BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (508)
base (459)
system (237)
imag (225)
model (205)

Stem detect$ (all stems)

2990 papers:

ECSAECSA-2015-HansenM #automation #community #composition #detection #using
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
WICSAWICSA-2015-BangM #design #detection #higher-order
Proactive Detection of Higher-Order Software Design Conflicts (JYB, NM), pp. 155–164.
WICSAWICSA-2015-MoCKX #architecture #automation #detection #smell
Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells (RM, YC, RK, LX), pp. 51–60.
CASECASE-2015-AntonelloGM #detection #fault
Autonomous robotic system for thermographic detection of defects in upper layers of carbon fiber reinforced polymers (MA, SG, EM), pp. 634–639.
CASECASE-2015-BrisimiAZCP #detection
Sensing and classifying roadway obstacles: The street bump anomaly detection and decision support system (TSB, SA, YZ, CGC, ICP), pp. 1288–1293.
CASECASE-2015-ButtersGS #detection #network
Detecting and reducing redundancy in alarm networks (TDB, SG, JLS), pp. 1224–1229.
CASECASE-2015-DamesK #automation #detection #locality #multi #smarttech
Automated detection, localization, and registration of smart devices with multiple robots (PD, VK), pp. 564–571.
CASECASE-2015-KreutzerRREL #automation #detection #metric #using
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-SathishRB #approach #detection #industrial #simulation
A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASECASE-2015-SundarkumarRNG #api #detection #machine learning #modelling #topic
Malware detection via API calls, topic models and machine learning (GGS, VR, IN, VG), pp. 1212–1217.
CASECASE-2015-WuDZW #detection
Kalman filter based DNS cache poisoning attack detection (HW, XD, LZ, LW), pp. 1594–1600.
CASECASE-2015-ZhangHZ #detection #fault #metric
Fault detection for wireless networked systems with compressed measurements (JZ, XH, DHZ), pp. 356–361.
CASECASE-2015-ZonEHJVSB #detection #multi #realtime #using
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
DACDAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #using #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-CampbellVPC #detection #fault #low cost #synthesis
High-level synthesis of error detecting cores through low-cost modulo-3 shadow datapaths (KAC, PV, DZP, DC), p. 6.
DACDAC-2015-LiuHWSJHL #assessment #detection #smarttech
Impact assessment of net metering on smart home cyberattack detection (YL, SH, JW, YS, YJ, YH, XL), p. 6.
DACDAC-2015-RajendranVK #detection
Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DATEDATE-2015-CakirM #clustering #correlation #detection #hardware #using
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-CornaFNS #android #detection
Occupancy detection via iBeacon on Android devices for smart building management (AC, LF, AAN, DS), pp. 629–632.
DATEDATE-2015-CourbonLFT #detection #hardware #performance
A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
DATEDATE-2015-FrancqF #detection #hardware
Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATEDATE-2015-HollerKRRK #compilation #detection #evaluation
Evaluation of diverse compiling for software-fault detection (AH, NK, TR, KR, CK), pp. 531–536.
DATEDATE-2015-KanounS #big data #concept #data type #detection #learning #online #scheduling #streaming
Big-data streaming applications scheduling with online learning and concept drift detection (KK, MvdS), pp. 1547–1550.
DATEDATE-2015-KumarAL #detection #fault #monitoring
Operational fault detection and monitoring of a memristor-based LUT (TNK, HAFA, FL), pp. 429–434.
DATEDATE-2015-LiaperdosAT #detection #estimation #fault #probability #testing
A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
DATEDATE-2015-LinSKRM #debugging #detection #effectiveness #fault #performance #testing #validation
Quick error detection tests with fast runtimes for effective post-silicon validation and debug (DL, ES, SK, ER, SM), pp. 1168–1173.
DATEDATE-2015-NgoEBDGNRR #detection #hardware #metric
Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
DATEDATE-2015-RenTB #detection #learning #statistics
Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
DATEDATE-2015-ZwergerG #detection #symmetry
Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
DocEngDocEng-2015-BarabucciBIMM #detection #documentation #modelling #visualisation
Document Changes: Modeling, Detection, Storage and Visualization (DChanges 2015) (GB, UMB, ADI, SM, EVM), pp. 227–228.
DocEngDocEng-2015-WuS #detection #evolution
Detecting XSLT Rules Affected by Schema Evolution (YW, NS), pp. 143–146.
DRRDRR-2015-DeMDC #detection #documentation #image
Detection of electrical circuit elements from documents images (PD, SM, AKD, BC).
HTHT-2015-KumarDCC #detection #social #social media
Detecting Changes in Suicide Content Manifested in Social Media Following Celebrity Suicides (MK, MD, GC, MDC), pp. 85–94.
HTHT-2015-SchulzSS #detection
Small-Scale Incident Detection based on Microposts (AS, BS, TS), pp. 3–12.
SIGMODSIGMOD-2015-YanZHSMZM #detection #distributed #using
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
VLDBVLDB-2015-ChuWLHP #clustering #detection #named #scalability
ALID: Scalable Dominant Cluster Detection (LC, SW, SL, QH, JP), pp. 826–837.
VLDBVLDB-2015-PotharajuCHNWZJ #automation #detection #knowledge base #named
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection (RP, JC, LH, CNR, MW, LZ, NJ), pp. 1828–1839.
VLDBVLDB-2015-WangWYZ #benchmark #community #detection #framework #metric #network #social
Community Detection in Social Networks: An In-depth Benchmarking Study with a Procedure-Oriented Framework (MW, CW, JXY, JZ), pp. 998–1009.
VLDBVLDB-2015-WuJLZ #community #detection #robust
Robust Local Community Detection: On Free Rider Effect and Its Elimination (YW, RJ, JL, XZ), pp. 798–809.
ESOPESOP-2015-CalzavaraBCS #detection #fine-grained
Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ESOPESOP-2015-ChengR #detection #spreadsheet #static analysis
Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
FASEFASE-2015-FedyukovichDHS #bound #dependence #detection #model checking
Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
SCAMSCAM-J-2013-CeruloPBCC15 #detection #markov #named
Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
ICPCICPC-2015-BenomarASPS #detection #development #evolution #process
Detection of software evolution phases based on development activities (OB, HA, HAS, PP, MAS), pp. 15–24.
ICPCICPC-2015-SohTAW #android #detection #user interface
Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
ICSMEICSME-2015-Aniche #detection #development #smell #web
Detection strategies of smells in web software development (MFA), pp. 598–601.
ICSMEICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSMEICSME-2015-LuciaDGRP #behaviour #design pattern #detection #named
ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
ICSMEICSME-2015-PoluriR #concurrent #detection
Deterministic dynamic race detection across program versions (SVP, MKR), pp. 181–190.
ICSMEICSME-2015-SvajlenkoR #clone detection #detection #tool support
Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
ICSMEICSME-2015-VasquezVLP #android #detection #developer #how #performance
How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
MSRMSR-2015-WuMKGI #consistency #detection #nondeterminism #open source #scalability
A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
SANERSANER-2015-AggarwalRTHGS #debugging #detection #re-engineering
Detecting duplicate bug reports with software engineering domain knowledge (KA, TR, FT, AH, RG, ES), pp. 211–220.
SANERSANER-2015-HeroldEBCC #detection #modelling
Detection of violation causes in reflexion models (SH, ME, JB, SC, MÓC), pp. 565–569.
SANERSANER-2015-Keivanloo0Z #clone detection #detection #java #repository #scalability
Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
SANERSANER-2015-SassoML #detection #problem
Misery loves company: CrowdStacking traces to aid problem detection (TDS, AM, ML), pp. 131–140.
SANERSANER-2015-YangMT #design pattern #detection #quality
Measuring the quality of design pattern detection results (SY, AM, VT), pp. 53–62.
SCAMSCAM-2015-FenskeSMS #detection #smell #variability
When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAMSCAM-2015-NicolayNRM #detection #javascript
Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
PLDIPLDI-2015-OlivoDL #debugging #detection #performance #static analysis #traversal
Static detection of asymptotic performance bugs in collection traversals (OO, ID, CL), pp. 369–378.
FMFM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
GaMGaM-2015-KulcsarDLVS #detection #graph transformation
Improved Conflict Detection for Graph Transformation with Attributes (GK, FD, ML, GV, AS), pp. 97–112.
GaMGaM-2015-RadwanH #detection #refactoring #smell
Detecting and Refactoring Operational Smells within the Domain Name System (MR, RH), pp. 113–128.
GaMGaM-2015-Wijs #confluence #detection #lts
Confluence Detection for Transformations of Labelled Transition Systems (AW), pp. 1–15.
CHICHI-2015-GoelZVP #detection #flexibility #gesture #named #using
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-HuberLP #detection
Detecting User Intention at Public Displays from Foot Positions (BH, JHL, JHP), pp. 3899–3902.
CHICHI-2015-KimCD #detection #interactive #monitoring
Sensors Know When to Interrupt You in the Car: Detecting Driver Interruptibility Through Monitoring of Peripheral Interactions (SK, JC, AKD), pp. 487–496.
CHICHI-2015-LiYS #detection #interactive #named
IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
CHICHI-2015-ManciniHAG #detection #interface #multi
Re-Centering Multispecies Practices: A Canine Interface for Cancer Detection Dogs (CM, RH, BA, CG), pp. 2673–2682.
CHICHI-2015-OhCKL #detection #documentation #named
ScanShot: Detecting Document Capture Moments and Correcting Device Orientation (JO, WC, JK, UL), pp. 953–956.
CSCWCSCW-2015-AzariaRK #detection
An Agent for Deception Detection in Discussion Based Environments (AA, AR, SK), pp. 218–227.
CSCWCSCW-2015-FreitasD15a #detection #multi #using
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
HCIHCI-IT-2015-BrahnamRNSB #design #detection
Design of a Bullying Detection/Alert System for School-Wide Intervention (SB, JJR, LN, CLS, SLB), pp. 695–705.
HCIHCI-IT-2015-FukumotoTE #detection #using
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-UC-2015-SanchezA #automation #detection #interface #internet
Automatic Deformations Detection in Internet Interfaces: ADDII (LS, PTAJ), pp. 43–53.
HCILCT-2015-Ai #automation #detection #fault #feedback #generative
Automatic Pronunciation Error Detection and Feedback Generation for CALL Applications (RA), pp. 175–186.
HCILCT-2015-CastilloDSTC #detection #student
Model for Detecting Student Difficulties in Solving Formative Assessments (CC, NDD, AS, VT, DAOC), pp. 199–207.
HCISCSM-2015-Kanawati #community #detection #network
Ensemble Selection for Community Detection in Complex Networks (RK), pp. 138–147.
CAiSECAiSE-2015-KhelladiHBRG #detection #evolution #metamodelling
Detecting Complex Changes During Metamodel Evolution (DEK, RH, RB, JR, MPG), pp. 263–278.
CAiSECAiSE-2015-WeilerGS #detection #performance #runtime #twitter
Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
ICEISICEIS-v1-2015-BedoBOCCRTT #detection #effectiveness #image #performance #social #social media
Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
ICEISICEIS-v1-2015-Xylogiannopoulos #detection #roadmap
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-CostaMAO #automation #consistency #detection #named #nondeterminism
Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
ECIRECIR-2015-BuitinckATR #detection #multi
Multi-emotion Detection in User-Generated Reviews (LB, JvA, ET, MdR), pp. 43–48.
ECIRECIR-2015-CaoC #analysis #behaviour #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-Dori-HacohenA #automation #detection #web
Automated Controversy Detection on the Web (SDH, JA), pp. 423–434.
ECIRECIR-2015-HagenPBS #classification #detection #sentiment #twitter #using
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-LiangCC #approach #detection #social #social media
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIRECIR-2015-LimCLK #community #constraints #detection #using
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-YangLW #detection
Detecting the Eureka Effect in Complex Search (HY, JL, CW), pp. 734–740.
ICMLICML-2015-AvronH #community #detection #personalisation #rank #using
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #detection #semantics #using
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-GornitzBK #detection #markov
Hidden Markov Anomaly Detection (NG, MLB, MK), pp. 1833–1842.
ICMLICML-2015-HockingRB #detection #learning #named #segmentation
PeakSeg: constrained optimal segmentation and supervised penalty learning for peak detection in count data (TH, GR, GB), pp. 324–332.
KDDKDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
KDDKDD-2015-FakhraeiFSG #detection #evolution #multi #network #social
Collective Spammer Detection in Evolving Multi-Relational Social Networks (SF, JRF, MVSS, LG), pp. 1769–1778.
KDDKDD-2015-HayashiMTK #detection #realtime #topic #twitter
Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
KDDKDD-2015-LaptevAF #automation #detection #framework #scalability
Generic and Scalable Framework for Automated Time-series Anomaly Detection (NL, SA, IF), pp. 1939–1947.
KDDKDD-2015-LiuC #challenge #detection #social #social media
Social Media Anomaly Detection: Challenges and Solutions (YL, SC), pp. 2317–2318.
KDDKDD-2015-MitzenmacherPPT #clique #detection #network #scalability
Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling (MM, JP, RP, CET, SCX), pp. 815–824.
KDDKDD-2015-NairRKBSKHD #detection #learning #monitoring
Learning a Hierarchical Monitoring System for Detecting and Diagnosing Service Issues (VN, AR, SK, VB, SS, SSK, SH, SD), pp. 2029–2038.
KDDKDD-2015-QahtanAWZ #data type #detection #framework #multi
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams (AAQ, BA, SW, XZ), pp. 935–944.
KDDKDD-2015-RayanaA #bibliography #detection #metadata #network
Collective Opinion Spam Detection: Bridging Review Networks and Metadata (SR, LA), pp. 985–994.
KDDKDD-2015-ShaoHYZ #community #detection #distance
Community Detection based on Distance Dynamics (JS, ZH, QY, TZ), pp. 1075–1084.
KDDKDD-2015-TsengYHKC #detection #framework #named
FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (VST, JCY, CWH, YK, KTC), pp. 2157–2166.
SEKESEKE-2015-HughesDH #detection #streaming
Detecting Reporting Anomalies in Streaming Sensing Systems (SH, YD, JOH), pp. 427–432.
SEKESEKE-2015-LinYX #automation #detection #generative #parametricity #testing
Automatic Detection of Parameter Shielding for Test Case Generation (JL, JY, JX), pp. 571–574.
SEKESEKE-2015-SaharAA #approach #case study #detection #image #modelling #prototype
A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKESEKE-2015-SalehianF #detection #embedded #monitoring #realtime
Embedded Real Time Blink Detection System for Driver Fatigue Monitoring (SS, BF), pp. 188–194.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-WanderleyP #detection #folksonomy #learning
Learning Folksonomies for Trend Detection in Task-Oriented Dialogues (GW, ECP), pp. 483–488.
SEKESEKE-2015-WangSZ #detection #execution #symbolic computation
Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection (YW, HS, QZ), pp. 536–539.
SIGIRSIGIR-2015-ChenC #detection #web
Opinion Spammer Detection in Web Forum (YRC, HHC), pp. 759–762.
SIGIRSIGIR-2015-DijkTR #community #detection #topic
Early Detection of Topical Expertise in Community Question Answering (DvD, MT, MdR), pp. 995–998.
SIGIRSIGIR-2015-Dori-Hacohen #analysis #detection
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
MoDELSMoDELS-2015-StephanC #clone detection #detection #identification #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
ECOOPECOOP-2015-FangDX #detection #named #performance #problem
PerfBlower: Quickly Detecting Memory-Related Performance Problems via Amplification (LF, LD, G(X), pp. 296–320.
OOPSLAOOPSLA-2015-AchourR #approximate #detection
Approximate computation with outlier detection in Topaz (SA, MCR), pp. 711–730.
OOPSLAOOPSLA-2015-BielikRV #android #concurrent #detection #scalability
Scalable race detection for Android applications (PB, VR, MTV), pp. 332–348.
OOPSLAOOPSLA-2015-HagueLO #approach #css #detection #html
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
PPDPPPDP-2015-StievenartNMR #abstract interpretation #concurrent #debugging #detection #higher-order #source code
Detecting concurrency bugs in higher-order programs through abstract interpretation (QS, JN, WDM, CDR), pp. 232–243.
REFSQREFSQ-2015-DaunWP #detection #embedded #requirements
Detecting and Correcting Outdated Requirements in Function-Centered Engineering of Embedded Systems (MD, TW, KP), pp. 65–80.
SACSAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-AttiaTHKTC #detection
On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
SACSAC-2015-AwadBESAS #anti #approach #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-BezuBRVVF #component #detection #multi #similarity #web
Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SACSAC-2015-ColantonioPPS #bibliography #detection #visual notation
Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
SACSAC-2015-DabainMT #design pattern #detection #using
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SACSAC-2015-GotoT #communication #detection #network #visual notation
Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-OliveiraQMM #community #complexity #detection #using
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-RegoMP #approach #detection #folksonomy #learning
A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SACSAC-2015-Rekha #big data #detection #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-SantiagoPH #approach #detection #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SACSAC-2015-SantosM #detection
Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
ESEC-FSEESEC-FSE-2015-BellKMD #dependence #detection #java #performance
Efficient dependency detection for safe Java test acceleration (JB, GEK, EM, MD), pp. 770–781.
ESEC-FSEESEC-FSE-2015-CaiC #detection #effectiveness #java #precise #source code
Effective and precise dynamic detection of hidden races for Java programs (YC, LC), pp. 450–461.
ESEC-FSEESEC-FSE-2015-MutluTL #detection #javascript #matter
Detecting JavaScript races that matter (EM, ST, BL), pp. 381–392.
ESEC-FSEESEC-FSE-2015-NguyenNDKN #detection #execution #semantics #variability
Detecting semantic merge conflicts with variability-aware execution (HVN, MHN, SCD, CK, TNN), pp. 926–929.
ESEC-FSEESEC-FSE-2015-RajagopalanH #concurrent #detection #named
RDIT: race detection from incomplete traces (AKR, JH), pp. 914–917.
ESEC-FSEESEC-FSE-2015-SafiSHM #detection
Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
ESEC-FSEESEC-FSE-2015-SamakR #detection #testing
Synthesizing tests for detecting atomicity violations (MS, MKR), pp. 131–142.
ICSEICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSEICSE-v1-2015-NistorCRL #detection #named #performance #problem
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
ICSEICSE-v1-2015-OcarizaP0 #consistency #detection #javascript #mvc #nondeterminism
Detecting Inconsistencies in JavaScript MVC Applications (FSOJ, KP, AM), pp. 325–335.
ICSEICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
ICSEICSE-v1-2015-PastoreM #detection #named
ZoomIn: Discovering Failures by Detecting Wrong Assertions (FP, LM), pp. 66–76.
ICSEICSE-v1-2015-ZouWXZSM #algorithm #detection #float #search-based
A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies (DZ, RW, YX, LZ, ZS, HM), pp. 529–539.
ICSEICSE-v2-2015-FooJAHZF #automation #case study #detection #industrial #performance
An Industrial Case Study on the Automated Detection of Performance Regressions in Heterogeneous Environments (KCF, ZMJ, BA, AEH, YZ, PF), pp. 159–168.
ICSEICSE-v2-2015-Hecht #android #approach #detection
An Approach to Detect Android Antipatterns (GH), pp. 766–768.
ICSEICSE-v2-2015-HerzigN #detection #empirical #using
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-HollandDKMR #android #detection #novel #security
Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
ICSEICSE-v2-2015-Palomba #analysis #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
SPLCSPLC-2015-SoutoGdMKB #debugging #detection #feature model #modelling #performance #product line
Faster bug detection for software product lines with incomplete feature models (SS, DG, Md, DM, SK, DSB), pp. 151–160.
HPCAHPCA-2015-OzsoyDGAP #detection #framework #online #performance
Malware-aware processors: A framework for efficient online malware detection (MO, CD, IG, NBAG, DVP), pp. 651–661.
HPDCHPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
PPoPPPPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread
Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
PPoPPPPoPP-2015-McPhersonNSC #detection #legacy #source code
Fence placement for legacy data-race-free programs via synchronization read detection (AJM, VN, SS, MC), pp. 249–250.
ICSTICST-2015-ArcainiGV #detection #fault #feature model #generative #modelling #testing
Generating Tests for Detecting Faults in Feature Models (PA, AG, PV), pp. 1–10.
ICSTICST-2015-BardinDDKPTM #detection #requirements
Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
ICSTICST-2015-MahajanH #detection #html #locality #using
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-WanJLH #android #detection #energy
Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
ICSTICST-2015-XuLCK #approach #bound #detection #lightweight #thread
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ISSTAISSTA-2015-GyoriSHM #dependence #detection #reliability #testing
Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
ISSTAISSTA-2015-HayTP #android #communication #detection
Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
ISSTAISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based #using
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTAISSTA-2015-WangGMC #android #approach #clone detection #detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
ISSTAISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling
Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
ISSTAISSTA-2015-ZhangE #detection #fault
Proactive detection of inadequate diagnostic messages for software configuration errors (SZ, MDE), pp. 12–23.
ICSTSAT-2015-AnsoteguiGLS #community #detection #using
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
CBSECBSE-2014-DidierM #approach #component #detection
A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
ECSAECSA-2014-PalmaMTG #detection #specification #web #web service
Specification and Detection of SOA Antipatterns in Web Services (FP, NM, GT, YGG), pp. 58–73.
QoSAQoSA-2014-WertOHF #anti #automation #component #detection #performance
Automatic detection of performance anti-patterns in inter-component communications (AW, MO, CH, RF), pp. 3–12.
ASEASE-2014-LiuSLZWDW #automation #case study #detection #documentation #fault
Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASEASE-2014-ThungKL #debugging #detection #named #tool support
DupFinder: integrated tool support for duplicate bug report detection (FT, PSK, DL), pp. 871–874.
CASECASE-2014-CanaliCCSEC #assembly #automation #detection #industrial
An automatic assembly parts detection and grasping system for industrial manufacturing (CC, FC, FC, GS, AE, DGC), pp. 215–220.
CASECASE-2014-ChiuC #bound #detection #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASECASE-2014-KuoSLW #3d #detection #estimation #image
3D object detection and pose estimation from depth image for robotic bin picking (HYK, HRS, SHL, CCW), pp. 1264–1269.
CASECASE-2014-YuM #approach #data-driven #detection #statistics
Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
DACDAC-2014-CuiMSW #detection #hardware #runtime #synthesis
High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
DACDAC-2014-HernandezA #detection #fault #named #safety
LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
DACDAC-2014-LiuHM #detection #hardware #statistics
Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
DACDAC-2014-RaiHST #detection #fault #framework #performance #realtime
An Efficient Real Time Fault Detection and Tolerance Framework Validated on the Intel SCC Processor (DR, PH, NS, LT), p. 6.
