #approach #enterprise #named
e-Strategy — An Enterprise Engineer Approach to Strategic Management (RP, AV), pp. 472–477.
ICEISICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process #using
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-WissotzkiTWK #bibliography #perspective #state of the art
Investigation of IT Sourcing, Relationship Management and Contractual Governance Approaches — State of the Art Literature Review (MW, FT, JW, HK), pp. 280–287.
ICEISICEIS-v3-2014-ZouhaierHA #adaptation #approach #people #user interface
A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
CIKMCIKM-2014-DuQF #approach #fine-grained #owl
A Practical Fine-grained Approach to Resolving Incoherent OWL 2 DL Terminologies (JD, GQ, XF), pp. 919–928.
CIKMCIKM-2014-LiuXCXTY #approach #bound #linear #network #scalability #social
Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach (QL, BX, EC, HX, FT, JXY), pp. 171–180.
CIKMCIKM-2014-MingYC #approach #re-engineering #summary #topic
A Dynamic Reconstruction Approach to Topic Summarization of User-Generated-Content (ZM, JY, TSC), pp. 311–320.
CIKMCIKM-2014-TangWPTL #approach #detection
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKMCIKM-2014-YaoRSLF #locality #probability
Exploring Tag-Free RFID-Based Passive Localization and Tracking via Learning-Based Probabilistic Approaches (LY, WR, QZS, XL, NJGF), pp. 1799–1802.
CIKMCIKM-2014-YeMAG #approach #privacy #visual notation
Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
CIKMCIKM-2014-ZhangKLCY #approach #named #scalability
NCR: A Scalable Network-Based Approach to Co-Ranking in Question-and-Answer Sites (JZ, XK, RJL, YC, PSY), pp. 709–718.
CIKMCIKM-2014-ZhaoCN #approach #data type #probability
Truth Discovery in Data Streams: A Single-Pass Probabilistic Approach (ZZ, JC, WN), pp. 1589–1598.
ECIRECIR-2014-Barron-CedenoPCR #comparison #similarity #wiki
A Comparison of Approaches for Measuring Cross-Lingual Similarity of Wikipedia Articles (ABC, MLP, PDC, PR), pp. 424–429.
ECIRECIR-2014-HuangDHL #approach
A Two-level Approach for Subtitle Alignment (JH, HD, XH, YL), pp. 468–473.
ECIRECIR-2014-MeguebliKDP #approach #identification
Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
ECIRECIR-2014-VechtomovaST #approach #information retrieval #word
An Information Retrieval-Based Approach to Determining Contextual Opinion Polarity of Words (OV, KS, JT), pp. 553–559.
ECIRECIR-2014-YounusOP #approach #behaviour #microblog #modelling #personalisation
A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
ICMLICML-c1-2014-BardenetDH #adaptation #approach #markov #monte carlo #scalability #towards
Towards scaling up Markov chain Monte Carlo: an adaptive subsampling approach (RB, AD, CCH), pp. 405–413.
ICMLICML-c1-2014-HutterHL #approach #performance
An Efficient Approach for Assessing Hyperparameter Importance (FH, HH, KLB), pp. 754–762.
ICMLICML-c2-2014-AgarwalKKSV #multi #predict #scalability
Least Squares Revisited: Scalable Approaches for Multi-class Prediction (AA, SMK, NK, LS, GV), pp. 541–549.
ICPRICPR-2014-BagheriGE #approach #classification #novel #subclass
Generic Subclass Ensemble: A Novel Approach to Ensemble Classification (MAB, QG, SE), pp. 1254–1259.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BiswasBC #approach #documentation #image
A Global-to-Local Approach to Binarization of Degraded Document Images (BB, UB, BBC), pp. 3008–3013.
ICPRICPR-2014-CaoHS #approach #classification #kernel #learning #multi
Optimization-Based Extreme Learning Machine with Multi-kernel Learning Approach for Classification (LlC, WbH, FS), pp. 3564–3569.
ICPRICPR-2014-CechFM #3d #approach #detection #refinement
A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPRICPR-2014-ChakeriH #approach #clustering #framework #game studies #set
Dominant Sets as a Framework for Cluster Ensembles: An Evolutionary Game Theory Approach (AC, LOH), pp. 3457–3462.
ICPRICPR-2014-ChatbriKK #approach #documentation #image #independence #query
An Application-Independent and Segmentation-Free Approach for Spotting Queries in Document Images (HC, PWK, KK), pp. 2891–2896.
ICPRICPR-2014-ChenCF #approach #classification #hybrid #semantics
A Hybrid Holistic/Semantic Approach for Scene Classification (ZC, ZC, HF), pp. 2299–2304.
ICPRICPR-2014-ColonnaCN #approach #distributed
A Distributed Approach for Classifying Anuran Species Based on Their Calls (JGC, MC, EFN), pp. 1242–1247.
ICPRICPR-2014-Desrosiers #adaptation #approach #image #performance #random #segmentation
A Fast and Adaptive Random Walks Approach for the Unsupervised Segmentation of Natural Images (CD), pp. 130–135.
ICPRICPR-2014-DingM #approach #detection #image
An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPRICPR-2014-DuanA #approach #estimation #image
A J-Linkage Based Approach for Vanishing Direction Estimation in Catadioptric Images (WD, NMA), pp. 2113–2118.
ICPRICPR-2014-DumonceauxRG #algebra #approach #clustering
An Algebraic Approach to Ensemble Clustering (FD, GR, MG), pp. 1301–1306.
ICPRICPR-2014-FrintropGC #approach
A Cognitive Approach for Object Discovery (SF, GMG, ABC), pp. 2329–2334.
ICPRICPR-2014-HalsteadDSF #approach #database #people #semantics #video
Locating People in Video from Semantic Descriptions: A New Database and Approach (MH, SD, SS, CF), pp. 4501–4506.
ICPRICPR-2014-JinIHS #approach #using
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-KapsourasN #approach #recognition #using
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KeceliC #approach #multimodal #using
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-LablackDBD #approach #detection
A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPRICPR-2014-MaHXP #3d #approach #robust #using
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MarcaciniDHR #approach #clustering #documentation #learning #metric
Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
ICPRICPR-2014-MasselliZ #approach #geometry #performance #problem
A New Geometric Approach for Faster Solving the Perspective-Three-Point Problem (AM, AZ), pp. 2119–2124.
ICPRICPR-2014-MehnertMSMB #approach
A Structural Texture Approach for Characterising Malignancy Associated Changes in Pap Smears Based on Mean-Shift and the Watershed Transform (AM, RM, KS, PM, EB), pp. 1189–1193.
ICPRICPR-2014-MeloLMS #approach #detection
An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPRICPR-2014-NagyM #approach #grid #search-based
Binary Tomography on the Triangular Grid with 3 Alternative Directions — A Genetic Approach (BN, EVM), pp. 1079–1084.
ICPRICPR-2014-NourbakhshBP #approach #graph #matrix
A Matrix Factorization Approach to Graph Compression (FN, SRB, MP), pp. 76–81.
ICPRICPR-2014-RodriguesPPW #approach #feature model
A Binary Krill Herd Approach for Feature Selection (DR, LAMP, JPP, SATW), pp. 1407–1412.
ICPRICPR-2014-SharmaCL #3d #approach #generative #hybrid #novel
Kinect-Variety Fusion: A Novel Hybrid Approach for Artifacts-Free 3DTV Content Generation (MS, SC, BL), pp. 2275–2280.
ICPRICPR-2014-SilvaTT #approach #graph #named
BoG: A New Approach for Graph Matching (FBS, ST, RdST), pp. 82–87.
ICPRICPR-2014-WalhaDLGA #approach #image #learning #taxonomy
Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
ICPRICPR-2014-WangEGLLF #approach #distance #documentation #edit distance #graph #word
A Coarse-to-Fine Word Spotting Approach for Historical Handwritten Documents Based on Graph Embedding and Graph Edit Distance (PW, VE, CG, CL, JL, AF), pp. 3074–3079.
ICPRICPR-2014-WangZH #approach #data-driven #health #named
DensityTransfer: A Data Driven Approach for Imputing Electronic Health Records (FW, JZ, JH), pp. 2763–2768.
ICPRICPR-2014-XianCZ #approach #automation #image #segmentation
A Fully Automatic Breast Ultrasound Image Segmentation Approach Based on Neutro-Connectedness (MX, HDC, YZ), pp. 2495–2500.
ICPRICPR-2014-YamadaM #approach #behaviour #using
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-ZhangHLHZL #approach #feature model #hybrid
A Hybrid Feature Selection Approach by Correlation-Based Filters and SVM-RFE (JZ, XH, PPL, WH, YZ, HL), pp. 3684–3689.
KDDKDD-2014-0001GHHLMSSZ #approach #probability
Knowledge vault: a web-scale approach to probabilistic knowledge fusion (XD, EG, GH, WH, NL, KM, TS, SS, WZ), pp. 601–610.
KDDKDD-2014-ChengB0 #approach #dependence #effectiveness #named
FBLG: a simple and effective approach for temporal dependence discovery from time series data (DC, MTB, YL), pp. 382–391.
KDDKDD-2014-KapoorSSY #approach #predict
A hazard based approach to user return time prediction (KK, MS, JS, TY), pp. 1719–1728.
KDDKDD-2014-NguyenCRB #effectiveness #feature model
Effective global approaches for mutual information based feature selection (XVN, JC, SR, JB), pp. 512–521.
KDDKDD-2014-QianHJPZ #approach #distance #learning #metric #using
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-Schadt #approach #data-driven
A data driven approach to diagnosing and treating disease (EES), p. 3.
KDDKDD-2014-YinW #approach #clustering #modelling #multi
A dirichlet multinomial mixture model-based approach for short text clustering (JY, JW), pp. 233–242.
KDIRKDIR-2014-BarbantanLP #approach #health #identification #ontology
Disease Identification in Electronic Health Records — An Ontology based Approach (IB, CL, RP), pp. 261–268.
KDIRKDIR-2014-ChakrabortyGR #approach #performance #retrieval #word
A Word Association Based Approach for Improving Retrieval Performance from Noisy OCRed Text (AC, KG, UR), pp. 450–456.
KDIRKDIR-2014-DeglInnocentiNT #approach #knowledge base #multi
A New Multi-lingual Knowledge-base Approach to Keyphrase Extraction for the Italian Language (DD, DDN, CT), pp. 78–85.
KDIRKDIR-2014-MojahedI #approach #distance #semistructured data
A Fusion Approach to Computing Distance for Heterogeneous Data (AM, BdlI), pp. 269–276.
KDIRKDIR-2014-Nguyen0 #distance #edit distance #similarity
Applying Information-theoretic and Edit Distance Approaches to Flexibly Measure Lexical Similarity (TTAN, SC), pp. 505–511.
KDIRKDIR-2014-OliveiraBSC #automation #classification #clustering #twitter
Combining Clustering and Classification Approaches for Reducing the Effort of Automatic Tweets Classification (EO, HGB, MRS, PMC), pp. 465–472.
KEODKEOD-2014-Grabska #approach #concept #ontology #process
An Ontology based Approach for Assisting Conceptualisation in CAD Processes (EG), pp. 272–279.
KEODKEOD-2014-PaniCP #approach #content management #multi
An Approach to Multimedia Content Management (FEP, GC, SP), pp. 264–271.
KMISKMIS-2014-GuerrucciDAB #approach #information management #network
Phased Approach to a Knowledge Management Network (DG, RMD, RCA, DB), pp. 101–108.
KMISKMIS-2014-Schmitt #approach #generative #information management #novel
Proposing a Next Generation of Knowledge Management Systems for Creative Collaborations in Support of Individuals and Institutions — Featuring a Novel Approach for Meme-based Personal Knowledge Management (US), pp. 346–353.
KMISKMIS-2014-ToureAD #approach #enterprise #named #performance
AM2O — An Efficient Approach for Managing Training in Enterprise (FT, EA, KD), pp. 405–412.
KRKR-2014-DiakidoyKM0 #approach #automation #comprehension
A Psychology-Inspired Approach to Automated Narrative Text Comprehension (IAD, ACK, LM, RM).
KRKR-2014-PereiraDH #abduction #approach #bias #reasoning
An Abductive Reasoning Approach to the Belief Bias Effect (LMP, EAD, SH).
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-JiangDPL #approach #estimation #markov #optimisation #recognition
Modified Bootstrap Approach with State Number Optimization for Hidden Markov Model Estimation in Small-Size Printed Arabic Text Line Recognition (ZJ, XD, LP, CL), pp. 437–441.
MLDMMLDM-2014-WaiyamaiS #approach #classification #dataset
A Cost-Sensitive Based Approach for Improving Associative Classification on Imbalanced Datasets (KW, PS), pp. 31–42.
RecSysRecSys-2014-LingLK #approach #recommendation
Ratings meet reviews, a combined approach to recommend (GL, MRL, IK), pp. 105–112.
SEKESEKE-2014-AssoudiL #approach #multi #process
A Multi-Agent-Based Approach for Autonomic Data Exchange Processes (HA, HL), pp. 334–337.
SEKESEKE-2014-DalliloAF #approach #multi #process
Making the link between strategy and process model collections: a multi-layered approach (FD, JPdA, MF), pp. 387–392.
SEKESEKE-2014-DegrossiAFM #approach #risk management
Flood Citizen Observatory: a crowdsourcing-based approach for flood risk management in Brazil (LCD, JPdA, MCF, EMM), pp. 570–575.
SEKESEKE-2014-GaoKN #estimation #learning #quality #ranking
Comparing Two Approaches for Adding Feature Ranking to Sampled Ensemble Learning for Software Quality Estimation (KG, TMK, AN), pp. 280–285.
SEKESEKE-2014-GomedeB #approach #multi
A Multicriteria Approach to Project Portfolio Selection (EG, RMB), pp. 43–48.
SEKESEKE-2014-GuessiON #approach #architecture
An Approach for Capturing and Documenting Architectural Decisions of Reference Architectures (MG, FO, EYN), pp. 162–167.
SEKESEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-HauboldBH #approach #flexibility #towards
Towards a flexible approach to manage varying and altering information representations (TH, GB, WH), pp. 566–569.
SEKESEKE-2014-JingLC #approach #collaboration #design
An Argument-based Collaborative Negotiation Approach to Support Software Design Collaboration (NJ, SCYL, HFC), pp. 274–279.
SEKESEKE-2014-LingZF #approach #modelling #process #similarity
An Improved Structure-based Approach to Measure Similarity of Business Process Models (JL, LZ, QF), pp. 377–380.
SEKESEKE-2014-QueirozB #approach #embedded #modelling #product line
A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
SEKESEKE-2014-Saito0TO #approach #constraints #generative #knowledge-based #testing #web
Test Data Generation for Web Applications: A Constraint and Knowledge-based Approach (HS, ST, HT, MO), pp. 110–114.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-ShahnewazR #approach #named
RELREA — An Analytical Approach for Evaluating Release Readiness (SMS, GR), pp. 437–442.
SEKESEKE-2014-WangC #analysis #approach #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-XuL #approach #architecture #automation #synthesis #using
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SIGIRSIGIR-2014-BabbarPGA #approach #classification #distributed #ranking #scalability
Re-ranking approach to classification in large-scale power-law distributed category systems (RB, IP, ÉG, MRA), pp. 1059–1062.
SIGIRSIGIR-2014-ChengCBB #approach #twitter
Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter (ZC, JC, HB, VB), pp. 335–344.
SIGIRSIGIR-2014-HingmireC #approach #classification #topic
Topic labeled text classification: a weakly supervised approach (SH, SC), pp. 385–394.
SIGIRSIGIR-2014-Ifada #modelling #personalisation #recommendation #topic #using
A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIRSIGIR-2014-KellyRT #constraints #information retrieval #research
Choices and constraints: research goals and approaches in information retrieval (part 1) (DK, FR, JT), p. 1283.
SIGIRSIGIR-2014-KellyRT14a #constraints #information retrieval #research
Choices and constraints: research goals and approaches in information retrieval (part 2) (DK, FR, JT), p. 1284.
SIGIRSIGIR-2014-KotsakosLKGKN #approach #documentation
A burstiness-aware approach for document dating (DK, TL, DK, DG, NK, KN), pp. 1003–1006.
SIGIRSIGIR-2014-QureshiOP #approach #visualisation
A perspective-aware approach to search: visualizing perspectives in news search results (MAQ, CO, GP), pp. 1261–1262.
SIGIRSIGIR-2014-RoitmanHS #approach #clustering
A fusion approach to cluster labeling (HR, SH, MSS), pp. 883–886.
SIGIRSIGIR-2014-ThomasL #composition #data analysis #distance #information retrieval
Compositional data analysis (CoDA) approaches to distance in information retrieval (PT, DL), pp. 991–994.
AMTAMT-2014-GholizadehDM #approach #model transformation #query
A Query Structured Approach for Model Transformation (HG, ZD, TSEM), pp. 54–63.
ECMFAECMFA-2014-LogreMCR #approach #variability #visualisation
Sensor Data Visualisation: A Composition-Based Approach to Support Domain Variability (IL, SM, PC, MR), pp. 101–116.
ICMTICMT-2014-JilaniIK #approach #generative #model transformation #testing
A Search Based Test Data Generation Approach for Model Transformations (AAJ, MZI, MUK), pp. 17–24.
MODELSMoDELS-2014-EnriciAP #approach #communication #modelling #uml
A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes (AE, LA, RP), pp. 370–385.
MODELSMoDELS-2014-NataleCSS #adaptation #approach #communication #component #generative
An MDA Approach for the Generation of Communication Adapters Integrating SW and FW Components from Simulink (MDN, FC, AS, ALSV), pp. 353–369.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
MODELSMoDELS-2014-EnriciAP #approach #communication #modelling #uml
A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes (AE, LA, RP), pp. 370–385.
MODELSMoDELS-2014-NataleCSS #adaptation #approach #communication #component #generative
An MDA Approach for the Generation of Communication Adapters Integrating SW and FW Components from Simulink (MDN, FC, AS, ALSV), pp. 353–369.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
GPCEGPCE-2014-SmeltzerEM #approach #visualisation
A transformational approach to data visualization (KS, ME, RAM), pp. 53–62.
POPLPOPL-2014-BeyeneCPR #approach #constraints #game studies #graph #infinity
A constraint-based approach to solving games on infinite graphs (TAB, SC, CP, AR), pp. 221–234.
POPLPOPL-2014-RamsayNO #abstraction #approach #higher-order #model checking #refinement
A type-directed abstraction refinement approach to higher-order model checking (SJR, RPN, CHLO), pp. 61–72.
RERE-2014-AdedjoumaSB #approach #automation #case study #detection
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
RERE-2014-Daneva #approach #game studies #how #multi #online #requirements
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
RERE-2014-FilipovikjNR #approach #formal method #requirements
Reassessing the pattern-based approach for formalizing requirements in the automotive domain (PF, MN, GRN), pp. 444–450.
RERE-2014-PutnamC #approach #game studies #multi #requirements
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
RERE-2014-TranM #approach #evolution #feature model #nondeterminism
An Approach for Decision Support on the Uncertainty in Feature Model Evolution (LMST, FM), pp. 93–102.
REFSQREFSQ-2014-HerrmannHLW #case study #education #experience #requirements
Experience-Oriented Approaches for Teaching and Training Requirements Engineering: An Experience Report (AH, AH, DL, RW), pp. 254–267.
REFSQREFSQ-2014-MaidenLZBAL #approach #case study #experience #specification
A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report (NAMM, JL, KZ, AB, GDA, FL), pp. 239–253.
REFSQREFSQ-2014-SannierB #analysis #approach #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
SACSAC-2014-BergamascoN #3d #approach #feature model #retrieval #using
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BrinkeMBBAK #approach #composition #design #energy
A tool-supported approach for modular design of energy-aware software (StB, SM, CB, LB, MA, SK), pp. 1206–1212.
SACSAC-2014-ChenWWZL #3d #approach #web
An approach to support stereoscopic 3D web (QC, WW, RW, JZ, ZL), pp. 981–984.
SACSAC-2014-EngielCL #approach #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-Fernandez-MarquezSSYDZ #approach #mobile #self
Self-managing and self-organising mobile computing applications: a separation of concerns approach (JLFM, GDMS, GS, JY, SD, FZ), pp. 458–465.
SACSAC-2014-GamaD #approach #deployment #fault #self #testing
A fault deployment and activation approach for testing self-recovery mechanisms (KG, DD), pp. 1114–1119.
SACSAC-2014-GriebeG #approach #automation #mobile #modelling #testing
A model-based approach to test automation for context-aware mobile applications (TG, VG), pp. 420–427.
SACSAC-2014-HoritaHSNTO #approach #modelling #refinement #using
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SACSAC-2014-KimLSKL #approach #named #ranking #web
C-Rank: a contribution-based web page ranking approach (DJK, SCL, HYS, SWK, JBL), pp. 908–912.
SACSAC-2014-LiuCM #ad hoc #approach #composition #mobile #network
A low-latency service composition approach in mobile ad hoc networks (CL, JC, FLM), pp. 509–511.
SACSAC-2014-ManducaMFP #approach #database #implementation #multitenancy #web
A nonintrusive approach for implementing single database, multitenant services from web applications (AMM, EVM, RPMF, MdGCP), pp. 751–756.
SACSAC-2014-Moin #approach #collaboration #visualisation
A unified approach to collaborative data visualization (AM), pp. 280–286.
SACSAC-2014-OliveiraNWB #approach #kernel #named
Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
SACSAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParraJGI #approach #automation #product line
An SOA approach for automating software product line adoption (CP, DJ, LG, AI), pp. 1231–1238.
