BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (27)
detect (19)
across (15)
base (13)
system (13)

Stem boundari$ (all stems)

155 papers:

CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-Michalek #bound #standard
Motion control with minimization of a boundary off-track for non-Standard N-trailers along forward-followed paths (MMM), pp. 1564–1569.
CIAACIAA-J-2013-JirasekJ15 #bound #on the #regular expression
On the boundary of regular languages (JJ, GJ), pp. 42–57.
DLTDLT-2015-JirasekJ #bound
The Boundary of Prefix-Free Languages (JJ, GJ), pp. 300–312.
CHICHI-2015-BlomkvistPA #agile #bound #communication #distributed
Communication through Boundary Objects in Distributed Agile Teams (JKB, JP, ), pp. 1875–1884.
CHICHI-2015-CecchinatoCB #bound #difference #email
Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
CHICHI-2015-FleckCR #bound #multi #using
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-YerousisARRRW #bound
Computer-Enabled Project Spaces: Connecting with Palestinian Refugees across Camp Boundaries (GPY, KA, TvR, DWR, MR, VW), pp. 3749–3758.
HCIDUXU-UI-2015-GomezFD #bound #education
Transcending Disciplinary, Cultural and National Boundaries: Emergent Technologies, New Education Landscape and the Cloud Workshop Project (RG, PF, RD), pp. 631–642.
HCIHCI-IT-2015-HakodaKSST #bound #gesture #mobile #named #using
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
KDDKDD-2015-YuW0PSIW #bound #markov #multi
Tornado Forecasting with Multiple Markov Boundaries (KY, DW, WD, JP, DLS, SI, XW), pp. 2237–2246.
GPCEGPCE-2015-ReyndersDP #api #bound #generative
Generating safe boundary APIs between typed EDSLs and their environments (BR, DD, FP), pp. 31–34.
WICSAWICSA-2014-BiancoMKR #bound #case study #ecosystem #framework
The Role of Platform Boundary Resources in Software Ecosystems: A Case Study (VdB, VM, MK, MR), pp. 11–20.
CASECASE-2014-ChiuC #bound #detection #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
ICFPICFP-2014-SchoepeHS #bound #named
SeLINQ: tracking information across application-database boundaries (DS, DH, AS), pp. 25–38.
CHICHI-2014-LeeSS #analysis #bound #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-WaycottDVMGOK #bound
Captioned photographs in psychosocial aged care: relationship building and boundary work (JW, HD, FV, AM, AG, EO, LK), pp. 4167–4176.
CSCWCSCW-2014-GavilanesMQ #bound #communication #social #twitter
Twitter ain’t without frontiers: economic, social, and cultural boundaries in international communication (ROGG, YM, DQ), pp. 1511–1522.
ASPLOSASPLOS-2014-SaniBQZ #bound
I/o paravirtualization at the device file boundary (AAS, KB, SQ, LZ), pp. 319–332.
CASECASE-2013-OFlahertyE #bound #learning #sequence
Learning to locomote: Action sequences and switching boundaries (RO, ME), pp. 7–12.
DocEngDocEng-2013-VielMPT #bound
Go beyond boundaries of iTV applications (CCV, ELM, MdGCP, CACT), pp. 263–272.
ICDARICDAR-2013-HePXSN #3d #bound #re-engineering
A Book Dewarping System by Boundary-Based 3D Surface Reconstruction (YH, PP, SX, JS, SN), pp. 403–407.
ITiCSEITiCSE-2013-QureshiEP #bound #student
Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
CIAACIAA-2013-JirasekJ #bound #on the #regular expression
On the Boundary of Regular Languages (JJ, GJ), pp. 208–219.
CHICHI-2013-ShiXC #bound #network #social #using
Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CSCWCSCW-2013-HalpernEFG #bound #collaboration #design
Designing collaboration: comparing cases exploring cultural probes as boundary-negotiating objects (MKH, IE, LF, GKG), pp. 1093–1102.
CSCWCSCW-2013-HuangDLLG #bound
Meanings and boundaries of scientific software sharing (XH, XD, CPL, TL, NG), pp. 423–434.
REFSQREFSQ-2013-RempelMKP #bibliography #bound #requirements #taxonomy #traceability
Requirements Traceability across Organizational Boundaries — A Survey and Taxonomy (PR, PM, TK, IP), pp. 125–140.