DACDAC-2014-VaidyanathanDP #detection #reliability #stack #using
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-XiaCK #algorithm #automation #detection #development
An Automobile Detection Algorithm Development for Automated Emergency Braking System (LX, TDC, KAAK), p. 6.
DATEDATE-2014-AndradesRC #design #detection
Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
DATEDATE-2014-BardizbanyanSWL #data flow #dependence #detection #energy
Reducing set-associative L1 data cache energy by early load data dependence detection (ELD3) (AB, MS, DBW, PLE), pp. 1–4.
DATEDATE-2014-Fu0PJZ #data flow #detection #fault #parallel #thread
A fault detection mechanism in a Data-flow scheduled Multithreaded processor (JF, QY, RP, CRJ, CZ), pp. 1–4.
DATEDATE-2014-JunsangsriLH #concurrent #detection #hybrid
A hybrid non-volatile SRAM cell with concurrent SEU detection and correction (PJ, FL, JH), pp. 1–4.
DATEDATE-2014-KordesVDW #detection #fault #hybrid #network #robust
Startup error detection and containment to improve the robustness of hybrid FlexRay networks (AK, BV, AKD, MGW), pp. 1–6.
DATEDATE-2014-Maurer #algorithm #detection #symmetry
A universal symmetry detection algorithm (PMM), pp. 1–4.
DATEDATE-2014-MurilloWCLA #automation #concurrent #constraints #debugging #detection
Automatic detection of concurrency bugs through event ordering constraints (LGM, SW, JC, RL, GA), pp. 1–6.
DATEDATE-2014-NathanS #detection #fault #low cost #named
Nostradamus: Low-cost hardware-only error detection for processor cores (RN, DJS), pp. 1–6.
DocEngDocEng-2014-BarabucciBIMM #detection #documentation #modelling #visualisation
Document changes: modeling, detection, storage and visualization (DChanges 2014) (GB, UMB, ADI, SM, EVM), pp. 207–208.
DocEngDocEng-2014-DohrnR #detection #documentation #fine-grained
Fine-grained change detection in structured text documents (HD, DR), pp. 87–96.
DocEngDocEng-2014-FerilliGRE #detection #order
Abstract argumentation for reading order detection (SF, DG, DR, FE), pp. 45–48.
HTHT-2014-HerzigMR #detection #social #social media #topic
An author-reader influence model for detecting topic-based influencers in social media (JH, YM, HR), pp. 46–55.
SIGMODSIGMOD-2014-Dev #algorithm #community #detection #interactive #network #online #social
A user interaction based community detection algorithm for online social networks (HD), pp. 1607–1608.
SIGMODSIGMOD-2014-Dev14a #community #detection #graph #precise #privacy #social
Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
SIGMODSIGMOD-2014-ShaoCC #detection #parallel #performance
Efficient cohesive subgraphs detection in parallel (YS, LC, BC), pp. 613–624.
VLDBVLDB-2014-ChenNC #detection #performance #sql
Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
VLDBVLDB-2014-GuptaSGGZLL #detection #graph #online #realtime #recommendation #scalability #twitter
Real-Time Twitter Recommendation: Online Motif Detection in Large Dynamic Graphs (PG, VS, AG, SG, VZ, QL, JL), pp. 1379–1380.
VLDBVLDB-2014-LondheGZNS #community #detection
Matching Titles with Cross Title Web-Search Enrichment and Community Detection (NL, VG, AZ, HQN, RKS), pp. 1167–1178.
VLDBVLDB-2014-YuYWLC #big data #classification #design #detection #power management
Big Data Small Footprint: The Design of A Low-Power Classifier for Detecting Transportation Modes (MCY, TY, SCW, CJL, EYC), pp. 1429–1440.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic #using
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-FinkbeinerT #detection #distributed #specification
Detecting Unrealizable Specifications of Distributed Systems (BF, LT), pp. 78–92.
SANERCSMR-WCRE-2014-DingZT #branch #detection
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
SANERCSMR-WCRE-2014-MondalRS14a #detection
Improving the detection accuracy of evolutionary coupling by measuring change correspondence (MM, CKR, KAS), pp. 358–362.
SANERCSMR-WCRE-2014-UjhelyiHVCSVF #comparison #detection #query
Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
SANERCSMR-WCRE-2014-VidacsBTSG #approach #detection #fault #locality #reduction #testing
Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPCICPC-2014-TianZLFZY #detection #parallel #thread
Plagiarism detection for multithreaded software based on thread-aware software birthmarks (ZT, QZ, TL, MF, XZ, ZY), pp. 304–313.
ICSMEICSME-2014-AbreuCFMPS14a #detection #fault #locality #smell
FaultySheet Detective: When Smells Meet Fault Localization (RA, JC, JPF, PM, AP, JS), pp. 625–628.
ICSMEICSME-2014-BauerVJ #approach #detection #novel
A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSMEICSME-2014-Kumar #collaboration #detection #source code
Detecting Collaborative Patterns in Programs (KK), p. 664.
ICSMEICSME-2014-Palma #detection #specification
Specification and Detection of SOA Antipatterns (FP), p. 670.
ICSMEICSME-2014-PonzanelliMBLF #detection #quality #stack overflow
Improving Low Quality Stack Overflow Post Detection (LP, AM, AB, ML, DF), pp. 541–544.
ICSMEICSME-2014-SvajlenkoR #clone detection #detection #tool support
Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
MSRMSR-2014-KleinCK #debugging #detection
New features for duplicate bug detection (NK, CSC, NAK), pp. 324–327.
MSRMSR-2014-LazarRS #debugging #detection #metric #similarity #using
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-MurtazaHKC #automation #detection
Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
PEPMPEPM-2014-0008E #c++ #detection #fault
Early detection of type errors in C++ templates (SC, ME), pp. 133–144.
PLDIPLDI-2014-DimitrovRVK #commutative #concurrent #detection
Commutativity race detection (DD, VR, MTV, EK), p. 33.
PLDIPLDI-2014-HsiaoPYPNCKF #concurrent #detection #mobile
Race detection for event-driven mobile applications (CHH, CP, JY, GP, SN, PMC, ZK, JF), p. 35.
PLDIPLDI-2014-HuangMR #abstraction #concurrent #control flow #detection #predict
Maximal sound predictive race detection with control flow abstraction (JH, POM, GR), p. 36.
PLDIPLDI-2014-MaiyaKM #android #concurrent #detection
Race detection for Android applications (PM, AK, RM), p. 34.
PLDIPLDI-2014-TavarageriKS #detection #fault #memory management
Compiler-assisted detection of transient memory errors (ST, SK, PS), p. 24.
STOCSTOC-2014-Massoulie #community #detection
Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
SEFMSEFM-2014-AlrajehC #automation #composition #detection #specification
Automated Error-Detection and Repair for Compositional Software Specifications (DA, RC), pp. 111–127.
SEFMSEFM-2014-ChristakisMW #detection #invariant #testing
Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations (MC, PM, VW), pp. 65–80.
SFMSFM-2014-GiachinoL #concurrent #detection #linear #recursion #source code
Deadlock Detection in Linear Recursive Programs (EG, CL), pp. 26–64.
CHICHI-2014-HautasaariYG #communication #detection #quote
“Maybe it was a joke”: emotion detection in text-only communication by non-native english speakers (AMJH, NY, GG), pp. 3715–3724.
CHICHI-2014-SunPC #detection #named
MouStress: detecting stress from mouse motion (DS, PP, JC), pp. 61–70.
HCIDUXU-DI-2014-Al-SalhieAA #detection #multi
Multimedia Surveillance in Event Detection: Crowd Analytics in Hajj (LAS, MAZ, AAW), pp. 383–392.
HCIDUXU-DI-2014-GencerBZV #detection #machine learning #mobile
Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
HCIDUXU-DI-2014-HeZL #detection #fault #feature model #image #segmentation
Aluminum CT Image Defect Detection Based on Segmentation and Feature Extraction (NH, LZ, KL), pp. 446–454.
HCIHCI-AIMT-2014-HottaHOK #detection #estimation #fault #multi
Detecting Address Estimation Errors from Users’ Reactions in Multi-user Agent Conversation (RH, HHH, SO, KK), pp. 245–253.
HCIHCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov #using
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TewsOFK #detection #interface #research
Current and New Research Perspectives on Dynamic Facial Emotion Detection in Emotional Interface (TKT, MO, HF, TK), pp. 779–787.
HCILCT-TRE-2014-YamaguchiSYNSM #collaboration #detection #distance #learning
Posture and Face Detection with Dynamic Thumbnail Views for Collaborative Distance Learning (TY, HS, MY, YN, HS, TM), pp. 227–236.
HCISCSM-2014-Ahangama #detection #realtime #social #social media #twitter
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-Kanawati #community #detection #network
Seed-Centric Approaches for Community Detection in Complex Networks (RK), pp. 197–208.
CAiSECAiSE-2014-PadilhaPFAGS #detection #effectiveness #empirical #metric #on the #smell
On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
ICEISICEIS-v1-2014-Lenz #detection
Data Fraud Detection (HJL), p. XV.
ICEISICEIS-v1-2014-MezghaniPZAS #detection #social
Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters #using
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-GippMBPN #detection #semantics #similarity #using #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-ThorntonCPHM #detection #health
Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
CIKMCIKM-2014-AnchuriSS #architecture #detection
Hotspot Detection in a Service-Oriented Architecture (PA, RS, SS), pp. 1749–1758.
CIKMCIKM-2014-KiselevaCBD #detection #modelling #user satisfaction
Modelling and Detecting Changes in User Satisfaction (JK, EC, RB, RD), pp. 1449–1458.
CIKMCIKM-2014-LefortierSR #detection #online
Online Exploration for Detecting Shifts in Fresh Intent (DL, PS, MdR), pp. 589–598.
CIKMCIKM-2014-OuyangSTN #crowdsourcing #detection
Truth Discovery in Crowdsourced Detection of Spatial Events (WRO, MBS, AT, TJN), pp. 461–470.
CIKMCIKM-2014-ShihKRCGSP #component #detection #network
Component Detection in Directed Networks (YKS, SK, YR, JC, AG, TS, SP), pp. 1729–1738.
CIKMCIKM-2014-ShuLLYT #detection
Deal or deceit: detecting cheating in distribution channels (KS, PL, WL, PY, LT), pp. 1419–1428.
CIKMCIKM-2014-TakayamaTIOFC #detection #probability
A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
CIKMCIKM-2014-TangWPTL #approach #detection
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKMCIKM-2014-WangWC #community #detection #named #network #social
CoDEM: An Ingenious Tool of Insight into Community Detection in Social Networks (MW, CW, JC), pp. 2006–2008.
CIKMCIKM-2014-YangLLLH #automation #clustering #detection #multi #social #using
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
ECIRECIR-2014-CorneyMG #detection #twitter
Spot the Ball: Detecting Sports Events on Twitter (DC, CJM, AG), pp. 449–454.
ECIRECIR-2014-GalleR #detection
Boilerplate Detection and Recoding (MG, JMR), pp. 462–467.
ECIRECIR-2014-PanemBGV #detection #realtime #topic #twitter #using
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchallerHE #detection #smarttech
Detecting Event Visits in Urban Areas via Smartphone GPS Data (RS, MH, DE), pp. 681–686.
ECIRECIR-2014-ThumaRO #detection #query #retrieval
Detecting Missing Content Queries in an SMS-Based HIV/AIDS FAQ Retrieval System (ET, SR, IO), pp. 247–259.
ICMLICML-c1-2014-ChenSMKWK #adaptation #detection
Active Detection via Adaptive Submodularity (YC, HS, CFM, LPK, SW, AK), pp. 55–63.
ICMLICML-c2-2014-AhmedTBZDKB #detection #random
Hierarchical Conditional Random Fields for Outlier Detection: An Application to Detecting Epileptogenic Cortical Malformations (BA, TT, KB, YZ, OD, RK, CEB), pp. 1080–1088.
ICMLICML-c2-2014-HarelMEC #concept #detection
Concept Drift Detection Through Resampling (MH, SM, REY, KC), pp. 1009–1017.
ICPRICPR-2014-0005ZTS #detection #segmentation
Human Hair Segmentation and Length Detection for Human Appearance Model (YW, ZZ, EKT, BS), pp. 450–454.
ICPRICPR-2014-AkinM #detection #learning #online
Online Learning and Detection with Part-Based, Circulant Structure (OA, KM), pp. 4229–4233.
ICPRICPR-2014-AlyuzGA #3d #detection #recognition #robust
Detection of Realistic Facial Occlusions for Robust 3D Face Recognition (NA, BG, LA), pp. 375–380.
ICPRICPR-2014-BalntasTM #detection
Improving Object Tracking with Voting from False Positive Detections (VB, LT, KM), pp. 1928–1933.
ICPRICPR-2014-BartoliLKBB #adaptation #detection #multi #performance
Unsupervised Scene Adaptation for Faster Multi-scale Pedestrian Detection (FB, GL, SK, ADB, ADB), pp. 3534–3539.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BougueliaBB #classification #data type #detection #novel #performance
Efficient Active Novel Class Detection for Data Stream Classification (MRB, YB, AB), pp. 2826–2831.
ICPRICPR-2014-BrownFP #detection #self #using
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNLYK #detection #order #statistics #using
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-CechFM #3d #approach #detection #refinement
A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPRICPR-2014-ChenH #composition #detection
Implicit Rank-Sparsity Decomposition: Applications to Saliency/Co-saliency Detection (YLC, CTH), pp. 2305–2310.
ICPRICPR-2014-ChenLHLLH #detection #using
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenSPS #detection #energy #statistics
Statistical Anomaly Detection in Mean and Variation of Energy Consumption (BC, MS, JP, AS), pp. 3570–3575.
ICPRICPR-2014-ChenWCN #detection #fault #modelling #network
Confusion Network Based Recurrent Neural Network Language Modeling for Chinese OCR Error Detection (JC, YW, HC, PN), pp. 1266–1271.
ICPRICPR-2014-Climent-PerezMR #detection #multi #using
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-ContiFAAMCT #detection #distance #evaluation
Evaluation of Time Series Distance Functions in the Task of Detecting Remote Phenology Patterns (JCC, FAF, JA, BA, LPCM, LC, RdST), pp. 3126–3131.
ICPRICPR-2014-DingM #approach #detection #image
An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPRICPR-2014-ElmikatyS #detection #image #multi #using
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-FerisBPS #detection
Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
ICPRICPR-2014-FiratCV #detection #learning #representation
Representation Learning for Contextual Object and Region Detection in Remote Sensing (OF, GC, FTYV), pp. 3708–3713.
ICPRICPR-2014-FradiD #detection #recognition
Sparse Feature Tracking for Crowd Change Detection and Event Recognition (HF, JLD), pp. 4116–4121.
ICPRICPR-2014-FuGYGY #detection #graph
Graph Construction for Salient Object Detection in Videos (KF, IYHG, YY, CG, JY), pp. 2371–2376.
ICPRICPR-2014-GomezK #detection #realtime
MSER-Based Real-Time Text Detection and Tracking (LG, DK), pp. 3110–3115.
ICPRICPR-2014-HedjamCK #detection #documentation #energy #image #multi #self
Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
ICPRICPR-2014-HuWSC #detection #framework #robust #using
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-JhuoL #detection #learning #multi #video
Video Event Detection via Multi-modality Deep Learning (IHJ, DTL), pp. 666–671.
ICPRICPR-2014-KamberovBKK #detection #video
Unsupervised Detection of Video Sub-scenes (GK, MB, LK, OK), pp. 1934–1939.
ICPRICPR-2014-KawarabukiO #detection
Snowfall Detection in a Foggy Scene (HK, KO), pp. 877–882.
ICPRICPR-2014-LablackDBD #approach #detection
A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPRICPR-2014-LemesSBS #authentication #detection
Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
ICPRICPR-2014-LiangLLFL #detection #modelling
Accurate Facial Landmarks Detection for Frontal Faces with Extended Tree-Structured Models (AL, WL, LL, MRF, VL), pp. 538–543.
ICPRICPR-2014-LiewY #detection #feature model #novel #performance #robust
Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
ICPRICPR-2014-LimKLC #detection #similarity
Crowd Saliency Detection via Global Similarity Structure (MKL, VJK, CCL, CSC), pp. 3957–3962.
ICPRICPR-2014-LinCCLH #analysis #detection
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LiuCL #detection #segmentation
Exploring Depth Information for Object Segmentation and Detection (TLL, KYC, SHL), pp. 4340–4345.
ICPRICPR-2014-LiuZZL #detection #realtime
Real-Time Scene Text Detection Based on Stroke Model (YL, DZ, YZ, SL), pp. 3116–3120.
ICPRICPR-2014-LuWMST #detection #modelling
Anomaly Detection through Spatio-temporal Context Modeling in Crowded Scenes (TL, LW, XM, PS, CLT), pp. 2203–2208.
ICPRICPR-2014-LuWW #detection #summary
Audiotory Movie Summarization by Detecting Scene Changes and Sound Events (TL, YW, GW), pp. 756–760.
ICPRICPR-2014-MaB #detection #incremental #random
Compound Exemplar Based Object Detection by Incremental Random Forest (KM, JBA), pp. 2407–2412.
ICPRICPR-2014-MatsuoSY #detection #image #using
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MatveevG #approximate #detection #segmentation
Iris Segmentation System Based on Approximate Feature Detection with Subsequent Refinements (IM, KG), pp. 1704–1709.
ICPRICPR-2014-MekonnenLHB #detection #optimisation #people
People Detection with Heterogeneous Features and Explicit Optimization on Computation Time (AAM, FL, AH, CB), pp. 4322–4327.
ICPRICPR-2014-MeloLMS #approach #detection
An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPRICPR-2014-MolderCCH #automation #detection #reduction #using
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MoriKNK #detection #using #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MuddamsettySTM #detection #using
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NilssonAGF #detection #using
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NilufarP #detection #learning #programming
Learning to Detect Contours with Dynamic Programming Snakes (SN, TJP), pp. 984–989.
ICPRICPR-2014-OzkanEA #detection #video #visual notation
Visual Group Binary Signature for Video Copy Detection (, EE, GBA), pp. 3945–3950.
ICPRICPR-2014-PakKA #detection #probability
Improvement of Benign and Malignant Probability Detection Based on Non-subsample Contourlet Transform and Super-resolution (FP, HRK, AA), pp. 895–899.
ICPRICPR-2014-PanagiotakisK #automation #detection #fault
Automatic Enhancement and Detection of Active Sea Faults from Bathymetry (CP, EK), pp. 855–860.
ICPRICPR-2014-PedagadiOB #detection
Integral Line Scan Features for Pedestrian Detection (SP, JO, BAB), pp. 2383–2388.
ICPRICPR-2014-PistocchiCBFC #3d #classification #detection #kernel
Kernelized Structural Classification for 3D Dogs Body Parts Detection (SP, SC, SB, NF, RC), pp. 1993–1998.
ICPRICPR-2014-RahmanHZ #detection
Information Divergence Based Saliency Detection with a Global Center-Surround Mechanism (IMHR, CH, MZ), pp. 3428–3433.
ICPRICPR-2014-RamirezOT #detection #multi
Go with the Flow: Improving Multi-view Vehicle Detection with Motion Cues (AR, EOB, MMT), pp. 4140–4145.
ICPRICPR-2014-RazakarivonyJ #detection
Discriminative Autoencoders for Small Targets Detection (SR, FJ), pp. 3528–3533.
ICPRICPR-2014-RiabchenkoKC14a #detection
Density-Aware Part-Based Object Detection with Positive Examples (ER, JKK, KC), pp. 2814–2819.
ICPRICPR-2014-SantoshWAT #detection #image #scalability
Scalable Arrow Detection in Biomedical Images (KCS, LW, SA, GRT), pp. 3257–3262.
ICPRICPR-2014-SariE #analysis #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SchubertM #detection #robust
Robust Registration and Filtering for Moving Object Detection in Aerial Videos (FS, KM), pp. 2808–2813.
ICPRICPR-2014-SinghKZ #detection #difference #image #markov #multi #scalability
A Multilayer Markovian Model for Change Detection in Aerial Image Pairs with Large Time Differences (PS, ZK, JZ), pp. 924–929.
ICPRICPR-2014-SongSLZZC #detection #image
Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
ICPRICPR-2014-SuL #detection
High-Stakes Deception Detection Based on Facial Expressions (LS, MDL), pp. 2519–2524.
ICPRICPR-2014-SunHJC #detection #image #network #robust
Robust Text Detection in Natural Scene Images by Generalized Color-Enhanced Contrasting Extremal Region and Neural Networks (LS, QH, WJ, KC), pp. 2715–2720.
ICPRICPR-2014-SunZL #adaptation #detection
An Adaptive-Profile Active Shape Model for Facial-Feature Detection (KS, HZ, KML), pp. 2849–2854.
ICPRICPR-2014-TaniH #detection #robust #using
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TavanaiSGCH #detection
Context Aware Detection and Tracking (AT, MS, FG, AGC, DCH), pp. 2197–2202.
ICPRICPR-2014-TuXN #analysis #detection #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-UbukataSTMKMU #detection #image #performance #segmentation
Fast Human Detection Combining Range Image Segmentation and Local Feature Based Detection (TU, MS, KT, AM, TK, GM, KU), pp. 4281–4286.
ICPRICPR-2014-WangFC #detection
Traffic Camera Anomaly Detection (YKW, CTF, JFC), pp. 4642–4647.
ICPRICPR-2014-WangFH0KH #detection #image #performance
Fast and Accurate Text Detection in Natural Scene Images with User-Intention (LW, WF, YH, JS, YK, YH), pp. 2920–2925.
ICPRICPR-2014-WangLSSC #detection #evaluation
Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos (CW, SL, YS, YS, HC), pp. 2596–2601.
ICPRICPR-2014-WuJ #detection #learning
Learning the Deep Features for Eye Detection in Uncontrolled Conditions (YW, QJ), pp. 455–459.
ICPRICPR-2014-YunJKHC #detection #modelling #performance #self
Self-Organizing Cascaded Structure of Deformable Part Models for Fast Object Detection (SY, HJ, WSK, BH, JYC), pp. 4246–4250.
ICPRICPR-2014-YunJYKC #detection #interactive #video
Motion Interaction Field for Accident Detection in Traffic Surveillance Video (KY, HJ, KMY, SWK, JYC), pp. 3062–3067.
ICPRICPR-2014-YuSZ #artificial reality #detection #image #realtime #sequence
Real Time Fingertip Detection with Kinect Depth Image Sequences (YY, YS, YZ), pp. 550–555.