SACSAC-2014-RolimBCCAPM #approach #multimodal #recommendation
A recommendation approach for digital TV systems based on multimodal features (RR, FB, AC, GC, HOdA, AP, AFM), pp. 289–291.
SACSAC-2014-SantosSTO #approach #hybrid #navigation
A hybrid GA-ANN approach for autonomous robots topological navigation (VdCS, DOS, CFMT, FSO), pp. 148–153.
SACSAC-2014-Silva #approach #automation #bibliography #quality #requirements #specification #validation
Quality of requirements specifications: a preliminary overview of an automatic validation approach (ARdS), pp. 1021–1022.
SACSAC-2014-VidalCNM #approach #automation #generative
A semi-automatic approach for generating customized R2RML mappings (VMPV, MAC, LETN, JMM), pp. 316–322.
SACSAC-2014-ZhengBM #empirical #recommendation
Splitting approaches for context-aware recommendation: an empirical study (YZ, RDB, BM), pp. 274–279.
SACSAC-2014-ZiadiHPZT #approach #independence #product line #towards
Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
FSEFSE-2014-Behringer #implementation
Integrating approaches for feature implementation (BB), pp. 775–778.
FSEFSE-2014-Wille #approach #modelling
Managing lots of models: the FaMine approach (DW), pp. 817–819.
ICSEICSE-2014-CaiWC #approach #constraints #dynamic analysis #named #parallel #source code #thread
ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs (YC, SW, WKC), pp. 491–502.
SPLCSPLC-2014-BarreirosM #approach
A cover-based approach for configuration repair (JB, AMDM), pp. 157–166.
SPLCSPLC-2014-ColanziVGO #approach #design #product line #search-based
A search-based approach for software product line design (TEC, SRV, IMSG, WNO), pp. 237–241.
SPLCSPLC-2014-DieumegardTP #approach #data flow #library #product line #semantics #specification
A software product line approach for semantic specification of block libraries in dataflow languages (AD, AT, MP), pp. 217–226.
SPLCSPLC-2014-DillonRD #approach #product line
A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
SPLCSPLC-2014-UrliBC #approach #product line
Handling complex configurations in software product lines: a tooled approach (SU, MBF, PC), pp. 112–121.
SPLCSPLC-2014-VillelaSVA #bibliography #variability
A survey on software variability management approaches (KV, AS, TV, ESdA), pp. 147–156.
ASPLOSASPLOS-2014-RuwaseKGM #approach #hardware #named
Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
CGOCGO-2014-JimboreanKSBK #approach #compilation #hardware #scalability
Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
HPCAHPCA-2014-HechtmanCHTBHRW #approach #consistency #named
QuickRelease: A throughput-oriented approach to release consistency on GPUs (BAH, SC, DRH, YT, BMB, MDH, SKR, DAW), pp. 189–200.
HPCAHPCA-2014-PariharH #approach #dependence #metaheuristic
Accelerating decoupled look-ahead via weak dependence removal: A metaheuristic approach (RP, MCH), pp. 662–677.
HPDCHPDC-2014-IslamLWP #approach #named
SOR-HDFS: a SEDA-based approach to maximize overlapping in RDMA-enhanced HDFS (NSI, XL, MWuR, DKP), pp. 261–264.
CAVCAV-2014-AlglaveKNP #approach #automation #static analysis
Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAVCAV-2014-EsparzaK #approach #automaton #composition #ltl
From LTL to Deterministic Automata: A Safraless Compositional Approach (JE, JK), pp. 192–208.
CAVCAV-2014-EsparzaLMMN #analysis #approach #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAVCAV-2014-HadareanBJBT #lazy evaluation
A Tale of Two Solvers: Eager and Lazy Approaches to Bit-Vectors (LH, KB, DJ, CB, CT), pp. 680–695.
ICLPICLP-J-2014-AmadiniGM #approach #constraints #lazy evaluation #named #theorem proving
SUNNY: a Lazy Portfolio Approach for Constraint Solving (RA, MG, JM), pp. 509–524.
ICSTICST-2014-Marin #approach #automation #database #multi #testing
A Data-Agnostic Approach to Automatic Testing of Multi-dimensional Databases (MM), pp. 133–142.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSSICTSS-2014-SamihGBAB #approach #modelling #testing
An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
ICTSSICTSS-2014-TurkerUY #adaptation #sequence
Lookahead-Based Approaches for Minimizing Adaptive Distinguishing Sequences (UCT, , HY), pp. 32–47.
ISSTAISSTA-2014-AppeltNBA #approach #automation #injection #sql #testing
Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
ISSTAISSTA-2014-GalindoAABB #approach #sequence #testing #variability #video
A variability-based testing approach for synthesizing video sequences (JAG, MA, MA, BB, DB), pp. 293–303.
LICSLICS-CSL-2014-BilokonE #approach #probability #process
A domain-theoretic approach to Brownian motion and general continuous stochastic processes (PB, AE), p. 10.
LICSLICS-CSL-2014-FredriksonJ #approach #privacy #satisfiability
Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
ICSTSAT-2014-LarrazORR #constraints #polynomial
Minimal-Model-Guided Approaches to Solving Polynomial Constraints and Extensions (DL, AO, ERC, AR), pp. 333–350.
TAPTAP-2014-HilkenNGW #behaviour #comparison #modelling #ocl #uml #verification
Filmstripping and Unrolling: A Comparison of Verification Approaches for UML and OCL Behavioral Models (FH, PN, MG, RW), pp. 99–116.
VMCAIVMCAI-2014-AcunaAMS #approach #complexity #heuristic #modelling #network
Modeling Parsimonious Putative Regulatory Networks: Complexity and Heuristic Approach (VA, AA, AM, AS), pp. 322–336.
CBSECBSE-2013-PlateniusDBSE #bibliography #fuzzy #on the fly
A survey of fuzzy service matching approaches in the context of on-the-fly computing (MCP, MvD, SB, WS, GE), pp. 143–152.
ECSAECSA-2013-DimechB #approach #architecture #consistency #development #maintenance
Maintaining Architectural Conformance during Software Development: A Practical Approach (CD, DB), pp. 208–223.
QoSAQoSA-2013-KonersmannDGR #approach #architecture #evolution #towards
Towards architecture-centric evolution of long-living systems (the ADVERT approach) (MK, ZD, MG, RHR), pp. 163–168.
QoSAQoSA-2013-Schmid #approach #formal method #technical debt
A formal approach to technical debt decision making (KS), pp. 153–162.
ASEASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-Garcia-GalanTC #approach #game studies #multi #variability
Multi-user variability configuration: A game theoretic approach (JGG, PT, ARC), pp. 574–579.
ASEASE-2013-GuoCASW #approach #learning #performance #predict #statistics #variability
Variability-aware performance prediction: A statistical learning approach (JG, KC, SA, NS, AW), pp. 301–311.
ASEASE-2013-KifetewJTOT #approach #grammarware #named #source code
SBFR: A search based approach for reproducing failures of programs with grammar based input (FMK, WJ, RT, AO, PT), pp. 604–609.
ASEASE-2013-PilgrimUTS #approach #co-evolution
Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
ASEASE-2013-RegerBR #approach #mining #parametricity #specification
A pattern-based approach to parametric specification mining (GR, HB, DER), pp. 658–663.
ASEASE-2013-VeerappaH #approach #maturity #requirements
Assessing the maturity of requirements through argumentation: A good enough approach (VV, RH), pp. 670–675.
CASECASE-2013-ChenZL #approach #design #novel
A novel design approach for lower limb rehabilitation training robot (JC, XZ, RL), pp. 554–557.
CASECASE-2013-HeZJ #approach #fault #robust
UIO based robust fault diagnosis approach for aero-engine fiber-optic sensor (CH, XZ, BJ), pp. 550–553.
CASECASE-2013-KernschmidtV #approach #modelling
An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
CASECASE-2013-LiF #approach #integer #linear #multi #problem #programming #scheduling
A mixed integer linear programming approach for multi-degree cyclic multi-hoist scheduling problems without overlapping (XL, RYKF), pp. 274–279.
CASECASE-2013-LiuZZ #approach #data-driven #modelling
Data driven modeling of human welder intelligence: A neuro-fuzzy approach (YL, WZ, YZ), pp. 663–668.
CASECASE-2013-ParisioMVJ #approach #predict
A scenario-based predictive control approach to building HVAC management systems (AP, MM, DV, KHJ), pp. 428–435.
CASECASE-2013-ShaoLW #approach #markov
A Markov chain approach to study flow disruptions on surgery in emergency care (XS, JL, DAW), pp. 990–995.
CASECASE-2013-SunSZS #approach #optimisation
A two-stage approach for VMAT treatment plan optimization (BS, JS, GZ, LS), pp. 455–460.
CASECASE-2013-XieLSD #analysis #approach #markov #modelling #process
Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASECASE-2013-YeWZML #approach #network #optimisation #predict #scalability
A signal split optimization approach based on model predictive control for large-scale urban traffic networks (BLY, WW, XZ, WJM, JL), pp. 904–909.
DACDAC-2013-0001WAWG #approach #empirical #estimation #towards
Towards variation-aware system-level power estimation of DRAMs: an empirical approach (KC, CW, BA, NW, KG), p. 8.
DACDAC-2013-EbrahimiAT #analysis #approach #multi
A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DACDAC-2013-KuangY #approach #composition #layout #performance
An efficient layout decomposition approach for triple patterning lithography (JK, EFYY), p. 6.
DACDAC-2013-MishraMD #approach #design #multi
A heterogeneous multiple network-on-chip design: an application-aware approach (AKM, OM, CRD), p. 10.
DATEDATE-2013-AncajasCR #approach
Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
DATEDATE-2013-ChaG #approach #detection #effectiveness #metric
Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATEDATE-2013-DaloukasMETS #approach #network #parallel #performance #power management
A parallel fast transform-based preconditioning approach for electrical-thermal co-simulation of power delivery networks (KD, AM, NEE, PT, GIS), pp. 1689–1694.
DATEDATE-2013-GuanYL0 #analysis #approach #estimation
FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATEDATE-2013-KondratyevLMW #evaluation #synthesis
Share with care: a quantitative evaluation of sharing approaches in high-level synthesis (AK, LL, MM, YW), pp. 1547–1552.
DATEDATE-2013-KumarCT #approach #distributed #realtime #satisfiability
A satisfiability approach to speed assignment for distributed real-time systems (PK, DBC, LT), pp. 749–754.
DATEDATE-2013-LeeKPK #approach
An integrated approach for managing the lifetime of flash-based SSDs (SL, TK, JP, JK), pp. 1522–1525.
DATEDATE-2013-LiD #approach #debugging #hybrid #performance
A hybrid approach for fast and accurate trace signal selection for post-silicon debug (ML, AD), pp. 485–490.
DATEDATE-2013-Moy #approach #modelling #parallel #programming
Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
DATEDATE-2013-MushtaqAB #approach #fault tolerance #manycore #performance
Efficient software-based fault tolerance approach on multicore platforms (HM, ZAA, KB), pp. 921–926.
DATEDATE-2013-RahimiBG #adaptation #approach
Hierarchically focused guardbanding: an adaptive approach to mitigate PVT variations and aging (AR, LB, RKG), pp. 1695–1700.
DATEDATE-2013-ShreejithVFL #approach #configuration management #network #using
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-TodorovMRS #approach #clustering #synthesis
A spectral clustering approach to application-specific network-on-chip synthesis (VT, DMG, HR, US), pp. 1783–1788.
DATEDATE-2013-WettinMPSG #approach #design #energy #manycore
Energy-efficient multicore chip design through cross-layer approach (PW, JM, PPP, BS, AG), pp. 725–730.
DATEDATE-2013-YuZHWLT #approach #manycore #set #simulation
A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
DocEngDocEng-2013-AgostiCFHM #approach
Interacting with digital cultural heritage collections via annotations: the CULTURA approach (MA, OC, NF, CH, GM), pp. 13–22.
DRRDRR-2013-MedjkouneMPV #approach #online #recognition #using
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-SabbourS #approach
A segmentation-free approach to Arabic and Urdu OCR (NS, FS).
HTHT-2013-RoutBPC #approach #classification #social
Where’s @wally?: a classification approach to geolocating users based on their social ties (DPR, KB, DPP, TC), pp. 11–20.
ICDARICDAR-2013-BougueliaBB #approach #classification #documentation #learning
A Stream-Based Semi-supervised Active Learning Approach for Document Classification (MRB, YB, AB), pp. 611–615.
ICDARICDAR-2013-ChiC #approach #recognition
Chinese Handwritten Legal Amount Recognition with HMM-Based Approach (BC, YC), pp. 778–782.
ICDARICDAR-2013-DingsAE #approach #segmentation
A Locale Group Based Line Segmentation Approach for Non Uniform Skewed and Curved Arabic Handwritings (LD, AAH, ME), pp. 803–806.
ICDARICDAR-2013-DingsAE13a #approach #modelling #synthesis
An Approach for Arabic Handwriting Synthesis Based on Active Shape Models (LD, AAH, ME), pp. 1260–1264.
ICDARICDAR-2013-DoTT #approach #recognition #representation
New Approach for Symbol Recognition Combining Shape Context of Interest Points with Sparse Representation (THD, ST, ORT), pp. 265–269.
ICDARICDAR-2013-DuH #approach #normalisation #online #recognition #variability
An Irrelevant Variability Normalization Based Discriminative Training Approach for Online Handwritten Chinese Character Recognition (JD, QH), pp. 69–73.
ICDARICDAR-2013-ElzobiADES #adaptation #approach #markov #modelling #recognition
A Hidden Markov Model-Based Approach with an Adaptive Threshold Model for Off-Line Arabic Handwriting Recognition (ME, AAH, LD, ME, AS), pp. 945–949.
ICDARICDAR-2013-GarzFBI #approach #clustering
A Binarization-Free Clustering Approach to Segment Curved Text Lines in Historical Manuscripts (AG, AF, HB, RI), pp. 1290–1294.
ICDARICDAR-2013-HoRRES #approach #classification #documentation
Document Classification in a Non-stationary Environment: A One-Class SVM Approach (AKNH, NR, JYR, VE, NS), pp. 616–620.
ICDARICDAR-2013-LiuSZM #approach #multi #novel
A Novel Multi-oriented Chinese Text Extraction Approach from Videos (YL, YS, YZ, QM), pp. 1355–1359.
ICDARICDAR-2013-LuoOWK #approach #automation #classification #using
Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDARICDAR-2013-MehriHGBM #approach
A Pixel Labeling Approach for Historical Digitized Books (MM, PH, PGK, AB, RM), pp. 817–821.
ICDARICDAR-2013-MorillotLG #case study #comparative #recognition
Comparative Study of HMM and BLSTM Segmentation-Free Approaches for the Recognition of Handwritten Text-Lines (OM, LLS, EG), pp. 783–787.
ICDARICDAR-2013-PantkeMF #evaluation #on the #word
On Evaluation of Segmentation-Free Word Spotting Approaches without Hard Decisions (WP, VM, TF), pp. 1300–1304.
ICDARICDAR-2013-PrumVFO #approach #modelling #online #recognition #using
A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDARICDAR-2013-StammLD #analysis #approach #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-SunH #approach #component #image
An Improved Component Tree Based Approach to User-Intention Guided Text Extraction from Natural Scene Images (LS, QH), pp. 383–387.
ICDARICDAR-2013-TangHF #analysis #approach #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-TarafdarPRRR #approach #documentation #visual notation #word
A Two-Stage Approach for Word Spotting in Graphical Documents (AT, UP, PPR, NR, JYR), pp. 319–323.
ICDARICDAR-2013-ToselliV #approach #documentation #performance #word
Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
SIGMODSIGMOD-2013-LongWWF #approach #distance #keyword #query
Collective spatial keyword queries: a distance owner-driven approach (CL, RCWW, KW, AWCF), pp. 689–700.
SIGMODSIGMOD-2013-WhangYYSKK #approach #named #parallel #using
ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMODSIGMOD-2013-ZhuZQ #approach #graph #mining #performance
A direct mining approach to efficient constrained graph pattern discovery (FZ, ZZ, QQ), pp. 821–832.
VLDBVLDB-2013-AltwaijryKM #approach
Query-Driven Approach to Entity Resolution (HA, DVK, SM), pp. 1846–1857.
VLDBVLDB-2013-BoghSJ #approach #named #retrieval
GroupFinder: A New Approach to Top-K Point-of-Interest Group Retrieval (KSB, AS, CSJ), pp. 1226–1229.
VLDBVLDB-2013-DeBrabantPTSZ #approach #architecture #database #named
Anti-Caching: A New Approach to Database Management System Architecture (JD, AP, ST, MS, SBZ), pp. 1942–1953.
VLDBVLDB-2013-DuanZCG #approach #database #keyword #probability
Supporting Keyword Search in Product Database: A Probabilistic Approach (HD, CZ, JC, AG), pp. 1786–1797.
VLDBVLDB-2013-DuttaNB #approach #approximate #data type #detection #streaming
Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDBVLDB-2013-Franceschini #approach #big data #how #open source
How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
VLDBVLDB-2013-GattaniLGTCDSRHD #approach #classification #social #social media
Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach (AG, DSL, NG, MT, XC, SD, SS, AR, VH, AD), pp. 1126–1137.
VLDBVLDB-2013-Lomet #approach #database #hardware #sql
Microsoft SQL Server’s Integrated Database Approach for Modern Applications and Hardware (DBL), pp. 1178–1179.
VLDBVLDB-2014-GyssensPGWW13 #approach #case study #query #symmetry #towards
An Approach towards the Study of Symmetric Queries (MG, JP, DVG, JW, YW), pp. 25–36.
VLDBVLDB-2014-ZhaoXLLZ13 #approach #similarity
A Partition-Based Approach to Structure Similarity Search (XZ, CX, XL, QL, WZ), pp. 169–180.
CSEETCSEET-2013-EterovicGB #approach #education #process
Teaching software processes to professionals: The approach taken by an evening master’s degree program (YE, GG, JB), pp. 309–313.
CSEETCSEET-2013-ShethBK #approach #re-engineering
A competitive-collaborative approach for introducing software engineering in a CS2 class (SS, JB, GEK), pp. 41–50.
CSEETCSEET-2013-WernerKSVW #challenge #collaboration #education #re-engineering
Software engineering education via the use of corporate-sponsored projects: A panel discussion of the approaches, benefits, and challenges for industry-academic collaboration (LLW, GK, MJS, JV, WEW), pp. 346–350.
ITiCSEITiCSE-2013-Baumgartner #approach #case study #design #education #information management #using
Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSEITiCSE-2013-Buck #approach #reliability
First, do no harm: a curricular approach to reliability (DB), p. 319.
ESOPESOP-2013-SharmaGHALN #algebra #approach #data-driven #invariant
A Data Driven Approach for Algebraic Loop Invariants (RS, SG, BH, AA, PL, AVN), pp. 574–592.
FASEFASE-2013-YangPX #approach #automation #generative #mobile
A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications (WY, MRP, TX), pp. 250–265.
TACASTACAS-2013-LindenW #approach #memory management
A Verification-Based Approach to Memory Fence Insertion in PSO Memory Systems (AL, PW), pp. 339–353.
CSMRCSMR-2013-NerellaMW #approach #optimisation #query #using
An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
ICSMEICSM-2013-AsaduzzamanRSP #approach #hybrid #independence #named #source code
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
ICSMEICSM-2013-FontanaZMM #approach #detection #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-LeL #approach #automation #effectiveness #fault #locality #predict #tool support
Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization Tools (TDBL, DL), pp. 310–319.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSRMSR-2013-AlipourHS #approach #debugging #detection #towards
A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSRMSR-2013-SahaSS #approach #automation #stack overflow
A discriminative model approach for suggesting tags automatically for stack overflow questions (AKS, RKS, KAS), pp. 73–76.
WCREWCRE-2013-AntonyAC #approach #behaviour #clone detection #detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCREWCRE-2013-BernardiCL #approach #design pattern #detection #graph #modelling
A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
STOCSTOC-2013-BravermanM #approach #complexity
An information complexity approach to extended formulations (MB, AM), pp. 161–170.
STOCSTOC-2013-LeeRS #approach #using
A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
DLTDLT-2013-BolligHLM #approach #automaton #learning
A Fresh Approach to Learning Register Automata (BB, PH, ML, BM), pp. 118–130.
ICALPICALP-v2-2013-DieudonneP #approach #polynomial
Deterministic Polynomial Approach in the Plane (YD, AP), pp. 533–544.
LATALATA-2013-Blanchet-SadriBFH #approach #graph #polynomial
A Graph Polynomial Approach to Primitivity (FBS, MB, NF, JH), pp. 153–164.
SEFMSEFM-2013-BorekMSR #approach #model checking #modelling
Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
SEFMSEFM-2013-MenadD #approach #multi #requirements
A Transformation Approach for Multiform Time Requirements (NM, PD), pp. 16–30.
ICFPICFP-2013-AbelP #approach #pattern matching #recursion #termination
Wellfounded recursion with copatterns: a unified approach to termination and productivity (AA, BP), pp. 185–196.
ICFPICFP-2013-BroadbentCHS #approach #higher-order #named #verification
C-SHORe: a collapsible approach to higher-order verification (CHB, AC, MH, OS), pp. 13–24.
IFLIFL-2013-HackettHJ #approach #optimisation #recursion #source code
The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
GT-VMTGT-VMT-2013-MaierM #approach #diagrams #layout
A Pattern-based Approach for Initial Diagram Layout (SM, MM).
CHICHI-2013-AtkinsonOPBWBPC #approach #design #research
Tactile perceptions of digital textiles: a design research approach (DA, PMO, BP, NBB, PW, SB, SP, MJC), pp. 1669–1678.