LICSLICS-2013-MogaveroMS #behaviour #bound #on the
On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
VLDBVLDB-2012-SelkeLB #bound #database
Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion (JS, CL, WTB), pp. 538–549.
SEFMSEFM-2012-ColomboFMP #bound #configuration management #monitoring #named #resource management #runtime #verification
polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries (CC, AF, RM, GJP), pp. 218–232.
CHICHI-2012-WisniewskiLW #bound
Fighting for my space: coping mechanisms for sns boundary regulation (PJW, HRL, DW), pp. 609–618.
CSCWCSCW-2012-FredericW #bound #social #social media
Boundary regulation in social media (SF, HW), pp. 769–778.
ICPRICPR-2012-ChenYZZ #bound #detection #network
Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPRICPR-2012-LiuSZWBCT #bound #detection
Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPRICPR-2012-SuYLW #bound #classification #editing #using
Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPRICPR-2012-WangHB #bound #locality
Glass object localization by joint inference of boundary and depth (TW, XH, NB), pp. 3783–3786.
ICPRICPR-2012-ZhangXY #bound #detection #modelling
An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
ICSTICST-2012-CadavidBS #bound #metamodelling #modelling
Searching the Boundaries of a Modeling Space to Test Metamodels (JJC, BB, HAS), pp. 131–140.
DACDAC-2011-HsiaoD #bound #parallel #scalability
A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
DATEDATE-2011-TsaiLCKCK #bound #on the
On routing fixed escaped boundary pins for high speed boards (TYT, RJL, CYC, CYK, HMC, YK), pp. 461–466.
ITiCSEITiCSE-2011-MarkhamB #bound #twitter #using
Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ICSMEICSM-2011-YazdanshenasM #bound #component
Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
CHICHI-2011-KuznetsovTKHPS #bound
Breaking boundaries: strategies for mentoring through textile computing workshops (SK, LCT, CK, IH, EP, DPS), pp. 2957–2966.
CHICHI-2011-ZhouAZ #bound
CPOE workarounds, boundary objects, and assemblages (XZ, MSA, KZ), pp. 3353–3362.
CAiSECAiSE-2011-Finkelstein #bound #challenge #information management #re-engineering
Ten Open Challenges at the Boundaries of Software Engineering and Information Systems (AF), p. 1.
MLDMMLDM-2011-AlshukriCZ #bound #detection #incremental #random #using
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
RERE-2011-UbayashiKHT #analysis #bound #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
CASECASE-2010-MacwanNB #approach #bound #multi #novel #online #predict #probability
On-line target-motion prediction for autonomous multirobot search in realistic terrains with time-expanding boundaries: A novel probabilistic approach (AM, GN, BB), pp. 662–667.
DACDAC-2010-LinLHC #bound #constraints
Performance-driven analog placement considering boundary constraint (CWL, JML, CPH, SJC), pp. 292–297.
ESOPESOP-2010-NaumannB #bound #first-order #higher-order #information management
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
LATALATA-2010-Neary #bound
A Boundary between Universality and Non-universality in Extended Spiking Neural P Systems (TN), pp. 475–487.
CHICHI-2010-AarhusB #bound
Negotiating boundaries: managing disease at home (RA, SAB), pp. 1223–1232.
CHICHI-2010-DantecE #bound #information management #multi
Across boundaries of influence and accountability: the multiple scales of public sector information systems (CALD, WKE), pp. 113–122.
CIKMCIKM-2010-XiaoLC #bound #concept
K-farthest-neighbors-based concept boundary determination for support vector data description (YX, BL, LC), pp. 1701–1704.
ICPRICPR-2010-BaldacciBD #3d #algorithm #bound #design #framework #graph #segmentation
Oriented Boundary Graph: A Framework to Design and Implement 3D Segmentation Algorithms (FB, AJPB, JPD), pp. 1116–1119.
ICPRICPR-2010-BauerEOBKFHN #approach #bound #estimation #graph #performance #robust
A Fast and Robust Graph-Based Approach for Boundary Estimation of Fiber Bundles Relying on Fractional Anisotropy Maps (MHAB, JE, TO, SB, JK, BF, HKH, CN), pp. 4016–4019.
ICPRICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self #using
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-ZhangK #analysis #bound
Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
SIGIRSIGIR-2010-WangLC #bound #detection #query
Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
MODELSMoDELS-v2-2010-ParetoEE #architecture #bound #design
Architectural Descriptions as Boundary Objects in System and Design Work (LP, PE, SE), pp. 406–419.
SACSAC-2010-CampanTC #bound
User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
SPLCSPLC-2010-ElsnerULS #bound #consistency #product line
Consistent Product Line Configuration across File Type and Product Line Boundaries (CE, PU, DL, WSP), pp. 181–195.
DATEDATE-2009-GuoS #bound #design #distributed #optimisation #using
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DRRDRR-2009-TaghvaC #analysis #bound #documentation #using
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
ICDARICDAR-2009-LiuBMG #bound #detection #fault #sequence
Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
ICDARICDAR-2009-SharmaL #bound
Form Field Frame Boundary Removal for Form Processing System in Gurmukhi Script (DVS, GSL), pp. 256–260.
ICDARICDAR-2009-WangC #bound #detection #documentation #image
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
WCREWCRE-1999-PassingSLP99a #bound #named
NTrace: Function Boundary Tracing for Windows on IA-32 (JP, AS, MvL, AP), pp. 43–52.
HCIHIMI-DIE-2009-ShinPC #bound #detection
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
ICSTSAT-2009-Goldberg #bound
Boundary Points and Resolution (EG), pp. 147–160.
WICSAWICSA-2008-LagoACK #architecture #bound #community
Wishes and Boundaries for a Software Architecture Knowledge Community (PL, PA, RC, PK), pp. 271–274.
CIKMCIKM-2008-LiuMG #bound #detection #documentation #identification
Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
ICPRICPR-2008-AlliliZ #approach #bound #segmentation
An approach for dynamic combination of region and boundary information in segmentation (MSA, DZ), pp. 1–4.
ICPRICPR-2008-KadarBS #bound #detection #evolution #image #programming #search-based
Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
ICPRICPR-2008-MuraiF #bound #detection #using #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-WangTHW #bound #using
Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPRICPR-2008-WimmerHS #bound #classification
Implicit active shape model employing boundary classifier (AW, JH, GS), pp. 1–4.
SEKESEKE-2008-PatroneR #bound #logic #programming language
Sharing Application Logic Across Programming Language Boundaries (DSP, BR), pp. 227–231.
ECOOPECOOP-2008-HuangHBR #bound #hardware #object-oriented #programming
Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary (SSH, AH, DFB, RMR), pp. 76–103.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
VLDBVLDB-2007-RastogiHS #bound #privacy
The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
HCIHCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #using #word
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
CAVCAV-2007-ChakiSV #bound #verification
Verification Across Intellectual Property Boundaries (SC, CS, HV), pp. 82–94.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code #using
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
FMFM-2006-BouquetDL #automation #bound #generative #ml #specification #testing
Automated Boundary Test Generation from JML Specifications (FB, FD, BL), pp. 428–443.
ICMLICML-2006-PandaCW #bound #concept #detection
Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
ICPRICPR-v1-2006-KatsoulasK #bound #image
Box-like Superquadric Recovery in Range Images by Fusing Region and Boundary Information (DK, DIK), pp. 719–722.
ICPRICPR-v1-2006-LiHS #approach #bound #image #machine learning
A Machine Learning Approach for Locating Boundaries of Liver Tumors in CT Images (YL, SH, KS), pp. 400–403.
ICPRICPR-v2-2006-ChenH #bound #composition #image #segmentation
Boundary correction for total variation regularized L^1 function with applications to image decomposition and segmentation (TC, TSH), pp. 316–319.
SACSAC-2006-FangG #bound #dataset
Boundary surface extraction and rendering for volume datasets (SF, PG), pp. 1356–1360.
CASECASE-2005-ChengY #bound #using
Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
SACSAC-2005-ReddyC #bound #using
Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
ICLPICLP-2005-Saidi #bound #mining #process #using
Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
ICPRICPR-v3-2004-ZhuHT #bound
Comparing Decision Boundary Curvature (HZ, JH, XT), pp. 450–453.