ICPRICPR-2014-ZhangKBC #detection
Center-Surround Contrast Features for Pedestrian Detection (SZ, DAK, CB, ABC), pp. 2293–2298.
ICPRICPR-2014-ZhangLYQWTZ #detection #statistics
Sufficient Statistics Feature Mapping over Deep Boltzmann Machine for Detection (CZ, XL, JY, SQ, YW, CT, YZ), pp. 827–832.
ICPRICPR-2014-ZhangM14a #detection #learning #multi
Simultaneous Detection of Multiple Facial Action Units via Hierarchical Task Structure Learning (XZ, MHM), pp. 1863–1868.
KDDKDD-2014-BabaieCA #detection #online
Sleep analytics and online selective anomaly detection (TB, SC, RGA), pp. 362–371.
KDDKDD-2014-ChenN #detection #graph #parametricity #social #social media #statistics
Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs (FC, DBN), pp. 1166–1175.
KDDKDD-2014-DuanSLL #community #correlation #detection #graph
Community detection in graphs through correlation (LD, WNS, YL, HL), pp. 1376–1385.
KDDKDD-2014-FortunySMMPM #detection
Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
KDDKDD-2014-GunnemannGF #detection #evolution #probability #rating #robust
Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution (SG, NG, CF), pp. 841–850.
KDDKDD-2014-KlosterG #community #detection #kernel
Heat kernel based community detection (KK, DFG), pp. 1386–1395.
KDDKDD-2014-PerozziASM #clustering #detection #graph #scalability
Focused clustering and outlier detection in large attributed graphs (BP, LA, PIS, EM), pp. 1346–1355.
KDDKDD-2014-RozenshteinAGT #detection #network #process
Event detection in activity networks (PR, AA, AG, NT), pp. 1176–1185.
KDDKDD-2014-SchubertWK #detection #named #scalability #topic
SigniTrend: scalable detection of emerging topics in textual streams by hashed significance thresholds (ES, MW, HPK), pp. 871–880.
KDDKDD-2014-TamersoyRC #detection #graph #mining #scalability
Guilt by association: large scale malware detection by mining file-relation graphs (AT, KAR, DHC), pp. 1524–1533.
KDDKDD-2014-YuCRW #detection
Detecting moving object outliers in massive-scale trajectory streams (YY, LC, EAR, QW), pp. 422–431.
KDDKDD-2014-YuH0 #analysis #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDIRKDIR-2014-NagwanshiM #detection #semantics #sentiment #using
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-PassonneauRX #detection #mining #scalability
Company Mention Detection for Large Scale Text Mining (RJP, TR, BX), pp. 512–520.
MLDMMLDM-2014-AndreaSVU #detection #performance
A New Measure of Outlier Detection Performance (KA, GS, NV, AU), pp. 190–197.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-YuST #detection #modelling #realtime
Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic (BY, LS, MT), pp. 258–271.
RecSysRecSys-2014-TavakolB #detection #topic
Factored MDPs for detecting topics of user sessions (MT, UB), pp. 33–40.
SEKESEKE-2014-CostaMM #detection #diagrams #equivalence #semantics #uml
Detecting Semantic Equivalence in UML Class Diagrams (VOC, RM, LM), pp. 318–323.
SEKESEKE-2014-LiuTA #database #detection
Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
SEKESEKE-2014-Otunba0 #approximate #detection #named
APT: Approximate Period Detection in Time Series (RO, JL), pp. 490–494.
SEKESEKE-2014-SantosM #detection #identification
Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SIGIRSIGIR-2014-HuTL #detection #microblog
Leveraging knowledge across media for spammer detection in microblogging (XH, JT, HL), pp. 547–556.
SIGIRSIGIR-2014-KumarJF #detection #twitter #using
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-ParkS #detection #higher-order #modelling #probability
Second order probabilistic models for within-document novelty detection in academic articles (LAFP, SS), pp. 1103–1106.
SIGIRSIGIR-2014-SpinaGA #detection #learning #monitoring #online #similarity #topic
Learning similarity functions for topic detection in online reputation monitoring (DS, JG, EA), pp. 527–536.
SIGIRSIGIR-2014-ZhangKQH #detection #semantics #word
Continuous word embeddings for detecting local text reuses at the semantic level (QZ, JK, JQ, XH), pp. 797–806.
SIGIRSIGIR-2014-ZhouKWAD #detection #recommendation
Detection of abnormal profiles on group attacks in recommender systems (WZ, YSK, JW, SA, GD), pp. 955–958.
MODELSMoDELS-2014-ChavarriagaNCJ #detection #multi #process
Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
MODELSMoDELS-2014-ChavarriagaNCJ #detection #multi #process
Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
OOPSLAOOPSLA-2014-SamakR #concurrent #detection #parallel #synthesis #thread
Multithreaded test synthesis for deadlock detection (MS, MKR), pp. 473–489.
PLATEAUPLATEAU-2014-SadowskiY #concurrent #detection #developer #how #tool support
How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
LOPSTRLOPSTR-2014-SinghK #detection #java #partial evaluation
Partial Evaluation for Java Malware Detection (RS, AK), pp. 133–147.
RERE-2014-AdedjoumaSB #approach #automation #case study #detection
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
SACSAC-2014-ChenLFCCK #algorithm #design #detection #effectiveness #health #implementation #monitoring
Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
SACSAC-2014-ChenZW #detection #named #testing
Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
SACSAC-2014-Cooper #android #detection #research #student
Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
SACSAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SACSAC-2014-FreitasVHBV #detection #twitter
Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
SACSAC-2014-IencoBPP #category theory #data type #detection #evolution
Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
SACSAC-2014-JunAK #detection #using
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KimK #community #detection #mobile #network #social
A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
SACSAC-2014-NabeezathP #algorithm #detection #performance
Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
SACSAC-2014-PalVCS #detection #smarttech #using
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-PengYYHKH #3d #detection #multi #using
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
FSEFSE-2014-BanerjeeC0R #debugging #detection #energy #mobile
Detecting energy bugs and hotspots in mobile apps (AB, LKC, SC, AR), pp. 588–598.
FSEFSE-2014-Bell #dependence #detection #testing
Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
FSEFSE-2014-EslamimehrP #concurrent #detection #named #scalability #source code
Sherlock: scalable deadlock detection for concurrent programs (ME, JP), pp. 353–365.
FSEFSE-2014-FengADA #android #detection #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSEFSE-2014-HuoC #detection #quality #testing
Improving oracle quality by detecting brittle assertions and unused inputs in tests (CH, JC), pp. 621–631.
FSEFSE-2014-Kasi #detection #scheduling
Minimizing software conflicts through proactive detection of conflicts and task scheduling (BKK), pp. 807–810.
FSEFSE-2014-LuoMW0Z #comparison #detection #obfuscation #semantics #similarity
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
FSEFSE-2014-MileaJK #abstraction #detection #refactoring #scalability
Vector abstraction and concretization for scalable detection of refactorings (NAM, LJ, SCK), pp. 86–97.
FSEFSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
FSEFSE-2014-Xiao #architecture #debugging #detection
Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
ICSEICSE-2014-ChenLZ #android #detection #scalability
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets (KC, PL, YZ), pp. 175–186.
ICSEICSE-2014-ChenSJHNF #anti #detection #performance #using
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-DouCW #ambiguity #detection #smell #spreadsheet
Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation (WD, SCC, JW), pp. 848–858.
ICSEICSE-2014-HuangZTWL #android #behaviour #detection #named #user interface
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
ICSEICSE-2014-JungLRP #automation #detection #memory management
Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-LinXXLPSZ #detection #difference #multi
Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
ICSEICSE-2014-LiuXC #debugging #detection #performance #smarttech
Characterizing and detecting performance bugs for smartphone applications (YL, CX, SCC), pp. 1013–1024.
ICSEICSE-2014-NegaraCDJ #detection #fine-grained #mining
Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
ASPLOSASPLOS-2014-WoodCG #detection #low level
Low-level detection of language-level data races with LARD (BPW, LC, DG), pp. 671–686.
ASPLOSASPLOS-2014-ZhangRZGBXZ #correlation #detection #named
EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
CGOCGO-2014-SureshS #algorithm #automation #detection #fault #grid #problem
Automated Algorithmic Error Resilience for Structured Grid Problems Based on Outlier Detection (AS, JS), p. 240.
CGOCGO-2014-YanXYR #detection #memory management #named
LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPCAHPCA-2014-HuangHFS #concurrent #data transformation #detection #metadata #runtime
Low-overhead and high coverage run-time race detection through selective meta-data management (RCH, EH, AF, GES), pp. 96–107.
HPCAHPCA-2014-QiMAT #detection
Dynamically detecting and tolerating IF-Condition Data Races (SQ, AM, WA, JT), pp. 120–131.
OSDIOSDI-2014-ChenMXHPSZ #detection
Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
PPoPPPPoPP-2014-Bautista-GomezC #detection #monitoring
Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
PPoPPPPoPP-2014-LiuTHB #detection #named #predict
PREDATOR: predictive false sharing detection (TL, CT, ZH, EDB), pp. 3–14.
PPoPPPPoPP-2014-SamakR #concurrent #detection
Trace driven dynamic deadlock detection and reproduction (MS, MKR), pp. 29–42.
ICSTICST-2014-HongPK #concurrent #detection #fault #java #web
Detecting Concurrency Errors in Client-Side Java Script Web Applications (SH, YP, MK), pp. 61–70.
ICTSSICTSS-2014-Bures #automation #detection #maintenance #testing
Change Detection System for the Maintenance of Automated Testing (MB), pp. 192–197.
ISSTAISSTA-2014-AlshahwanH #detection #fault #testing
Coverage and fault detection of the output-uniqueness test selection criteria (NA, MH), pp. 181–192.
ISSTAISSTA-2014-ChoudharyPO14a #consistency #detection #named #nondeterminism #testing #web
X-PERT: a web application testing tool for cross-browser inconsistency detection (SRC, MRP, AO), pp. 417–420.
ISSTAISSTA-2014-MileaJK #detection #refactoring #scalability
Scalable detection of missed cross-function refactorings (NAM, LJ, SCK), pp. 138–148.
ISSTAISSTA-2014-ZhangC #automation #detection #exception #information management #lightweight
Lightweight automated detection of unsafe information leakage via exceptions (BZ, JC), pp. 327–338.
ICSTSAT-2014-BiereBLM #constraints #detection
Detecting Cardinality Constraints in CNF (AB, DLB, EL, NM), pp. 285–301.
ASEASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-Fard #behaviour #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-GhaisasMA #case study #detection #documentation
Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASEASE-2013-GuoZYZZ #android #detection
Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
ASEASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
ASEASE-2013-PalombaBPOLP #detection #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-RayKPR #consistency #detection #nondeterminism #semantics
Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
ASEASE-2013-Zhang0SLMD #automation #constraints #detection #symmetry
Constraint-based automatic symmetry detection (SJZ, JS, CS, YL, JM, JSD), pp. 15–25.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LinG #detection #framework #network #optimisation #synthesis
Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
CASECASE-2013-WeeklyRZBNS #detection #low cost #matter
Low-cost coarse airborne particulate matter sensing for indoor occupancy detection (KW, DR, LZ, AMB, WWN, CJS), pp. 32–37.
CASECASE-2013-YanLS #detection #fault #process #statistics
Fault detection of cooling coils based on unscented Kalman filters and statistical process control (YY, PBL, BS), pp. 237–242.
CASECASE-2013-ZhouL #detection #realtime #throughput
Real time electricity demand response for sustainable manufacturing systems considering throughput bottleneck detection (ZZ, LL), pp. 640–644.
DACDAC-2013-LiaoHL #detection #fault
GPU-based n-detect transition fault ATPG (KYL, SCH, JCML), p. 8.
DACDAC-2013-LinCLWC #detection #fuzzy #novel
A novel fuzzy matching model for lithography hotspot detection (SYL, JYC, JCL, WYW, SCC), p. 6.
DACDAC-2013-WangK #control flow #detection #hardware #kernel #named #performance #using
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-YuLJC #classification #detection #feature model #using
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AnanthanarayananGP #detection #fault #low cost #set #using
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-ChaG #approach #detection #effectiveness #metric
Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATEDATE-2013-DeOrioLBB #debugging #detection #machine learning
Machine learning-based anomaly detection for post-silicon bug diagnosis (AD, QL, MB, VB), pp. 491–496.
DATEDATE-2013-HuHMCF #detection #fault #realtime
Fault detection, real-time error recovery, and experimental demonstration for digital microfluidic biochips (KH, BNH, AM, KC, RBF), pp. 559–564.
DATEDATE-2013-HuNRK #detection #hardware #multimodal #using
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-KocBKE #detection #fault
Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
DATEDATE-2013-LinHLFGHM #challenge #detection #fault #validation
Overcoming post-silicon validation challenges through quick error detection (QED) (DL, TH, YL, FF, DSG, NH, SM), pp. 320–325.
DATEDATE-2013-PontarelliOEW #detection #fault #using
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-SarrazinENBG #concurrent #design #detection #fault #performance
Scan design with shadow flip-flops for low performance overhead and concurrent delay fault detection (SS, SE, LAdBN, YB, VG), pp. 1077–1082.
DATEDATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction #using
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-ZhaoLBT #detection #manycore #probability #runtime
Run-time probabilistic detection of miscalibrated thermal sensors in many-core systems (JZ, S(L, WB, RT), pp. 1395–1398.
DocEngDocEng-2013-BarabucciBIM #detection #documentation #modelling #visualisation
Document changes: modeling; detection; storing and visualization (DChanges) (GB, UMB, ADI, SM), pp. 281–282.
DocEngDocEng-2013-NevesZM #adaptation #algorithm #detection #documentation #image
An adaptive thresholding algorithm based on edge detection and morphological operations for document images (RFdPN, CZ, CABM), pp. 107–110.
DocEngDocEng-2013-WilliamsG #detection #library
Near duplicate detection in an academic digital library (KW, CLG), pp. 91–94.
DRRDRR-2013-LiWTL #comprehension #detection #image
Comic image understanding based on polygon detection (LL, YW, ZT, DL).
DRRDRR-2013-RazaAS #detection #image #multi
Multilingual artificial text detection and extraction from still images (AR, AA, IS).
DRRDRR-2013-SalahRP #adaptation #assessment #automation #detection #quality
Adaptive detection of missed text areas in OCR outputs: application to the automatic assessment of OCR quality in mass digitization projects (ABS, NR, TP).
HTHT-2013-JarukasemratanaML #algorithm #community #detection #distance #network
Community detection algorithm based on centrality and node distance in scale-free networks (SJ, TM, XL), pp. 258–262.
ICDARICDAR-2013-AlaeiDG #detection #probability #representation #using
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BertrandGTFO #detection #documentation
A System Based on Intrinsic Features for Fraudulent Document Detection (RB, PGK, ORT, PF, JMO), pp. 106–110.
ICDARICDAR-2013-ChenPCN #detection
Detecting OOV Names in Arabic Handwritten Data (JC, RP, HC, PN), pp. 994–998.
ICDARICDAR-2013-DiamantatosVK #detection #documentation #image
Detecting Main Body Size in Document Images (DP, VV, EK), pp. 1160–1164.
ICDARICDAR-2013-DiemKS #detection #documentation
Text Line Detection for Heterogeneous Documents (MD, FK, RS), pp. 743–747.
ICDARICDAR-2013-FernandezT #algorithm #detection
Handwritten Line Detection via an EM Algorithm (FCF, ORT), pp. 718–722.
ICDARICDAR-2013-GandhiJ #detection #documentation #image
Detection of Cut-and-Paste in Document Images (AG, CVJ), pp. 653–657.
ICDARICDAR-2013-GaoRKLSIK #detection #documentation #image #retrieval
Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
ICDARICDAR-2013-GaoWXSZLS #adaptation #detection
Adaptive Scene Text Detection Based on Transferring Adaboost (SG, CW, BX, CS, YZ, ZL, YS), pp. 388–392.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-HaoGZXPSK #automation #detection #fault #finite #transducer
Automated Error Detection and Correction of Chinese Characters in Written Essays Based on Weighted Finite-State Transducer (SH, ZG, MZ, YX, HP, KS, DK), pp. 763–767.
ICDARICDAR-2013-HuangSU #detection
Scene Character Detection by an Edge-Ray Filter (RH, PS, SU), pp. 462–466.
ICDARICDAR-2013-IdikaPV #detection
Achieving Linguistic Provenance via Plagiarism Detection (NCI, HP, MV), pp. 648–652.
ICDARICDAR-2013-JainD #detection #documentation #image #named #verification
VisualDiff: Document Image Verification and Change Detection (RJ, DSD), pp. 40–44.
ICDARICDAR-2013-KasarBACP #detection #documentation #image #learning #using
Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDARICDAR-2013-KessentiniCP #detection #documentation #regular expression #word
Word Spotting and Regular Expression Detection in Handwritten Documents (YK, CC, TP), pp. 516–520.
ICDARICDAR-2013-KhanSM13a #detection
Hyperspectral Imaging for Ink Mismatch Detection (ZK, FS, ASM), pp. 877–881.
ICDARICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition #using
Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDARICDAR-2013-LiLLLFT #detection #geometry
Detection of Overlapped Quadrangles in Plane Geometric Figures (KL, XL, HL, LL, TF, ZT), pp. 260–264.
ICDARICDAR-2013-LinGTBAS #detection #recognition
A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
ICDARICDAR-2013-MoyssetK #algorithm #detection #evaluation #on the
On the Evaluation of Handwritten Text Line Detection Algorithms (BM, CK), pp. 185–189.
ICDARICDAR-2013-NassuMO #detection #documentation #image #towards
Text Line Detection in Document Images: Towards a Support System for the Blind (BTN, RM, LESdO), pp. 638–642.
ICDARICDAR-2013-RabaevBEKD #detection
Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
ICDARICDAR-2013-RazaSDE #detection #multi #using
Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDARICDAR-2013-RebeloC #detection
Staff Line Detection and Removal in the Grayscale Domain (AR, JSC), pp. 57–61.
ICDARICDAR-2013-RigaudBOKW #detection #speech
An Active Contour Model for Speech Balloon Detection in Comics (CR, JCB, JMO, DK, JvdW), pp. 1240–1244.
ICDARICDAR-2013-SankaranJ #detection #fault
Error Detection in Highly Inflectional Languages (NS, CVJ), pp. 1135–1139.
ICDARICDAR-2013-ShivakumaraBGT #detection #video
Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
ICDARICDAR-2013-SunBOK #detection #using
Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDARICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo #using
Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDARICDAR-2013-WangSZ #component #detection #multi #segmentation
Natural Scene Text Detection with Multi-channel Connected Component Segmentation (XW, YS, YZ), pp. 1375–1379.
ICDARICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZagorisP #detection #image #modelling #using
Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDARICDAR-2013-ZhuZ #detection #image #recognition #using
Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
SIGMODSIGMOD-2013-GeorgiadisKGPTM #algorithm #data type #detection #framework #state of the art
Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms (DG, MK, AG, ANP, KT, YM), pp. 1061–1064.
VLDBVLDB-2013-AbdelhaqSG #detection #locality #named #online #twitter
EvenTweet: Online Localized Event Detection from Twitter (HA, CS, MG), pp. 1326–1329.
VLDBVLDB-2013-DuttaNB #approach #approximate #data type #detection #streaming
Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDBVLDB-2014-BudakGAA13 #detection #named #network #online #roadmap #social
GeoScope: Online Detection of Geo-Correlated Information Trends in Social Networks (CB, TG, DA, AEA), pp. 229–240.
VLDBVLDB-2014-LiDWLKC13 #detection
Attraction and Avoidance Detection from Movements (ZL, BD, FW, TKHL, RK, MC), pp. 157–168.
TACASTACAS-2013-SongT #detection #ltl #model checking
LTL Model-Checking for Malware Detection (FS, TT), pp. 416–431.
CSMRCSMR-2013-BertranGCS #architecture #detection
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMRCSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-NegaraTS #detection #web
Feature Detection in Ajax-Enabled Web Applications (NN, NT, ES), pp. 154–163.
CSMRCSMR-2013-PolychniatisHJBV #dependence #detection
Detecting Cross-Language Dependencies Generically (TP, JH, SJ, EB, JV), pp. 349–352.
CSMRCSMR-2013-StevensRNJ #detection #multi #query #refactoring
A History Querying Tool and Its Application to Detect Multi-version Refactorings (RS, CDR, CN, VJ), pp. 335–338.
ICPCICPC-2013-Kamiya #clone detection #detection #named #semantics
Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
ICPCICPC-2013-MondalRS13a #detection
Improving the detection accuracy of evolutionary coupling (MM, CKR, KAS), pp. 223–226.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-UddinRS #clone detection #detection #named #performance #scalability
SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
ICSMEICSM-2013-FontanaZMM #approach #detection #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSRMSR-2013-AlaliBNM #detection #distance #metric #using
A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSRMSR-2013-AlipourHS #approach #debugging #detection #towards
A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSRMSR-2013-AmouiKATLL #detection #experience #fault #industrial #search-based
Search-based duplicate defect detection: an industrial experience (MA, NK, AAD, LT, SL, WL), pp. 173–182.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-WangG #android #api #case study #detection #developer
Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
SCAMSCAM-2013-CeruloCPC #detection #markov
A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
SCAMSCAM-2013-FardM #detection #javascript #named #smell
JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
WCREWCRE-2013-AntonyAC #approach #behaviour #clone detection #detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCREWCRE-2013-BernardiCL #approach #design pattern #detection #graph #modelling
A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
WCREWCRE-2013-ChenSB #c #detection #memory management
Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
WCREWCRE-2013-ChenSB13a #c #detection #memory management #named
MemBrush: A practical tool to detect custom memory allocators in C binaries (XC, AS, HB), pp. 477–478.
WCREWCRE-2013-DucheneRRG #black box #data flow #detection #modelling #named
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection (FD, SR, JLR, RG), pp. 252–261.
WCREWCRE-2013-HallerSB #c #c++ #data type #detection #named
MemPick: High-level data structure detection in C/C++ binaries (IH, AS, HB), pp. 32–41.
WCREWCRE-2013-HallerSB13a #data type #detection #named
MemPick: A tool for data structure detection (IH, AS, HB), pp. 479–480.
WCREWCRE-2013-KrutzS #clone detection #detection #named
CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
WCREWCRE-2013-NayrollesMV #detection #execution #mining
Improving SOA antipatterns detection in Service Based Systems by mining execution traces (MN, NM, PV), pp. 321–330.