CHICHI-2013-BlytheBHWO
Unlimited editions: three approaches to the dissemination and display of digital art (MB, JB, JH, PCW, PO), pp. 139–148.
CHICHI-2013-BowserHRRGHRP #approach #game studies #prototype #scalability
Prototyping in PLACE: a scalable approach to developing location-based apps and games (AB, DLH, JR, MR, RJG, YH, DR, JP), pp. 1519–1528.
CHICHI-2013-DalsgardE #approach #case study #library #scalability
Large-scale participation: a case study of a participatory approach to developing a new public library (PD, EE), pp. 399–408.
CHICHI-2013-GaverBBBCHJP #approach #human-computer #prototype
Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping (WWG, JB, KB, AB, DWTC, MH, NJ, SP), pp. 3451–3460.
CHICHI-2013-KhovanskayaBCVG #approach #design #quote #what
“Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
CHICHI-2013-MonroeLOSPM #approach #challenge #query #specification #visual notation
The challenges of specifying intervals and absences in temporal queries: a graphical language approach (MM, RL, JMdO, BS, CP, JM), pp. 2349–2358.
CHICHI-2013-PriceJ #research
Interview approaches to researching embodiment (SP, CJ), pp. 2907–2910.
CHICHI-2013-YinOPZ #adaptation #approach
Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
HCIDHM-HB-2013-Yuan #approach #evaluation #modelling #validation
Validation of an Integrated Biomechanical Modeling Approach to the Ergonomic Evaluation of Drywall Installation (LY), pp. 159–168.
HCIDHM-SET-2013-GoreM #approach #modelling #performance #validation
A Validation Approach for Complex NextGen Air Traffic Control Human Performance Models (BFG, PM), pp. 28–37.
HCIDHM-SET-2013-YangYF #safety #using
Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
HCIDUXU-CXC-2013-Heimgartner #design #human-computer #question #user interface
Intercultural User Interface Design — Culture-Centered HCI Design — Cross-Cultural User Interface Design: Different Terminology or Different Approaches? (RH), pp. 62–71.
HCIDUXU-CXC-2013-OkimotoMB #approach #assessment #multi #usability
Usability Assessment in the Multicultural Approach (MLLRO, COM, KJB), pp. 89–94.
HCIDUXU-CXC-2013-Sun #approach #experience #locality #social #social media #user interface
Tracing Technology Diffusion of Social Media with Culturally Localized User Experience Approach (HS), pp. 115–120.
HCIDUXU-NTE-2013-SannaVBBR #approach #behaviour #design
Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
HCIDUXU-PMT-2013-BellowsHY #approach #design #difference #research
An Individual Differences Approach to Design Fixation: Comparing Laboratory and Field Research (BGB, JFH, RJY), pp. 13–21.
HCIDUXU-PMT-2013-GockelGPPE #approach #evaluation #experience #named #user interface
VMUXE — An Approach to User Experience Evaluation for Virtual Museums (BG, HG, AP, SP, JE), pp. 262–272.
HCIDUXU-PMT-2013-KarahasanovicF #2d #approach #behaviour #experience #modelling #network
Modelling User Behaviour and Experience — The R2D2 Networks Approach (AK, AF), pp. 506–515.
HCIDUXU-PMT-2013-KohnoYSN #analysis #approach #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-RaisonS #agile #approach #design
Keeping User Centred Design (UCD) Alive and Well in Your Organisation: Taking an Agile Approach (CR, SS), pp. 573–582.
HCIDUXU-PMT-2013-Silveira #approach #behaviour #design #usability
Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
HCIDUXU-WM-2013-FordK #approach #visual notation
Graphical Displays in Eco-Feedback: A Cognitive Approach (RF, BK), pp. 486–495.
HCIDUXU-WM-2013-Igler #approach #design #evaluation #mobile #prototype
Feature Evaluation for Mobile Applications: A Design Science Approach Based on Evolutionary Software Prototypes (BI), pp. 673–681.
HCIDUXU-WM-2013-SauckenML #approach #case study #design #experience #how #metaprogramming #user interface
How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
HCIDUXU-WM-2013-SchneidermeierMS #approach #communication #concept
Human-Centered Communication Planning: A Conceptual Approach (TS, FM, JS), pp. 94–102.
HCIDUXU-WM-2013-SchutzOV #approach #automation #development #evaluation #usability
SysML-Based Approach for Automation Software Development — Explorative Usability Evaluation of the Provided Notation (DS, MO, BVH), pp. 568–574.
HCIDUXU-WM-2013-Tussyadiah #approach #case study #experience #mobile
Meta-design Approach for Mobile Platforms Supporting Creative Tourism Experiences (IPT), pp. 733–739.
HCIDUXU-WM-2013-WilliamsGMW #approach #enterprise #performance
A User Centred Approach to Determining the Impact of Faster Broadband on Small and Medium Sized Enterprises (DW, AG, JM, JW), pp. 140–149.
HCIDUXU-WM-2013-WilliamsGMW13a #approach
A User Centred Approach to Evaluating the Future Demand for Bandwidth from Consumers (DW, AG, JM, JW), pp. 150–159.
HCIHCI-AMTE-2013-HashizumeK #approach #comprehension #design #development #experience #user interface
Understanding User Experience and Artifact Development through Qualitative Investigation: Ethnographic Approach for Human-Centered Design (AH, MK), pp. 68–76.
HCIHCI-III-2013-SouiAG #adaptation #approach #design #fuzzy #logic
Fuzzy Logic Approach for Adaptive Systems Design (MS, MA, KG), pp. 141–150.
HCIHCI-IMT-2013-BarbeWM #approach #design
Human Centered Design Approach to Integrate Touch Screen in Future Aircraft Cockpits (JB, MW, RM), pp. 429–438.
HCIHCI-UC-2013-KleinS #approach #development #industrial #process #social #social media
Social Media in the Product Development Process of the Automotive Industry: A New Approach (AK, GS), pp. 396–401.
HCIHIMI-D-2013-EbbessonE #approach #design #industrial
A User Driven Design Approach to Creating UGC Services — Challenging the Newspaper Industry (EE, CIE), pp. 187–196.
HCIHIMI-D-2013-KlomannM #approach #interactive #named #prototype
Freiform: A SmartPen Based Approach for Creating Interactive Paper Prototypes for Collecting Data (MK, JTM), pp. 316–321.
HCIHIMI-D-2013-OhnoNK #approach #design
Environment-Centered Approach to ICT Service Design (TO, MN, YK), pp. 347–356.
HCIHIMI-HSM-2013-AhramKAF #approach #energy
Power and Energy Management: A User-Centered System-of-Systems Engineering Approach (TZA, WK, BA, PF), pp. 3–12.
HCIHIMI-HSM-2013-WadaNS #approach
Approach to Haptic Guidance Control in Steering Operation Based on Cooperative States between Driver and Control System (TW, RN, SS), pp. 596–605.
HCIHIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation
Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HCIHIMI-LCCB-2013-NarumiKHATH #approach
Digital Railway Museum: An Approach to Introduction of Digital Exhibition Systems at the Railway Museum (TN, TK, TH, KA, TT, MH), pp. 238–247.
HCIHIMI-LCCB-2013-YuL #approach #feedback #mining
Exploring User Feedback of a E-Learning System: A Text Mining Approach (WBY, RL), pp. 182–191.
HCIOCSC-2013-AlaouiL #approach #communication #design
A LivingLab Approach to Involve Elderly in the Design of Smart TV Applications Offering Communication Services (MA, ML), pp. 325–334.
HCIOCSC-2013-HallCW #approach #community #predict
Well-Being’s Predictive Value — A Gamified Approach to Managing Smart Communities (MH, SC, CW), pp. 13–22.
HCIOCSC-2013-JiangB #approach #case study #multi #network #social
A Three-Level Approach to the Study of Multi-cultural Social Networking (YJ, OdB), pp. 365–374.
VISSOFTVISSOFT-2013-FittkauWWH #approach #scalability #visualisation
Live trace visualization for comprehending large software landscapes: The ExplorViz approach (FF, JW, CW, WH), pp. 1–4.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILTHILT-2013-WardRL #approach #integration #process
An approach to integration of complex systems: the SAVI virtual integration process (DTW, DAR, BAL), pp. 43–46.
CAiSECAiSE-2013-BakkerFV #approach #detection #hybrid #web
A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
CAiSECAiSE-2013-MaggiBA #approach #knowledge-based
A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps (FMM, RPJCB, WMPvdA), pp. 433–448.
EDOCEDOC-2013-GoknilKM #approach #metamodelling #modelling #multi #reasoning #requirements
A metamodeling approach for reasoning on multiple requirements models (AG, IK, JVM), pp. 159–166.
EDOCEDOC-2013-LyMMRA #comparison #evaluation #framework #monitoring
A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches (LTL, FMM, MM, SRM, WMPvdA), pp. 7–16.
EDOCEDOC-2013-SelwayGMS #approach #formal method #natural language #specification #using
Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management #using
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
EDOCEDOC-2013-TranZ #analysis #approach #architecture #verification
Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEISICEIS-J-2013-BouneffaA13a #approach #graph grammar #impact analysis #ontology
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEISICEIS-J-2013-GiordanoTSAF13a #approach #architecture #case study #enterprise #ontology #semantics
Joining Data and Maps in the Government Enterprise Architecture by a Semantic Approach: Methodology, Ontology and Case Study (DG, AT, CS, SA, AF), pp. 506–519.
ICEISICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEISICEIS-J-2013-VaniyaBN13a #approach
Analysing the M&A Preparedness Building Approach (NV, PB, ON), pp. 459–473.
ICEISICEIS-v1-2013-BevacquaCFGP #abstraction #adaptation #approach #predict #process
A Data-adaptive Trace Abstraction Approach to the Prediction of Business Process Performances (AB, MC, FF, MG, LP), pp. 56–65.
ICEISICEIS-v1-2013-LimaSKCF #approach #enterprise #evolution
A Delta Oriented Approach to the Evolution and Reconciliation of Enterprise Software Products Lines (GL, JS, UK, DAdC, SVF), pp. 255–263.
ICEISICEIS-v1-2013-OliveiraB #approach #modelling #novel #process #standard
ETL Standard Processes Modelling — A Novel BPMN Approach (BCdSO, OB), pp. 120–127.
ICEISICEIS-v1-2013-ZaamouneBPB #analysis #approach #multi #relational
A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEISICEIS-v2-2013-Abbo #approach
The Analytical Approach to Information Value Management (DA), pp. 549–554.
ICEISICEIS-v2-2013-BenhaddiBA #approach #evaluation #formal method #implementation #user satisfaction
Formalization of the User Centric SOA Approach — Implementation and End User Satisfaction Evaluation (MB, KB, EHA), pp. 481–488.
ICEISICEIS-v2-2013-ClayerTC #adaptation #approach #design #education #towards
Towards a Pattern-based Adaptive Approach for Instructional Design based on Teacher’s Pedagogical Design Scheme (JPC, CT, CC), pp. 532–538.
ICEISICEIS-v2-2013-FragalSGJ #approach #embedded #product line #specification
Application Engineering for Embedded Systems — Transforming SysML Specification to Simulink within a Product-Line based Approach (VHF, RFS, IMdSG, EAdOJ), pp. 94–101.
ICEISICEIS-v2-2013-KuCY #approach #recommendation
Effect of Product Type and Recommendation Approach on Consumers’ Intention to Purchase Recommended Products (YCK, CHC, CSY), pp. 475–480.
ICEISICEIS-v2-2013-RibeiroS #approach #modelling #realtime #requirements
An Approach for Modeling Real-time Requirements with SysML and MARTE Stereotypes (FGCR, MSS), pp. 70–81.
ICEISICEIS-v2-2013-SilvaFJGO #approach #embedded #named #product line
SyMPLES — A SysML-based Approach for Developing Embedded Systems Software Product Lines (RFS, VHF, EAdOJ, IMdSG, FO), pp. 257–264.
ICEISICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework #using
Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, ), pp. 427–434.
ICEISICEIS-v2-2013-WolfengagenRSBS #approach #modelling #process #towards
Applicative Approach to Information Processes Modeling — Towards a Constructive Information Theory (VW, VR, LS, AB, AS), pp. 323–328.
ICEISICEIS-v3-2013-AhmadO #approach #architecture #enterprise #process #semantics
A New Approach to Semantically Derive Enterprise Information Architecture from Business Process Architecture (MA, MO), pp. 363–369.
ICEISICEIS-v3-2013-GiordanoTSAF #approach #architecture #case study #enterprise #ontology
An Ontology based Approach to Integrate Data and Maps — In the Government Enterprise Architecture: A Case Study (DG, AT, CS, SA, AF), pp. 356–362.
ICEISICEIS-v3-2013-GromoffKPS #approach #architecture #enterprise #flexibility
Newer Approach to Flexible Business Architecture of Modern Enterprise (AG, NK, MP, YS), pp. 326–332.
ICEISICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling #using
A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEISICEIS-v3-2013-LuxHH #approach #enterprise #flexibility #representation #towards
Towards Enterprise Management Systems — A Generic and Flexible Information Representation Approach (AL, JH, RH), pp. 251–257.
ICEISICEIS-v3-2013-PanTG #approach #dependence #modelling #ontology #process
Artefact-oriented Business Process Modelling — An Ontological Dependency Approach (YCP, YT, SRG), pp. 223–230.
ICEISICEIS-v3-2013-SbaiFK #adaptation #approach #configuration management #modelling #process #towards
Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models (HS, MF, LK), pp. 382–387.
CIKMCIKM-2013-HashemiNB #approach #learning #network #retrieval #topic
Expertise retrieval in bibliographic network: a topic dominance learning approach (SHH, MN, HB), pp. 1117–1126.
CIKMCIKM-2013-JabbourSSU #approach
Mining-based compression approach of propositional formulae (SJ, LS, YS, TU), pp. 289–298.
CIKMCIKM-2013-KimNC #approach #modelling #probability #social #social media
Modeling dynamics of meta-populations with a probabilistic approach: global diffusion in social media (MK, DN, PC), pp. 489–498.
CIKMCIKM-2013-RousseauV #ad hoc #approach #information retrieval
Graph-of-word and TW-IDF: new approach to ad hoc IR (FR, MV), pp. 59–68.
CIKMCIKM-2013-TianCZ #approach #database #hybrid #mobile #privacy #query
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
CIKMCIKM-2013-WangLZ #approach #graph #metric #multi #random #towards
Towards metric fusion on multi-view data: a cross-view based graph random walk approach (YW, XL, QZ), pp. 805–810.
ECIRECIR-2013-0001S #game studies #query #refinement
Comparing Crowd-Based, Game-Based, and Machine-Based Approaches in Initial Query and Query Refinement Tasks (CGH, PS), pp. 495–506.
ECIRECIR-2013-IgnatovKC #approach #detection
Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIRECIR-2013-RahimiS #approach #corpus #modelling
A Language Modeling Approach for Extracting Translation Knowledge from Comparable Corpora (RR, AS), pp. 606–617.
ICMLICML-c1-2013-BootsG #approach #learning
A Spectral Learning Approach to Range-Only SLAM (BB, GJG), pp. 19–26.
ICMLICML-c1-2013-GiguereLMS #algorithm #approach #bound #learning #predict
Risk Bounds and Learning Algorithms for the Regression Approach to Structured Output Prediction (SG, FL, MM, KS), pp. 107–114.
ICMLICML-c1-2013-GonenSS #approach #learning #performance
Efficient Active Learning of Halfspaces: an Aggressive Approach (AG, SS, SSS), pp. 480–488.
ICMLICML-c1-2013-KadriGP #approach #kernel #learning
A Generalized Kernel Approach to Structured Output Learning (HK, MG, PP), pp. 471–479.
ICMLICML-c1-2013-NarasimhanA #approach #optimisation
A Structural SVM Based Approach for Optimizing Partial AUC (HN, SA), pp. 516–524.
ICMLICML-c2-2013-WangK13a #approach #message passing #problem
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passing (HW, DK), pp. 190–198.
ICMLICML-c3-2013-DembczynskiJKWH #approach #classification #multi #optimisation #plugin
Optimizing the F-Measure in Multi-Label Classification: Plug-in Rule Approach versus Structured Loss Minimization (KD, AJ, WK, WW, EH), pp. 1130–1138.
ICMLICML-c3-2013-GermainHLM #adaptation #approach #classification #linear
A PAC-Bayesian Approach for Domain Adaptation with Specialization to Linear Classifiers (PG, AH, FL, EM), pp. 738–746.
ICMLICML-c3-2013-GuptaPV #approach #learning #multi #parametricity
Factorial Multi-Task Learning : A Bayesian Nonparametric Approach (SKG, DQP, SV), pp. 657–665.
ICMLICML-c3-2013-Izbicki #algebra #approach #classification #online #parallel #performance
Algebraic classifiers: a generic approach to fast cross-validation, online training, and parallel training (MI), pp. 648–656.
ICMLICML-c3-2013-NiuJDHS #approach #learning #novel
Squared-loss Mutual Information Regularization: A Novel Information-theoretic Approach to Semi-supervised Learning (GN, WJ, BD, HH, MS), pp. 10–18.
KDDKDD-2013-CuiJYWZY #approach #data-driven #network #predict
Cascading outbreak prediction in networks: a data-driven approach (PC, SJ, LY, FW, WZ, SY), pp. 901–909.
KDDKDD-2013-LiuCZ #approach #performance #probability
Summarizing probabilistic frequent patterns: a fast approach (CL, LC, CZ), pp. 527–535.
KDDKDD-2013-NiemannW #approach #collaboration #recommendation
A new collaborative filtering approach for increasing the aggregate diversity of recommender systems (KN, MW), pp. 955–963.
KDDKDD-2013-Vatsavai #approach #learning #multi #using
Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDDKDD-2013-ZafaraniL #approach #behaviour #social #social media
Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
KDDKDD-2013-ZhouTWN #approach #predict #probability
A “semi-lazy” approach to probabilistic path prediction (JZ, AKHT, WW, WSN), pp. 748–756.
KDIRKDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax #using
Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIRKDIR-KMIS-2013-DimasKV #approach #sentiment #twitter
Every Character Counts — A Character based Approach to Determine Political Sentiment on Twitter (AD, PCK, EMV), pp. 261–266.
KDIRKDIR-KMIS-2013-FerchichiBF #adaptation #approach #image #predict
An Approach based on Adaptive Decision Tree for Land Cover Change Prediction in Satellite Images (AF, WB, IRF), pp. 82–90.
KDIRKDIR-KMIS-2013-MattaD #approach #design #memory management
Memory Meetings — An Approach to Keep Track of Project Knowledge in Design (NM, GD), pp. 336–343.
KDIRKDIR-KMIS-2013-MorganK #ambiguity #approach #twitter
A Generic Open World Named Entity Disambiguation Approach for Tweets (MBM, MvK), pp. 267–276.
KDIRKDIR-KMIS-2013-NhungNCLT #approach #image #learning #multi
A Multiple Instance Learning Approach to Image Annotation with Saliency Map (TPN, CTN, JC, HVL, TT), pp. 152–159.
KDIRKDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification #using
Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
KDIRKDIR-KMIS-2013-SmirnovSK #approach #multi #self #smarttech
Multilevel Self-Organization in Smart Environment — Service-Oriented Approach (AVS, NS, AK), pp. 290–297.
KDIRKDIR-KMIS-2013-SucaS #approach #documentation #ontology #using
An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEODKEOD-2013-AveiroP13a #approach #enterprise #implementation #ontology #semantics
Implementing Organizational Self Awareness — A Semantic Mediawiki based Enterprise Ontology Management Approach (DA, DP), pp. 453–461.
KEODKEOD-2013-BouiadjraB #approach #ontology
User-centered Approach for Evaluating Ontologies (ABB, SMB), pp. 192–198.
KEODKEOD-2013-ChulyadyoHB #approach #automation #ontology
Core Ontology based Approach for Treating the Flatness of Automatically Built Ontology (RC, MH, GB), pp. 316–323.
KEODKEOD-2013-CostaFML #approach #classification #information management #ontology #using
Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEODKEOD-2013-PaniLCB #approach #web
An Approach to Manage the Web Knowledge (FEP, MIL, GC, GB), pp. 81–88.
KEODKEOD-2013-SouissiCG #approach #ontology #semantics
A Semantic-based Approach for Ontology Module Extraction (AS, WC, KG), pp. 222–229.
KEODKEOD-2013-ZarradDZ #approach #wiki
Title-based Approach to Relation Discovery from Wikipedia (RZ, ND, EZ), pp. 70–80.
MLDMMLDM-2013-LiuLM #approach #combinator #lightweight #multi
A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators (XL, LL, NDM), pp. 616–628.
RecSysRecSys-2013-Shi #approach #graph #recommendation #similarity
Trading-off among accuracy, similarity, diversity, and long-tail: a graph-based recommendation approach (LS), pp. 57–64.
SEKESEKE-2013-AdamE #approach #multi
A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
SEKESEKE-2013-DingXG #approach #petri net #specification
An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
SEKESEKE-2013-DuttaAKB #approach #distributed
Virtual Medical Board: A Distributed Bayesian Agent Based Approach (S) (AD, SA, AK, SB), pp. 685–688.
SEKESEKE-2013-FelizardoBM #approach #bibliography #replication #validation #visual notation
A Visual Approach to Validate the Selection Review of Primary Studies in Systematic Reviews: A Replication Study (KRF, EFB, JCM), pp. 141–146.
SEKESEKE-2013-FerreiraVQ #approach #product line #testing
A Mutation Approach to Feature Testing of Software Product Lines (JMF, SRV, MAQ), pp. 232–237.