ICPRICPR-v4-2004-KimPL #bound #using
Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
ICPRICPR-v4-2004-SungLPL #bound #locality #recognition #using
Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
SACSAC-2004-ZhouLA #bound #image
Boundary extraction in thermal images by edge map (QZ, ZL, JKA), pp. 254–258.
CGOCGO-2004-TallamZG #bound #profiling
Extending Path Profiling across Loop Backedges and Procedure Boundaries (ST, XZ, RG), pp. 251–264.
CSLCSL-2004-ImmermanRRSY #bound #decidability #logic #transitive
The Boundary Between Decidability and Undecidability for Transitive-Closure Logics (NI, AMR, TWR, SS, GY), pp. 160–174.
DACDAC-2003-StehrGA #analysis #bound #performance #trade-off
Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
DATEDATE-2003-SmedtG #bound #design #named
HOLMES: Capturing the Yield-Optimized Design Space Boundaries of Analog and RF Integrated Circuits (BDS, GGEG), pp. 10256–10263.
TACASTACAS-2003-BraghinCFFLP #analysis #bound #named
BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
ICEISICEIS-v3-2003-GustasG #approach #bound #enterprise #information management #modelling #towards
Towards the Enterprise Engineering Approach for Information System Modelling Across Organisational and Technical Boundaries (RG, PG), pp. 77–88.
MLDMMLDM-2003-ImiyaTOH #bound #detection #random #set
Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
MLDMMLDM-2003-MiteranBB #approximate #bound #classification #image #realtime #segmentation #using
Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
FMFME-2002-LegeardPU #automation #bound #testing
Automated Boundary Testing from Z and B (BL, FP, MU), pp. 21–40.
CSCWCSCW-2002-LuttersA #bound #case study #safety
Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
CSCWCSCW-2002-StevensW #bound #data access #maintenance
A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
ICPRICPR-v2-2002-EcabertT #bound #image #segmentation
Variational Image Segmentation by Unifying Region and Boundary Information (OE, JPT), pp. 885–888.
ICPRICPR-v3-2002-Ishii #bound #design #people
Tangible Bits: Designing the Boundary between People, Bits, and Atoms (HI), p. 277.
ICPRICPR-v3-2002-KimKKK #bound #sequence
Usefulness of Boundary Sequences in Computing Shape Features for Arbitrary Shaped Regions (SK, SK, JK, MK), pp. 355–358.
ICPRICPR-v3-2002-SilvestreL #bound #classification #optimisation
Optimization of Neural Classifiers Based on Bayesian Decision Boundaries and Idle Neurons Pruning (MRS, LLL), pp. 387–390.
WICSAWICSA-2001-Shaw #architecture #bound #communication #research #ubiquitous
When System Boundaries Dissolve: Research Opportunities in Software Architectures for Ubiquitous Computing and Communication (MS), p. 99–?.
DACDAC-2001-YangPT #bound
Improving Bus Test Via IDDT and Boundary Scan (SYY, CAP, MTA), pp. 307–312.
DATEDATE-2000-ParkK #bound #design #detection #fault
A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
DATEDATE-2000-SchwenckerSGA #automation #bound #design
The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
ICMLICML-2000-Reynolds #adaptation #bound #clustering #learning
Adaptive Resolution Model-Free Reinforcement Learning: Decision Boundary Partitioning (SIR), pp. 783–790.
ICPRICPR-v1-2000-HoogsM #approach #bound
An Integrated Boundary and Region Approach to Perceptual Grouping (AH, JLM), pp. 1284–1290.
ICPRICPR-v1-2000-TasdizenC #algebra #bound #estimation #image #modelling
Boundary Estimation from Intensity/Color Images with Algebraic Curve Models (TT, DBC), pp. 1225–1228.
ICPRICPR-v2-2000-LingC #bound #feature model #performance
Fast and Efficient Feature Extraction Based on Bayesian Decision Boundaries (LLL, HMC), pp. 2390–2393.
ICPRICPR-v3-2000-CamilleriP #bound #refinement
Spectral Unmixing of Mixed Pixels for Texture Boundary Refinement (KPC, MP), pp. 7096–7099.
ICPRICPR-v3-2000-KwanCG #approach #automation #bound #using
Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
ICPRICPR-v3-2000-RittscherS #bound #detection
An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
ICPRICPR-v4-2000-LeungCKC #bound #detection #fuzzy
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
DATEDATE-1999-ShinKK #bound #multi #testing
At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks (JS, HK, SK), p. 473–?.