WCREWCRE-2013-SutiiRS #dependence #detection #enterprise #java
Detecting dependencies in Enterprise JavaBeans with SQuAVisiT (AS, SAR, AS), pp. 485–486.
PLDIPLDI-2013-ElwazeerAKSB #data type #detection #scalability
Scalable variable and data type detection in a binary rewriter (KE, KA, AK, MS, RB), pp. 51–60.
STOCSTOC-2013-FeldmanGRVX #algorithm #bound #clique #detection #statistics
Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
IFMIFM-2013-SavaryFL #bytecode #detection #modelling #testing #using #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
SEFMSEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt #using
Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis #using
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
GT-VMTGT-VMT-2013-MicallefC #case study #detection #modelling #risk management #visual notation
A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
CHICHI-2013-WisemanCBGO #detection #fault #using
Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCWCSCW-2013-AgustinaS #3d #collaboration #design #detection #realtime
Dependency-conflict detection in real-time collaborative 3D design systems (A, CS), pp. 715–728.
CSCWCSCW-2013-BrooksKTPRSAZHA #chat #collaboration #detection #statistics
Statistical affect detection in collaborative chat (MB, KK, MKT, DP, JJR, TJS, OA, AZ, PH, CRA), pp. 317–328.
HCIDUXU-PMT-2013-Breiner #detection #forensics #interactive
User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
HCIHCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-III-2013-WangLDHY #detection #set
A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
HCIHCI-III-2013-YangZZJXW #detection #multi #realtime #using
Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCIHCI-IMT-2013-EbisawaF #detection #using #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHIMI-D-2013-IshiiW #communication #detection #evaluation #self #video
Evaluation of Superimposed Self-character Based on the Detection of Talkers’ Face Angles in Video Communication (YI, TW), pp. 431–438.
HCIHIMI-HSM-2013-SaitohI #detection #learning #using #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HCIHIMI-LCCB-2013-SuzukiKUIISS #collaboration #detection #multi
Detection of Division of Labor in Multiparty Collaboration (NS, TK, IU, SI, SI, MS, KS), pp. 362–371.
CAiSECAiSE-2013-BakkerFV #approach #detection #hybrid #web
A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
ICEISICEIS-v1-2013-LiuDH #assessment #detection #exception #risk management
Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
CIKMCIKM-2013-FinisRABKF #detection #flexibility #named #performance
RWS-Diff: flexible and efficient change detection in hierarchical data (JPF, MR, NA, RB, AK, FF), pp. 339–348.
CIKMCIKM-2013-KeikhaCC #detection #retrieval
Generalizing diversity detection in blog feed retrieval (MK, FC, WBC), pp. 1201–1204.
CIKMCIKM-2013-McMinnMJ #corpus #detection #scalability #twitter
Building a large-scale corpus for evaluating event detection on twitter (AJM, YM, JMJ), pp. 409–418.
CIKMCIKM-2013-TanGC0Z #detection #named #network #social
UNIK: unsupervised social network spam detection (ET, LG, SC, XZ, YEZ), pp. 479–488.
CIKMCIKM-2013-XieSYPZ #correlation #detection #streaming
Local correlation detection with linearity enhancement in streaming data (QX, SS, BY, CP, XZ), pp. 309–318.
CIKMCIKM-2013-ZhangJSCDZ #classification #detection
Short text classification by detecting information path (SZ, XJ, DS, BC, XD, XZ), pp. 727–732.
CIKMCIKM-2013-ZhuXGC #detection #mobile #perspective #ranking
Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
ECIRECIR-2013-DadvarTOJ #detection
Improving Cyberbullying Detection with User Context (MD, DT, RO, FdJ), pp. 693–696.
ECIRECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics #using
Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIRECIR-2013-IgnatovKC #approach #detection
Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIRECIR-2013-McParlaneMW #detection #recommendation #semantics
Detecting Friday Night Party Photos: Semantics for Tag Recommendation (PJM, YM, IW), pp. 756–759.
ECIRECIR-2013-PanchenkoBNF #categorisation #detection #towards
Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames (AP, RB, HN, CF), pp. 776–779.
ECIRECIR-2013-WaltherK #detection #twitter
Geo-spatial Event Detection in the Twitter Stream (MW, MK), pp. 356–367.
ECIRECIR-2013-YatesG #detection #named #social #social media
ADRTrace: Detecting Expected and Unexpected Adverse Drug Reactions from User Reviews on Social Media Sites (AY, NG), pp. 816–819.
ICMLICML-c1-2013-BuhlerRSH #clustering #community #detection #set #source code
Constrained fractional set programs and their application in local clustering and community detection (TB, SSR, SS, MH), pp. 624–632.
ICMLICML-c3-2013-FriedlandJL #detection #social
Copy or Coincidence? A Model for Detecting Social Influence and Duplication Events (LF, DJ, ML), pp. 1175–1183.
ICMLICML-c3-2013-HockingRVB #detection #learning #using
Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICMLICML-c3-2013-KoppulaS #detection #learning #process
Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation (HSK, AS), pp. 792–800.
KDDKDD-2013-CiglanLN #community #detection #network #on the
On community detection in real-world networks and the importance of degree assortativity (MC, ML, KN), pp. 1007–1015.
KDDKDD-2013-FeiKSNMH #detection #learning
Heat pump detection from coarse grained smart meter data with positive and unlabeled learning (HF, YK, SS, MRN, SKM, JH), pp. 1330–1338.
KDDKDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
KDDKDD-2013-StitelmanPDHRP #detection #network #online #scalability #using
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDDKDD-2013-ZhaoH #detection #learning #online
Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
KDDKDD-2013-ZimekGCS #detection #effectiveness #performance
Subsampling for efficient and effective unsupervised outlier detection ensembles (AZ, MG, RJGBC, JS), pp. 428–436.
MLDMMLDM-2013-AmalamanER #detection #using
Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDMMLDM-2013-KokkulaM #classification #detection #synthesis #topic
Classification and Outlier Detection Based on Topic Based Pattern Synthesis (SK, NMM), pp. 99–114.
MLDMMLDM-2013-MaziluCGRHT #detection #learning #predict
Feature Learning for Detection and Prediction of Freezing of Gait in Parkinson’s Disease (SM, AC, EG, DR, JMH, GT), pp. 144–158.
MLDMMLDM-2013-NikovskiWESSMT #data analysis #detection
Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDMMLDM-2013-SharmaG #detection
Optimal Time Segments for Stress Detection (NS, TG), pp. 421–433.
SEKESEKE-2013-Al-JamimiA #design pattern #detection #prolog #using
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S) (HAAJ, MAA), pp. 727–730.
SEKESEKE-2013-CostaJM #detection #modelling #semantics
Semantic Conflicts Detection in Model-driven Engineering (VOC, JMBOJ, LGPM), pp. 656–661.
SEKESEKE-2013-LenhardW #detection #modelling
Detecting Portability Issues in Model-Driven BPEL Mappings (S) (JL, GW), pp. 18–21.
SEKESEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-OliveiraBVC #detection
Metrics-based Detection of Similar Software (S) (PO, HB, MTV, HAXC), pp. 447–450.
SEKESEKE-2013-ThommazoOORWF #detection #network #traceability
Detecting traceability links through neural networks (ADT, TRdO, GO, RR, VW, SF), pp. 36–41.
SIGIRSIGIR-2013-BonnefoyBB #detection #documentation
A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
SIGIRSIGIR-2013-ChenALC #detection #microblog #topic
Emerging topic detection for organizations from microblogs (YC, HA, ZL, TSC), pp. 43–52.
SIGIRSIGIR-2013-GippMBLN #analysis #detection
Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIRSIGIR-2013-SavenkovLL #behaviour #detection
Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
SIGIRSIGIR-2013-YinYHH #detection #image #retrieval #robust
Accurate and robust text detection: a step-in for text retrieval in natural scene images (XCY, XY, KH, HWH), pp. 1091–1092.
AMTAMT-2013-TichyKL #detection #model transformation #performance #smell
Detecting Performance Bad Smells for Henshin Model Transformations (MT, CK, GL), pp. 82–91.
MODELSMoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
MODELSMoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
ECOOPECOOP-2013-ShomratF #detection
Detecting Refactored Clones (MS, YAF), pp. 502–526.
OOPSLAOOPSLA-2013-BaoZ #detection #execution #float #on the fly #problem
On-the-fly detection of instability problems in floating-point program execution (TB, XZ), pp. 817–832.
OOPSLAOOPSLA-2013-BhattacharyaGN #detection #program analysis
Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLAOOPSLA-2013-Deng0L #detection #performance
Efficient concurrency-bug detection across inputs (DD, WZ, SL), pp. 785–802.
OOPSLAOOPSLA-2013-RaychevVS #concurrent #detection #effectiveness #source code
Effective race detection for event-driven programs (VR, MTV, MS), pp. 151–166.
OOPSLAOOPSLA-2013-ZhongS #api #detection #documentation #fault
Detecting API documentation errors (HZ, ZS), pp. 803–816.
PPDPPPDP-2013-CalauttiGT #decidability #detection #logic programming #source code
Detecting decidable classes of finitely ground logic programs with function symbols (MC, SG, IT), pp. 239–250.
POPLPOPL-2013-BarrVLS #automation #detection #exception #float
Automatic detection of floating-point exceptions (ETB, TV, VL, ZS), pp. 549–560.
SACSAC-2013-BakkerVFK #detection #web
Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
SACSAC-2013-BanerjeeSS #detection #monitoring #using
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SACSAC-2013-ChaeKHLW #api #detection
Software plagiarism detection via the static API call frequency birthmark (DKC, SWK, JH, SCL, GW), pp. 1639–1643.
SACSAC-2013-CostaBM #detection #network #social
Detecting tip spam in location-based social networks (HC, FB, LHdCM), pp. 724–729.
SACSAC-2013-DietrichRP #clustering #detection #visual notation
Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
SACSAC-2013-FariaGC #algorithm #data type #detection #multi #problem
Novelty detection algorithm for data streams multi-class problems (ERF, JG, ACPLFC), pp. 795–800.
SACSAC-2013-HassanzadehN #algorithm #detection #graph
A semi-supervised graph-based algorithm for detecting outliers in online-social-networks (RH, RN), pp. 577–582.
SACSAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SACSAC-2013-KimM #algorithm #detection #hybrid #search-based #using
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SACSAC-2013-LeitaoC #adaptation #detection #optimisation #performance #using #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SACSAC-2013-PerkusichAP #detection #development #problem
A model to detect problems on scrum-based software development projects (MP, HOdA, AP), pp. 1037–1042.
SACSAC-2013-RieckerBH #detection #energy #lightweight #network
Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
ESEC-FSEESEC-FSE-2013-LiangWXM #debugging #detection
Inferring project-specific bug patterns for detecting sibling bugs (GL, QW, TX, HM), pp. 565–575.
ESEC-FSEESEC-FSE-2013-McPeakGR #debugging #detection #incremental #scalability
Scalable and incremental software bug detection (SM, CHG, MKR), pp. 554–564.
ESEC-FSEESEC-FSE-2013-NguyenX #detection #named
Cachetor: detecting cacheable data to remove bloat (KN, G(X), pp. 268–278.
ESEC-FSEESEC-FSE-2013-PetkeYCH #combinator #detection #fault #interactive #performance #testing
Efficiency and early fault detection with lower and higher strength combinatorial interaction testing (JP, SY, MBC, MH), pp. 26–36.
ESEC-FSEESEC-FSE-2013-SongT #automaton #detection #model checking #named
PoMMaDe: pushdown model-checking for malware detection (FS, TT), pp. 607–610.
ESEC-FSEESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault
Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ICSEICSE-2013-FemmerGLM #case study #consistency #detection #nondeterminism
Detecting inconsistencies in wrappers: a case study (HF, DG, ML, DM), pp. 1022–1031.
ICSEICSE-2013-HermansSPD #clone detection #detection #spreadsheet #visualisation
Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
ICSEICSE-2013-MalikHH #automation #detection #performance #scalability #testing
Automatic detection of performance deviations in the load testing of large scale systems (HM, HH, AEH), pp. 1012–1021.
ICSEICSE-2013-MarinoHDVTV #concurrent #detection #source code
Detecting deadlock in programs with data-centric synchronization (DM, CH, JD, MV, FT, JV), pp. 322–331.
ICSEICSE-2013-NguyenNNN #detection #named #web
DRC: a detection tool for dangling references in PHP-based web applications (HVN, HAN, TTN, TNN), pp. 1299–1302.
ICSEICSE-2013-NistorSML #data access #detection #named #performance #problem
Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSEICSE-2013-Simpson #communication #detection #developer
Changeset based developer communication to detect software failures (BS), pp. 1468–1470.
ICSEICSE-2013-TianD #detection #model checking
Detecting spurious counterexamples efficiently in abstract model checking (CT, ZD), pp. 202–211.
ICSEICSE-2013-ZhengZ #detection #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
SLESLE-2013-VasudevanT #ambiguity #detection #programming language
Detecting Ambiguity in Programming Language Grammars (NV, LT), pp. 157–176.
ASPLOSASPLOS-2013-QianTSQ #consistency #detection #named #precise #scalability
Volition: scalable and precise sequential consistency violation detection (XQ, JT, BS, DQ), pp. 535–548.
ASPLOSASPLOS-2013-WesterDCFN #concurrent #detection
Parallelizing data race detection (BW, DD, PMC, JF, SN), pp. 27–38.
CGOCGO-2013-TanFG #detection #fault #lightweight #source code
Lightweight fault detection in parallelized programs (LT, MF, RG), p. 11.
HPDCHPDC-2013-HeBTGGMS #detection
I/O acceleration with pattern detection (JH, JB, AT, GG, GAG, CM, XHS), pp. 25–36.
HPDCHPDC-2013-ZhouTKB #automation #debugging #detection #named #scalability
WuKong: automatically detecting and localizing bugs that manifest at large system scales (BZ, JT, MK, SB), pp. 131–142.
LCTESLCTES-2013-ChenY #comparison #detection #fault #performance
Boosting efficiency of fault detection and recovery throughapplication-specific comparison and checkpointing (HC, CY), pp. 13–20.
PPoPPPPoPP-2013-CaiZWC #detection #named #parallel #source code #thread
TeamWork: synchronizing threads globally to detect real deadlocks for multithreaded programs (YC, KZ, SW, WKC), pp. 311–312.
PPoPPPPoPP-2013-Chen #algorithm #detection #fault #fault tolerance #named #online
Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
PPoPPPPoPP-2013-LifflanderMK #detection #fault tolerance #protocol #termination
Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
PPoPPPPoPP-2013-ParkSI #concurrent #detection #scalability #source code
Scalable data race detection for partitioned global address space programs (CSP, KS, CI), pp. 305–306.
SOSPSOSP-2013-KasikciZC #concurrent #crowdsourcing #detection #named
RaceMob: crowdsourced data race detection (BK, CZ, GC), pp. 406–422.
CAVCAV-2013-KroeningLW #approximate #c #detection #performance #source code
Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
ICLPICLP-J-2013-CatB #dependence #detection #functional #generative
Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
ICSTICST-2013-ChristakisGS #concurrent #detection #erlang #fault #source code #testing
Systematic Testing for Detecting Concurrency Errors in Erlang Programs (MC, AG, KFS), pp. 154–163.
ICSTICST-2013-GreilerDS #automation #detection #smell
Automated Detection of Test Fixture Strategies and Smells (MG, AvD, MADS), pp. 322–331.
ISSTAISSTA-2013-RadoiD #concurrent #detection #java #parallel
Practical static race detection for Java parallel loops (CR, DD), pp. 178–190.
ICSTSAT-2013-MisraORS #bound #detection #set
Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
ASEASE-2012-MaigaABSGAA #anti #detection
Support vector machines for anti-pattern detection (AM, NA, NB, AS, YGG, GA, EA), pp. 278–281.
ASEASE-2012-NguyenNNLS #debugging #detection #information retrieval #modelling #topic
Duplicate bug report detection with a combination of information retrieval and topic modeling (ATN, TTN, TNN, DL, CS), pp. 70–79.
ASEASE-2012-NguyenNNNN #detection #embedded #smell #web
Detection of embedded code smells in dynamic web applications (HVN, HAN, TTN, ATN, TNN), pp. 282–285.
ASEASE-2012-ThungLLJRD #debugging #detection #empirical #fault #tool support #what
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools (FT, L, DL, LJ, FR, PTD), pp. 50–59.
ASEASE-2012-YuanG #approach #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
CASECASE-2012-Chang #detection #fault #feature model #process #using
Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASECASE-2012-DinhamF #detection #using
Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASECASE-2012-IdenP #algorithm #aspect-oriented #detection #functional #safety
Functional safety aspects of pattern detection algorithms (JI, CIP), pp. 747–752.
CASECASE-2012-JungCKM #detection #using
Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASECASE-2012-KanY #detection
Dynamic spatiotemporal warping for the detection and location of myocardial infarctions (CK, HY), pp. 1046–1051.
CASECASE-2012-KimKS #algorithm #detection #recognition #using
Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASECASE-2012-KimSCKY #automation #detection #image
Image and sensor los-based automatic horizontal line detection and tracking for infrared search and track (SK, MSS, BC, JK, YY), pp. 718–723.
CASECASE-2012-KimYSP #detection #using #visual notation
Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASECASE-2012-WeiZW #detection #recognition #research
Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
DACDAC-2012-CropPC #detection #logic #throughput #using
Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DACDAC-2012-GuoK #concurrent #detection #encryption #fault #standard
Invariance-based concurrent error detection for advanced encryption standard (XG, RK), pp. 573–578.
DACDAC-2012-HuangHRBK #detection #embedded #fault tolerance #towards
Towards fault-tolerant embedded systems with imperfect fault detection (JH, KH, AR, CB, AK), pp. 188–196.
DACDAC-2012-LinHFHM #debugging #detection #effectiveness #validation
Quick detection of difficult bugs for effective post-silicon validation (DL, TH, FF, NH, SM), pp. 561–566.
DACDAC-2012-YuCSJC #design #detection #using
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DATEDATE-2012-CampagnaV #architecture #detection #fault #hybrid #validation
An hybrid architecture to detect transient faults in microprocessors: An experimental validation (SC, MV), pp. 1433–1438.
DATEDATE-2012-LiDT #authentication #detection #framework #hardware #self
A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
DATEDATE-2012-MarinissenVGHRMB #detection #process
EDA solutions to new-defect detection in advanced process technologies (EJM, GV, SKG, FH, JR, NM, SB), pp. 123–128.
DRRDRR-2012-FengY #component #composition #detection #documentation #using
Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRRDRR-2012-Silva #algorithm #detection #evaluation #using
Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
HTHT-2012-ChakrabortyGG #community #detection #folksonomy
Detecting overlapping communities in folksonomies (AC, SG, NG), pp. 213–218.
HTHT-2012-FlockVS #detection #wiki
Revisiting reverts: accurate revert detection in wikipedia (FF, DV, ES), pp. 3–12.
HTHT-2012-JainHVYS #detection #linked data #open data
Moving beyond SameAs with PLATO: partonomy detection for linked data (PJ, PH, KV, PZY, APS), pp. 33–42.
HTHT-2012-LimD #community #detection #twitter
Following the follower: detecting communities with common interests on twitter (KHL, AD), pp. 317–318.
HTHT-2012-NakajimaZIN #analysis #detection #scalability
Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
HTHT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social #using
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
VLDBVLDB-2012-Bidoit-TolluCU #detection #independence #type system #xml
Type-Based Detection of XML Query-Update Independence (NBT, DC, FU), pp. 872–883.
VLDBVLDB-2012-GraefeK #database #detection
Definition, Detection, and Recovery of Single-Page Failures, a Fourth Class of Database Failures (GG, HAK), pp. 646–655.
ITiCSEITiCSE-2012-PoonSTK #corpus #detection #source code
Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
FASEFASE-2012-MahouachiKG #classification #design #detection #fault
A New Design Defects Classification: Marrying Detection and Correction (RM, MK, KG), pp. 455–470.
TACASTACAS-2012-SongT #automaton #detection #model checking
Pushdown Model Checking for Malware Detection (FS, TT), pp. 110–125.
CSMRCSMR-2012-BinunK #design pattern #detection #named
DPJF — Design Pattern Detection with High Accuracy (AB, GK), pp. 245–254.
CSMRCSMR-2012-DeissenboeckHHW #challenge #detection
Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
CSMRCSMR-2012-FontanaCZ #benchmark #design pattern #detection #metric #named #tool support
DPB: A Benchmark for Design Pattern Detection Tools (FAF, AC, MZ), pp. 235–244.
CSMRCSMR-2012-KaushikT #case study #comparative #debugging #detection #information retrieval #modelling #performance
A Comparative Study of the Performance of IR Models on Duplicate Bug Detection (NK, LT), pp. 159–168.
CSMRCSMR-2012-Koschke #clone detection #detection #scalability #using
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMRCSMR-2012-NadiH #detection #linux #mining #variability
Mining Kbuild to Detect Variability Anomalies in Linux (SN, RCH), pp. 107–116.
ICPCICPC-2012-HauptmannJEJV #clone detection #comprehension #detection #question
Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
ICPCICPC-2012-Keivanloo #clone detection #code search #detection #source code
Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPCICPC-2012-KeivanlooRR #clone detection #detection #named #semantics
SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-Al-KofahiNNNN #detection #semantics
Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
ICSMEICSM-2012-AlalfiCDSS #clone detection #detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
ICSMEICSM-2012-FadhelKLW #detection #search-based
Search-based detection of high-level model changes (AbF, MK, PL, MW), pp. 212–221.
ICSMEICSM-2012-HermansPD #detection #smell #spreadsheet
Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
ICSMEICSM-2012-HigoK #consistency #detection #how #nondeterminism
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
ICSMEICSM-2012-RamaKVP #detection #source code #version control
Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
ICSMEICSM-2012-TangWZL #detection #maintenance
Time-leverage point detection for time sensitive software maintenance (ET, LW, JZ, XL), pp. 567–570.
ICSMEICSM-2012-ThungLJ #collaboration #detection
Detecting similar applications with collaborative tagging (FT, DL, LJ), pp. 600–603.
ICSMEICSM-2012-ZouG #algorithm #automation #case study #detection #industrial #what #why
An industrial case study of Coman’s automated task detection algorithm: What Worked, What Didn’t, and Why (LZ, MWG), pp. 6–14.
MSRMSR-2012-Breckel #comparison #database #debugging #detection #fault #mining #scalability
Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
SCAMSCAM-2012-GethersAP #concept #database #dependence #detection
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
SCAMSCAM-2012-MurakamiHHIK #clone detection #detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCREWCRE-2012-Al-OmariKRR #detection #dot-net #programming language
Detecting Clones Across Microsoft .NET Programming Languages (FAO, IK, CKR, JR), pp. 405–414.