SEKESEKE-2013-Lacanienta0TO #approach #generative #knowledge-based #web
A Knowledge-based Approach for Generating Test Scenarios for Web Applications (RL, ST, HT, MO), pp. 166–171.
SEKESEKE-2013-MarcolinoOGM #approach #case study #effectiveness #towards #variability
Towards the Effectiveness of a Variability Management Approach at Use Case Level (AM, EAOJ, IMSG, JCM), pp. 214–219.
SEKESEKE-2013-MolleriSB #approach #automation #bibliography #process
Proposal of an Automated Approach to Support the Systematic Review of Literature Process (S) (JSM, LEdS, FBVB), pp. 488–493.
SEKESEKE-2013-MoshirpourEF #approach #automation #ontology #using
Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (S) (MM, AE, BHF), pp. 63–66.
SEKESEKE-2013-SadiqJ #approach #elicitation #fuzzy #process #requirements
A fuzzy based approach for requirements prioritization in goal oriented requirements elicitation process (S) (MS, SKJ), pp. 54–58.
SEKESEKE-2013-SeveroFS #approach #collaboration #game studies #risk management
A Dialogue Game Approach to Collaborative Risk Management (S) (FS, LMF, LAdLS), pp. 548–551.
SEKESEKE-2013-SilvaD #approach #semantics
A context-aware approach on semantic trajectories (S) (CS, MARD), pp. 435–440.
SEKESEKE-2013-SilvaVMA #approach #product line
Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
SEKESEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing #using
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SIGIRSIGIR-2013-Boehm #approach #information management #knowledge-based
Group-support for task-based information searching: a knowledge-based approach (TB), p. 1141.
SIGIRSIGIR-2013-FreitasFOC #approach #graph #linked data #natural language #open data #query #semantics
Answering natural language queries over linked data graphs: a distributional semantics approach (AF, FFdF, SO, EC), pp. 1107–1108.
SIGIRSIGIR-2013-SchedlS #hybrid #music #recommendation #retrieval
Hybrid retrieval approaches to geospatial music recommendation (MS, DS), pp. 793–796.
SIGIRSIGIR-2013-WuF #approach #feedback #incremental #performance #pseudo
An incremental approach to efficient pseudo-relevance feedback (HW, HF), pp. 553–562.
SIGIRSIGIR-2013-Yeniterzi #effectiveness #social #social media #using
Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
AMTAMT-2013-MatragkasKPZ #approach #model transformation #testing
A Traceability-Driven Approach to Model Transformation Testing (NDM, DSK, RFP, AZ), pp. 2–11.
ECMFAECMFA-2013-AmbertBLLP #approach #modelling #testing
Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
ICMTICMT-2013-FaunesSB #approach #model transformation
Genetic-Programming Approach to Learn Model Transformation Rules from Examples (MF, HAS, MB), pp. 17–32.
ICMTICMT-2013-RuscioIP #approach #atl #co-evolution #evolution #metamodelling
A Methodological Approach for the Coupled Evolution of Metamodels and ATL Transformations (DDR, LI, AP), pp. 60–75.
ICMTICMT-2013-WieberS #approach #graph transformation #testing
Systematic Testing of Graph Transformations: A Practical Approach Based on Graph Patterns (MW, AS), pp. 205–220.
MODELSMoDELS-2013-ArkinTI #algorithm #approach #modelling #parallel
Model-Driven Approach for Supporting the Mapping of Parallel Algorithms to Parallel Computing Platforms (EA, BT, KMI), pp. 757–773.
MODELSMoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
MODELSMoDELS-2013-Gonzalez-HuertaIA #approach #architecture #multi #validation
Defining and Validating a Multimodel Approach for Product Architecture Derivation and Improvement (JGH, EI, SA), pp. 388–404.
MODELSMoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
MODELSMoDELS-2013-ZalilaCP #approach #domain-specific language #integration #verification
Formal Verification Integration Approach for DSML (FZ, XC, MP), pp. 336–351.
MODELSMoDELS-2013-ArkinTI #algorithm #approach #modelling #parallel
Model-Driven Approach for Supporting the Mapping of Parallel Algorithms to Parallel Computing Platforms (EA, BT, KMI), pp. 757–773.
MODELSMoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
MODELSMoDELS-2013-Gonzalez-HuertaIA #approach #architecture #multi #validation
Defining and Validating a Multimodel Approach for Product Architecture Derivation and Improvement (JGH, EI, SA), pp. 388–404.
MODELSMoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
MODELSMoDELS-2013-ZalilaCP #approach #domain-specific language #integration #verification
Formal Verification Integration Approach for DSML (FZ, XC, MP), pp. 336–351.
TOOLSTOOLS-EUROPE-J-2012-LilisS13 #approach #debugging #fault #metaprogramming
An Integrated Approach to Source Level Debugging and Compile Error Reporting in Metaprograms (YL, AS), pp. 1–26.
LOPSTRLOPSTR-2013-AlbertGG #analysis #approach
A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
PPDPPPDP-2013-LamoMRL #approach #bidirectional #declarative #graph #model transformation
A declarative and bidirectional model transformation approach based on graph co-spans (YL, FM, AR, JdL), pp. 1–12.
PPDPPPDP-2013-MatsudaW #approach #bidirectional #for free #problem #runtime
Bidirectionalization for free with runtime recording: or, a light-weight approach to the view-update problem (KM, MW), pp. 297–308.
REER-BR-2013-CabrejosMC #approach #development #elicitation #requirements #usability #web
An Approach for the Elicitation of Usability Requirements in the Development of Web Applications (LJERC, SM, TC).
REER-BR-2013-GuedesSC #approach #product line
Goals and Scenarios to Software Product Lines: the GS2SPL Approach (GG, CTLLS, JC).
RERE-2013-NistalaK #analysis #approach #consistency #requirements #validation
An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
RERE-2013-Valenca #approach #ecosystem #evolution #requirements #social
Requirements negotiation model: A social oriented approach for software ecosystems evolution (GV), pp. 393–396.
REFSQREFSQ-2013-Cleland-HuangCK #agile #approach #architecture #requirements
A Persona-Based Approach for Exploring Architecturally Significant Requirements in Agile Projects (JCH, AC, EK), pp. 18–33.
SACSAC-2013-AbdallahHA #approach #design #quantifier
Quantified extreme scenario based design approach (AA, RH, MAA), pp. 1117–1122.
SACSAC-2013-AraujoGMSAB #approach #composition #feature model #modelling
Advanced modularity for building SPL feature models: a model-driven approach (JA, MG, AMDM, IS, VA, ELAB), pp. 1246–1253.
SACSAC-2013-AzarianCWB #approach #manycore #pipes and filters
An FPGA-based multi-core approach for pipelining computing stages (AA, JMPC, SW, JB), pp. 1533–1540.
SACSAC-2013-BakkerVFK #detection #web
Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
SACSAC-2013-BakreBE #approach #interactive #uml
Aspect interaction chart — a UML approach for modularizing aspect interaction conflicts (SB, AB, TE), pp. 1254–1259.
SACSAC-2013-BasgaluppBSC #approach #predict
Software effort prediction: a hyper-heuristic decision-tree based approach (MPB, RCB, TSdS, ACPLFC), pp. 1109–1116.
SACSAC-2013-BlancoMLJ #approach #probability
A Kalman filter based approach to probabilistic gas distribution mapping (JLB, JGM, AJL, JGJ), pp. 217–222.
SACSAC-2013-JungS #approach #garbage collection #named
LINK-GC: a preemptive approach for garbage collection in NAND flash storages (SJ, YHS), pp. 1478–1484.
SACSAC-2013-KaratasK #approach #composition #flexibility #security
A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
SACSAC-2013-KinderenP #approach #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SACSAC-2013-LaneseBF #approach #calculus #internet #process
Internet of things: a process calculus approach (IL, LB, MDF), pp. 1339–1346.
SACSAC-2013-LiBB #ad hoc #approach #composition #web #web service
Service farming: an ad-hoc and QoS-aware web service composition approach (WL, YB, FB), pp. 750–756.
SACSAC-2013-LinCLG #approach #data-driven #distributed #learning #predict
Distributed dynamic data driven prediction based on reinforcement learning approach (SYL, KMC, CCL, NG), pp. 779–784.
SACSAC-2013-LiZSL #approach #graph #mining #named #novel
WAVE-CIA: a novel CIA approach based on call graph mining (BL, QZ, XS, HL), pp. 1000–1005.
SACSAC-2013-Marques-NetoAV #approach #maintenance
A quantitative approach for evaluating software maintenance services (HMN, GJA, MTV), pp. 1068–1073.
SACSAC-2013-MehtaRCN #approach #dependence #using
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SACSAC-2013-MeloAOAMB #analysis #approach #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SACSAC-2013-PougetSCM #approach #data flow #debugging #embedded #interactive #novel
A novel approach for interactive debugging of dynamic dataflow embedded applications (KP, MS, PLC, JFM), pp. 1547–1549.
SACSAC-2013-SaitoRFSG #approach #image #performance #reduction
A data reduction and organization approach for efficient image annotation (PTMS, PJdR, AXF, CTNS, JFG), pp. 53–57.
SACSAC-2013-TounsiKKDM #approach #design pattern #formal method #modelling #towards
Towards an approach for modeling and formalizing SOA design patterns with Event-B (IT, MHK, AHK, KD, EM), pp. 1937–1938.
SACSAC-2013-VivianHL #approach #development #distributed
Supporting distributed software development through context awareness on software artifacts: the DiSEN-CollaborAR approach (RLV, EHMH, GCLL), pp. 765–770.
SACSAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SACSAC-2013-XuTTZ #approach #fault #fine-grained
An instruction-level fine-grained recovery approach for soft errors (JX, QT, LT, HZ), pp. 1511–1516.
ESEC-FSEESEC-FSE-2013-MockusHP #approach #quality #risk management
Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
ESEC-FSEESEC-FSE-2013-WangHJK #approach #evaluation
Searching for better configurations: a rigorous approach to clone evaluation (TW, MH, YJ, JK), pp. 455–465.
ICSEICSE-2013-AversanoCRT #approach
An approach for restructuring text content (LA, GC, GDR, MT), pp. 1225–1228.
ICSEICSE-2013-BortisH #approach #debugging #named
PorchLight: a tag-based approach to bug triaging (GB, AvdH), pp. 342–351.
ICSEICSE-2013-CarrenoW #analysis #approach #evolution #requirements
Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSEICSE-2013-Che #approach #architecture #design #evolution
An approach to documenting and evolving architectural design decisions (MC), pp. 1373–1376.
ICSEICSE-2013-Kukreja #approach #requirements #towards
Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
ICSEICSE-2013-NetoCLGM #approach #named #problem #programming #student #testing
POPT: a problem-oriented programming and testing approach for novice students (VLN, RC, LL, DSG, APM), pp. 1099–1108.
ICSEICSE-2013-PanichellaDOPPL #algorithm #approach #effectiveness #how #modelling #re-engineering #search-based #topic
How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
SLESLE-2013-DialloCL #approach #formal method #modelling #using
A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
SPLCSPLC-2013-Quinton0D #approach #constraints #feature model #modelling
Cardinality-based feature models with constraints: a pragmatic approach (CQ, DR, LD), pp. 162–166.
ASPLOSASPLOS-2013-DashtiFFGLLQR #approach #memory management
Traffic management: a holistic approach to memory placement on NUMA systems (MD, AF, JRF, FG, RL, BL, VQ, MR), pp. 381–394.
ASPLOSASPLOS-2013-KangW #approach #hardware
To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach (HK, JLW), pp. 357–368.
ISMMISMM-2013-Musuvathi #approach #consistency #memory management #modelling
Safety-first approach to memory consistency models (MM), pp. 1–2.
CAVCAV-2013-ArmoniFJ #approach
SVA and PSL Local Variables — A Practical Approach (RA, DF, NJ), pp. 197–212.
ICLPICLP-J-2013-ErdemPSSU #approach #multi
Finding optimal plans for multiple teams of robots through a mediator: A logic-based approach (EE, VP, ZGS, PS, TU), pp. 831–846.
ICLPICLP-J-2013-MaLWRL #analysis #approach #declarative #distributed #execution #specification
A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICSTICST-2013-GraslandBGP #approach #functional #hybrid #safety #testing
A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
ICTSSICTSS-2013-VorobyovKS #approach #memory management
A Dynamic Approach to Locating Memory Leaks (KV, PK, PS), pp. 255–270.
ISSTAISSTA-2013-TrippWG #approach #learning #security #testing #web
Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
ICSTSAT-2013-CimattiGSS #approach #composition #modulo theories #satisfiability
A Modular Approach to MaxSAT Modulo Theories (AC, AG, BJS, RS), pp. 150–165.
ICSTSAT-2013-HeuleS #approach #clique #satisfiability
A SAT Approach to Clique-Width (MH, SS), pp. 318–334.
ICSTSAT-2013-IgnatievJM #approach #quantifier #satisfiability
Quantified Maximum Satisfiability: — A Core-Guided Approach (AI, MJ, JMS), pp. 250–266.
ICSTSAT-2013-MihalT #approach #constraints #logic #programmable
A Constraint Satisfaction Approach for Programmable Logic Detailed Placement (AM, ST), pp. 208–223.
CBSECBSE-2012-GhafariJSH #approach #architecture #component #configuration management #consistency
An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
CBSECBSE-2012-MartinezV #approach #component #realtime
An MDE approach to address synchronization needs in component-based real-time systems (PLM, TV), pp. 125–134.
QoSAQoSA-2012-DurdikR #approach #architecture #design #modelling
Position paper: approach for architectural design and modelling with documented design decisions (ADMD3) (ZD, RHR), pp. 49–54.
WICSA-ECSAWICSA-ECSA-2012-KebirSCC #approach #component #identification #object-oriented
Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2012-KuzZBSX #approach #architecture #effectiveness
An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
ASEASE-2012-AminGC #approach #automation #linear #modelling
An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling (AA, LG, AC), pp. 130–139.
ASEASE-2012-YuanG #approach #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
CASECASE-2012-BrunoMSVZ #approach #modelling #recognition
Human motion modelling and recognition: A computational approach (BB, FM, AS, TV, RZ), pp. 156–161.
CASECASE-2012-CaoZF #approach #mobile #search-based
Point stabilization of mobile robots by genetic sliding mode approach with neural dynamics model on uneven surface (ZC, YZ, YF), pp. 1150–1155.
CASECASE-2012-ChenZAB #analysis #approach #performance #realtime
Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
CASECASE-2012-FeiMAL #approach #automaton #finite #scalability
A symbolic approach to large-scale discrete event systems modeled as finite automata with variables (ZF, SM, , BL), pp. 502–507.
CASECASE-2012-HansenOMO #approach #energy #generative #industrial
Enhanced approach for energy-efficient trajectory generation of industrial robots (CH, , DM, TO), pp. 1–7.
CASECASE-2012-HN #approach #multi #network #social
Influence limitation in multi-campaign social networks: A Shapley value based approach (PRH, YN), pp. 735–740.
CASECASE-2012-MatsumotoN #approach #clustering #composition #concurrent #petri net #scheduling #tool support
Petri net decomposition approach to deadlock-free scheduling for dual-armed cluster tools (IM, TN), pp. 194–199.
CASECASE-2012-PampuriSSLBN #multi #process
Multistep virtual metrology approaches for semiconductor manufacturing processes (SP, AS, GAS, CDL, AB, GDN), pp. 91–96.
CASECASE-2012-PehlivanAXC #approach #capacity #multi #network #optimisation
Multi-period capacity planning for maternity facilities in a perinatal network: A queuing and optimization approach (CP, VA, XX, CCH), pp. 137–142.
CASECASE-2012-PrabhuJT #approach #modelling #physics
Modeling green factory physics — An analytical approach (VVP, HWJ, MT), pp. 46–51.
CASECASE-2012-QuangR #approach #implementation
Implementation of Time Domain Passivity Approach on Rate-Mode bilateral teleoperation (HVQ, JHR), pp. 846–850.
CASECASE-2012-SugiyamaNITU #approach #composition #problem
A bilevel decomposition approach to railway crew rostering problems for fair labor condition (TS, TN, MI, ST, KU), pp. 383–389.
CASECASE-2012-SustoSPNB #approach
An information-theory and Virtual Metrology-based approach to Run-to-Run semiconductor manufacturing control (GAS, AS, SP, GDN, AB), pp. 358–363.
DACDAC-2012-KumarGCALT #approach #cyber-physical #hybrid #verification
A hybrid approach to cyber-physical systems verification (PK, DG, SC, AA, KL, LT), pp. 688–696.
DACDAC-2012-ParkKCDCP #prototype
Approaching the theoretical limits of a mesh NoC with a 16-node chip prototype in 45nm SOI (SP, TK, CHOC, BKD, AC, LSP), pp. 398–405.
DATEDATE-2012-BolchiniMS #adaptation #approach #architecture #fault #manycore #online
An adaptive approach for online fault management in many-core architectures (CB, AM, DS), pp. 1429–1432.
DATEDATE-2012-FritzBAH #approach #evaluation #monitoring #performance
Evaluation of a new RFID system performance monitoring approach (GF, VB, OEKA, DH), pp. 1439–1442.
DATEDATE-2012-Graeb #challenge
ITRS 2011 Analog EDA Challenges and Approaches (HG), pp. 1150–1155.
DATEDATE-2012-KamalASP #approach #architecture #process
An architecture-level approach for mitigating the impact of process variations on extensible processors (MK, AAK, SS, MP), pp. 467–472.
DATEDATE-2012-LiuTW #analysis #approach #graph #parallel #statistics
Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
DATEDATE-2012-LuoCH #approach #fault #synthesis
A cyberphysical synthesis approach for error recovery in digital microfluidic biochips (YL, KC, TYH), pp. 1239–1244.
DATEDATE-2012-MilbredtGLST #approach #architecture #design
Designing FlexRay-based automotive architectures: A holistic OEM approach (PM, MG, ML, AS, JT), pp. 276–279.
DATEDATE-2012-PanagopoulosAR #approach #framework #hybrid #simulation
A framework for simulating hybrid MTJ/CMOS circuits: Atoms to system approach (GP, CA, KR), pp. 1443–1446.
DATEDATE-2012-SabryAC #approach #embedded #fault #hybrid
A hybrid HW-SW approach for intermittent error mitigation in streaming-based embedded systems (MMS, DA, FC), pp. 1110–1113.
DATEDATE-2012-SuriBE #approach #multi #problem #scalability
A scalable GPU-based approach to accelerate the multiple-choice knapsack problem (BS, UDB, PE), pp. 1126–1129.
DATEDATE-2012-TabkhiS #approach #power management
Application-specific power-efficient approach for reducing register file vulnerability (HT, GS), pp. 574–577.
DATEDATE-2012-WuLMC #approach #correlation
Mitigating lifetime underestimation: A system-level approach considering temperature variations and correlations between failure mechanisms (KCW, MCL, DM, SCC), pp. 1269–1274.
DATEDATE-2012-ZambelliIFCPOB #approach #trade-off
A cross-layer approach for new reliability-performance trade-offs in MLC NAND flash memories (CZ, MI, MF, SDC, PP, PO, DB), pp. 881–886.
DocEngDocEng-2012-Delprat #approach #documentation
Content and document based approach for digital productivity applications (TD), pp. 83–84.
DocEngDocEng-2012-IorioPPV #approach #automation #documentation #recognition #xml
A first approach to the automatic recognition of structural patterns in XML documents (ADI, SP, FP, FV), pp. 85–94.
DRRDRR-2012-EsserSMBS #approach #automation #documentation
Automatic indexing of scanned documents: a layout-based approach (DE, DS, KM, MB, AS).
DRRDRR-2012-SadawiSS #approach #recognition #rule-based
Chemical structure recognition: a rule-based approach (NMS, APS, VS).
HTHT-2012-WalshOW #approach #evaluation
Evaluation of a domain-aware approach to user model interoperability (EW, AO, VW), pp. 197–206.
HTHT-2012-WolffMC #approach #named
Storyspace: a story-driven approach for creating museum narratives (AW, PM, TDC), pp. 89–98.
SIGMODSIGMOD-2012-ChengKCC #approach #distance #graph #performance #query #scalability
Efficient processing of distance queries in large graphs: a vertex cover approach (JC, YK, SC, CC), pp. 457–468.
SIGMODSIGMOD-2012-JinRXL #approach #distance #graph #query #scalability
A highway-centric labeling approach for answering distance queries on large sparse graphs (RJ, NR, YX, VEL), pp. 445–456.
SIGMODSIGMOD-2012-XuKWCC #approach #clustering #graph #modelling
A model-based approach to attributed graph clustering (ZX, YK, YW, HC, JC), pp. 505–516.
VLDBVLDB-2012-SunHYY #analysis #approach #mining #network
Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDBVLDB-2012-ZhaoRGH #approach #integration
A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration (BZ, BIPR, JG, JH), pp. 550–561.
ITiCSEITiCSE-2012-CookDHHJKS #abstraction #approach #education #modelling
A systematic approach to teaching abstraction and mathematical modeling (CTC, SDS, JOH, JEH, DPJ, JK, MS), pp. 357–362.
ITiCSEITiCSE-2012-Kurmas #approach #design
The presenter first design approach (ZK), p. 379.
ITiCSEITiCSE-2012-MorgadoB12a #approach #problem
A structured approach to problem solving in CS1 (CM, FB), p. 399.
ITiCSEITiCSE-2012-Velazquez-Iturbide #algorithm #approach #learning #refinement
Refinement of an experimental approach tocomputer-based, active learning of greedy algorithms (JÁVI), pp. 46–51.