SIGMODSIGMOD-1999-EmbleyJN #bound #documentation #web
Record-Boundary Discovery in Web Documents (DWE, YSJ, YKN), pp. 467–478.
DACDAC-1998-DengiR #2d #bound #megamodelling
Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
ITiCSEITiCSE-1998-Wolfer #bound #re-engineering
Graduate software engineering across international boundaries (poster): the first courses (JW), p. 311.
ICPRICPR-1998-Claridge #algorithm #bound #consistency #locality #visual notation
A boundary localisation algorithm consistent with human visual perception (EC), pp. 300–304.
ICPRICPR-1998-FlorebySS #bound #fourier #image #order #using
Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
ICPRICPR-1998-Heikkila #bound #detection
Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPRICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-SuriHS #automation #bound #classification #polynomial
Automatic quadratic calibration for correction of pixel classification boundaries to an accuracy of 2.5 millimeters: an application in cardiac imaging (JSS, RMH, FHS), pp. 30–33.
DATEEDTC-1997-ChakrabortyM #bound #functional #parallel #programmable #testing
A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
DATEEDTC-1997-Kristof #architecture #bound #effectiveness #idea #self #testing
Extension of the boundary-scan architecture and new idea of BIST for more effective testing and self-testing of interconnections (AK), p. 630.
ICDARICDAR-1997-Nishida #bound #documentation #feature model #image
Boundary Feature Extraction from Gray-Scale Document Images (HN), pp. 132–141.
ICDARICDAR-1997-Szmurlo #bound #normalisation #recognition
Boundary Normalization for Recognition of Non-Touching Non-Degraded Characters (MS), pp. 463–466.
ICPRICPR-1996-GunnN #bound #energy #using
Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
ICPRICPR-1996-SuriHS #automation #bound #fault
Correction of systematic errors in automatically produced boundaries from low-contrast ventriculograms (JSS, RMH, FHS), pp. 361–365.
KRKR-1996-Hendler #bound #implementation #research
Implementations and Research: Discussions at the Boundary (JAH), pp. 659–660.
KRKR-1996-MacGregor #bound #implementation #research
Implementations and Research: Discussions at the Boundary (RMM), pp. 657–658.
KRKR-1996-Schubert #bound #implementation #research
Implementations and Research: Discussions at the Boundary (LKS), pp. 661–662.
KRKR-1996-Shapiro #bound #implementation #research
Implementations and Research: Discussions at the Boundary (SCS), pp. 663–664.
PLDIPLDI-1995-BarrettZ #bound #garbage collection #using
Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
DATEEDAC-1994-KarkkainenTW #bound #monitoring #power management #testing
Boundary Scan Testing Combined with Power Supply Current Monitoring (MK, KT, MW), pp. 232–235.
DATEEDAC-1994-Su #bound #random testing #testing
Random Testing of Interconnects in A Boundary Scan Environment (CS), pp. 226–231.
DACDAC-1992-LingKW #3d #approach #bound #simulation
A Boundary-Element Approach to Transient simulation of Three-Dimensional Integrated Circuit Interconnect (DDL, SK, JW), pp. 93–98.
ICMLML-1991-YooF #bound #effectiveness #identification
Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
RTARTA-1991-Brandenburg #bound #confluence #equivalence #graph grammar
The Equivalence of Boundary and Confluent Graph Grammars on Graph Languages of Bounded Degree (FJB), pp. 312–322.
PLDIPLDI-1990-SanthanamO #bound
Register Allocation Across Procedure and Module Boundaries (VS, DO), pp. 28–39.
ICMLML-1988-BravermanR #bound
Boundaries of Operationality (MSB, SJR), pp. 221–234.
ICGTGG-1986-Welzl #bound #graph grammar
Boundary NlC and partition controlled graph grammars (EW), pp. 593–609.
OOPSLAOOPSLA-1986-MittalBK #bound
Virtual Copies — At the Boundary Between Classes and Instances (SM, DGB, KMK), pp. 159–166.
ICALPICALP-1982-GoralcikovaGK #bound #morphism #pseudo
A Boundary of Isomorphism Completeness in the Lattice of Semigroup Pseudovarieties (AG, PG, VK), pp. 292–299.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.