WCREWCRE-2012-DurfinaKZK #decompiler #detection
Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler (LD, JK, PZ, BK), pp. 51–60.
WCREWCRE-2012-GauthierM #data access #detection #performance #php
Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-IshiharaHHIK #clone detection #detection #empirical #functional #library #towards
Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise #using
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository #using
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCREWCRE-2012-MaigaABSGA #anti #approach #detection #incremental #named
SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
PLDIPLDI-2012-JinSSSL #comprehension #debugging #detection #performance
Understanding and detecting real-world performance bugs (GJ, LS, XS, JS, SL), pp. 77–88.
PLDIPLDI-2012-NagarakatteBMM #concurrent #debugging #detection #manycore
Multicore acceleration of priority-based schedulers for concurrency bug detection (SN, SB, MMKM, MM), pp. 543–554.
PLDIPLDI-2012-PetrovVSD #concurrent #detection #web
Race detection for web applications (BP, MTV, MS, JD), pp. 251–262.
PLDIPLDI-2012-PradelG #automation #concurrent #detection #precise #safety #thread
Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
PLDIPLDI-2012-RamanZSVY #concurrent #detection #parallel #precise #scalability
Scalable and precise dynamic datarace detection for structured parallelism (RR, JZ, VS, MTV, EY), pp. 531–542.
FMFM-2012-SongT #detection #model checking #performance #using
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
IFMIFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling #using
Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFMIFM-2012-TianBB #behaviour #detection #game studies #multi
Behaviour-Based Cheat Detection in Multiplayer Games with Event-B (HT, PJB, AGB), pp. 206–220.
CHICHI-2012-HollandKT #algorithm #detection #identification #usability #visual notation
Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
CHICHI-2012-ViS #design #detection #interactive
Detecting error-related negativity for interaction design (CV, SS), pp. 493–502.
CSCWCSCW-2012-LiuBS #collaboration #design #detection #product line
Conflict detection and resolution for product line design in a collaborative decision making environment (X(L, ECB, JES), pp. 1327–1336.
EDOCEDOC-2012-CostaMPA #approach #detection #modelling #rule-based
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOCEDOC-2012-HarrisonBADN #detection #framework #identification
A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
ICEISICEIS-v3-2012-WangWZLW #detection #modelling #process
Detecting Infeasible Traces in Process Models (ZW, LW, XZ, YL, JW), pp. 212–217.
CIKMCIKM-2012-AkogluTVF #category theory #detection #performance #reliability
Fast and reliable anomaly detection in categorical data (LA, HT, JV, CF), pp. 415–424.
CIKMCIKM-2012-BaeJKL #detection #using
Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKMCIKM-2012-CaballeroBA #detection #topic
The generalized dirichlet distribution in enhanced topic detection (KLCE, JB, RA), pp. 773–782.
CIKMCIKM-2012-ComarLSNT #detection #kernel #linear
Weighted linear kernel with tree transformed features for malware detection (PMC, LL, SS, AN, PNT), pp. 2287–2290.
CIKMCIKM-2012-HuangQYY #algorithm #detection #robust
Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space (HH, HQ, SY, DY), pp. 405–414.
CIKMCIKM-2012-LiSD #detection #named #twitter
Twevent: segment-based event detection from tweets (CL, AS, AD), pp. 155–164.
CIKMCIKM-2012-QahtanZW #detection #estimation #performance
Efficient estimation of dynamic density functions with an application to outlier detection (AAQ, XZ, SW), pp. 2159–2163.
CIKMCIKM-2012-TangY #detection #named #roadmap #social #social media #statistics #topic
TUT: a statistical model for detecting trends, topics and user interests in social media (XT, CCY), pp. 972–981.
CIKMCIKM-2012-XiangFWHR #corpus #detection #scalability #topic #twitter
Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
ECIRECIR-2012-BosmaMW #detection #framework #network #social
A Framework for Unsupervised Spam Detection in Social Networking Sites (MB, EM, WW), pp. 364–375.
ECIRECIR-2012-PolajnarGA #detection
Detection of News Feeds Items Appropriate for Children (TP, RG, LA), pp. 63–72.
ICMLICML-2012-BiessmannPBH #canonical #detection #roadmap #web
Canonical Trends: Detecting Trend Setters in Web Data (FB, JMP, MLB, AH), p. 170.
ICMLICML-2012-MalisiewiczSGE #detection #image #retrieval #visual notation
Exemplar-SVMs for Visual Ob ject Detection, Label Transfer and Image Retrieval (TM, AS, AG, AAE), p. 4.
ICPRICPR-2012-AjmeraD #analysis #detection #word
Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
ICPRICPR-2012-BagdanovBLM #detection #multi
Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
ICPRICPR-2012-BaiZX #detection #linear #multi
Multi scale multi structuring element top-hat transform for linear feature detection (XB, FZ, BX), pp. 1920–1923.
ICPRICPR-2012-BurghoutsS #correlation #detection
Correlations between 48 human actions improve their detection (GJB, KS), pp. 3815–3818.
ICPRICPR-2012-ChengLWTCBWS #detection
Peripapillary atrophy detection by biologically inspired feature (JC, JL, DWKW, NMT, CYlC, MB, TYW, SMS), pp. 53–56.
ICPRICPR-2012-ChenYZZ #bound #detection #network
Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPRICPR-2012-CheungP #detection #using
Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPRICPR-2012-ChowdhuryBP #detection #using
Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPRICPR-2012-DahmBCG #detection #morphism
Topological features and iterative node elimination for speeding up subgraph isomorphism detection (ND, HB, TC, YG), pp. 1164–1167.
ICPRICPR-2012-DaiFZ #detection #mining
Mining sub-categories for object detection (JD, JF, JZ), pp. 3260–3263.
ICPRICPR-2012-DeshmukhRSL #detection
Vocalization patterns of dairy animals to detect animal state (OD, NR, YS, SL), pp. 254–257.
ICPRICPR-2012-DinhLLRD #detection #image #multi
Training data selection for cancer detection in multispectral endoscopy images (VCD, ML, RL, OR, RPWD), pp. 161–164.
ICPRICPR-2012-FelhiBT #detection #image
A skeleton based descriptor for detecting text in real scene images (MF, NB, ST), pp. 282–285.
ICPRICPR-2012-FengB #concept #detection #image #semantics
Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi #using
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GerogiannisNL #detection #image #performance
Fast and efficient vanishing point detection in indoor images (DG, CN, AL), pp. 3244–3247.
ICPRICPR-2012-GhianiMR #detection #liveness
Fingerprint liveness detection by local phase quantization (LG, GLM, FR), pp. 537–540.
ICPRICPR-2012-GlazerLM #detection
Feature shift detection (AG, ML, SM), pp. 1383–1386.
ICPRICPR-2012-Goldstein #algorithm #detection #named
FastLOF: An Expectation-Maximization based Local Outlier detection algorithm (MG), pp. 2282–2285.
ICPRICPR-2012-GuermaziVB #detection #image #multi
Matching of multi-resolution image for remote sensing glacier detection (AG, LV, PB), pp. 3406–3410.
ICPRICPR-2012-GuR #detection
Shadow detection via Rayleigh scattering and Mie theory (LG, ARK), pp. 2165–2168.
ICPRICPR-2012-GuyonBZ #constraints #detection #matrix #rank #robust
Foreground detection via robust low rank matrix factorization including spatial constraint with Iterative reweighted regression (CG, TB, EHZ), pp. 2805–2808.
ICPRICPR-2012-HardingHCLC #automation #detection #image
Automated detection of skeletal muscle twitches from B-mode ultrasound images: An application to motor neuron disease (PJH, EFHT, RC, IL, NC), pp. 2630–2633.
ICPRICPR-2012-Ho #approach #detection #effectiveness
An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPRICPR-2012-HuangA #analysis #detection #perspective
Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
ICPRICPR-2012-HuangL #analysis #automation #component #detection #independence
Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
ICPRICPR-2012-HuangLW #clustering #detection #incremental
Incremental support vector clustering with outlier detection (DH, JHL, CDW), pp. 2339–2342.
ICPRICPR-2012-HuangOSU #detection #framework #multi #recognition
Scene character detection and recognition based on multiple hypotheses framework (RH, SO, PS, SU), pp. 717–720.
ICPRICPR-2012-IkemuraF #detection #using
Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPRICPR-2012-ItoOWK #detection
Detection of eyes by circular Hough transform and histogram of gradient (YI, WO, TW, FK), pp. 1795–1798.
ICPRICPR-2012-JiangES #detection #estimation #integration #performance #robust
Efficient and robust integration of face detection and head pose estimation (FJ, HKE, BES), pp. 1578–1581.
ICPRICPR-2012-JiangFZT #detection #random
Active Shape Model with random forest for facial features detection (WJ, YF, ZZ, YT), pp. 593–596.
ICPRICPR-2012-KataokaSM #detection #using
Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-KhanER #detection #image
A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images (AMK, HED, NMR), pp. 149–152.
ICPRICPR-2012-KunchevaF #detection #feature model #multi #streaming
PCA feature extraction for change detection in multidimensional unlabelled streaming data (LIK, WJF), pp. 1140–1143.
ICPRICPR-2012-LeeLM #detection #realtime #smarttech
Real-time staircase detection from a wearable stereo system (YHL, TSL, GGM), pp. 3770–3773.
ICPRICPR-2012-LePB #detection #navigation #people
Pedestrian lane detection for assistive navigation of blind people (MCL, SLP, AB), pp. 2594–2597.
ICPRICPR-2012-LiL #detection
Scene text detection via stroke width (YL, HL), pp. 681–684.
ICPRICPR-2012-LiP #detection
Anomalous tie plate detection for railroad inspection (YL, SP), pp. 3017–3020.
ICPRICPR-2012-LiuL #analysis #detection #learning #multi
Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
ICPRICPR-2012-LiuSZWBCT #bound #detection
Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPRICPR-2012-MaB #detection #multi
Multi-view multi-class object detection via exemplar compounding (KM, JBA), pp. 3256–3259.
ICPRICPR-2012-MadabusiG #detection #image
Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
ICPRICPR-2012-MaLXS #detection #image #using
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPRICPR-2012-MartelliCBTM #detection #paradigm #similarity
Joining feature-based and similarity-based pattern description paradigms for object detection (SM, MC, LB, DT, VM), pp. 2702–2705.
ICPRICPR-2012-McCloskeyD #detection #metadata #process #using #video
Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPRICPR-2012-MinagawaKTH #automation #detection
A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
ICPRICPR-2012-MinKCK #approach #detection #higher-order #using
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MogelmoseTM #comparative #dataset #detection #evaluation #learning
Learning to detect traffic signs: Comparative evaluation of synthetic and real-world datasets (AM, MMT, TBM), pp. 3452–3455.
ICPRICPR-2012-NarayanamN #algorithm #community #detection #distributed #game studies #graph #information management #social
A game theory inspired, decentralized, local information based algorithm for community detection in social graphs (RN, YN), pp. 1072–1075.
ICPRICPR-2012-NguyenPRPV #detection #multi #segmentation #video
Multi-modal abnormality detection in video with unknown data segmentation (TVN, DQP, SR, DSP, SV), pp. 1322–1325.
ICPRICPR-2012-NiigakiSM #detection #using
Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPRICPR-2012-Ohtsuka #analysis #detection
Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
ICPRICPR-2012-PanZXQ #2d #category theory #detection
Improved generic categorical object detection fusing depth cue with 2D appearance and shape features (HP, YZ, SX, KQ), pp. 1467–1470.
ICPRICPR-2012-PhamDBR #detection #image #re-engineering
Accurate junction detection and reconstruction in line-drawing images (TAP, MD, SB, JYR), pp. 693–696.
ICPRICPR-2012-PhanST #detection #symmetry #using
Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPRICPR-2012-RadwanDG #detection #estimation
Correcting pose estimation with implicit occlusion detection and rectification (IR, AD, RG), pp. 3496–3499.
ICPRICPR-2012-RoyG #detection #framework #image #locality #probability
A probabilistic framework for logo detection and localization in natural scene images (AR, UG), pp. 2051–2054.
ICPRICPR-2012-RoyH #classification #component #detection #documentation #image #using
Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPRICPR-2012-SakaiKMK #detection #robust
Robust detection of adventitious lung sounds in electronic auscultation signals (TS, MK, SM, SK), pp. 1993–1996.
ICPRICPR-2012-SanLH #detection
Constrained-MSER detection of retinal pathology (GLYS, MLL, WH), pp. 2059–2062.
ICPRICPR-2012-Schmidt-HackenbergYB #detection #image #visual notation
Visual cortex inspired features for object detection in X-ray images (LSH, MRY, TMB), pp. 2573–2576.
ICPRICPR-2012-SharmaHN #classification #detection #incremental #learning #performance
Efficient incremental learning of boosted classifiers for object detection (PS, CH, RN), pp. 3248–3251.
ICPRICPR-2012-ShaukatGWB #approach #bottom-up #detection #top-down
Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPRICPR-2012-ShiLBH #detection
Context-driven moving vehicle detection in wide area motion imagery (XS, HL, EB, WH), pp. 2512–2515.
ICPRICPR-2012-ShinPJB #detection #using
Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPRICPR-2012-SiddiquieFDD #detection #invariant
Unsupervised model selection for view-invariant object detection in surveillance environments (BS, RSF, AD, LSD), pp. 3252–3255.
ICPRICPR-2012-SimoesSW #detection #image #using
Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPRICPR-2012-SjobergKIL #classification #concept #detection #linear #realtime #scalability #visual notation
Real-time large-scale visual concept detection with linear classifiers (MS, MK, SI, JL), pp. 421–424.
ICPRICPR-2012-SommerFHG #detection #image
Learning-based mitotic cell detection in histopathological images (CS, LF, FAH, DG), pp. 2306–2309.
ICPRICPR-2012-SoranHLS #detection #using
Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPRICPR-2012-SpampinatoP #detection #performance
Enhancing object detection performance by integrating motion objectness and perceptual organization (CS, SP), pp. 3640–3643.
ICPRICPR-2012-SrikanthaSM #approach #detection #image
An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPRICPR-2012-StrokinaMELK #detection
Detection of bubbles as Concentric Circular Arrangements (NS, JM, TE, LL, HK), pp. 2655–2659.
ICPRICPR-2012-TangHW #detection #multi #recognition
Hand-dorsa vein recognition based on multi-level keypoint detection and local feature matching (YT, DH, YW), pp. 2837–2840.
ICPRICPR-2012-TangW #detection #semantics
Semantic Hough Transform based object detection with Partial Least Squares (JT, HW), pp. 3652–3655.
ICPRICPR-2012-ThanhMNMY #detection #recognition #robust #using
Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPRICPR-2012-TiribuziPVR #detection #framework #kernel #learning #multi
A Multiple Kernel Learning framework for detecting altered fingerprints (MT, MP, PV, ER), pp. 3402–3405.
ICPRICPR-2012-Ugurlu #detection #using
Head posture detection using skin and hair information (YU), pp. 1–4.
ICPRICPR-2012-VazquezLP #adaptation #detection
Unsupervised domain adaptation of virtual and real worlds for pedestrian detection (DV, AML, DP), pp. 3492–3495.
ICPRICPR-2012-VitaladevuniCPN #detection #documentation #image #using
Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPRICPR-2012-WakayamaDDIMT #detection #estimation #performance #visual notation
Estimation of the human performance for pedestrian detectability based on visual search and motion features (MW, DD, KD, II, HM, YT), pp. 1940–1943.
ICPRICPR-2012-WangBLST #detection #re-engineering
Detecting discontinuities for surface reconstruction (YW, JB, NL, MS, PT), pp. 2108–2111.
ICPRICPR-2012-WangCCP #detection #realtime #using
Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPRICPR-2012-WangGL #detection #image
A new depth descriptor for pedestrian detection in RGB-D images (NW, XG, JL), pp. 3688–3691.
ICPRICPR-2012-WangPLQHJ #detection
Color Maximal-Dissimilarity Pattern for pedestrian detection (QW, JP, GL, LQ, QH, SJ), pp. 1952–1955.
ICPRICPR-2012-WechtitschFS #detection #fault #robust
Robust detection of single-frame defects in archived film (SW, HF, PS), pp. 2647–2650.
ICPRICPR-2012-WeibelDWR #detection #graph #using
Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPRICPR-2012-WidhalmNB #detection #smarttech
Transport mode detection with realistic Smartphone sensor data (PW, PN, NB), pp. 573–576.
ICPRICPR-2012-WongLTYLTCW #automation #detection #image
Detecting the optic cup excavation in retinal fundus images by automatic detection of vessel kinking (DWKW, JL, NMT, FY, BHL, YCT, CYlC, TYW), pp. 73–76.
ICPRICPR-2012-XiangL #detection #symmetry
Symmetric object detection based on symmetry and centripetal-SIFT edge descriptor (YX, SL), pp. 1403–1406.
ICPRICPR-2012-YamashitaTHNH #detection #representation
Sparse representation of audio features for sputum detection from lung sounds (TY, ST, KH, YN, SH), pp. 2005–2008.
ICPRICPR-2012-YuYL #detection #image
Ulcer detection in wireless capsule endoscopy images (LY, PCY, JHL), pp. 45–48.
ICPRICPR-2012-ZhangL #detection #using
Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPRICPR-2012-ZhangLC #analysis #detection #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
ICPRICPR-2012-ZhangLM12a #adaptation #automation #clustering #detection #fault
An adaptive unsupervised clustering of pronunciation errors for automatic pronunciation error detection (LZ, HL, LM), pp. 1521–1525.
ICPRICPR-2012-ZhangLMA #detection #independence #statistics
A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
ICPRICPR-2012-ZhangRZY #detection #random
Contour detection via random forest (CZ, XR, YZ, MHY), pp. 2772–2775.
ICPRICPR-2012-ZhangWBZCZ #detection #feature model
Object detection via foreground contour feature selection and part-based shape model (HZ, JW, XB, JZ, JC, HZ), pp. 2524–2527.
ICPRICPR-2012-ZhangWDP #detection #linear
Skin detection via linear regression tree (JZ, HW, FD, CP), pp. 1711–1714.
ICPRICPR-2012-ZhangWN #detection #feature model #student
Bayesian feature selection and model detection for student’s t-mixture distributions (HZ, QMJW, TMN), pp. 1631–1634.
ICPRICPR-2012-ZhangWSD #approach #detection #effectiveness
A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPRICPR-2012-ZhangXY #bound #detection #modelling
An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
ICPRICPR-2012-ZhangZHHT #detection #mining #semantics
Semantic windows mining in sliding window based object detection (JZ, XZ, YH, KH, TT), pp. 3264–3267.
ICPRICPR-2012-ZhaoL #3d #detection
Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
ICPRICPR-2012-ZhaoZWL #detection #graph #mobile #robust
Robust mobile spamming detection via graph patterns (YZ, ZZ, YW, JL), pp. 983–986.
ICPRICPR-2012-ZhouLYCL #detection
Corner-surround Contrast for saliency detection (QZ, NL, YY, PC, WL), pp. 1423–1426.
KDDKDD-2012-BatalFHMH #detection #mining #multi
Mining recent temporal patterns for event detection in multivariate time series data (IB, DF, JH, FM, MH), pp. 280–288.
KDDKDD-2012-DingKBKC #anti #communication #detection #social
Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
KDDKDD-2012-GuptaGSH #community #detection #mining
Integrating community matching and outlier detection for mining evolutionary community outliers (MG, JG, YS, JH), pp. 859–867.
KDDKDD-2012-HiraiY #clustering #detection #normalisation #using
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-PhamP #algorithm #approximate #detection
A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data (NP, RP), pp. 877–885.
KDDKDD-2012-XieWLY #bibliography #detection
Review spam detection via temporal pattern discovery (SX, GW, SL, PSY), pp. 823–831.
KDDKDD-2012-XingLHCHLLMZ #behaviour #chat #detection #online #scalability #video
Scalable misbehavior detection in online video chat services (XX, YLL, SH, HC, RH, QL, XL, SM, YZ), pp. 552–560.
KDDKDD-2012-ZhangY #bound #community #detection #matrix
Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
KDIRKDIR-2012-HaanR #detection
Detecting Temporally Related Arithmetical Patterns — An Extension of Complex Event Processing (RdH, MR), pp. 329–332.
KDIRKDIR-2012-LemnaruTCP #case study #classification #detection #hybrid #network #problem
A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
KDIRKDIR-2012-SantosGSK #behaviour #detection #finite
Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
KEODKEOD-2012-FukumotoST #detection #multi #summary #topic
Topic and Subject Detection in News Streams for Multi-document Summarization (FF, YS, AT), pp. 166–171.
MLDMMLDM-2012-GlodekSP #detection #process #recognition
Detecting Actions by Integrating Sequential Symbolic and Sub-symbolic Information in Human Activity Recognition (MG, FS, GP), pp. 394–404.
MLDMMLDM-2012-MaiorcaGC #detection #pattern matching #pattern recognition #recognition
A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
MLDMMLDM-2012-SyarifZPW #detection
Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
SEKESEKE-2012-GallegosG #detection #tool support
Tool Support for Anomaly Detection in Scientific Sensor Data (IG, AQG), pp. 678–683.
SEKESEKE-2012-MireslamiMF #behaviour #detection #distributed
Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
SEKESEKE-2012-WangZWZZ #component #detection #online
Online Anomaly Detection for Components in OSGi-based Software (TW, WZ, JW, JZ, HZ), pp. 188–193.
SIGIRSIGIR-2012-AlasiryLP #detection #query
Detecting candidate named entities in search queries (AA, ML, AP), pp. 1049–1050.
SIGIRSIGIR-2012-JiangWLAW #alias #approach #detection #learning #similarity #string #towards
Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIRSIGIR-2012-Najork #detection #scalability #web
Detecting quilted web pages at scale (MN), pp. 385–394.
SIGIRSIGIR-2012-NishidaHF #classification #detection #probability #twitter #word
Improving tweet stream classification by detecting changes in word probability (KN, TH, KF), pp. 971–980.
SIGIRSIGIR-2012-ZhangWDH #detection #learning #performance #reuse
Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
MODELSMoDELS-2012-FariasGL #aspect-oriented #consistency #detection #empirical #nondeterminism
Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
MODELSMoDELS-2012-JacksonSB #constraints #declarative #detection #fault #specification
Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
MODELSMoDELS-2012-FariasGL #aspect-oriented #consistency #detection #empirical #nondeterminism
Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
MODELSMoDELS-2012-JacksonSB #constraints #declarative #detection #fault #specification
Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
ECOOPECOOP-2012-XuYR #data type #detection #invariant #static analysis
Static Detection of Loop-Invariant Data Structures (G(X, DY, AR), pp. 738–763.