ESOPESOP-2012-DownenA #approach #multi
A Systematic Approach to Delimited Control with Multiple Prompts (PD, ZMA), pp. 234–253.
CSMRCSMR-2012-Penta #approach #developer #empirical #maintenance #reverse engineering
Empirical Studies in Reverse Engineering and Maintenance: Employing Developers to Evaluate Your Approach and Tool (MDP), pp. 567–568.
CSMRCSMR-2012-YoshidaKI #approach #functional #maintenance #metric #source code
A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
ICPCICPC-2012-MahmoudNX #approach #semantics #traceability
A semantic relatedness approach for traceability link recovery (AM, NN, SX), pp. 183–192.
ICPCICPC-2012-Sajnani #approach #architecture #automation #machine learning
Automatic software architecture recovery: A machine learning approach (HS), pp. 265–268.
ICSMEICSM-2012-BauerHD #approach #library
A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
ICSMEICSM-2012-CorazzaMM #approach #identifier #named #performance
LINSEN: An efficient approach to split identifiers and expand abbreviations (AC, SDM, VM), pp. 233–242.
ICSMEICSM-2012-DuseauDS #approach #named #visual notation
Vasco: A visual approach to explore object churn in framework-intensive applications (FD, BD, HAS), pp. 15–24.
ICSMEICSM-2012-Perez-Castillo #approach #information management #legacy #named #process
MARBLE: Modernization approach for recovering business processes from legacy information systems (RPC), pp. 671–676.
MSRMSR-2012-Zhang #case study #experience
MSR 2012 keynote: Software analytics in practice — Approaches and experiences (DZ), p. 1.
WCREWCRE-2012-AlomariCM #approach #performance #scalability #slicing
A Very Efficient and Scalable Forward Static Slicing Approach (HWA, MLC, JIM), pp. 425–434.
WCREWCRE-2012-IchiiMNCO #approach #automation #modelling #rule-based #source code
A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
WCREWCRE-2012-MaigaABSGA #anti #approach #detection #incremental #named
SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
WCREWCRE-2012-MediniAGPT #approach #execution #named
SCAN: An Approach to Label and Relate Execution Trace Segments (SM, GA, YGG, MDP, PT), pp. 135–144.
PEPMPEPM-2012-GotoS #approach #functional
An approach to completing variable names for implicitly typed functional languages (TG, IS), pp. 131–140.
SASSAS-2012-Alonso-BlasG #approach #cost analysis #on the
On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
ICALPICALP-v1-2012-CharikarL #approach #problem
A Dependent LP-Rounding Approach for the k-Median Problem (MC, SL), pp. 194–205.
ICALPICALP-v1-2012-LaekhanukitGS #approach #problem
A Rounding by Sampling Approach to the Minimum Size k-Arc Connected Subgraph Problem (BL, SOG, MS), pp. 606–616.
ICALPICALP-v2-2012-BouyerMS #approach #automaton #game studies #reachability #robust
Robust Reachability in Timed Automata: A Game-Based Approach (PB, NM, OS), pp. 128–140.
LATALATA-2012-Yoshinaka #context-free grammar #integration #learning
Integration of the Dual Approaches in the Distributional Learning of Context-Free Grammars (RY), pp. 538–550.
FMFM-2012-AsplundMBCC #approach #coordination #formal method
A Formal Approach to Autonomous Vehicle Coordination (MA, AM, MB, SC, VC), pp. 52–67.
FMFM-2012-ZhaoZKL #approach #case study #hybrid #industrial
A “Hybrid” Approach for Synthesizing Optimal Controllers of Hybrid Systems: A Case Study of the Oil Pump Industrial Example (HZ, NZ, DK, KGL), pp. 471–485.
IFMIFM-2012-IsobeMNR #approach #capacity #csp #safety
Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
SEFMSEFM-2012-AbdelhalimST #approach #effectiveness #model checking #optimisation
An Optimization Approach for Effective Formalized fUML Model Checking (IA, SS, HT), pp. 248–262.
SEFMSEFM-2012-BicknellRBCS #approach #using #verification
A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFMSEFM-2012-FathabadiBR #approach #composition
A Systematic Approach to Atomicity Decomposition in Event-B (ASF, MJB, AR), pp. 78–93.
SEFMSEFM-2012-JanuzajKBM #approach
A Configuration Approach for IMA Systems (VJ, SK, FB, RM), pp. 203–217.
SEFMSEFM-2012-Jones #abstraction #concurrent #formal method
Abstraction as a Unifying Link for Formal Approaches to Concurrency (CBJ), pp. 1–15.
SEFMSEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing #using
An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFMSEFM-2012-VorobyovKS #approach #data flow #security
A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
SEFMSEFM-2012-ZhuXMQQ #approach #concurrent #source code #verification
The Rely/Guarantee Approach to Verifying Concurrent BPEL Programs (HZ, QX, CM, SQ, ZQ), pp. 172–187.
GT-VMTGT-VMT-2012-GabrielLE #algebra #approach #petri net
Algebraic Approach to Timed Petri Nets (KG, PL, CE).
GT-VMTGT-VMT-2012-NatschlagerS #algebra #approach #graph #graph transformation #inheritance
A Flattening Approach for Attributed Type Graphs with Inheritance in Algebraic Graph Transformation (CN, KDS).
CHICHI-2012-FrauenbergerGKP #approach
Interpreting input from children: a designerly approach (CF, JG, WKB, HP), pp. 2377–2386.
CHICHI-2012-LazarFBMWHOE #approach #interactive #proving
The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users (JL, JF, TB, GM, BW, JH, AO, NE), pp. 2267–2276.
CHICHI-2012-MorrisonMRSC #approach #hybrid #mobile
A hybrid mass participation approach to mobile software trials (AM, DM, SR, SS, MC), pp. 1311–1320.
CHICHI-2012-Sae-BaeAIM #approach #authentication #gesture #multi #novel
Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
CHICHI-2012-WallnerK #analysis #approach #visualisation
A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CSCWCSCW-2012-FuksMCVUB #approach #co-evolution #collaboration #design
Collaborative museums: an approach to co-design (HF, HM, DC, KV, WU, MB), pp. 681–684.
CSCWCSCW-2012-NobaranyHF #approach #collaboration #distributed #process #reuse
Facilitating the reuse process in distributed collaboration: a distributed cognition approach (SN, MH, BDF), pp. 1223–1232.
CSCWCSCW-2012-PaoMCR #approach #collaboration #design
A need-driven design approach: addressing latent needs in collaboration rooted in early childhood (SYP, SM, KC, AR), pp. 829–832.
AdaEuropeAdaEurope-2012-FariaMP #ada #approach #model checking #source code
An Approach to Model Checking Ada Programs (JMF, JM, JSP), pp. 105–118.
HILTHILT-2012-Sanden #approach #bibliography #design #modelling #multi #tutorial
Design of Multitask Software: The Entity-life Modeling Approach (tutorial overview) (BIS), pp. 1–2.
CAiSECAiSE-2012-DaskalakiP #approach #multi
OtO Matching System: A Multi-strategy Approach to Instance Matching (ED, DP), pp. 286–300.
CAiSECAiSE-2012-KaragiannisMM #approach #evaluation #heatmap #metamodelling
Compliance Evaluation Featuring Heat Maps (CE-HM): A Meta-Modeling-Based Approach (DK, CM, AM), pp. 414–428.
CAiSECAiSE-2012-LaraGC #approach #modelling
Abstracting Modelling Languages: A Reutilization Approach (JdL, EG, JSC), pp. 127–143.
CAiSECAiSE-2012-LiptchinskyKTD #approach #collaboration #modelling #novel #process #social
A Novel Approach to Modeling Context-Aware and Social Collaboration Processes (VL, RK, HLT, SD), pp. 565–580.
CAiSECAiSE-2012-NederstigtAVF #approach #automation #e-commerce #taxonomy
An Automatic Approach for Mapping Product Taxonomies in E-Commerce Systems (LJN, SSA, DV, FF), pp. 334–349.
EDOCEDOC-2012-CostaMPA #approach #detection #modelling #rule-based
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOCEDOC-2012-DohringSG #adaptation #approach #aspect-oriented #model transformation #recursion #rule-based #runtime #weaving #workflow
Emulating Runtime Workflow Adaptation and Aspect Weaving by Recursive Rule-Based Sub-Process Selection — A Model Transformation Approach (MD, AS, IG), pp. 133–142.
ICEISICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse #using
Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEISICEIS-J-2012-KaragiannisS #approach #design #hybrid #modelling
An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
ICEISICEIS-J-2012-RibeiroFBKE #algorithm #approach #learning #markov #process
Combining Learning Algorithms: An Approach to Markov Decision Processes (RR, FF, MACB, ALK, FE), pp. 172–188.
ICEISICEIS-J-2012-XavierN12a #approach #component
Measuring Users’ Emotions with a Component-Based Approach (RACX, VPdAN), pp. 393–409.
ICEISICEIS-v1-2012-BoulilBP #approach #ocl #quality #uml
A UML & Spatial OCL based Approach for Handling Quality Issues in SOLAP Systems (KB, SB, FP), pp. 99–104.
ICEISICEIS-v1-2012-Dustdar #approach #design #novel
Design by Units — A Novel Approach for Building Elastic Systems (SD).
ICEISICEIS-v1-2012-RibeiroFBBDKE #algorithm #approach #learning
Unified Algorithm to Improve Reinforcement Learning in Dynamic Environments — An Instance-based Approach (RR, FF, MACB, APB, OBD, ALK, FE), pp. 229–238.
ICEISICEIS-v1-2012-ZianiRO #approach #constraints #mining #multi
A Constraint-based Mining Approach for Multi-attribute Index Selection (BZ, FR, YO), pp. 93–98.
ICEISICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process #using
Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
ICEISICEIS-v2-2012-CapelM #approach #automation #composition #correctness #model checking #safety #verification
A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
ICEISICEIS-v2-2012-GottardiPC #approach #framework #modelling #reuse
A Model-based Approach for Reusing Crosscutting Frameworks (TG, OPL, VVdC), pp. 46–55.
ICEISICEIS-v2-2012-PantojaC #approach #development #using
A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEISICEIS-v2-2012-ParreirasGW #approach #linked data #modelling #ontology #open data
An Ontology-based Approach for Enabling Linked Data Capabilities to MOF Compliant Models (FSP, GG, TW), pp. 126–131.
ICEISICEIS-v2-2012-SousaPS #approach #concept
A Pragmatic Approach to Conceptual Negotiation Support (CS, CP, ALS), pp. 349–354.
ICEISICEIS-v3-2012-BoukhedoumaOAT #adaptation #approach #architecture #modelling #workflow
Service based Approach for Adaptability of Workflow Models — The Subcontracting Architecture (SB, MO, ZA, DT), pp. 224–231.
ICEISICEIS-v3-2012-GoncalvesNUS #approach #flexibility #mobile #user interface
An Analitic Approach to Evaluate Flexible Mobile User Interfaces for the Elderly (VPG, VPdAN, JU, SS), pp. 91–96.
ICEISICEIS-v3-2012-HayashiMB #approach #towards
Schools as Organizations — A Semiotic Approach towards Making Sense of Information Technology (ECSH, MCM, MCCB), pp. 15–24.
ICEISICEIS-v3-2012-KumarS #approach #architecture #enterprise #metric #performance
Enterprise Architecture Performance Management — A Context based Approach to EA Metrics Definition (AK, PS), pp. 249–254.
ICEISICEIS-v3-2012-XavierN #approach #evaluation #hybrid #information management
A Hybrid Evaluation Approach for the Emotional State of Information Systems Users (RACX, VPdAN), pp. 45–53.
CIKMCIKM-2012-BhatiaHHS #approach #query #scalability
A scalable approach for performing proximal search for verbose patent search queries (SB, BH, QH, WSS), pp. 2603–2606.
CIKMCIKM-2012-CamposDJN #approach #higher-order #identification #named #web
GTE: a distributional second-order co-occurrence approach to improve the identification of top relevant dates in web snippets (RC, GD, AJ, CN), pp. 2035–2039.
CIKMCIKM-2012-FangS #approach #feedback #learning #recommendation
A latent pairwise preference learning approach for recommendation from implicit feedback (YF, LS), pp. 2567–2570.
CIKMCIKM-2012-IntagornL #approach #mining #probability #social
A probabilistic approach to mining geospatial knowledge from social annotations (SI, KL), pp. 1717–1721.
CIKMCIKM-2012-LiKBCL #approach #named #probability #query #recommendation
DQR: a probabilistic approach to diversified query recommendation (RL, BK, BB, RC, EL), pp. 16–25.
CIKMCIKM-2012-LongGXK #approach #design #using
A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKMCIKM-2012-OrangS #approach #correlation #nondeterminism #probability #query
A probabilistic approach to correlation queries in uncertain time series data (MO, NS), pp. 2229–2233.
CIKMCIKM-2012-ShenWLW #approach #graph #ontology
A graph-based approach for ontology population with named entities (WS, JW, PL, MW), pp. 345–354.
CIKMCIKM-2012-XieFTCMLL #approach #hybrid #performance
A hybrid approach for efficient provenance storage (YX, DF, ZT, LC, KKMR, YL, DDEL), pp. 1752–1756.
CIKMCIKM-2012-ZhaoN #approach #data type #modelling
A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
CIKMCIKM-2012-ZhuYCQ #approach #classification #feature model #graph
Graph classification: a diversified discriminative feature selection approach (YZ, JXY, HC, LQ), pp. 205–214.
ECIRECIR-2012-FergusonOLPM #microblog #retrieval
An Investigation of Term Weighting Approaches for Microblog Retrieval (PF, NO, JL, OP, KM), pp. 552–555.
ECIRECIR-2012-TamFL #approach #automation #email
Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
ECIRECIR-2012-YanZ #approach #community #recommendation
A New Approach to Answerer Recommendation in Community Question Answering Services (ZY, JZ), pp. 121–132.
ICMLICML-2012-FengXY #approach #robust
Robust PCA in High-dimension: A Deterministic Approach (JF, HX, SY), p. 237.
ICMLICML-2012-GeistSLG #approach #difference #learning
A Dantzig Selector Approach to Temporal Difference Learning (MG, BS, AL, MG), p. 49.
ICMLICML-2012-KiralyT #algebra #approach #combinator #matrix #rank
A Combinatorial Algebraic Approach for the Identifiability of Low-Rank Matrix Completion (FJK, RT), p. 100.
ICMLICML-2012-MerchanteGG #analysis #approach #linear #performance
An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
ICMLICML-2012-MohamedHG #learning
Evaluating Bayesian and L1 Approaches for Sparse Unsupervised Learning (SM, KAH, ZG), p. 91.
ICMLICML-2012-NanCLC #optimisation
Optimizing F-measure: A Tale of Two Approaches (NY, KMAC, WSL, HLC), p. 202.
ICMLICML-2012-XieHS #approach #automation #generative #learning
Artist Agent: A Reinforcement Learning Approach to Automatic Stroke Generation in Oriental Ink Painting (NX, HH, MS), p. 139.
ICMLICML-2012-ZhongG #approach #approximate #matrix
A Bayesian Approach to Approximate Joint Diagonalization of Square Matrices (MZ, MAG), p. 87.
ICPRICPR-2012-BriaMMT #approach #semistructured data
A ranking-based cascade approach for unbalanced data (AB, CM, MM, FT), pp. 3439–3442.
ICPRICPR-2012-ClausnerAP #approach #documentation #hybrid #robust #segmentation
A robust hybrid approach for text line segmentation in historical documents (CC, AA, SP), pp. 335–338.
ICPRICPR-2012-CourtyAL #approach #classification #image
A classwise supervised ordering approach for morphology based hyperspectral image classification (NC, EA, SL), pp. 1997–2000.
ICPRICPR-2012-DornellesH #algorithm #approach #image #search-based
A genetic algorithm based approach for combining binary image operators (MMD, NSTH), pp. 3184–3187.
ICPRICPR-2012-DuanHC #approach #image #segmentation
Shape prior regularized continuous max-flow approach to image segmentation (YD, WH, HC), pp. 2516–2519.
ICPRICPR-2012-DuH #adaptation #approach #linear
A discriminative linear regression approach to OCR adaptation (JD, QH), pp. 629–632.
ICPRICPR-2012-Ho #approach #detection #effectiveness
An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPRICPR-2012-KawabataK #approach #multi #using
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-LiF #approach #named #process #recognition
ARMA-HMM: A new approach for early recognition of human activity (KL, YF), pp. 1779–1782.
ICPRICPR-2012-LiuCZZ
Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking (YL, JC, HZ, HZ), pp. 898–901.
ICPRICPR-2012-MarcaciniCR #approach #clustering #learning
An active learning approach to frequent itemset-based text clustering (RMM, GNC, SOR), pp. 3529–3532.
ICPRICPR-2012-MinKCK #approach #detection #higher-order #using
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MorinDD #approach #multi #random #segmentation
A random walk approach for multiatlas-based segmentation (JPM, CD, LD), pp. 3636–3639.
ICPRICPR-2012-NegiBC #approach
Characterizing user-subgroups in Flickr Group: A block LDA based approach (SN, RB, SC), pp. 2262–2265.
ICPRICPR-2012-PazzagliaC #approach #recognition #tool support #visual notation
Visual description and recognition of mechanical tools with a silhouette-based approach (FP, CC), pp. 2549–2552.
ICPRICPR-2012-PohKA #approach #authentication #parametricity
A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
ICPRICPR-2012-RattaniMGR #approach #automation #classification
A dual-staged classification-selection approach for automated update of biometric templates (AR, GLM, EG, FR), pp. 2972–2975.
ICPRICPR-2012-San-BiagioUCCCM #approach #classification #kernel #learning #multi
A multiple kernel learning approach to multi-modal pedestrian classification (MSB, AU, MC, MC, UC, VM), pp. 2412–2415.
ICPRICPR-2012-ShaukatGWB #approach #bottom-up #detection #top-down
Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPRICPR-2012-SrikanthaSM #approach #detection #image
An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPRICPR-2012-SunXAL #approach #online #performance #video
A tracking based fast online complete video synopsis approach (LS, JX, HA, SL), pp. 1956–1959.
ICPRICPR-2012-WangJ12a #approach #novel #probability #recognition
A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
ICPRICPR-2012-WeberT #approach #documentation #performance
Symbol spotting for technical documents: An efficient template-matching approach (JW, ST), pp. 669–672.
ICPRICPR-2012-WongLTYCCBW #approach #automation #graph #locality
Automatic localization of the macula in a supervised graph-based approach with contextual superpixel features (DWKW, JL, NMT, FY, XC, CMGC, MB, TYW), pp. 2063–2066.
ICPRICPR-2012-ZhangWSD #approach #detection #effectiveness
A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPRICPR-2012-Zheng0CP #adaptation #approach
A Grassmann manifold-based domain adaptation approach (JZ, MYL, RC, PJP), pp. 2095–2099.
ICPRICPR-2012-ZhongHH #approach
A hierarchical approach to high-quality partial shape registration (MZ, TH, QH), pp. 113–116.
KDDKDD-2012-0001LHSE #approach #towards
Towards heterogeneous temporal clinical event pattern discovery: a convolutional approach (FW, NL, JH, JS, SE), pp. 453–461.
KDDKDD-2012-Davidson #clustering #comprehension #constraints
Two approaches to understanding when constraints help clustering (ID), pp. 1312–1320.
KDDKDD-2012-LiuBEWFZ #comparison #mining #scalability
Mining large-scale, sparse GPS traces for map inference: comparison of approaches (XL, JB, JE, YW, GF, YZ), pp. 669–677.
KDDKDD-2012-MaoCCLKB #approach #data mining #mining #monitoring #realtime
An integrated data mining approach to real-time clinical monitoring and deterioration warning (YM, WC, YC, CL, MK, TCB), pp. 1140–1148.
KDDKDD-2012-PatroDSWFK #approach #data-driven #how #learning #modelling #network
The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
KDDKDD-2012-ShaferRBAGF #approach #mining #monitoring #named
RainMon: an integrated approach to mining bursty timeseries monitoring data (IS, KR, VNB, YA, GRG, CF), pp. 1158–1166.
KDIRKDIR-2012-AlkouzA #approach #network #semantics #social
An Interests Discovery Approach in Social Networks based on a Semantically Enriched Bayesian Network Model (AA, SA), pp. 300–305.
KDIRKDIR-2012-CheungZZ #approach #network
A Bayesian Approach for Constructing Ensemble Neural Network (SHC, YZ, ZZ), pp. 374–377.
KDIRKDIR-2012-Dagnino #approach #grid #information management #machine learning #smarttech
Knowledge Discovery in the Smart Grid — A Machine Learning Approach (AD), pp. 366–369.
KDIRKDIR-2012-DinsoreanuMHP #approach #recommendation
A Unified Approach for Context-sensitive Recommendations (MD, FCM, OLH, RP), pp. 85–94.
KDIRKDIR-2012-FerraraT #approach #social
A Keyphrase Extraction Approach for Social Tagging Systems (FF, CT), pp. 362–365.
KDIRKDIR-2012-FleissnerF #approach
A Syntax-oriented Event Extraction Approach (SF, ACF), pp. 336–339.
KDIRKDIR-2012-GayLM #approach #constraints #mining #multi #sequence
Constraint-programming Approach for Multiset and Sequence Mining (PG, BL, JM), pp. 212–220.
KDIRKDIR-2012-MiaoLWZ #infinity #modelling #process #semantics #topic #wiki
Infinite Topic Modelling for Trend Tracking — Hierarchical Dirichlet Process Approaches with Wikipedia Semantic based Method (YM, CL, HW, LZ), pp. 35–44.