OOPSLAOOPSLA-2012-Effinger-DeanLCGB #concurrent #detection #named
IFRit: interference-free regions for dynamic data-race detection (LED, BL, LC, DG, HJB), pp. 467–484.
OOPSLAOOPSLA-2012-LucasER #detection #distributed #problem #sequence
Detecting problematic message sequences and frequencies in distributed systems (CL, SGE, DSR), pp. 915–926.
TOOLSTOOLS-EUROPE-2012-OlszakBJV #detection #quantifier
Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
POPLPOPL-2012-SmaragdakisESYF #concurrent #detection #polynomial #predict
Sound predictive race detection in polynomial time (YS, JE, CS, JY, CF), pp. 387–400.
RERE-2012-FerrariG #detection #using
Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RERE-2012-KnaussDPC #detection #requirements
Detecting and classifying patterns of requirements clarifications (EK, DD, GPC, JCH), pp. 251–260.
RERE-2012-YangRGWN #automation #detection #natural language #nondeterminism #requirements
Speculative requirements: Automatic detection of uncertainty in natural language requirements (HY, ANDR, VG, AW, BN), pp. 11–20.
SACSAC-2012-ChengZQ #detection #fine-grained #topic
Fine-grained topic detection in news search results (JC, JZ, SQ), pp. 912–917.
SACSAC-2012-MakanjuZML #clustering #composition #detection #identification
Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
SACSAC-2012-MannS #android #detection #framework #privacy #static analysis
A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
SACSAC-2012-MoraisC #ad hoc #detection #distributed #network
A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
SACSAC-2012-OyamaGCSK #detection
Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
SACSAC-2012-Pizzuti #algorithm #community #composition #detection #search-based
Boosting the detection of modular community structure with genetic algorithms and local search (CP), pp. 226–231.
SACSAC-2012-SchluterC #correlation #detection #markov #modelling #predict #using
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
FSEFSE-2012-KwonS #component #detection
Detecting and analyzing insecure component usage (TK, ZS), p. 5.
ICSEICSE-2012-Blincoe12a #collaboration #coordination #detection #developer #requirements
Timely detection of Coordination Requirements to support collaboration among software developers (KB), pp. 1601–1603.
ICSEICSE-2012-CaiC #concurrent #detection #named #scalability
MagicFuzzer: Scalable deadlock detection for large-scale applications (YC, WKC), pp. 606–616.
ICSEICSE-2012-GuimaraesS #detection
Improving early detection of software merge conflicts (MLG, ARS), pp. 342–352.
ICSEICSE-2012-HermansPD #detection #smell #spreadsheet #visualisation
Detecting and visualizing inter-worksheet smells in spreadsheets (FH, MP, AvD), pp. 441–451.
ICSEICSE-2012-McMillanGP #detection
Detecting similar software applications (CM, MG, DP), pp. 364–374.
ICSEICSE-2012-MollerS #automation #detection
Automated detection of client-state manipulation vulnerabilities (AM, MS), pp. 749–759.
ICSEICSE-2012-NguyenNNN #detection #named #web
BabelRef: Detection and renaming tool for cross-language program entities in dynamic web applications (HVN, HAN, TTN, TNN), pp. 1391–1394.
ICSEICSE-2012-PradelG #automation #debugging #detection #generative #mining #specification #testing
Leveraging test generation and specification mining for automated bug detection without false positives (MP, TRG), pp. 288–298.
ICSEICSE-2012-RoehmM #automation #detection #developer #development #problem #process
Automatically detecting developer activities and problems in software development work (TR, WM), pp. 1261–1264.
ICSEICSE-2012-SiegmundKKABRS #automation #detection #performance #predict
Predicting performance via automated feature-interaction detection (NS, SSK, CK, SA, DSB, MR, GS), pp. 167–177.
ICSEICSE-2012-SongT12a #debugging #detection #metadata #on the fly
Detecting metadata bugs on the fly (MS, ET), pp. 1455–1456.
ICSEICSE-2012-ZhengZ #detection #problem #static analysis
Static detection of resource contention problems in server-side scripts (YZ, XZ), pp. 584–594.
CCCC-2012-KwonS #component #detection #static analysis
Static Detection of Unsafe Component Loadings (TK, ZS), pp. 122–143.
CGOCGO-2012-ZouR #detection #parallel #source code
Scan detection and parallelization in “inherently sequential” nested loop programs (YZ, SVR), pp. 74–83.
PPoPPPPoPP-2012-HoeflerS #detection #optimisation
Communication-centric optimizations by dynamically detecting collective operations (TH, TS), pp. 305–306.
CAVCAV-2012-ArltS #detection #java #named
Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
CAVCAV-2012-AtigBEL #detection #parallel #source code #thread
Detecting Fair Non-termination in Multithreaded Programs (MFA, AB, ME, AL), pp. 210–226.
ICSTICST-2012-ChoudharyPO #crawling #detection #difference #named #web
CrossCheck: Combining Crawling and Differencing to Better Detect Cross-browser Incompatibilities in Web Applications (SRC, MRP, AO), pp. 171–180.
ICSTICST-2012-DucheneGRR #detection #fuzzing #model inference #using
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICSTICST-2012-Nguyen #comprehension #detection #performance #scalability #using
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICSTICST-2012-TanMTL #consistency #detection #nondeterminism #testing
@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies (SHT, DM, LT, GTL), pp. 260–269.
ICTSSICTSS-2012-SantosA #automation #detection #fault #lightweight #monitoring
Lightweight Automatic Error Detection by Monitoring Collar Variables (JS, RA), pp. 215–230.
ISSTAISSTA-2012-AlshahwanH #detection #fault #testing #web
State aware test case regeneration for improving web application test suite coverage and fault detection (NA, MH), pp. 45–55.
ISSTAISSTA-2012-CaballeroGMN #detection #named #pointer
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
ISSTAISSTA-2012-CanaliLBKCK #detection
A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
ISSTAISSTA-2012-LiRCS #debugging #detection #precise #predict
Residual investigation: predictive and precise bug detection (KL, CR, CC, YS), pp. 298–308.
ISSTAISSTA-2012-PradelHG #detection #parametricity #static analysis #type system
Static detection of brittle parameter typing (MP, SH, TRG), pp. 265–275.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
ISSTAISSTA-2012-TombF #analysis #consistency #detection #nondeterminism #reachability
Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
ISSTAISSTA-2012-ZhangJWLZ #algorithm #detection #towards
A first step towards algorithm plagiarism detection (FZ, YcJ, DW, PL, SZ), pp. 111–121.
QoSAQoSA-ISARCS-2011-DettenB #clustering #component #detection #re-engineering
Combining clustering and pattern detection for the reengineering of component-based software systems (MvD, SB), pp. 23–32.
ASEASE-2011-ApelSWRB #detection #feature model #interactive #using #verification
Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASEASE-2011-Haiduc #automation #concept #detection #quality #query
Automatically detecting the quality of the query and its implications in IR-based concept location (SH), pp. 637–640.
ASEASE-2011-RasoolM #design pattern #detection #flexibility
Flexible design pattern detection based on feature types (GR, PM), pp. 243–252.
ASEASE-2011-YuTN #detection #source code #specification
Specifying and detecting meaningful changes in programs (YY, TTT, BN), pp. 273–282.
CASECASE-2011-BroderickAT #detection #formal method #industrial
Anomaly detection without a pre-existing formal model: Application to an industrial manufacturing system (JAB, LVA, DMT), pp. 169–174.
CASECASE-2011-ColP #detection #performance #recursion
Fast and accurate object detection by means of recursive monomial feature elimination and cascade of SVM (LDC, FAP), pp. 304–309.
CASECASE-2011-JasperF #detection #performance
Fast focus-based depth detection for manipulation in scanning electron microscopes (DJ, SF), pp. 375–380.
CASECASE-2011-RatnakarZ #detection #using
An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASECASE-2011-SenoussiCDZ #detection #fault #feature model #process
Feature selection for fault detection systems: Application to the Tennessee Eastman Process (HS, BCM, MD, NZ), pp. 189–194.
CASECASE-2011-SunLOS #detection #energy #fault
Building energy doctors: SPC and Kalman filter-based fault detection (BS, PBL, ZO, FS), pp. 333–340.
CASECASE-2011-WanY #detection #fault
Fault detection of networked control systems utilizing limited possibilities of unknown packet transmission (YW, HY), pp. 619–624.
DACDAC-2011-DingGYP #detection #learning #named
AENEID: a generic lithography-friendly detailed router based on post-RET data learning and hotspot detection (DD, JRG, KY, DZP), pp. 795–800.
DACDAC-2011-LifaEP #configuration management #detection #fault #optimisation #performance
Performance optimization of error detection based on speculative reconfiguration (AAL, PE, ZP), pp. 369–374.
DACDAC-2011-SorgenfreiS #detection #using
Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DACDAC-2011-YangBC #detection #embedded #energy #fault #using
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DACDAC-2011-ZhangDWT #composition #detection #self
Self-aligned double patterning decomposition for overlay minimization and hot spot detection (HZ, YD, MDFW, ROT), pp. 71–76.
DATEDATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive #using
Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATEDATE-2011-GizopoulosPARHSMBV #architecture #detection #fault #manycore #online
Architectures for online error detection and recovery in multicore processors (DG, MP, SVA, PR, SKSH, DJS, AM, AB, XV), pp. 533–538.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KyrkouTT #detection #hardware
Depth-directed hardware object detection (CK, CT, TT), pp. 1442–1447.
DATEDATE-2011-MaW #detection #fault #low cost #named
LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
DATEDATE-2011-MedwedM #detection #fault #logic
Arithmetic logic units with high error detection rates to counteract fault attacks (MM, SM), pp. 1644–1649.
DATEDATE-2011-PalframanKL #detection #fault #low cost
Time redundant parity for low-cost transient error detection (DJP, NSK, MHL), pp. 52–57.
DATEDATE-2011-ZhangT #detection #hardware #named #network
RON: An on-chip ring oscillator network for hardware Trojan detection (XZ, MT), pp. 1638–1643.
DocEngDocEng-2011-GippM #algorithm #detection #pattern matching #sequence
Citation pattern matching algorithms for citation-based plagiarism detection: greedy citation tiling, citation chunking and longest common citation sequence (BG, NM), pp. 249–258.
DocEngDocEng-2011-KarolNKAM #adaptation #aspect-oriented #detection #multi #xml
Detecting and resolving conflicts between adaptation aspects in multi-staged XML transformations (SK, MN, DK, UA, KM), pp. 229–238.
DRRDRR-2011-KavallieratouLC #detection
Ruling line detection and removal (EK, DPL, JC), pp. 1–10.
DRRDRR-2011-LiuZ11a #detection #documentation #effectiveness
A simple and effective figure caption detection system for old-style documents (ZL, HZ), pp. 1–10.
HTHT-2011-StewartSN #approach #detection #social #social media
A transfer approach to detecting disease reporting events in blog social media (AS, MS, WN), pp. 271–280.
ICDARICDAR-2011-ChenL #detection #documentation
Table Detection in Noisy Off-line Handwritten Documents (JC, DPL), pp. 399–403.
ICDARICDAR-2011-ChenL11a #algorithm #detection #documentation #modelling
A Model-Based Ruling Line Detection Algorithm for Noisy Handwritten Documents (JC, DPL), pp. 404–408.
ICDARICDAR-2011-CoatesCCSSWWN #detection #image #learning #recognition
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning (AC, BC, CC, SS, BS, TW, DJW, AYN), pp. 440–445.
ICDARICDAR-2011-DuAL #detection #performance
Dot Text Detection Based on FAST Points (YD, HA, SL), pp. 435–439.
ICDARICDAR-2011-FangGBQTT #detection #documentation #multi #visual notation
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
ICDARICDAR-2011-GhoshC #detection #identification #image
Composite Script Identification and Orientation Detection for Indian Text Images (SG, BBC), pp. 294–298.
ICDARICDAR-2011-GleichmanOGMBP #alias #detection #image #segmentation
Detection and Segmentation of Antialiased Text in Screen Images (SG, BO, AG, MM, EB, EP), pp. 424–428.
ICDARICDAR-2011-KunishigeFU #detection
Scenery Character Detection with Environmental Context (YK, YF, SU), pp. 1049–1053.
ICDARICDAR-2011-LeeLLYK #detection
AdaBoost for Text Detection in Natural Scene (JJL, PHL, SWL, ALY, CK), pp. 429–434.
ICDARICDAR-2011-LiuLZL #detection #image #novel
A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
ICDARICDAR-2011-MicenkovaB #detection #documentation #image
Stamp Detection in Color Document Images (BM, JvB), pp. 1125–1129.
ICDARICDAR-2011-PanZSN11a #adaptation #detection #segmentation #verification
Improving Scene Text Detection by Scale-Adaptive Segmentation and Weighted CRF Verification (YFP, YZ, JS, SN), pp. 759–763.
ICDARICDAR-2011-PapandreouG #detection #novel
A Novel Skew Detection Technique Based on Vertical Projections (AP, BG), pp. 384–388.
ICDARICDAR-2011-PhamDB #detection
A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
ICDARICDAR-2011-UchidaSKF #approach #detection #towards
A Keypoint-Based Approach toward Scenery Character Detection (SU, YS, YK, YF), pp. 819–823.
ICDARICDAR-2011-WeberLSSSD #detection #evaluation #interface #multi #online
MCS for Online Mode Detection: Evaluation on Pen-Enabled Multi-touch Interfaces (MW, ML, YTHS, CS, FS, AD), pp. 957–961.
ICDARICDAR-2011-YinHSN #detection #documentation #robust
Robust Vanishing Point Detection for MobileCam-Based Documents (XCY, HWH, JS, SN), pp. 136–140.
ICDARICDAR-2011-YiT #detection #image #word
Text Detection in Natural Scene Images by Stroke Gabor Words (CY, YT), pp. 177–181.
ICDARICDAR-2011-YouADGT #detection #using
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDARICDAR-2011-ZhaoLL #detection #independence #robust
A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
SIGMODSIGMOD-2011-AlvanakiMRW #detection #named #topic #web
EnBlogue: emergent topic detection in web 2.0 streams (FA, SM, KR, GW), pp. 1271–1274.
SIGMODSIGMOD-2011-DongS #detection #scalability
Large-scale copy detection (XLD, DS), pp. 1205–1208.
VLDBVLDB-2011-BorisovB #approach #declarative #detection #towards
Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
VLDBVLDB-2011-JinLLH #data mining #detection #named #network #social #social media
SocialSpamGuard: A Data Mining-Based Spam Detection System for Social Media Networks (XJ, CXL, JL, JH), pp. 1458–1461.
VLDBVLDB-2011-KaushikR #detection #named
Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
FASEFASE-2011-KessentiniSBW #design #detection #fault #search-based
Search-Based Design Defects Detection by Example (MK, HAS, MB, MW), pp. 401–415.
FASEFASE-2011-LiT #clone detection #detection #erlang #incremental #source code
Incremental Clone Detection and Elimination for Erlang Programs (HL, SJT), pp. 356–370.
SCAMSCAM-J-2009-TiarksKF11 #assessment #detection #state of the art #tool support
An extended assessment of type-3 clones as detected by state-of-the-art tools (RT, RK, RF), pp. 295–331.
CSMRCSMR-2011-FreyH #architecture #constraints #detection #legacy #migration
An Extensible Architecture for Detecting Violations of a Cloud Environment’s Constraints during Legacy Software System Migration (SF, WH), pp. 269–278.
CSMRCSMR-2011-HigoK #clone detection #dependence #detection #heuristic
Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
CSMRCSMR-2011-KessentiniSBW #design #detection #fault #generative #music
Design Defect Detection Rules Generation: A Music Metaphor (MK, HAS, MB, MW), pp. 241–248.
ICPCICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity #using
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-HuangW #detection #monitoring #process
Anomaly Detection by Monitoring Filesystem Activities (LH, KW), pp. 221–222.
ICPCICPC-2011-KessentiniKSBO #design #detection #fault
Design Defects Detection and Correction by Example (MK, WK, HAS, MB, AO), pp. 81–90.
ICSMEICSM-2011-JiresalCN #cobol #detection #precise #scalability #source code
Precise detection of un-initialized variables in large, real-life COBOL programs in presence of unrealizable paths (RJ, AC, RN), pp. 448–456.
ICSMEICSM-2011-KuhnK #combinator #detection #fault #testing
Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
ICSMEICSM-2011-Roover #detection #logic #metaprogramming #object-oriented #source code
A logic meta-programming foundation for example-driven pattern detection in object-oriented programs (CDR), pp. 556–561.
ICSMEICSM-2011-SunKZ #api #detection #graph #library
Graph-based detection of library API imitations (CS, SCK, SJZ), pp. 183–192.
MSRMSR-2011-BiegelSHDD #comparison #detection #metric #refactoring #similarity
Comparison of similarity metrics for refactoring detection (BB, QDS, WH, SD, SD), pp. 53–62.
MSRMSR-2011-HemelKVD #clone detection #detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
MSRMSR-2011-Zhou #debugging #detection #problem
Connecting technology with real-world problems — from copy-paste detection to detecting known bugs: (keynote abstract) (YZ), p. 2.
PASTEPASTE-2011-Detten #behaviour #detection #execution #generative #symbolic computation #towards
Towards systematic, comprehensive trace generation for behavioral pattern detection through symbolic execution (MvD), pp. 17–20.
WCREWCRE-2011-HigoUNK #approach #clone detection #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-UddinRSH #detection #effectiveness #on the #scalability
On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems (MSU, CKR, KAS, AH), pp. 13–22.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
CIAACIAA-2011-FelscherT #composition #detection
Compositional Failure Detection in Structured Transition Systems (IF, WT), pp. 130–141.
CHICHI-2011-KarueiMFMKE #detection #mobile
Detecting vibrations across the body in mobile contexts (IK, KEM, ZFF, RM, SK, MEZ), pp. 3267–3276.
CHICHI-2011-KoZ #detection #feedback #web
Feedlack detects missing feedback in web applications (AJK, XZ), pp. 2177–2186.
HCIDUXU-v2-2011-TamirKMVLJ #detection #usability
Detection of Software Usability Deficiencies (DET, OVK, CJM, DKDV, GRL, AMJ), pp. 527–536.
HCIHCI-DDA-2011-MiyazakiNI #detection #image
A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
HCIHCI-DDA-2011-ZaragozaRBBMCR #detection
A User-Friendly Tool for Detecting the Stress Level in a Person’s Daily Life (IZ, BR, CB, RMB, IM, DC, MAR), pp. 423–431.
HCIHCI-ITE-2011-AbeOO #analysis #detection #image
Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
HCIHCI-ITE-2011-KimRH #detection #multi #recognition
A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
HCIHCI-MIIE-2011-CostaFVCBH #detection #navigation #people #visual notation
Landmarks Detection to Assist the Navigation of Visually Impaired People (PC, HF, VV, PC, JB, LJH), pp. 293–300.
HCIHCI-MIIE-2011-OehlSTHP #approach #detection #human-computer #interactive
Improving Human-Machine Interaction — A Non Invasive Approach to Detect Emotions in Car Drivers (MO, FWS, TKT, RH, HRP), pp. 577–585.
HCIHIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #using #visualisation
Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
AdaEuropeAdaEurope-2011-RazaFP #detection #fault #parallel #source code
Detecting High-Level Synchronization Errors in Parallel Programs (SAR, SF, EP), pp. 17–30.
ICEISICEIS-v2-2011-BaiW #detection #fuzzy #identification #multi
Applying Fuzzy Multiple Criteria Decision Making to Evaluate and Identify Optimal Explosive Detection Equipments (YB, DW), pp. 118–124.
CIKMCIKM-2011-AnderkaSL #classification #detection #problem #quality
Detection of text quality flaws as a one-class classification problem (MA, BS, NL), pp. 2313–2316.
CIKMCIKM-2011-BingLG #detection #segmentation #towards
Towards a unified solution: data record region detection and segmentation (LB, WL, YG), pp. 1265–1274.
CIKMCIKM-2011-DavisLMR #detection #graph
Detecting anomalies in graphs with numeric labels (MD, WL, PCM, GR), pp. 1197–1202.
CIKMCIKM-2011-HagenSR #detection #query
Query session detection as a cascade (MH, BS, TR), pp. 147–152.
CIKMCIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic #using
Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKMCIKM-2011-LeeCCS #detection #social #social media
Content-driven detection of campaigns in social media (KL, JC, ZC, DZS), pp. 551–556.
CIKMCIKM-2011-LeitaoC #detection #optimisation
Duplicate detection through structure optimization (LL, PC), pp. 443–452.
CIKMCIKM-2011-ParkL #data type #detection #evaluation #query
A continuous query evaluation scheme for a detection-only query over data streams (HKP, WSL), pp. 2405–2408.
CIKMCIKM-2011-PillutlaRBSJ #detection #distributed
LSH based outlier detection and its application in distributed setting (MRP, NR, PB, KS, CVJ), pp. 2289–2292.
CIKMCIKM-2011-ShiYCYW #community #detection #multi #on the
On selection of objective functions in multi-objective community detection (CS, PSY, YC, ZY, BW), pp. 2301–2304.
CIKMCIKM-2011-SoodL #detection #probability #using
Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKMCIKM-2011-Stamatatos #detection
Plagiarism detection based on structural information (ES), pp. 1221–1230.
CIKMCIKM-2011-VarolCAK #corpus #detection #named
CoDet: sentence-based containment detection in news corpora (EV, FC, CA, OK), pp. 2049–2052.
CIKMCIKM-2011-WatanabeOOO #detection #microblog #named #realtime
Jasmine: a real-time local-event detection system based on geolocation information propagated to microblogs (KW, MO, MO, RO), pp. 2541–2544.
CIKMCIKM-2011-YalnizCM #detection #scalability
Partial duplicate detection for large book collections (IZY, EFC, RM), pp. 469–474.
CIKMCIKM-2011-ZhangYCT #detection
A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
KDDKDD-2011-BhaduriMG #algorithm #detection
Algorithms for speeding up distance-based outlier detection (KB, BLM, CG), pp. 859–867.
KDDKDD-2011-ChattopadhyayYPFD #adaptation #detection #multi
Multi-source domain adaptation and its application to early detection of fatigue (RC, JY, SP, WF, ID), pp. 717–725.
KDDKDD-2011-ChenRT #adaptation #detection #incremental #learning
Detecting bots via incremental LS-SVM learning with dynamic feature adaptation (FC, SR, PNT), pp. 386–394.