KDIRKDIR-2012-SchonebergM #documentation #identification
Contextual Approaches for Identification of Toponyms in Ancient Documents (HS, FM), pp. 163–168.
KEODKEOD-2012-BrandaoMS #approach #composition #incremental #interactive #named #navigation #ontology
I3OM — An Iterative, Incremental and Interactive Approach for Ontology Navigation based on Ontology Modularization (RB, PM, NS), pp. 265–270.
KEODKEOD-2012-FigueirasCPLJ #approach #collaboration #information retrieval
Information Retrieval in Collaborative Engineering Projects — A Vector Space Model Approach (PF, RC, LP, CL, RJG), pp. 233–238.
KEODKEOD-2012-KotowskiS #approach #library #ontology
Ontology Library — A New Approach for Storing, Searching and Discovering Ontologies (DK, DAS), pp. 271–277.
KEODKEOD-2012-LiangCI #approach #development #using
A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEODKEOD-2012-MatskanisAMMR #approach #linked data #open data #query #research
A Linked Data Approach for Querying Heterogeneous Sources — Assisting Researchers in Finding Answers to Complex Clinical Questions (NM, VA, PM, KM, JR), pp. 411–414.
KEODKEOD-2012-PereiraS #approach #design #information management #ontology #security
An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
KEODKEOD-2012-SchlenoffFB #approach #ontology #recognition #using
An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEODKEOD-2012-WicaksonoRO #approach #energy #ontology
Ontology Driven Approach for Intelligent Energy Management in Discrete Manufacturing (HW, SR, JO), pp. 108–114.
KMISKMIS-2012-Chai-ArayalertN #approach #information management #towards
Towards a Semiotic Approach to Practice-oriented Knowledge Transfer (SCA, KN), pp. 119–124.
KMISKMIS-2012-EddineDZC #requirements #towards
Towards Unifying Existing Requirements Engineering Approaches into a Unified Model (SIE, TD, NZ, PJC), pp. 311–315.
KMISKMIS-2012-LageA12a #approach #process
Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
KMISKMIS-2012-Tellioglu #information management
Approaching Knowledge Management in Organisations (HT), pp. 208–215.
KMISKMIS-2012-ThonssenL #approach #contract #semantics
Semantically Enriched Obligation Management — An Approach for Improving the Handling of Obligations Represented in Contracts (BT, JL), pp. 40–48.
KMISKMIS-2012-Vaiyavuth #approach #challenge #concept #energy #framework #how #modelling
How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
KRKR-2012-ConitzerX #approach #approximate #multi
Paradoxes of Multiple Elections: An Approximation Approach (VC, LX).
KRKR-2012-LutzSW #approach #approximate #logic
An Automata-Theoretic Approach to Uniform Interpolation and Approximation in the Description Logic EL (CL, IS, FW).
MLDMMLDM-2012-DiezC #approach #classification #multi #predict
A Multiclassifier Approach for Drill Wear Prediction (AD, AC), pp. 617–630.
MLDMMLDM-2012-EbrahimiA #approach #clustering
Semi Supervised Clustering: A Pareto Approach (JE, MSA), pp. 237–251.
MLDMMLDM-2012-Garcia-ConstantinoCNRS #approach #automation #classification #summary
A Semi-Automated Approach to Building Text Summarisation Classifiers (MGC, FC, PJN, AR, CS), pp. 495–509.
MLDMMLDM-2012-LiHO #approach #correlation #mining
Top-N Minimization Approach for Indicative Correlation Change Mining (AL, MH, YO), pp. 102–116.
MLDMMLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining #using
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-PirasGP #approach #image #retrieval
Enhancing Image Retrieval by an Exploration-Exploitation Approach (LP, GG, RP), pp. 355–365.
MLDMMLDM-2012-SinghCS #approach #hybrid #performance #recognition #using
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDMMLDM-2012-TaTB #approach #clustering #data type #using
Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDMMLDM-2012-TurkovKM #approach #concept #pattern matching #pattern recognition #problem #recognition
Bayesian Approach to the Concept Drift in the Pattern Recognition Problems (PAT, OK, VM), pp. 1–10.
RecSysRecSys-2012-AntunesCG #approach #development #recommendation
An approach to context-based recommendation in software development (BA, JC, PG), pp. 171–178.
RecSysRecSys-2012-ZhangTSWY #approach #image #recommendation #semantics
A semantic approach to recommending text advertisements for images (WZ, LT, XS, HW, YY), pp. 179–186.
SEKESEKE-2012-AlbuquerquePL #approach #case study #experience #natural language #requirements #reuse
Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKESEKE-2012-AsuncionT #approach #traceability
A Holistic Approach to Software Traceability (HUA, RNT), pp. 412–417.
SEKESEKE-2012-AvelarSP #approach #database #ontology #relational #xml
An Ontology-based Approach for Storing XML Data Into Relational Databases (FTMdA, DdBS, EKP), pp. 438–443.
SEKESEKE-2012-ChangCSZQ #approach #component #ontology #reuse
An Approach for Software Component Reusing Based on Ontological Mapping (SKC, FC, MDS, EZ, YQ), pp. 180–187.
SEKESEKE-2012-ChenCZS #analysis #approach #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
SEKESEKE-2012-DuttaUA #analysis #approach #automation #semantics #verification
Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
SEKESEKE-2012-FerreiraS #approach #bibliography
An Overview of the RSLingo Approach (DdAF, ARdS), pp. 66–69.
SEKESEKE-2012-GrunwaldM #approach #named #owl #uml
umlTUowl — A Both Generic and Vendor-specific Approach for UML to OWL Transformation (AG, TM), pp. 730–736.
SEKESEKE-2012-JlaielA #approach #novel #process #reuse #semantics #towards
Towards a Novel Semantic Approach for Process Patterns’ Capitalization and Reuse (NJ, MBA), pp. 505–510.
SEKESEKE-2012-KrollSPHGSAF #adaptation #development #empirical
Follow-the-Sun Software Development: A Controlled Experiment to Evaluate the Benefits of Adaptive and Prescriptive Approaches (JK, ARS, RP, ERH, RAG, AS, JLNA, PHLF), pp. 551–556.
SEKESEKE-2012-LeeS #approach #re-engineering
A Process-Based Approach to Improving Knowledge Sharing in Software Engineering (SBL, KS), pp. 700–705.
SEKESEKE-2012-MolleriB #automation #bibliography #perspective #process
Automated Approaches to Support Secondary Study Processes: a Systematic Review (JSM, FBVB), pp. 143–147.
SEKESEKE-2012-RakaLM #approach #generative #modelling #product line
Interoperable EMR Message Generation: A Model-Driven Software Product Line Approach (DR, SHL, MM), pp. 537–540.
SEKESEKE-2012-WangL #analysis #approach #modelling #petri net #workflow
Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
SEKESEKE-2012-YangCXZZ #approach #multi #optimisation
A New Approach to Evaluate Path Feasibility and Coverage Ratio of EFSM Based on Multi-objective Optimization (RY, ZC, BX, ZZ, WZ), pp. 470–475.
SIGIRSIGIR-2012-Bonzanini #approach #knowledge-based
A knowledge-based approach for summarising opinions (MB), p. 991.
SIGIRSIGIR-2012-DangC #approach
Diversity by proportionality: an election-based approach to search result diversification (VD, WBC), pp. 65–74.
SIGIRSIGIR-2012-Hassan #approach #modelling #web
A semi-supervised approach to modeling web search satisfaction (AH), pp. 275–284.
SIGIRSIGIR-2012-HauffH #approach #image #microblog
Placing images on the world map: a microblog-based enrichment approach (CH, GJH), pp. 691–700.
SIGIRSIGIR-2012-JiangWLAW #alias #approach #detection #learning #similarity #string #towards
Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIRSIGIR-2012-SinghPR #approach #thread
Retrieving similar discussion forum threads: a structure based approach (AS, DP, DR), pp. 135–144.
SIGIRSIGIR-2012-YeLL #approach #generative #recommendation #social
Exploring social influence for recommendation: a generative model approach (MY, XL, WCL), pp. 671–680.
SIGIRSIGIR-2012-YuanCSLM #approach #data-driven #maintenance
Category hierarchy maintenance: a data-driven approach (QY, GC, AS, CYL, NMT), pp. 791–800.
ECMFAECMFA-2012-KolovosRWMP #approach #documentation #lightweight #xml
A Lightweight Approach for Managing XML Documents with MDE Languages (DSK, LMR, JRW, NDM, RFP), pp. 118–132.
ECMFAECMFA-2012-RadjenovicPRWK #approach #plugin #simulation #uml
A Plug-in Based Approach for UML Model Simulation (AR, RFP, LMR, JW, SK), pp. 328–339.
ECMFAECMFA-2012-VotintsevaWRS #case study #comparative #industrial #modelling #multi
Comparative Study of Model-Based and Multi-Domain System Engineering Approaches for Industrial Settings (AV, PW, NR, PES), pp. 20–31.
MODELSMoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MODELSMoDELS-2012-CuadradoLG #approach #bottom-up #interactive #metamodelling
Bottom-Up Meta-Modelling: An Interactive Approach (JSC, JdL, EG), pp. 3–19.
MODELSMoDELS-2012-GonzalezC #approach #atl #generative #named #testing
ATLTest: A White-Box Test Generation Approach for ATL Transformations (CAG, JC), pp. 449–464.
MODELSMoDELS-2012-KainzBK #approach #model transformation
A Generic Approach Simplifying Model-to-Model Transformation Chains (GK, CB, AK), pp. 579–594.
MODELSMoDELS-2012-SchulzeCA #approach #modelling #uml
An Approach for Synchronizing UML Models and Narrative Text in Literate Modeling (GS, JCO, JA), pp. 595–608.
MODELSMoDELS-2012-SunGBB #approach #industrial #modelling
A Model-Driven Approach to Support Engineering Changes in Industrial Robotics Software (YS, JG, KB, NvB), pp. 368–382.
MODELSMoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MODELSMoDELS-2012-CuadradoLG #approach #bottom-up #interactive #metamodelling
Bottom-Up Meta-Modelling: An Interactive Approach (JSC, JdL, EG), pp. 3–19.
MODELSMoDELS-2012-GonzalezC #approach #atl #generative #named #testing
ATLTest: A White-Box Test Generation Approach for ATL Transformations (CAG, JC), pp. 449–464.
MODELSMoDELS-2012-KainzBK #approach #model transformation
A Generic Approach Simplifying Model-to-Model Transformation Chains (GK, CB, AK), pp. 579–594.
MODELSMoDELS-2012-SchulzeCA #approach #modelling #uml
An Approach for Synchronizing UML Models and Narrative Text in Literate Modeling (GS, JCO, JA), pp. 595–608.
MODELSMoDELS-2012-SunGBB #approach #industrial #modelling
A Model-Driven Approach to Support Engineering Changes in Industrial Robotics Software (YS, JG, KB, NvB), pp. 368–382.
TOOLSTOOLS-EUROPE-J-2011-LangerWWC12 #approach #emf #lightweight #modelling
EMF Profiles: A Lightweight Extension Approach for EMF Models (PL, KW, MW, JC), pp. 1–29.
OOPSLAOOPSLA-2012-KaliberaMJV #approach #black box #comprehension #concurrent
A black-box approach to understanding concurrency in DaCapo (TK, MM, REJ, JV), pp. 335–354.
PPDPPPDP-2012-OlartePRC #approach #automation #concurrent #constraints #linear #verification
A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
PADLPADL-2012-GoldbergW #approach #declarative #modelling
A Declarative Approach for Software Modeling (MG, GW), pp. 18–32.
PADLPADL-2012-GuzmanCCH #approach
A Segment-Swapping Approach for Executing Trapped Computations (PCdG, AC, MC, MVH), pp. 138–152.
POPLPOPL-2012-Balabonski #approach #lazy evaluation
A unified approach to fully lazy sharing (TB), pp. 469–480.
RERE-2012-Hoffmann #approach #requirements
A Pattern-based approach for analysing requirements in socio-technical systems engineering (AH), pp. 341–344.
RERE-2012-MendizabalSS #approach #elicitation #performance #requirements
Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
REFSQREFSQ-2012-WangLWZW #approach #dependence #impact analysis #simulation
A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
SACSAC-2012-ArpiniA #behaviour #enterprise #modelling #on the
On the support for the assignment of active structure and behavior in enterprise modeling approaches (RHA, JPAA), pp. 1686–1693.
SACSAC-2012-BarabucciPPV #approach #semantics
Embedding semantic annotations within texts: the FRETTA approach (GB, SP, FP, FV), pp. 658–663.
SACSAC-2012-BartschS #approach #policy
Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
SACSAC-2012-BhattiBA #approach #manycore #realtime #scheduling
A semi-partitioned real-time scheduling approach for periodic task systems on multicore platforms (MKB, CB, MA), pp. 1594–1601.
SACSAC-2012-BoulilaEFS #adaptation #approach #database #image #predict
High level adaptive fusion approach: application to land cover change prediction in satellite image databases (WB, KSE, IRF, BS), pp. 21–22.
SACSAC-2012-BromanFHA #comparison #domain-specific language #implementation
A comparison of two metacompilation approaches to implementing a complex domain-specific language (DB, PF, GH, ), pp. 1919–1921.
SACSAC-2012-CentenoA #algorithm #approach #clustering #image
Clustering approach algorithm for image interpolation (TMC, MTA), pp. 56–57.
SACSAC-2012-ChanvilaiHNTO #approach #constraints #diagrams #ocl
Goal-oriented approach to creating class diagrams with OCL constraints (SC, KH, HN, YT, AO), pp. 1051–1056.
SACSAC-2012-CosciaCMZ #approach #development #web #web service
An approach to improve code-first web services discoverability at development time (JLOC, MC, CM, AZ), pp. 638–643.
SACSAC-2012-FerrariGT #approach #clustering #requirements #specification
A clustering-based approach for discovering flaws in requirements specifications (AF, SG, GT), pp. 1043–1050.
SACSAC-2012-FkiJST #approach #composition #flexibility #using
A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
SACSAC-2012-FreitasCO #approach #linked data #open data #semantics #web
A distributional approach for terminological semantic search on the Linked Data Web (AF, EC, SO), pp. 384–391.
SACSAC-2012-GuidaraCF #approach #semantics
Intention based semantic approach for service sourcing (IG, TC, KF), pp. 401–402.
SACSAC-2012-LiuCZ #approach #architecture #petri net #self #towards
Towards a colored reflective Petri-net approach to model self-evolving service-oriented architectures (YL, WC, BZ), pp. 1858–1865.
SACSAC-2012-MalaverriML #approach #quality
A provenance approach to assess the quality of geospatial data (JGM, CBM, RCL), pp. 2043–2044.
SACSAC-2012-SenarathneW #approach #coordination #multi
A two-level approach for multi-robot coordinated exploration of unstructured environments (PGCNS, DW), pp. 274–279.
SACSAC-2012-TaherHP #adaptation #approach #web #web service
A three step based approach for Web Service adaptation (YT, WJvdH, MP), pp. 1992–1993.
FSEFSE-2012-ManiCSD #approach #debugging #named #summary
AUSUM: approach for unsupervised bug report summarization (SM, RC, VSS, AD), p. 11.
FSEFSE-2012-NguyenNNN #approach #debugging #multi
Multi-layered approach for recovering links between bug reports and fixes (ATN, TTN, HAN, TNN), p. 63.
ICSEICSE-2012-AstromskisJM #approach #modelling #named
Egidio: A non-invasive approach for synthesizing organizational models (SA, AJ, ARM), pp. 1465–1466.
ICSEICSE-2012-BalasubramaniamJKMN #approach #automation #constraints #generative #performance #theorem proving
An automated approach to generating efficient constraint solvers (DB, CJ, LK, IM, PN), pp. 661–671.
ICSEICSE-2012-BavotaLFOZ #approach #education #project management #re-engineering
Teaching software engineering and software project management: An integrated and practical approach (GB, ADL, FF, RO, CZ), pp. 1155–1164.
ICSEICSE-2012-Khoshnevis #approach #product line #variability
An approach to variability management in service-oriented product lines (SK), pp. 1483–1486.
ICSEICSE-2012-KimKKJ #approach #case study #industrial #testing #using
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
ICSEICSE-2012-MengWZM #approach #evolution #framework #identification
A history-based matching approach to identification of framework evolution (SM, XW, LZ, HM), pp. 353–363.
ICSEICSE-2012-MirakhorliSCC #approach #automation #quality #traceability
A tactic-centric approach for automating traceability of quality concerns (MM, YS, JCH, ), pp. 639–649.
ICSEICSE-2012-SongHLSLD #approach #model checking #multi #probability
Analyzing multi-agent systems with probabilistic model checking approach (SS, JH, YL, JS, HfL, JSD), pp. 1337–1340.
ICSEICSE-2012-Souza #adaptation #approach #design
A requirements-based approach for the design of adaptive systems (VESS), pp. 1635–1637.
ICSEICSE-2012-WagnerLHKTPSGS #approach #assessment #modelling #quality
The Quamoco product quality modelling and assessment approach (SW, KL, LH, MK, AT, RP, AS, AG, JS), pp. 1133–1142.
LDTALDTA-2012-Voigtlander #bidirectional #programming language
Programming language approaches to bidirectional transformation (JV), p. 1.
SLESLE-2012-BettiniSVC #implementation #tool support #type system #xtext
Approaches and Tools for Implementing Type Systems in Xtext (LB, DS, MV, SC), pp. 392–412.
SLESLE-2012-GarciaDA #approach #automation #co-evolution #model transformation
Model Transformation Co-evolution: A Semi-automatic Approach (JG, OD, MA), pp. 144–163.
PLEASEPLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards #using
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
SPLCSPLC-2012-DietrichTSL #approach #linux #robust #variability
A robust approach for variability extraction from the Linux build system (CD, RT, WSP, DL), pp. 21–30.
ASPLOSASPLOS-2012-RadojkovicCMVPCNV #approach #parallel #statistics #thread
Optimal task assignment in multithreaded processors: a statistical approach (PR, VC, MM, JV, AP, FJC, MN, MV), pp. 235–248.
HPCAHPCA-2012-AhnCK #approach #architecture #network #scalability
Network within a network approach to create a scalable high-radix router microarchitecture (JHA, SC, JK), pp. 455–466.
PPoPPPPoPP-2012-KwonJEM #approach #clustering #hybrid
A hybrid approach of OpenMP for clusters (OK, FJ, RE, SPM), pp. 75–84.
CSLCSL-2012-AltenkirchR #approach
A Syntactical Approach to Weak ω-Groupoids (TA, OR), pp. 16–30.
CSLCSL-2012-ChaudhuriHM #approach #calculus
A Systematic Approach to Canonicity in the Classical Sequent Calculus (KC, SH, DM), pp. 183–197.
ICLPICLP-2012-0002KZPM #approach #data access #logic programming #rdf
A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
ICLPICLP-2012-Peano #approach
An ASP Approach for the Optimal Placement of the Isolation Valves in a Water Distribution System (AP), pp. 464–468.
ICSTICST-2012-AmraniLSCDVTC #approach #model transformation #verification
A Tridimensional Approach for Studying the Formal Verification of Model Transformations (MA, LL, GMKS, BC, JD, HV, YLT, JRC), pp. 921–928.
ICSTICST-2012-BekrarBGM #approach #fuzzing
A Taint Based Approach for Smart Fuzzing (SB, CB, RG, LM), pp. 818–825.
ICSTICST-2012-BlancoTS #approach #evaluation #interactive #test coverage #testing
Test Adequacy Evaluation for the User-database Interaction: A Specification-Based Approach (RB, JT, RVS), pp. 71–80.
ICSTICST-2012-FilhoB #approach #modelling #testing
An Integrated Model-Driven Approach for Mechatronic Systems Testing (RSSF, CJB), pp. 447–456.
ICSTICST-2012-KimKR #approach #distributed #empirical #evaluation #scalability #testing
A Scalable Distributed Concolic Testing Approach: An Empirical Evaluation (MK, YK, GR), pp. 340–349.
ICSTICST-2012-MarbackDE #approach #effectiveness #php #testing #web
An Effective Regression Testing Approach for PHP Web Applications (AM, HD, NE), pp. 221–230.
ICSTICST-2012-MarcoLA #approach #re-engineering
Property-Driven Software Engineering Approach (ADM, FL, GDA), pp. 966–967.
ICSTICST-2012-ParkVH #approach #concurrent #debugging
A Unified Approach for Localizing Non-deadlock Concurrency Bugs (SP, RWV, MJH), pp. 51–60.
ICTSSICTSS-2012-StrugS #approach #machine learning #mutation testing #testing
Machine Learning Approach in Mutation Testing (JS, BS), pp. 200–214.
ISSTAISSTA-2012-YuL #approach #data flow #dependence #named #parallel #profiling
Multi-slicing: a compiler-supported parallel approach to data dependence profiling (HY, ZL), pp. 23–33.
ISSTAISSTA-2012-ZhaiXCT #approach #named #parallel #thread
CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications (KZ, BX, WKC, THT), pp. 221–231.
SMTSMT-2012-MichelHGH #approach #automation #smt
An SMT-based approach to automated configuration (RM, AH, VG, PH), pp. 109–119.
CBSECBSE-2011-PiresDPFM #approach #aspect-oriented #evolution
Software evolution in AOSD: a MDA-based approach (PFP, FCD, MP, LF, ÉM), pp. 193–198.
ECSAECSA-2011-AdmodisastroK #analysis #approach #architecture #black box #development
An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
ECSAECSA-2011-DeitersR #approach #architecture #composition #design
A Constructive Approach to Compositional Architecture Design (CD, AR), pp. 75–82.