KDDKDD-2011-GabburPFT #approach #detection
A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
KDDKDD-2011-GhaniK #detection #fault #interactive #learning
Interactive learning for efficiently detecting errors in insurance claims (RG, MK), pp. 325–333.
KDDKDD-2011-KaufmanRP #data mining #detection #mining
Leakage in data mining: formulation, detection, and avoidance (SK, SR, CP), pp. 556–563.
KDDKDD-2011-LiL #behaviour #community #detection #framework #generative #modelling #network #simulation #social
Social flocks: a crowd simulation framework for social network generation, community detection, and collective behavior modeling (CTL, SDL), pp. 765–768.
KDDKDD-2011-SculleyOPSHZ #detection
Detecting adversarial advertisements in the wild (DS, MEO, MP, BS, JH, YZ), pp. 274–282.
KDDKDD-2011-YeLZZTGA #detection
Combining file content and file relations for cloud based malware detection (YY, TL, SZ, WZ, ET, UG, MA), pp. 222–230.
KDIRKDIR-2011-GeraciM #algorithm #detection #multi #web
A Multi-sequence Alignment Algorithm for Web Template Detection (FG, MM), pp. 121–128.
KDIRKDIR-2011-MallJP #correlation #detection
Detecting Correlations between Hot Days in News Feeds (RM, NJ, VP), pp. 375–378.
KDIRKDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation #using
Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KEODKEOD-2011-HmidaCBN #3d #approach #detection #ontology #semantics
From 3D Point Clouds to Semantic Objects — An Ontology-based Detection Approach (HBH, CC, FB, CN), pp. 255–260.
MLDMMLDM-2011-AlshukriCZ #bound #detection #incremental #random #using
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDMMLDM-2011-ChenHCS #detection #email #similarity
Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
MLDMMLDM-2011-HaoCCCS #adaptation #detection #email #modelling
Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
MLDMMLDM-2011-PerezR #array #detection #using
Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDMMLDM-2011-SahaDR #community #detection #network
Detection of Communities and Bridges in Weighted Networks (TS, CD, HR), pp. 584–598.
MLDMMLDM-2011-WuW #category theory #detection
Parameter-Free Anomaly Detection for Categorical Data (SW, SW), pp. 112–126.
RecSysRecSys-2011-WuCMW #detection #learning #named
Semi-SAD: applying semi-supervised learning to shilling attack detection (ZW, JC, BM, YW), pp. 289–292.
SEKESEKE-2011-BragaD #detection #information management #tool support #using
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKESEKE-2011-BudiLLJW #architecture #automation #design #detection
Automated Detection of Likely Design Flaws in N-Tier Architectures (AB, L, DL, LJ, SW), pp. 613–618.
SEKESEKE-2011-MoserWHB #analysis #automation #detection #empirical #requirements #semantics
Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKESEKE-2011-ZhangSSCM #design pattern #detection
Detecting Architecture Erosion by Design Decision of Architectural Pattern (LZ, YS, HS, FC, HM), pp. 758–763.
SIGIRSIGIR-2011-AktolgaRA #detection
Detecting outlier sections in us congressional legislation (EA, IR, YA), pp. 235–244.
SIGIRSIGIR-2011-AminiU #automation #detection #learning #multi #summary
Transductive learning over automatically detected themes for multi-document summarization (MRA, NU), pp. 1193–1194.
SIGIRSIGIR-2011-GuoYA #detection #interactive #mobile
Detecting success in mobile search from interaction (QG, SY, EA), pp. 1229–1230.
SIGIRSIGIR-2011-JijkounR #detection
Bootstrapping subjectivity detection (VJ, MdR), pp. 1125–1126.
SIGIRSIGIR-2011-Shokouhi #analysis #detection #query
Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
BXBX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification #using
Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
ECMFAECMFA-2011-BarrettCB #detection
Table-Driven Detection and Resolution of Operation-Based Merge Conflicts with Mirador (SB, PC, GB), pp. 329–344.
ECMFAECMFA-2011-NoirDESB #case study #consistency #detection #experience #nondeterminism #representation
Operation Based Model Representation: Experiences on Inconsistency Detection (JLN, OD, DE, MAAdS, XB), pp. 85–96.
MODELSMoDELS-2011-Al-BatranSH #clone detection #detection #development #embedded #modelling #semantics
Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
MODELSMoDELS-2011-JensenCGN #behaviour #detection
A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
MODELSMoDELS-2011-Al-BatranSH #clone detection #detection #development #embedded #modelling #semantics
Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
MODELSMoDELS-2011-JensenCGN #behaviour #detection
A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
ECOOPECOOP-2011-CarbinMKR #detection #infinity
Detecting and Escaping Infinite Loops with Jolt (MC, SM, MK, MCR), pp. 609–633.
OOPSLAOOPSLA-2011-JovicAH #debugging #detection #performance
Catch me if you can: performance bug detection in the wild (MJ, AA, MH), pp. 155–170.
OOPSLAOOPSLA-2011-LiSD #analysis #concurrent #detection #named
SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
OOPSLAOOPSLA-2011-LiuB #automation #detection #named #precise
SHERIFF: precise detection and automatic mitigation of false sharing (TL, EDB), pp. 3–18.
LOPSTRLOPSTR-2011-DandoisV #detection #how #logic programming #source code
Clones in Logic Programs and How to Detect Them (CD, WV), pp. 90–105.
PADLPADL-2011-ChristakisS #detection #fault #message passing #static analysis #using
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADLPADL-2011-SalgueiroDBA #constraints #detection #using
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
SACSAC-2011-BhaskaranNFG #behaviour #detection #learning #online
Deceit detection via online behavioral learning (NB, IN, MGF, VG), pp. 29–30.
SACSAC-2011-FontesNPC #architecture #detection #learning #problem
An agent-based architecture for supporting the workgroups creation and the detection of out-of-context conversation on problem-based learning in virtual learning environments (LMdOF, FMMN, AÁAP, GALdC), pp. 1175–1180.
SACSAC-2011-HuangH #detection #markov #multi #semantics
Semantic event detection in baseball videos based on a multi-output hidden Markov model (YFH, JJH), pp. 929–936.
SACSAC-2011-KaoYYC #detection
A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs (KFK, THY, WSY, HHC), pp. 32–36.
SACSAC-2011-Mammar #approach #bibliography #c #detection
An overview of a proof-based approach to detecting C vulnerabilities (AM), pp. 1343–1344.
SACSAC-2011-WangZ #detection #performance #web
High-speed web attack detection through extracting exemplars from HTTP traffic (WW, XZ), pp. 1538–1543.
SACSAC-2011-ZhangZZZX #detection #learning #web
Harmonic functions based semi-supervised learning for web spam detection (WZ, DZ, YZ, GZ, BX), pp. 74–75.
ESEC-FSEESEC-FSE-2011-BrunHEN #collaboration #detection
Proactive detection of collaboration conflicts (YB, RH, MDE, DN), pp. 168–178.
ICSEICSE-2011-Bertran #architecture #detection #evolution #smell
Detecting architecturally-relevant code smells in evolving software systems (IMB), pp. 1090–1093.
ICSEICSE-2011-Choudhary #detection #web
Detecting cross-browser issues in web applications (SRC), pp. 1146–1148.
ICSEICSE-2011-GenevesL #consistency #detection #ide #xml
Inconsistent path detection for XML IDEs (PG, NL), pp. 983–985.
ICSEICSE-2011-JhiWJZLW #detection
Value-based program characterization and its application to software plagiarism detection (YcJ, XW, XJ, SZ, PL, DW), pp. 756–765.
ICSEICSE-2011-MatthijssenZ #ajax #comprehension #detection #interactive #named
FireDetective: understanding ajax client/server interactions (NM, AZ), pp. 998–1000.
ICSEICSE-2011-ShengVEHCZ #concurrent #detection #lightweight #named
RACEZ: a lightweight and non-invasive race detection tool for production applications (TS, NV, SE, RH, WC, WZ), pp. 401–410.
ICSEICSE-2011-SridharaPV #automation #detection
Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
ICSEICSE-2011-TanZP #concurrent #debugging #detection #mining #named
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs (LT, YZ, YP), pp. 11–20.
ICSEICSE-2011-WongCKD #composition #detection
Detecting software modularity violations (SW, YC, MK, MD), pp. 411–420.
SLESLE-2011-BastenKV #ambiguity #detection #scalability
Ambiguity Detection: Scaling to Scannerless (BB, PK, JJV), pp. 303–323.
ASPLOSASPLOS-2011-ZhangLOSJLR #concurrent #debugging #detection #fault #named
ConSeq: detecting concurrency bugs through sequential errors (WZ, JL, RO, JS, GJ, SL, TWR), pp. 251–264.
CGOCGO-2011-XieX #detection #named #performance
Acculock: Accurate and efficient detection of data races (XX, JX), pp. 201–212.
HPCAHPCA-2011-QureshiSLF #detection #online
Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
HPDCHPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code #using
Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
PPoPPPPoPP-2011-ZhengRQA #detection #gpu #named #source code
GRace: a low-overhead mechanism for detecting data races in GPU programs (MZ, VTR, FQ, GA), pp. 135–146.
SOSPSOSP-2011-LaadanVTBYN #detection #pervasive #process
Pervasive detection of process races in deployed systems (OL, NV, CcT, CB, JY, JN), pp. 353–367.
SOSPSOSP-2011-LenersWHAW #detection #distributed #network
Detecting failures in distributed systems with the Falcon spy network (JBL, HW, WLH, MKA, MW), pp. 279–294.
SOSPSOSP-2011-VeeraraghavanCFN #detection #using
Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
CAVCAV-2011-GaneshKAGHE #analysis #detection #named #string #testing
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
ICSTICST-2011-SmithW #detection #heuristic #sql #using #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICTSSICTSS-2011-MammarCJMO #c #detection #source code #testing #using
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-ShinboH #communication #detection #empirical #mobile
An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
ISSTAISSTA-2011-LeS #analysis #detection #fault #generative
Generating analyses for detecting faults in path segments (WL, MLS), pp. 320–330.
ISSTAISSTA-2011-PradelG #detection #order
Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
ICSTSAT-2011-LonsingB #detection
Failed Literal Detection for QBF (FL, AB), pp. 259–272.
ECSAECSA-2010-ScandariatoBJ #architecture #automation #detection
Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
ASEASE-2010-LiHG #ajax #behaviour #detection #interactive #web
Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
ASEASE-2010-PhamNNN #detection
Detection of recurring software vulnerabilities (NHP, TTN, HAN, TNN), pp. 447–456.
ASEASE-2010-RederE #design #detection #fault #named #uml #visualisation
Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML (AR, AE), pp. 347–348.
ASEASE-2010-YangWRN #automation #coordination #detection #natural language #requirements
Automatic detection of nocuous coordination ambiguities in natural language requirements (HY, AW, ANDR, BN), pp. 53–62.
CASECASE-2010-AllenT #consistency #detection #fault #industrial #nondeterminism
Event-based fault detection of manufacturing cell: Data inconsistencies between academic assumptions and industry practice (LVA, DMT), pp. 426–432.
CASECASE-2010-BorsuYP #automation #detection
Automated surface deformations detection and marking on automotive body panels (VB, AY, PP), pp. 551–556.
CASECASE-2010-DhupatiKRR #analysis #detection #novel #speech #using #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-LeungLECS #detection
Detection and tracking of low contrast human sperm tail (CL, ZL, NE, RFC, YS), pp. 263–268.
CASECASE-2010-RichtsfeldSV #automation #detection #realtime
Real-time edge detection for automated fibre-mat stitching (MR, AS, MV), pp. 557–562.
CASECASE-2010-RodriguezBMRW #analysis #assembly #detection
Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
CASECASE-2010-RoutrayRS #clustering #detection #fault #reduction
Data reduction and clustering techniques for fault detection and diagnosis in automotives (AR, AR, SS), pp. 326–331.
DACDAC-2010-CochranR #consistency #detection #predict #runtime
Consistent runtime thermal prediction and control through workload phase detection (RC, SR), pp. 62–67.
DACDAC-2010-JindalAHLNW #detection #logic
Detecting tangled logic structures in VLSI netlists (TJ, CJA, JH, ZL, GJN, CBW), pp. 603–608.
DATEDATE-2010-BorodinJ #detection #fault
Instruction precomputation with memoization for fault detection (DB, BHHJ), pp. 1665–1668.
DATEDATE-2010-BoydSS #detection #process #trade-off
Power-accuracy tradeoffs in human activity transition detection (JB, HS, AS), pp. 1524–1529.
DATEDATE-2010-CutrupiCCG #detection #flexibility
A flexible UWB Transmitter for breast cancer detection imaging systems (MC, MC, MRC, MG), pp. 1076–1081.
DATEDATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters #using
Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATEDATE-2010-DasMZC #detection #hardware #information management #memory management
Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
DATEDATE-2010-DiracoLS #detection #recognition
An active vision system for fall detection and posture recognition in elderly healthcare (GD, AL, PS), pp. 1536–1541.
DATEDATE-2010-Scholzel #detection #fault #performance
HW/SW co-detection of transient and permanent faults with fast recovery in statically scheduled data paths (MS), pp. 723–728.
DocEngDocEng-2010-ChiuCD #detection #documentation #image
Picture detection in document page images (PC, FC, LD), pp. 211–214.
DocEngDocEng-2010-ThaoM #data type #detection #using #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRRDRR-2010-BeusekomRB #detection #multi
Trainable multiscript orientation detection (JvB, YR, TMB), pp. 1–10.
DRRDRR-2010-Dejean #detection #documentation #sequence
Numbered sequence detection in documents (HD), pp. 1–10.
DRRDRR-2010-FaureV #detection #metric
Detection of figure and caption pairs based on disorder measurements (CF, NV), pp. 1–10.
DRRDRR-2010-LiuZ #detection #documentation #image #learning
Semi-supervised learning for detecting text-lines in noisy document images (ZL, HZ), pp. 1–10.
DRRDRR-2010-SankarasubramaniamNVK #approach #detection #documentation
Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
DRRDRR-2010-ShahabKD #detection #web
The aware toolbox for the detection of law infringements on web pages (AS, TK, AD), pp. 1–10.
DRRDRR-2010-TerradesSGVJ #detection #predict
Interactive-predictive detection of handwritten text blocks (ORT, NS, AG, EV, AJ), pp. 1–10.
HTHT-2010-GippB #approach #detection #identification #independence
Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
SIGMODSIGMOD-2010-CieslewiczRSY #automation #data-driven #detection
Automatic contention detection and amelioration for data-intensive operations (JC, KAR, KS, YY), pp. 483–494.
SIGMODSIGMOD-2010-MathioudakisK #detection #named #twitter
TwitterMonitor: trend detection over the twitter stream (MM, NK), pp. 1155–1158.
SIGMODSIGMOD-2010-WangWLWWLTXL #dataset #detection #named
MapDupReducer: detecting near duplicates over massive datasets (CW, JW, XL, WW, HW, HL, WT, JX, RL), pp. 1119–1122.
VLDBVLDB-2010-DongBHS #detection
Global Detection of Complex Copying Relationships Between Sources (XD, LBE, YH, DS), pp. 1358–1369.
VLDBVLDB-2010-DongBHS10a #detection #named
SOLOMON: Seeking the Truth Via Copying Detection (XD, LBE, YH, DS), pp. 1617–1620.
VLDBVLDB-2010-OrairTWMP #detection
Distance-Based Outlier Detection: Consolidation and Renewed Bearing (GHO, CHCT, YW, WMJ, SP), pp. 1469–1480.
VLDBVLDB-2010-WoodsTA #detection
Complex Event Detection at Wire Speed with FPGAs (LW, JT, GA), pp. 660–669.
VLDBVLDB-2010-YiuUST #detection #mobile #performance #policy #proximity #self
Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
CSEETCSEET-2010-SharifM #design pattern #detection #layout
The Effects of Layout on Detecting the Role of Design Patterns (BS, JIM), pp. 41–48.
ITiCSEITiCSE-2010-Kumar #detection #fault #online #testing
The case for error detection support during online testing (ANK), p. 311.
FASEFASE-2010-DistefanoF #detection #java #memory management
Memory Leaks Detection in Java by Bi-abductive Inference (DD, IF), pp. 278–292.
TACASTACAS-2010-ParizekK #component #detection #fault #java #performance #random #using
Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CSMRCSMR-2010-KnieselBHFCGT #design pattern #detection #tool support
DPDX--Towards a Common Result Exchange Format for Design Pattern Detection Tools (GK, AB, PH, LJF, AC, YGG, NT), pp. 232–235.
CSMRCSMR-2010-LuciaDGR #behaviour #design pattern #detection #model checking
Improving Behavioral Design Pattern Detection through Model Checking (ADL, VD, CG, MR), pp. 176–185.
CSMRCSMR-2010-RoubtsovSB #composition #dependence #detection #injection #java #smell
Detecting Modularity “Smells” in Dependencies Injected with Java Annotations (SAR, AS, MvdB), pp. 244–247.
ICPCICPC-2010-BarbourYZ #clone detection #detection #scalability
A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
ICPCICPC-2010-BeyerF #dependence #detection #low level #named
DepDigger: A Tool for Detecting Complex Low-Level Dependencies (DB, AF), pp. 40–41.
ICSMEICSM-2010-BernardiL #design pattern #detection #modelling
Model-driven detection of Design Patterns (MLB, GADL), pp. 1–5.
ICSMEICSM-2010-CanforaCCP #detection #empirical #logic #multi #using
Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSMEICSM-2010-CorazzaMMS #approach #clone detection #detection #kernel
A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
ICSMEICSM-2010-HummelJHC #clone detection #detection #distributed #incremental #scalability
Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSMEICSM-2010-LuciaDGR #design pattern #detection #dynamic analysis #eclipse #plugin
An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis (ADL, VD, CG, MR), pp. 1–6.
PASTEPASTE-2010-Schmeelk #benchmark #detection #metric #towards
Towards a unified fault-detection benchmark (SS), pp. 61–64.
SCAMSCAM-2010-BastenS #ambiguity #detection #named
AMBIDEXTER: Practical Ambiguity Detection (BB, TvdS), pp. 101–102.
SCAMSCAM-2010-BrixtelFLBR #clone detection #detection #independence
Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
WCREWCRE-2010-BiegelD #clone detection #configuration management #detection
Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
WCREWCRE-2010-DavisG #assembly #detection #source code
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
WCREWCRE-2010-SelimFZ #clone detection #detection #representation #using
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
PEPMPEPM-2010-BrownT #clone detection #detection #haskell
Clone detection and elimination for Haskell (CB, SJT), pp. 111–120.
PEPMPEPM-2010-HofmannK #detection #morphism #problem #towards
I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDIPLDI-2010-BondBG #analysis #context-sensitive grammar #debugging #detection #named #performance
Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses (MDB, GZB, SZG), pp. 13–24.
PLDIPLDI-2010-BondCM #detection #named
PACER: proportional detection of data races (MDB, KEC, KSM), pp. 255–268.
PLDIPLDI-2010-FlanaganF #detection #memory management
Adversarial memory for detecting destructive races (CF, SNF), pp. 244–254.
PLDIPLDI-2010-XuR #detection
Detecting inefficiently-used containers to avoid bloat (G(X, AR), pp. 160–173.
STOCSTOC-2010-BhaskaraCCFV #approximate #detection
Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
FLOPSFLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis #using
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
ICALPICALP-v1-2010-AmirELPS #detection
Cycle Detection and Correction (AA, EE, AL, EP, NS), pp. 43–54.
ICALPICALP-v1-2010-KroviMOR #detection #quantum
Finding Is as Easy as Detecting for Quantum Walks (HK, FM, MO, JR), pp. 540–551.
SEFMSEFM-2010-CristiaAM #detection #framework #testing
Pruning Testing Trees in the Test Template Framework by Detecting Mathematical Contradictions (MC, PA, PRM), pp. 268–277.
LISPILC-2010-Mehnert #detection #fault #type inference #type system
Extending Dylan’s type system for better type inference and error detection (HM), pp. 1–10.
ICGTICGT-2010-TaentzerELW #detection #graph #version control
Conflict Detection for Model Versioning Based on Graph Modifications (GT, CE, PL, MW), pp. 171–186.
CHICHI-2010-AppertB #detection #gesture #recognition
Scale detection for a priori gesture recognition (CA, OB), pp. 879–882.
CHICHI-2010-NakatsumaS #2d #communication #detection #network
High accuracy position and orientation detection in two-dimensional communication network (KN, HS), pp. 2297–2306.
CHICHI-2010-WuDM #detection #enterprise #network #social #using
Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
AdaEuropeAdaEurope-2010-Keul #detection #version control
Static Versioning of Global State for Race Condition Detection (SK), pp. 111–124.
CAiSECAiSE-2010-BouassidaB #approach #detection #problem
A New Approach for Pattern Problem Detection (NB, HBA), pp. 150–164.
ICEISICEIS-AIDSS-2010-PortelaAROG #automation #detection #framework #game studies #performance
An Intelligent Framework for Automatic Event Detection in Robotic Soccer Games — An Auxiliar Tool to Help Coaches Improve their Teams’ Performance (JP, PA, LPR, ECO, JG), pp. 244–249.
CIKMCIKM-2010-CiglanN #detection #named #personalisation #statistics #wiki
WikiPop: personalized event detection system based on Wikipedia page view statistics (MC, KN), pp. 1931–1932.
CIKMCIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image #using
Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKMCIKM-2010-FisichellaSDN #detection #health
Unsupervised public health event detection for epidemic intelligence (MF, AS, KD, WN), pp. 1881–1884.
CIKMCIKM-2010-GeXZOYL #detection #evolution #named
Top-Eye: top-k evolving trajectory outlier detection (YG, HX, ZHZ, HTO, JY, KCL), pp. 1733–1736.
CIKMCIKM-2010-HuangSHDSL #algorithm #clustering #community #detection #named #network
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks (JH, HS, JH, HD, YS, YL), pp. 219–228.
CIKMCIKM-2010-LimNJLL #behaviour #bibliography #detection #rating #using
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-MurataTMKM #detection
Detecting periodic changes in search intentions in a search engine (MM, HT, YM, RK, TM), pp. 1525–1528.
CIKMCIKM-2010-Nomoto #detection #similarity
Two-tier similarity model for story link detection (TN), pp. 789–798.
CIKMCIKM-2010-PopescuP #detection #twitter
Detecting controversial events from twitter (AMP, MP), pp. 1873–1876.
CIKMCIKM-2010-SotoudehA #detection #framework #induction #using
Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKMCIKM-2010-TianWWRCM #detection #mobile #topic
Topic detection and organization of mobile text messages (YT, WW, XW, JR, CC, JM), pp. 1877–1880.