ECSAECSA-2011-DwivediEFGS #approach #architecture
An Architectural Approach to End User Orchestrations (VD, PVE, JMF, DG, BRS), pp. 370–378.
ECSAECSA-2011-EbadA #comparison #framework
Software Packaging Approaches — A Comparison Framework (SAE, MAA), pp. 438–446.
ECSAECSA-2011-KrichenHZJ #approach #configuration management #modelling #towards
Towards a Model-Based Approach for Reconfigurable DRE Systems (FK, BH, BZ, MJ), pp. 295–302.
WICSAWICSA-2011-BalasubramaniamSJKMN #approach #architecture #constraints #generative #named #performance #theorem proving
Dominion: An Architecture-Driven Approach to Generating Efficient Constraint Solvers (DB, LdS, CJ, LK, IM, PN), pp. 228–231.
WICSAWICSA-2011-Bashardoust-TajaliRC #bibliography #challenge #modelling #variability
Challenges of Variability in Model-Driven and Transformational Approaches: A Systematic Survey (SBT, VDR, JPC), pp. 294–301.
WICSAWICSA-2011-Dobrica #analysis #architecture #integration #modelling #quality
Exploring Approaches of Integration Software Architecture Modeling with Quality Analysis Models (LD), pp. 113–122.
WICSAWICSA-2011-WeynsMHB #approach #architecture #online #product line
An Architectural Approach to Support Online Updates of Software Product Lines (DW, BM, AH, NB), pp. 204–213.
ASEASE-2011-ChakrabortyS #approach #framework #towards
Towards an approach and framework for test-execution plan derivation (SSC, VS), pp. 488–491.
ASEASE-2011-ChenHX #approach #evaluation #machine learning #process
Software process evaluation: A machine learning approach (NC, SCHH, XX), pp. 333–342.
ASEASE-2011-FilieriGLM #adaptation #approach #reliability #requirements #self
Self-adaptive software meets control theory: A preliminary approach supporting reliability requirements (AF, CG, AL, MM), pp. 283–292.
ASEASE-2011-GethersKDP #adaptation #approach #impact analysis #source code
An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
ASEASE-2011-KehrerKT #approach #difference #rule-based #semantics #version control
A rule-based approach to the semantic lifting of model differences in the context of model versioning (TK, UK, GT), pp. 163–172.
ASEASE-2011-NguyenNANN #approach #debugging #topic
A topic-based approach for narrowing the search space of buggy files from a bug report (ATN, TTN, JMAK, HVN, TNN), pp. 263–272.
ASEASE-2011-PohlLP #algorithm #analysis #automation #comparison #feature model #modelling #performance
A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models (RP, KL, KP), pp. 313–322.
CASECASE-2011-CostantinoDFFMSU #approach #design #fuzzy #network #programming
A fuzzy programming approach for the strategic design of distribution networks (NC, MD, MF, MPF, AMM, FS, WU), pp. 66–71.
CASECASE-2011-FarautPN #behaviour #equivalence #multi
Equivalence of behaviors between centralized and multi-model approaches (GF, LP, ÉN), pp. 32–38.
CASECASE-2011-MalkiM #approach #modelling
Boolean temporal model-based approach for the diagnosis of Discrete Event Systems (NM, MSM), pp. 175–180.
CASECASE-2011-MeikeR #energy #industrial
Recuperated energy savings potential and approaches in industrial robotics (DM, LR), pp. 299–303.
CASECASE-2011-MikosFG #agile #approach #distributed #injection #process #reasoning
A distributed system for rapid determination of nonconformance causes and solutions for the thermoplastic injection molding process: A Case-Based Reasoning Agents approach (WLM, JCEF, FGCG), pp. 755–760.
CASECASE-2011-MovafaghpourM #approach #linear #probability #programming
A linear programming approach for probabilistic robot path planning with missing information of outcomes (MAM, EM), pp. 126–132.
CASECASE-2011-NaibR #approach #automation #constraints
A P2P approach for automating seamless connectivity given intermittent bandwidth constraints (VVBN, SR), pp. 637–641.
CASECASE-2011-NishiYI #approach #generative #problem #scheduling
Column generation approach to ship scheduling problems for international crude oil transportation (TN, SY, TI), pp. 468–473.
CASECASE-2011-SharviaP #approach #assessment #named #safety #towards
IACoB-SA: An approach towards integrated safety assessment (SS, YP), pp. 220–225.
CASECASE-2011-TalpasanuK #analysis #approach
Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
CASECASE-2011-Tanaka #approach #problem #scheduling
A unified approach for the scheduling problem with rejection (ST), pp. 369–374.
CASECASE-2011-Vogel-HeuserS #approach #automation #modelling #usability
A methodological approach to evaluate the benefit and usability of different modeling notations for open loop control in automation systems (BVH, KS), pp. 474–481.
CASECASE-2011-WengerMHHZ #approach #development
Utilizing IEC 61499 in an MDA control application development approach (MW, MMM, IH, RH, AZ), pp. 495–500.
CASECASE-2011-YonezawaKZIHSIYF #approach #experience #performance
Long-term operational experience with a robot cell production system controlled by low carbon-footprint Senju (thousand-handed) Kannon Model robots and an approach to improving operating efficiency (HY, HK, MZ, KI, NH, YS, MY, TF), pp. 291–298.
DACDAC-2011-ChangS #approach
Plugging versus logging: a new approach to write buffer management for solid-state disks (LPC, YCS), pp. 23–28.
DACDAC-2011-KadryMGAK #approach #challenge #design #effectiveness #verification
Facing the challenge of new design features: an effective verification approach (WK, RM, AG, EA, CAK), pp. 842–847.
DACDAC-2011-OnaissiTLN #analysis #approach #performance
A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
DATEDATE-2011-FuWT #approach #manycore #performance #simulation
A shared-variable-based synchronization approach to efficient cache coherence simulation for multi-core systems (CYF, MHW, RST), pp. 347–352.
DATEDATE-2011-GraupnerJW #approach #design #generative #layout #optimisation
Generator based approach for analog circuit and layout design and optimization (AG, RJ, RW), pp. 1675–1680.
DATEDATE-2011-KlobedanzK0 #approach #configuration management #fault tolerance #network
A reconfiguration approach for fault-tolerant FlexRay networks (KK, AK, WM), pp. 82–87.
DATEDATE-2011-RemondNBM #approach #design #empirical #process #simulation
Mathematical approach based on a “Design of Experiment” to simulate process variations (ER, EN, CB, RM), pp. 1486–1490.
DATEDATE-2011-RinaudoGCMP #approach #design #energy #performance #power management
Moving to Green ICT: From stand-alone power-aware IC design to an integrated approach to energy efficient design for heterogeneous electronic systems (SR, GG, AC, AM, MP), pp. 1127–1128.
DATEDATE-2011-WangLH #approach #embedded
An approach to improve accuracy of source-level TLMs of embedded software (ZW, KL, AH), pp. 216–221.
DATEDATE-2011-WangWT #approach #modelling #named #performance #scheduling #simulation
DOM: A Data-dependency-Oriented Modeling approach for efficient simulation of OS preemptive scheduling (PCW, MHW, RST), pp. 335–340.
DATEDATE-2011-WelpK #approach #markov #process #synthesis
An approach for dynamic selection of synthesis transformations based on Markov Decision Processes (TW, AK), pp. 1533–1536.
DRRDRR-2011-PengSGS #approach #documentation #using
Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
HTHT-2011-StewartSN #approach #detection #social #social media
A transfer approach to detecting disease reporting events in blog social media (AS, MS, WN), pp. 271–280.
HTHT-2011-WoenselCT #approach #on the fly
A generic approach for on-the-fly adding of context-aware features to existing websites (WVW, SC, ODT), pp. 143–152.
ICDARICDAR-2011-AbidiSK #approach #library #retrieval #towards #word
Towards Searchable Digital Urdu Libraries — A Word Spotting Based Retrieval Approach (AA, IS, KK), pp. 1344–1348.
ICDARICDAR-2011-AlaeiNP11a #algorithm #approach #documentation
A New Text-Line Alignment Approach Based on Piece-Wise Painting Algorithm for Handwritten Documents (AA, PN, UP), pp. 324–328.
ICDARICDAR-2011-BakerSSS #analysis #documentation
Comparing Approaches to Mathematical Document Analysis from PDF (JBB, APS, VS, MS), pp. 463–467.
ICDARICDAR-2011-BoumaizaT #approach #novel #recognition #representation #word
A Novel Approach for Graphics Recognition Based on Galois Lattice and Bag of Words Representation (AB, ST), pp. 829–833.
ICDARICDAR-2011-ChaabouniBKAA11a #feature model #identification #online
Combining of Off-line and On-line Feature Extraction Approaches for Writer Identification (AC, HB, MK, AMA, HEA), pp. 1299–1303.
ICDARICDAR-2011-HassanGHCG #approach
Searching OCR’ed Text: An LDA Based Approach (EH, VG, SKMH, SC, MG), pp. 1210–1214.
ICDARICDAR-2011-KluznerTCW #adaptation #approach #hybrid
Hybrid Approach to Adaptive OCR for Historical Books (VK, AT, DC, EW), pp. 900–904.
ICDARICDAR-2011-MalleronE #analysis #approach #documentation
A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
ICDARICDAR-2011-MessaoudAAM #approach
New Binarization Approach Based on Text Block Extraction (IBM, HA, HEA, VM), pp. 1205–1209.
ICDARICDAR-2011-NguyenCO #approach #classification
Bags of Strokes Based Approach for Classification and Indexing of Drop Caps (TTHN, MC, JMO), pp. 349–353.
ICDARICDAR-2011-ParodiGB #approach #feature model #invariant #verification
A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification (MP, JCG, AB), pp. 1289–1293.
ICDARICDAR-2011-Saund #approach #graph #image #maintenance
A Graph Lattice Approach to Maintaining Dense Collections of Subgraphs as Image Features (ES), pp. 1069–1074.
ICDARICDAR-2011-ShahabSD #approach #recognition
Bayesian Approach to Photo Time-Stamp Recognition (AS, FS, AD), pp. 1039–1043.
ICDARICDAR-2011-UchidaSKF #approach #detection #towards
A Keypoint-Based Approach toward Scenery Character Detection (SU, YS, YK, YF), pp. 819–823.
ICDARICDAR-2011-VajdaJF #approach #learning
A Semi-supervised Ensemble Learning Approach for Character Labeling with Minimal Human Effort (SV, AJ, GAF), pp. 259–263.
ICDARICDAR-2011-YamazoeEYT #approach #finite #recognition #transducer
Hypothesis Preservation Approach to Scene Text Recognition with Weighted Finite-State Transducer (TY, ME, TY, KT), pp. 359–363.
SIGMODSIGMOD-2011-BergamaschiDGLV #approach #database #keyword #metadata #relational
Keyword search over relational databases: a metadata approach (SB, ED, FG, RTL, YV), pp. 565–576.
SIGMODSIGMOD-2011-HanLMHY #approach #sequence
A new approach for processing ranked subsequence matching based on ranked union (WSH, JL, YSM, SwH, HY), pp. 457–468.
SIGMODSIGMOD-2011-KonstantinidisA #approach #graph #query #scalability
Scalable query rewriting: a graph-based approach (GK, JLA), pp. 97–108.
SIGMODSIGMOD-2011-PoundPT #approach #mining #web
Facet discovery for structured web search: a query-log mining approach (JP, SP, PT), pp. 169–180.
SIGMODSIGMOD-2011-XuKQWZ #approach #distributed #parallel
A Hadoop based distributed loading approach to parallel data warehouses (YX, PK, YQ, JW, KKZ), pp. 1091–1100.
VLDBVLDB-2011-BorisovB #approach #declarative #detection #towards
Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
VLDBVLDB-2011-OgasawaraOVDPM #algebra #approach #workflow
An Algebraic Approach for Data-Centric Scientific Workflows (ESO, DdO, PV, JD, FP, MM), pp. 1328–1339.
VLDBVLDB-2012-GaoJZYJW11 #approach #graph #relational #scalability
Relational Approach for Shortest Path Discovery over Large Graphs (JG, RJ, JZ, JXY, XJ, TW), pp. 358–369.
VLDBVLDB-2012-GoyalBL11 #approach #data-driven #social
A Data-Based Approach to Social Influence Maximization (AG, FB, LVSL), pp. 73–84.
VLDBVLDB-2012-KonigDCN11 #approach #estimation #robust #statistics #towards
A Statistical Approach Towards Robust Progress Estimation (ACK, BD, SC, VRN), pp. 382–393.
CSEETCSEET-2011-Georgas #approach #community #development #education #re-engineering #student
Software development as service to the student community: An experiential and high student involvement approach to software engineering education (JCG), pp. 434–438.
ITiCSEITiCSE-2011-Mahmoud11a #approach #mobile #programming
A mobile web-based approach to introductory programming (QHM), p. 334.
ITiCSEITiCSE-2011-RussellMD #approach #learning #student
A contextualized project-based approach for improving student engagement and learning in AI courses (IR, ZM, JD), p. 368.
FASEFASE-2011-GattiBC #approach #development
A Step-Wise Approach for Integrating QoS throughout Software Development (SG, EB, CC), pp. 217–231.
FoSSaCSFoSSaCS-2011-BertrandSJK #approach #automaton #game studies
A Game Approach to Determinize Timed Automata (NB, AS, TJ, MK), pp. 245–259.
ICPCICPC-2011-BettenburgAHS #approach #lightweight #semistructured data
A Lightweight Approach to Uncover Technical Artifacts in Unstructured Data (NB, BA, AEH, MS), pp. 185–188.
ICPCICPC-2011-KeivanlooRC #approach #clone detection #hybrid #named #realtime
SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
ICPCICPC-2011-SamaraweeraSQ #approach #programming #towards
Programming from the Reader’s Perspective: Toward an Expectations Approach (GS, MS, JQ), pp. 211–212.
ICPCICPC-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach (MFZ, CKR), pp. 266–269.
ICSMEICSM-2011-CarlsonDD #approach #case study #clustering #industrial #testing
A clustering approach to improving test case prioritization: An industrial case study (RC, HD, AD), pp. 382–391.
ICSMEICSM-2011-HassaineBGHA #approach #co-evolution
A seismology-inspired approach to study change propagation (SH, FB, YGG, SH, GA), pp. 53–62.
ICSMEICSM-2011-HuangLZXW #approach #novel #testing
A novel approach to regression test selection for J2EE applications (SH, ZJL, JZ, YX, WW), pp. 13–22.
SCAMSCAM-2011-AvanciniC #approach #search-based #security #testing #web
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
SCAMSCAM-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
WCREWCRE-2011-FokinDCT #c++ #decompiler #named
SmartDec: Approaching C++ Decompilation (AF, ED, AC, KT), pp. 347–356.
WCREWCRE-2011-HigoUNK #approach #clone detection #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-KhomhCZH #approach #case study #evaluation
An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox (FK, BC, YZ, AEH), pp. 261–270.
PEPMPEPM-2011-Consel #approach #development #named
DiaSuite: a paradigm-oriented software development approach (CC), pp. 77–78.
STOCSTOC-2011-MahdianY #approach #online #random
Online bipartite matching with random arrivals: an approach based on strongly factor-revealing LPs (MM, QY), pp. 597–606.
DLTDLT-J-2010-BrodaMMR11 #approach #automaton #combinator #complexity #on the
On the Average State Complexity of Partial derivative Automata: an analytic Combinatorics Approach (SB, AM, NM, RR), pp. 1593–1606.
CIAACIAA-2011-CastanoC #approach #satisfiability
Variable and Clause Ordering in an FSA Approach to Propositional Satisfiability (JMC, RC), pp. 76–87.
CIAACIAA-2011-PajicPP #approach #finite #information management #transducer
Information Extraction from Semi-structured Resources: A Two-Phase Finite State Transducers Approach (VP, GPL, MP), pp. 282–289.
DLTDLT-2011-MenibusS #approach #automaton #self
Self-organization in Cellular Automata: A Particle-Based Approach (BHdM, MS), pp. 251–263.
DLTDLT-2011-Yoshinaka #concept #context-free grammar #learning #towards
Towards Dual Approaches for Learning Context-Free Grammars Based on Syntactic Concept Lattices (RY), pp. 429–440.
ICALPICALP-v2-2011-Cord-LandwehrDFHKKKKMHRSWWW #algorithm #approach #convergence #mobile
A New Approach for Analyzing Convergence Algorithms for Mobile Robots (ACL, BD, MF, MH, BK, AK, PK, SK, MM, FMadH, CR, KS, DW, CW, DW), pp. 650–661.
FMFM-2011-RozierV #approach #encoding #ltl #multi #satisfiability
A Multi-encoding Approach for LTL Symbolic Satisfiability Checking (KYR, MYV), pp. 417–431.
SEFMSEFM-2011-MadeiraFMB #approach #hybrid #specification
Hybrid Specification of Reactive Systems: An Institutional Approach (AM, JMF, MAM, LSB), pp. 269–285.
SEFMSEFM-2011-TongSJ #approach #formal method #information management #process
A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries (JT, SAS, AEJ), pp. 486–501.
CEFPCEFP-2011-SlodicakMN #category theory #functional #programming
Some New Approaches in Functional Programming Based on Categories (VS, PM, VN), pp. 517–532.
CHICHI-2011-JayatilakaBSG #approach #visual notation
Evaluating a pattern-based visual support approach for humanitarian landmine clearance (LGJ, LFB, JS, KZG), pp. 453–462.
CHICHI-2011-MadathilG #approach #testing #usability
Synchronous remote usability testing: a new approach facilitated by virtual worlds (KCM, JSG), pp. 2225–2234.
CHICHI-2011-MarshallMRKD #approach #how #interface #multi
Rethinking “multi-user”: an in-the-wild study of how groups approach a walk-up-and-use tabletop interface (PM, RM, YR, SK, MD), pp. 3033–3042.
CHICHI-2011-MatthewsWMY #approach #collaboration #design #tool support
Collaboration personas: a new approach to designing workplace collaboration tools (TM, SW, TPM, SY), pp. 2247–2256.
CSCWCSCW-2011-AspinR #3d #approach #gpu #multi
A GPU based, projective multi-texturing approach to reconstructing the 3D human form for application in tele-presence (RAA, DJR), pp. 105–112.
CSCWCSCW-2011-ZhaoLLG #approach #game studies #hybrid #internet #realtime #video
Back to the future: a hybrid approach to transparent sharing of video games over the internet in real time (SZ, DL, TL, NG), pp. 187–196.
HCIDHM-2011-WangPBN #approach
A Biomechanical Approach for Evaluating Motion Related Discomfort : Illustration by an Application to Pedal Clutching Movement (XW, RP, NKB, JN), pp. 210–219.
HCIDHM-2011-WortelenL #approach #automation #behaviour #estimation
Less Driving While Driving? An Approach for the Estimation of Effects of Future Vehicle Automation Systems on Driver Behavior (BW, AL), pp. 523–532.
HCIDUXU-v1-2011-BeccariO #approach #experience #user interface
A Philosophical Approach about User Experience Methodology (MNB, TLO), pp. 13–22.
HCIDUXU-v1-2011-ChandersekaranS #approach #enterprise #multi
A Multi-tiered Approach to Enterprise Support Services (CC, WRS), pp. 388–397.
HCIDUXU-v1-2011-Hsu11a #approach #design #education #industrial
Training Designers of Real-World Products: Scenario Approach in Industrial Design Curriculum (YCH), pp. 432–441.
HCIDUXU-v1-2011-KimPHE #approach #case study #design #experience
The Essence of Enjoyable Experiences: The Human Needs — A Psychological Needs-Driven Experience Design Approach (JK, SP, MH, KE), pp. 77–83.
HCIDUXU-v1-2011-Liem #approach #concept #design #development #user interface
A Culturally Driven Approach for the Development of Innovative User Interface Design Concepts (AL), pp. 84–93.
HCIDUXU-v1-2011-SimpsonP #exclamation #experience #user interface
Approaching Warp Speed!: Examining the User Experience in the Age of 4G (QS, SP), pp. 658–667.
HCIDUXU-v2-2011-KimU #collaboration #design #human-computer #interactive #web
Peru Digital: Approaching Interactive Digital Storytelling and Collaborative Interactive Web Design through Digital Ethnography, HCI, and Digital Media (SJK, NMU), pp. 20–28.
HCIDUXU-v2-2011-KomogortsevTMCH #approach #automation #identification #named #usability
EMA: Automated Eye-Movement-Driven Approach for Identification of Usability Issues (OVK, DET, CJM, JC, CH), pp. 459–468.
HCIDUXU-v2-2011-ObermeierBSV #aspect-oriented #automation #evaluation #modelling #object-oriented #programming #usability
Fundamental Aspects Concerning the Usability Evaluation of Model-Driven Object Oriented Programming Approaches in Machine and Plant Automation (MO, SB, KS, BVH), pp. 497–506.
HCIDUXU-v2-2011-Sauter #approach #interface #mobile #towards
Implied Aesthetics: A Sensor-Based Approach towards Mobile Interfaces (DS), pp. 645–654.
HCIDUXU-v2-2011-UangLC #approach #axiom #design
A Product Design Approach by Integrating Axiomatic Design and TRIZ (STU, CLL, MC), pp. 225–233.
HCIHCD-2011-ChoiS #approach #design #implementation #process
A Design-Supporting Tool for Implementing the Learning-Based Approach: Accommodating Users’ Domain Knowledge into Design Processes (JMC, KS), pp. 369–378.
HCIHCD-2011-DaimaruK #approach #design
A Pattern Approach for Designing Application (KD, BK), pp. 22–27.
HCIHCD-2011-GoreHHBM #approach #modelling #performance
A Methodical Approach for Developing Valid Human Performance Models of Flight Deck Operations (BFG, BLH, NH, DLB, EM), pp. 379–388.
HCIHCD-2011-KandaK #communication #people #tool support
Holistic Prosthetic Approaches to the Hearing Handicapped People: Communication Tools in Various Situations (KK, TK), pp. 313–320.
HCIHCI-DDA-2011-PeissnerSS #adaptation #approach #design pattern #user interface
A Design Patterns Approach to Adaptive User Interfaces for Users with Special Needs (MP, AS, DS), pp. 268–277.
HCIHCI-ITE-2011-CarrinoTMKI #approach #interface #multimodal
Head-Computer Interface: A Multimodal Approach to Navigate through Real and Virtual Worlds (FC, JT, EM, OAK, RI), pp. 222–230.
HCIHCI-MIIE-2011-BlockLT #approach #social #social media
A Context Centric Approach to Utilize Social Media Services on Public Terminals (MB, JL, ST), pp. 474–482.
HCIHCI-MIIE-2011-CarrinoMKI #approach #hybrid #interactive #named #towards
ARAMIS: Toward a Hybrid Approach for Human- Environment Interaction (SC, EM, OAK, RI), pp. 165–174.
HCIHCI-MIIE-2011-KarthikP #adaptation #approach #classification #email #machine learning
Adaptive Machine Learning Approach for Emotional Email Classification (KK, RP), pp. 552–558.
HCIHCI-MIIE-2011-OehlSTHP #approach #detection #human-computer #interactive
Improving Human-Machine Interaction — A Non Invasive Approach to Detect Emotions in Car Drivers (MO, FWS, TKT, RH, HRP), pp. 577–585.
HCIHCI-MIIE-2011-RosnerFOLHF #approach #empirical
Intentionality in Interacting with Companion Systems — An Empirical Approach (DFR, RF, MO, JL, MH, JF), pp. 593–602.
HCIHCI-UA-2011-HsuC #approach #behaviour #navigation
Associating Learners’ Cognitive Style with Their Navigation Behaviors: A Data-Mining Approach (YCH, SYC), pp. 27–34.
HCIHCI-UA-2011-JohnsonLTS #approach #comprehension #monitoring #towards
Toward an Understanding of a Computerized Monitoring System Failure: An Interpretive Approach (NJ, YL, FT, SS), pp. 336–345.
HCIHCI-UA-2011-OctaviaBCQL #3d #adaptation #collaboration #game studies #interactive #modelling #towards
User Modeling Approaches towards Adaptation of Users’ Roles to Improve Group Interaction in Collaborative 3D Games (JRO, AB, KC, PQ, KL), pp. 668–677.
HCIHIMI-v1-2011-Pavel11a #approach #composition #design #protocol #security
An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
HCIHIMI-v1-2011-PavelJ #approach #authentication #design #logic #protocol
Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
HCIHIMI-v1-2011-PlumbaumSKA #approach #semantics #user interface
My Personal User Interface: A Semantic User-Centric Approach to Manage and Share User Information (TP, KS, MK, SA), pp. 585–593.
HCIHIMI-v1-2011-TokosumiT #approach #multi #ontology
Ontological Approach to Aesthetic Feelings: A Multilingual Case of Cutism (AT, FT), pp. 161–164.
HCIHIMI-v2-2011-LuC #approach #collaboration #design #information management
From Personal to Collaborative Information Management: A Design Science’s Approach (ML, PC), pp. 36–45.
HCIHIMI-v2-2011-Rebello #approach
Macroergonomics in Air Traffic Control — The Approach of a New System (LHBR), pp. 516–525.
HCIOCSC-2011-PujariK #approach #machine learning #predict #recommendation
A Supervised Machine Learning Link Prediction Approach for Tag Recommendation (MP, RK), pp. 336–344.
VISSOFTVISSOFT-2011-NovaisLCPM #approach #difference #evolution #interactive #visual notation
An interactive differential and temporal approach to visually analyze software evolution (RLN, CANL, GdFC, RMSP, MGM), pp. 1–4.
VISSOFTVISSOFT-2011-WirthPS #approach #behaviour #multi #visualisation
A multi-level approach for visualization and exploration of reactive program behavior (CW, HP, RS), pp. 1–4.
AdaEuropeAdaEurope-2011-CarnevaliLPV #approach #design #formal method #scheduling #verification
A Formal Approach to Design and Verification of Two-Level Hierarchical Scheduling Systems (LC, GL, AP, EV), pp. 118–131.
CAiSECAiSE-2011-AwadGTW #approach #process #synthesis
An Iterative Approach for Business Process Template Synthesis from Compliance Rules (AA, RG, JT, MW), pp. 406–421.
CAiSECAiSE-2011-CaresF #approach #metamodelling
A Metamodelling Approach for i* Model Translations (CC, XF), pp. 337–351.
CAiSECAiSE-2011-SmirnovRW #abstraction #approach #process #semantics
A Semantic Approach for Business Process Model Abstraction (SS, HAR, MW), pp. 497–511.
CAiSECAiSE-2011-WeidlichMW #approach #process #variability
A Foundational Approach for Managing Process Variability (MW, JM, MW), pp. 267–282.
ICEISICEIS-J-2011-BrasilSFSC11a #approach #multi #optimisation #release planning #requirements
A Multiobjective Optimization Approach to the Software Release Planning with Undefined Number of Releases and Interdependent Requirements (MMAB, TGNdS, FGdF, JTdS, MIC), pp. 300–314.
ICEISICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system #using
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEISICEIS-J-2011-PhillisK #analysis #approach
A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management #using
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-Cuzzocrea #approach #information management #mining
A UML-extended Approach for Mining OLAP Data Cubes in Complex Knowledge Discovery Environments (AC), pp. 281–289.
ICEISICEIS-v1-2011-LezochePA #approach #concept #information management
Conceptualisation Approach for Cooperative Information Systems Interoperability (ML, HP, AA), pp. 101–110.
ICEISICEIS-v2-2011-FronzaSSV #approach #predict #towards
Toward a Non Invasive Control of Applications — A Biomedical Approach to Failure Prediction (IF, AS, GS, JV), pp. 83–91.
ICEISICEIS-v2-2011-MarquezCCS #approach #distributed #multi #social
A Distributed Agency Methodology Applied to Complex Social Systems — A Multi-Dimensional Approach (BYM, MCP, JRC, EDS), pp. 204–209.
ICEISICEIS-v3-2011-BoudebousBBS #approach #design #distributed #industrial #process
Design Approach of Distributed Systems for the Control of Industrial Process (DB, JB, SB, NS), pp. 157–164.
ICEISICEIS-v3-2011-ChakirF #approach #modelling #multi #variability
A Model Driven Approach Supporting Multi-view Services Modeling and Variability Management (BC, MF), pp. 247–252.
ICEISICEIS-v3-2011-Garcia-GarciaECA #approach #generative #named #taxonomy
NDT-Glossary — A MDE Approach for Glossary Generation (JAGG, MJEC, CRC, MA), pp. 170–175.
ICEISICEIS-v3-2011-HafiddiNBAK #approach #architecture
A Context-aware Service Centric Approach for Service Oriented Architectures (HH, MN, HB, BEA, AK), pp. 176–183.
ICEISICEIS-v3-2011-LemrabetLBBB
Business-IT Alignment and Organisation Agility Enabled by BPM and SOA Approaches Interplay (YL, HL, NB, MB, JPB), pp. 241–246.
ICEISICEIS-v3-2011-LinLMZN #approach #verification #workflow
Approach for Verifying Workflow Validity (YL, TL, IM, RZ, RN), pp. 66–75.
ICEISICEIS-v3-2011-MateoPC #approach #modelling #product line #testing
Testing in Software Product Lines — A Model based Approach (PRM, MP, DC), pp. 46–54.
ICEISICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEISICEIS-v4-2011-BenhaddiBA #approach #modelling
Model-driven Approach for User-centric Mashuped SOA (MB, KB, EHA), pp. 116–123.
ICEISICEIS-v4-2011-DoumiBB #approach #modelling
Modeling Approach for Business IT Alignment (KD, SB, KB), pp. 457–464.
ICEISICEIS-v4-2011-NguyenD #approach #information management #mobile #performance
An Efficient Cooperative Cache Approach in Mobile Information System (TTMN, TTBD), pp. 153–159.
ICEISICEIS-v4-2011-XieH #approach #architecture #quality
An Architectural Approach to Analyze Information Quality for Inter-organizational Service (SX, MH), pp. 438–443.
ICEISICEIS-v4-2011-XuF #approach #case study #education #game studies #re-engineering #social
A Case Study: Integrating a Game Application-driven Approach and Social Collaborations into Software Engineering Education (WX, STF), pp. 23–32.
CIKMCIKM-2011-DengZFX #approach #in memory #memory management
Information re-finding by context: a brain memory inspired approach (TD, LZ, LF, WX), pp. 1553–1558.
CIKMCIKM-2011-FeiJYLH #approach #behaviour #learning #multi #predict #social
Content based social behavior prediction: a multi-task learning approach (HF, RJ, YY, BL, JH), pp. 995–1000.
CIKMCIKM-2011-KimJHSZ #approach #corpus #graph #mining
Mining entity translations from comparable corpora: a holistic graph mapping approach (JK, LJ, SwH, YIS, MZ), pp. 1295–1304.
CIKMCIKM-2011-KimQYL #approach #behaviour
Advertiser-centric approach to understand user click behavior in sponsored search (SK, TQ, HY, TYL), pp. 2121–2124.
CIKMCIKM-2011-Nomoto #approach #documentation #named
WikiLabel: an encyclopedic approach to labeling documents en masse (TN), pp. 2341–2344.
CIKMCIKM-2011-OroR #approach #learning #named
SILA: a spatial instance learning approach for deep webpages (EO, MR), pp. 2329–2332.
CIKMCIKM-2011-SellamanickamGS #approach #learning #ranking
A pairwise ranking based approach to learning with positive and unlabeled examples (SS, PG, SKS), pp. 663–672.
CIKMCIKM-2011-TomasevRMI #approach #classification #nearest neighbour #probability
A probabilistic approach to nearest-neighbor classification: naive hubness bayesian kNN (NT, MR, DM, MI), pp. 2173–2176.
CIKMCIKM-2011-UysalC #approach #microblog #ranking #twitter
User oriented tweet ranking: a filtering approach to microblogs (IU, WBC), pp. 2261–2264.
CIKMCIKM-2011-WangWLZZ #analysis #approach #classification #graph #hashtag #sentiment #topic #twitter
Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
CIKMCIKM-2011-WangYZ #approach
A language model approach to capture commercial intent and information relevance for sponsored search (LW, MY, YZ), pp. 599–604.
CIKMCIKM-2011-WeilerMM #ambiguity #approach #library #named #scalability
Authormagic: an approach to author disambiguation in large-scale digital libraries (HW, KMW, SM), pp. 2293–2296.
CIKMCIKM-2011-YooYC #classification #email #modelling #personalisation
Modeling personalized email prioritization: classification-based and regression-based approaches (SY, YY, JGC), pp. 729–738.
CIKMCIKM-2011-YuKL #approach #bidirectional #bottom-up #information management #top-down #towards
Towards a top-down and bottom-up bidirectional approach to joint information extraction (XY, IK, MRL), pp. 847–856.
ECIRECIR-2011-AltingovdeOCU #approach #hybrid
Second Chance: A Hybrid Approach for Dynamic Result Caching in Search Engines (ISA, RO, BBC, ÖU), pp. 510–516.
ECIRECIR-2011-ChilukaAP #approach #predict #recommendation #scalability
A Link Prediction Approach to Recommendations in Large-Scale User-Generated Content Systems (NC, NA, JAP), pp. 189–200.
ECIRECIR-2011-Dulac-ArnoldDG #approach #classification
Text Classification: A Sequential Reading Approach (GDA, LD, PG), pp. 411–423.
ECIRECIR-2011-Gabrilovich #knowledge-based #retrieval
Ad Retrieval Systems in vitro and in vivo: Knowledge-Based Approaches to Computational Advertising (EG), pp. 4–5.
ECIRECIR-2011-MagdyLJ
Simple vs. Sophisticated Approaches for Patent Prior-Art Search (WM, PL, GJFJ), pp. 725–728.
ECIRECIR-2011-SongDDK #approach #segmentation
An Iterative Approach to Text Segmentation (FS, WMD, AD, FWK), pp. 629–640.
ECIRECIR-2011-ZhaoZSH #approach #metric #novel #quantum #ranking
A Novel Re-ranking Approach Inspired by Quantum Measurement (XZ, PZ, DS, YH), pp. 721–724.
ICMLICML-2011-DeisenrothR #approach #modelling #named #policy
PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
ICMLICML-2011-GermainLLMS #approach #kernel
A PAC-Bayes Sample-compression Approach to Kernel Methods (PG, AL, FL, MM, SS), pp. 297–304.
ICMLICML-2011-GlorotBB #adaptation #approach #classification #learning #scalability #sentiment
Domain Adaptation for Large-Scale Sentiment Classification: A Deep Learning Approach (XG, AB, YB), pp. 513–520.
ICMLICML-2011-KumarD #approach #clustering #multi
A Co-training Approach for Multi-view Spectral Clustering (AK, HDI), pp. 393–400.
ICMLICML-2011-MartinsFASX #approach
An Augmented Lagrangian Approach to Constrained MAP Inference (AFTM, MATF, PMQA, NAS, EPX), pp. 169–176.
ICMLICML-2011-MeyerBS #approach #constraints #linear
Linear Regression under Fixed-Rank Constraints: A Riemannian Approach (GM, SB, RS), pp. 545–552.
KDDKDD-2011-CotterSK #approach #kernel
A GPU-tailored approach for training kernelized SVMs (AC, NS, JK), pp. 805–813.
KDDKDD-2011-GabburPFT #approach #detection
A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
KDDKDD-2011-GilpinD #algorithm #approach #clustering #flexibility #performance #satisfiability
Incorporating SAT solvers into hierarchical clustering algorithms: an efficient and flexible approach (SG, IND), pp. 1136–1144.
KDDKDD-2011-GuerraVMA #analysis #approach #bias #realtime #sentiment
From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
KDDKDD-2011-ZhangHLSL #approach #learning #multi #scalability
Multi-view transfer learning with a large margin approach (DZ, JH, YL, LS, RDL), pp. 1208–1216.
KDDKDD-2011-ZhouBS #approach #graph #ranking
An iterated graph laplacian approach for ranking on manifolds (XZ, MB, NS), pp. 877–885.
KDIRKDIR-2011-BarbieriCMR #approach #clustering #probability
Characterizing Relationships through Co-clustering — A Probabilistic Approach (NB, GC, GM, ER), pp. 64–73.
KDIRKDIR-2011-CostaRO #approach #classification #transaction #xml
A Transactional Approach to Associative XML Classification by Content and Structure (GC, RO, ER), pp. 104–113.
KDIRKDIR-2011-DeruyverH #approach #consistency #graph #image #information management #semantics
Semantic Graphs and Arc Consistency Checking — The Renewal of an Old Approach for Information Extraction from Images (AD, YH), pp. 515–522.
KDIRKDIR-2011-DoquireV #approach #category theory #feature model #hybrid
An Hybrid Approach to Feature Selection for Mixed Categorical and Continuous Data (GD, MV), pp. 394–401.
KDIRKDIR-2011-Jean-LouisBFD #approach #scalability
A Weakly Supervised Approach for Large-scale Relation Extraction (LJL, RB, OF, AD), pp. 94–103.
KDIRKDIR-2011-JeongY #approach #proximity #semantics #summary
An Approach for Combining Semantic Information and Proximity Information for Text Summarization (HJ, YY), pp. 427–432.
KDIRKDIR-2011-MauleKR #approach #automation #using
Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
KDIRKDIR-2011-OlegA #analysis #approach #clustering
Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
KDIRKDIR-2011-Osuna-OntiverosLS #approach #clustering #documentation #semantics
A Semantic Clustering Approach for Indexing Documents (DOO, ILA, VSS), pp. 288–293.
KDIRKDIR-2011-PrachuabsupakijS #classification #multi #set #using
Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
KEODKEOD-2011-AhmedMB #approach #dependence #ontology
Existential Dependency Driven Approach for Extracting Views from Domain Ontology (SSA, MM, SMB), pp. 413–418.
KEODKEOD-2011-BouiadjraB #approach #evaluation #ontology #state of the art
Ontology Evaluation — State of the Art, New Approach and Perspectives (ABB, SMB), pp. 365–368.
KEODKEOD-2011-HmidaCBN #3d #approach #detection #ontology #semantics
From 3D Point Clouds to Semantic Objects — An Ontology-based Detection Approach (HBH, CC, FB, CN), pp. 255–260.
KEODKEOD-2011-IshakLA #approach #learning #modelling #ontology #probability #visual notation
A Two-way Approach for Probabilistic Graphical Models Structure Learning and Ontology Enrichment (MBI, PL, NBA), pp. 189–194.
KEODKEOD-2011-KhuratS #approach #ontology #policy #verification
An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
KEODKEOD-2011-KudryavtsevG #approach #diagrams #modelling #ontology
Diagrammatic Knowledge Modeling for Managers — Ontology-based Approach (DK, TG), pp. 386–389.
KEODKEOD-2011-LunesuPC #approach #semantics
Approach to Manage Semantic Informations from UGC (MIL, FEP, GC), pp. 470–473.
KEODKEOD-2011-SchmidtKL #automation #documentation #domain-specific language
Domain Specific Language in Technical Solution Documents — Discussion of Two Approaches to Improve the Semi-automated Annotation (HXS, AK, UL), pp. 159–166.
KMISKMIS-2011-AinsworthM #approach #pervasive
Breaching the Strongroom — A Pervasive Informatics Approach to Working with Medieval Manuscripts (PFA, MM), pp. 264–271.
KMISKMIS-2011-AnthopoulosGF #approach
Supporting the Solution Selection for a Digital City with a Fuzzy-based Approach (LGA, VCG, PF), pp. 355–358.
KMISKMIS-2011-CachiaM #approach #modelling #re-engineering
An Event-driven Cartographic Approach to Modelling Software Engineering Knowledge (EC, MM), pp. 18–27.
KMISKMIS-2011-GesquiereMN #approach #multi #semantics
Interoperability between GIS and BIM — A Semantic-based Multi-representation Approach (GG, CM, CN), pp. 359–362.
KMISKMIS-2011-GoncalvesP #approach #challenge #process #towards
Business Processes and Organisations — Challenges and Opportunities Towards a People-centric Approach (NPG, JASP), pp. 418–423.
KMISKMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard #using
Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
KMISKMIS-2011-SchwinnKR #approach #editing #information management #ontology #query #visual notation
An Approach to a Graphical Query Editor — For Ontology-based Knowledge Management (MS, NK, SR), pp. 436–441.
KMISKMIS-2011-Silva #approach #concept #learning
Learning Organization — Concept and Proposal of a New Approach (AFdS), pp. 384–389.
KMISKMIS-2011-WeberL #approach #assessment #quality #social
A User Centered Approach for Quality Assessment in Social Systems (NW, SNL), pp. 211–216.
MLDMMLDM-2011-Bouguessa #approach #clustering #transaction
A Practical Approach for Clustering Transaction Data (MB), pp. 265–279.
MLDMMLDM-2011-SimeonH #approach #correlation #difference #mining #named #set
GENCCS: A Correlated Group Difference Approach to Contrast Set Mining (MS, RJH), pp. 140–154.
RecSysRecSys-2011-AnandG #approach #problem
A market-based approach to address the new item problem (SSA, NG), pp. 205–212.
RecSysRecSys-2011-BarbieriCMO #approach #modelling #recommendation
Modeling item selection and relevance for accurate recommendations: a bayesian approach (NB, GC, GM, RO), pp. 21–28.
SEKESEKE-2011-AllisonAYC #approach #re-engineering
A Software Engineering Approach to User-Driven Control of the Microgrid (MA, AAA, ZY, PJC), pp. 59–64.
SEKESEKE-2011-AndradeDBW #approach #communication #documentation #retrieval #using
An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
SEKESEKE-2011-BagheriS #approach #architecture #formal method
A Formal Approach for Incorporating Architectural Tactics into the Software Architecture (HB, KJS), pp. 770–775.
SEKESEKE-2011-CaiZWXS #approach #component #recommendation
Recommending Component by Citation: A Semi-supervised Approach for Determination (SC, YZ, LW, BX, WS), pp. 489–494.
SEKESEKE-2011-CassellAG #approach #clustering #refactoring
A Dual Clustering Approach to the Extract Class Refactoring (KC, PA, LG), pp. 77–82.
SEKESEKE-2011-CatalA #approach #development #enterprise #estimation
A Composite Project Effort Estimation Approach in an Enterprise Software Development Project (CC, MSA), pp. 331–334.
SEKESEKE-2011-FreireAKAC #approach #automation #deployment #modelling #monitoring #process
Automatic Deployment and Monitoring of Software Processes: A Model-Driven Approach (MAF, FAA, UK, EA, RC), pp. 42–47.
SEKESEKE-2011-KimLZKLS #approach #configuration management #modelling #privacy
A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
SEKESEKE-2011-Krishna #approach #non-functional #process #requirements #uml
A Process Oriented Approach to Model Non-Functional Requirements Proposition Extending UML (AK), pp. 736–739.
SEKESEKE-2011-ParkK #approach #automation #formal method #lightweight
Applying Lightweight Formal Approach to Automatic Configuration Inspection (SP, GK), pp. 107–110.