CIKMCIKM-2010-WuIPR #approach #detection #wiki
Elusive vandalism detection in wikipedia: a text stability-based approach (QW, DI, CP, LR), pp. 1797–1800.
ECIRECIR-2010-BoudinSN #detection #information retrieval
Improving Medical Information Retrieval with PICO Element Detection (FB, LS, JYN), pp. 50–61.
ECIRECIR-2010-KimCLL #detection #effectiveness #image #named #sequence #using
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ICMLICML-2010-FelzenszwalbGMR #detection #modelling
Discriminative Latent Variable Models for Object Detection (PFF, RBG, DAM, DR), pp. 11–12.
ICMLICML-2010-ShoebG #detection #machine learning
Application of Machine Learning To Epileptic Seizure Detection (AHS, JVG), pp. 975–982.
ICMLICML-2010-XuHFPJ #detection #mining #problem #scalability
Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
ICPRICPR-2010-AnthimopoulosVG #detection #evaluation #image
A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
ICPRICPR-2010-AranG #detection #people
Fusing Audio-Visual Nonverbal Cues to Detect Dominant People in Group Conversations (OA, DGP), pp. 3687–3690.
ICPRICPR-2010-BanerjeeK #detection #modelling
Model-Based Detection of Acoustically Dense Objects in Ultrasound (JB, KBK), pp. 4166–4169.
ICPRICPR-2010-BelaroussiFTSCP #case study #detection #image
Road Sign Detection in Images: A Case Study (RB, PF, JPT, BS, PC, NP), pp. 484–488.
ICPRICPR-2010-BenedekDZ #detection #image #process
Building Detection in a Single Remotely Sensed Image with a Point Process of Rectangles (CB, XD, JZ), pp. 1417–1420.
ICPRICPR-2010-BimboLMP #detection #geometry #using
Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPRICPR-2010-BouchrikaCNMT #detection #people #using
Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPRICPR-2010-BrezovanBGSS #adaptation #detection #image #performance #visual notation
An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
ICPRICPR-2010-BushraOEO #detection #linear
QRS Complex Detection by Non Linear Thresholding of Modulus Maxima (BJ, OB, EF, OL), pp. 4500–4503.
ICPRICPR-2010-CadavidA #automation #detection #modelling #using #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-CandamoGKG #detection #using
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPRICPR-2010-ChaoTLC #detection #fault
A Generalized Anisotropic Diffusion for Defect Detection in Low-Contrast Surfaces (SMC, DMT, WCL, WYC), pp. 4408–4411.
ICPRICPR-2010-CheongL #case study #clustering #detection #topic #twitter
A Study on Detecting Patterns in Twitter Intra-topic User and Message Clustering (MC, VCSL), pp. 3125–3128.
ICPRICPR-2010-ConteFPTV #detection #people
Counting Moving People in Videos by Salient Points Detection (DC, PF, GP, FT, MV), pp. 1743–1746.
ICPRICPR-2010-DasKK #detection #multi #optimisation
Sub-Category Optimization for Multi-view Multi-pose Object Detection (DD, YK, YK), pp. 1405–1408.
ICPRICPR-2010-DengH #composition #detection #exponential #process
Voice Activity Detection Based on Complex Exponential Atomic Decomposition and Likelihood Ratio Test (SD, JH), pp. 89–92.
ICPRICPR-2010-DengSS #detection #network #pattern matching #pattern recognition #recognition
Applying Error-Correcting Output Coding to Enhance Convolutional Neural Network for Target Detection and Pattern Recognition (HD, GS, CYS), pp. 4291–4294.
ICPRICPR-2010-DornaikaC #classification #detection #performance #using
Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPRICPR-2010-DoshiB #detection
Detecting Vorticity in Optical Flow of Fluids (AD, AGB), pp. 2118–2121.
ICPRICPR-2010-DurakN #classification #detection #image
Principal Contour Extraction and Contour Classification to Detect Coronal Loops from the Solar Images (ND, ON), pp. 2403–2406.
ICPRICPR-2010-FaragGEF #data-driven #detection #modelling #robust
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT (AAF, JHG, SE, AAF), pp. 2588–2591.
ICPRICPR-2010-FengJR #detection
Detecting Altered Fingerprints (JF, AKJ, AR), pp. 1622–1625.
ICPRICPR-2010-FengZH #detection #learning #online #self
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes (JF, CZ, PH), pp. 3599–3602.
ICPRICPR-2010-FouheySB #detection #image #multi #using
Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPRICPR-2010-FujitaHSTS #detection #image #using
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GaoHLZW #detection #kernel
Local Outlier Detection Based on Kernel Regression (JG, WH, WL, Z(Z, OW), pp. 585–588.
ICPRICPR-2010-Garcia-TubioWS #detection #geometry
Combining Geometry and Local Appearance for Object Detection (MPGT, HW, LS), pp. 4024–4027.
ICPRICPR-2010-GiannakopoulosPT #approach #detection #multimodal #video
A Multimodal Approach to Violence Detection in Video Sharing Sites (TG, AP, ST), pp. 3244–3247.
ICPRICPR-2010-GuoM #detection #using
Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPRICPR-2010-GuptaD #communication #detection #network #social
Detection and Characterization of Anomalous Entities in Social Communication Networks (NG, LD), pp. 738–741.
ICPRICPR-2010-HaberdarS #detection #framework #mobile #refinement #using #video
Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPRICPR-2010-HamKN #automation #detection #finite #fuzzy
Fire-Flame Detection Based on Fuzzy Finite Automation (SH, BK, JYN), pp. 3919–3922.
ICPRICPR-2010-HarirchiRMDG #algorithm #detection #using
Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPRICPR-2010-HayashiUPS #artificial reality #detection #multi
An Augmented Reality Setup with an Omnidirectional Camera Based on Multiple Object Detection (TH, HU, JP, HS), pp. 3171–3174.
ICPRICPR-2010-HeimonenH #detection #framework
A Human Detection Framework for Heavy Machinery (TAH, JH), pp. 416–419.
ICPRICPR-2010-HongCCG #detection #set
Boosted Sigma Set for Pedestrian Detection (XH, HC, XC, WG), pp. 3017–3020.
ICPRICPR-2010-HuangM #automation #detection #locality #video
Automatic Detection and Localization of Natural Scene Text in Video (XH, HM), pp. 3216–3219.
ICPRICPR-2010-IzadiS #automation #detection #image #segmentation #using
Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPRICPR-2010-JoshiP #adaptation #detection #incremental #learning
Scene-Adaptive Human Detection with Incremental Active Learning (AJJ, FP), pp. 2760–2763.
ICPRICPR-2010-JulianDLCBC #automation #detection
Automatic Hair Detection in the Wild (PJ, CD, FL, VC, AB, AC), pp. 4617–4620.
ICPRICPR-2010-KalalMM #automation #detection #fault
Forward-Backward Error: Automatic Detection of Tracking Failures (ZK, KM, JM), pp. 2756–2759.
ICPRICPR-2010-KamarainenI #canonical #detection #learning
Learning and Detection of Object Landmarks in Canonical Object Space (JKK, JI), pp. 1409–1412.
ICPRICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self #using
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-KontschiederDKBB #detection #image
Detecting Paper Fibre Cross Sections in Microtomy Images (PK, MD, JK, WB, HB), pp. 316–319.
ICPRICPR-2010-KonyaES #detection #documentation #image #performance
Fast Seamless Skew and Orientation Detection in Document Images (IVK, SE, CS), pp. 1924–1928.
ICPRICPR-2010-KrajewskiBK #case study #classification #detection #multi #self #speech
Comparing Multiple Classifiers for Speech-Based Detection of Self-Confidence — A Pilot Study (JK, AB, SK), pp. 3716–3719.
ICPRICPR-2010-KrishnanS #detection #using
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPRICPR-2010-Landesa-VazquezA #detection
The Role of Polarity in Haar-like Features for Face Detection (ILV, JLAC), pp. 412–415.
ICPRICPR-2010-LathenCKB #detection #linear #robust
Non-ring Filters for Robust Detection of Linear Structures (GL, OC, HK, MB), pp. 233–236.
ICPRICPR-2010-LefakisWGS #detection
Boosted Edge Orientation Histograms for Grasping Point Detection (LL, HW, MPGT, LS), pp. 4072–4076.
ICPRICPR-2010-Lian #detection #performance #retrieval
Fast Fingerprint Retrieval with Line Detection (HCL), pp. 3151–3154.
ICPRICPR-2010-LiaoH #detection #energy
Slip and Fall Events Detection by Analyzing the Integrated Spatiotemporal Energy Map (TL, CLH), pp. 1718–1721.
ICPRICPR-2010-LinW #detection #framework #using
Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPRICPR-2010-LiPG #detection #evaluation #realtime
Real-Time Traffic Sign Detection: An Evaluation Study (YL, SP, WG), pp. 3033–3036.
ICPRICPR-2010-LiSN #detection #documentation #image #performance #recognition
Fast Logo Detection and Recognition in Document Images (ZL, MSA, MN), pp. 2716–2719.
ICPRICPR-2010-LiuQW #automation #detection
Automatic Detection of Phishing Target from Phishing Webpage (GL, BQ, LW), pp. 4153–4156.
ICPRICPR-2010-LiZZ #detection #invariant #using
Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPRICPR-2010-LuWD #detection #random
Part Detection, Description and Selection Based on Hidden Conditional Random Fields (WL, SW, XD), pp. 657–660.
ICPRICPR-2010-MaHHL #detection
Context Inspired Pedestrian Detection in Far-Field Videos (WM, PH, LH, CL), pp. 3009–3012.
ICPRICPR-2010-ManciniFZ #detection #multi
Road Change Detection from Multi-Spectral Aerial Data (AM, EF, PZ), pp. 448–451.
ICPRICPR-2010-MarcialisRT #analysis #detection
Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
ICPRICPR-2010-MehmoodN #detection #kernel #using
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPRICPR-2010-MilitzerHJTH #automation #detection #image #segmentation
Automatic Detection and Segmentation of Focal Liver Lesions in Contrast Enhanced CT Images (AM, TH, FJ, CT, JH), pp. 2524–2527.
ICPRICPR-2010-MoroTU #detection #using
Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPRICPR-2010-NguyenFP #detection #towards
Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
ICPRICPR-2010-NishioOB #detection
Hierarchical Anomality Detection Based on Situation (SN, HO, NB), pp. 1108–1111.
ICPRICPR-2010-OzcanG #detection #fuzzy
Fuzzy Support Vector Machines for ECG Arrhythmia Detection (NOO, FSG), pp. 2973–2976.
ICPRICPR-2010-OzturkYA #detection
Detecting Dominant Motion Flows in Unstructured/Structured Crowd Scenes (OO, TY, KA), pp. 3533–3536.
ICPRICPR-2010-PaivaT #detection #image #using
Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPRICPR-2010-PapalazarouRW #detection #estimation #image #multi #using
Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPRICPR-2010-PapariCP #detection #novel #using
Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPRICPR-2010-ParkKS #detection #markov #modelling #recognition #using #visual notation
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPRICPR-2010-PoullotS #detection #image #scalability #video
Detecting Screen Shot Images within Large-Scale Video Archive (SP, SS), pp. 3203–3207.
ICPRICPR-2010-PrisacariuTZRG #3d #detection #towards
Integrating Object Detection with 3D Tracking Towards a Better Driver Assistance System (VAP, RT, KZ, IDR, LJVG), pp. 3344–3347.
ICPRICPR-2010-PutpuekCLS #approach #detection #identification
Unified Approach to Detection and Identification of Commercial Films by Temporal Occurrence Pattern (NP, NC, CL, SS), pp. 3288–3291.
ICPRICPR-2010-QinVG #detection #image
Background Filtering for Improving of Object Detection in Images (GQ, BV, LG), pp. 922–925.
ICPRICPR-2010-QiuFW #detection #visual notation
Detect Visual Spoofing in Unicode-Based Text (BQ, NF, LW), pp. 1949–1952.
ICPRICPR-2010-ReckyL #detection #using
Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPRICPR-2010-RenHHLC #detection
A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
ICPRICPR-2010-RudinacJ #detection #locality
Saliency Detection and Object Localization in Indoor Environments (MR, PPJ), pp. 404–407.
ICPRICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
ICPRICPR-2010-SenechalBP #automation #detection #using
Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPRICPR-2010-Seo #detection #distance #matrix
Speaker Change Detection Based on the Pairwise Distance Matrix (JSS), pp. 93–96.
ICPRICPR-2010-SeppkeDH #detection #energy #image #symmetry #using
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPRICPR-2010-SertelCLSG #analysis #approach #detection #image
An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
ICPRICPR-2010-SeverskyY #3d #detection #scalability #set
Scalable Cage-Driven Feature Detection and Shape Correspondence for 3D Point Sets (LMS, LY), pp. 3557–3560.
ICPRICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile #using
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPRICPR-2010-ShiGW #detection #realtime
Real-Time Abnormal Event Detection in Complicated Scenes (YS, YG, RW), pp. 3653–3656.
ICPRICPR-2010-ShimosakaINSM #detection #process
Detecting Human Activity Profiles with Dirichlet Enhanced Inhomogeneous Poisson Processes (MS, TI, HN, TS, TM), pp. 4384–4387.
ICPRICPR-2010-ShivakumaraPT #detection #video
New Wavelet and Color Features for Text Detection in Video (PS, TQP, CLT), pp. 3996–3999.
ICPRICPR-2010-SirmacekU #detection #network #using
Road Network Extraction Using Edge Detection and Spatial Voting (BS, ), pp. 3113–3116.
ICPRICPR-2010-SongLLJ #detection #representation
A Discriminative Model for Object Representation and Detection via Sparse Features (XS, PL, LL, YJ), pp. 3077–3080.
ICPRICPR-2010-StephaniJRH #automation #detection
Automatically Detecting Peaks in Terahertz Time-Domain Spectroscopy (HS, JJ, CR, BH), pp. 4468–4471.
ICPRICPR-2010-SuLLT #detection
An RST-Tolerant Shape Descriptor for Object Detection (CWS, HYML, YML, HRT), pp. 766–769.
ICPRICPR-2010-SultaniC #detection #using
Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPRICPR-2010-SunB #3d #detection
3D Filtering for Injury Detection in Brain MRI (YS, BB), pp. 2568–2571.
ICPRICPR-2010-SunHL #data-driven #detection
Data-Driven Foreground Object Detection from a Non-stationary Camera (SWS, FH, HYML), pp. 3053–3056.
ICPRICPR-2010-SunVFT #automation #detection
Automated Detection of Nucleoplasmic Bridges for DNA Damage Scoring in Binucleated Cells (CS, PV, MF, PT), pp. 2480–2483.
ICPRICPR-2010-SuZSH #2d #detection #image
Detection of Shapes in 2D Point Clouds Generated from Images (JS, ZZ, AS, FH), pp. 2640–2643.
ICPRICPR-2010-TahirYBAMK #concept #detection #visual notation
The University of Surrey Visual Concept Detection System at ImageCLEF@ICPR: Working Notes (MAT, FY, MB, MA, KM, JK), pp. 850–853.
ICPRICPR-2010-TasdemirC #detection #video
Motion Vector Based Features for Content Based Video Copy Detection (KT, AEÇ), pp. 3134–3137.
ICPRICPR-2010-TaxHVP #clustering #concept #detection #learning #multi #using
The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPRICPR-2010-TopalAG #approach #detection #heuristic #realtime #robust
Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection (CT, CA, YG), pp. 2424–2427.
ICPRICPR-2010-TorrentPLFSMP #approach #detection #using
Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPRICPR-2010-TosatoFCM #detection
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds (DT, MF, MC, VM), pp. 3308–3311.
ICPRICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability #using
Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPRICPR-2010-VerschaeR #detection #multi
Coarse-To-Fine Multiclass Nested Cascades for Object Detection (RV, JRdS), pp. 344–347.
ICPRICPR-2010-VillamizarMAS #category theory #detection #multi #performance #random
Shared Random Ferns for Efficient Detection of Multiple Categories (MV, FMN, JAC, AS), pp. 388–391.
ICPRICPR-2010-Wang #detection #documentation #recognition #using
Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPRICPR-2010-WangY #detection
Detection Based Low Frame Rate Human Tracking (LW, NHCY), pp. 3529–3532.
ICPRICPR-2010-WhitelamJB #case study #detection #multi
Multispectral Eye Detection: A Preliminary Study (CW, ZJ, TB), pp. 209–212.
ICPRICPR-2010-WijnhovenW #detection #performance #probability #using
Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPRICPR-2010-WuHCCT #detection #interactive #using #visual notation
Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPRICPR-2010-XingAL #detection #learning #multi
Multiple Human Tracking Based on Multi-view Upper-Body Detection and Discriminative Learning (JX, HA, SL), pp. 1698–1701.
ICPRICPR-2010-YangQ #approach #detection #distributed #effectiveness #parametricity
An Effective Decentralized Nonparametric Quickest Detection Approach (DY, HQ), pp. 2278–2281.
ICPRICPR-2010-YukselG #classification #detection
Variational Mixture of Experts for Classification with Applications to Landmine Detection (SEY, PDG), pp. 2981–2984.
ICPRICPR-2010-ZengM #detection #multi #people #robust
Robust Head-Shoulder Detection by PCA-Based Multilevel HOG-LBP Detector for People Counting (CZ, HM), pp. 2069–2072.
ICPRICPR-2010-ZhangGC #detection #invariant #using
Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPRICPR-2010-ZhangK10a #detection #graph #using
Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPRICPR-2010-ZhangST10a #detection #lens
Contact Lens Detection Based on Weighted LBP (HZ, ZS, TT), pp. 4279–4282.
ICPRICPR-2010-ZhangXL #detection #video
Extracting Key Sub-trajectory Features for Supervised Tactic Detection in Sports Video (YZ, CX, HL), pp. 125–128.
ICPRICPR-2010-ZhangXW #data transformation #detection
Data Transformation of the Histogram Feature in Object Detection (RZ, BX, CW), pp. 2893–2896.
ICPRICPR-2010-ZhangZYK #classification #detection #learning #representation #taxonomy
Microaneurysm (MA) Detection via Sparse Representation Classifier with MA and Non-MA Dictionary Learning (BZ, LZ, JY, FK), pp. 277–280.
ICPRICPR-2010-ZhouNW #approach #detection #novel
A Novel Approach to Detect Ship-Radiated Signal Based on HMT (YZ, ZN, CW), pp. 4601–4604.
KDDKDD-2010-CaoOYW #behaviour #detection #sequence
Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors (LC, YO, PSY, GW), pp. 85–94.
KDDKDD-2010-ChenLB #approach #detection #named #statistics
GLS-SOD: a generalized local statistical approach for spatial outlier detection (FC, CTL, APB), pp. 1069–1078.
KDDKDD-2010-DasMSO #algorithm #case study #detection #kernel #learning #multi #safety
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
KDDKDD-2010-GaoLFWSH #community #detection #network #on the #performance
On community outliers and their efficient detection in information networks (JG, FL, WF, CW, YS, JH), pp. 813–822.
KDIRKDIR-2010-BonninBB #detection #modelling #parallel #predict #web
Detecting Parallel Browsing to Improve Web Predictive Modeling (GB, AB, AB), pp. 504–509.
KDIRKDIR-2010-LieglGSH #automation #detection #sentiment #taxonomy
Dictionary Extension for Improving Automated Sentiment Detection (JL, SG, AS, AHH), pp. 404–407.
KDIRKDIR-2010-Onem #behaviour #classification #detection #network
Unwanted Behaviour Detection and Classification in Network Traffic (IMÖ), pp. 122–128.
SEKESEKE-2010-ArrudaCD #detection #framework #using
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-ElamyFL #detection #multi
A Multiagent System for Automate Detection and Diagnosis of Active Tuberculosis on Chest Radiograph and CT Thorax (AHE, BHF, RL), pp. 495–498.
SEKESEKE-2010-FuL #constraints #detection #string #theorem proving #web
A String Constraint Solver for Detecting Web Application Vulnerability (XF, CCL), pp. 535–542.
SEKESEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification #using
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKESEKE-2010-ShinPS #detection
Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
SIGIRSIGIR-2010-Barron-Cedeno #detection #on the #reuse
On the mono- and cross-language detection of text reuse and plagiarism (ABC), p. 914.
SIGIRSIGIR-2010-ChenMCRH #detection #rank #web
Web page publication time detection and its application for page rank (ZC, JM, CC, HR, SH), pp. 859–860.
SIGIRSIGIR-2010-GuoA #detection #interactive #web
Ready to buy or just browsing?: detecting web searcher goals from interaction data (QG, EA), pp. 130–137.
SIGIRSIGIR-2010-HajishirziYK #adaptation #detection #learning #similarity
Adaptive near-duplicate detection via similarity learning (HH, WtY, AK), pp. 419–426.
SIGIRSIGIR-2010-HeR #approach #automation #detection #generative #ranking
A ranking approach to target detection for automatic link generation (JH, MdR), pp. 831–832.
SIGIRSIGIR-2010-LiuLGB #behaviour #detection
Can search systems detect users’ task difficulty?: some behavioral signals (JL, CL, JG, NJB), pp. 845–846.
SIGIRSIGIR-2010-WangLC #bound #detection #query
Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
SIGIRSIGIR-2010-ZhangZYH #detection #performance #sequence
Efficient partial-duplicate detection based on sequence matching (QZ, YZ, HY, XH), pp. 675–682.
ECMFAECMFA-2010-Lopez-HerrejonE #consistency #detection #modelling #multi #nondeterminism #variability
Detecting Inconsistencies in Multi-View Models with Variability (RELH, AE), pp. 217–232.
MODELSMoDELS-v2-2010-GerthKLE #detection #precise #process #using
Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MODELSMoDELS-v2-2010-SilvaBBG #detection #modelling #process
Early Deviation Detection in Modeling Activities of MDE Processes (MAAdS, RB, XB, MPG), pp. 303–317.
ECOOPECOOP-2010-MonperrusBM #detection #object-oriented
Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
OOPSLAOOPSLA-2010-GabelYYGS #consistency #detection #nondeterminism #scalability #source code
Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
OOPSLAOOPSLA-2010-ShiPYLZCZ #concurrent #debugging #detection #invariant
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs (YS, SP, ZY, SL, YZ, WC, WZ), pp. 160–174.
PADLPADL-2010-ChristakisS #detection #erlang #static analysis
Static Detection of Race Conditions in Erlang (MC, KFS), pp. 119–133.
PADLPADL-2010-LiT #detection #erlang #source code
Similar Code Detection and Elimination for Erlang Programs (HL, SJT), pp. 104–118.
REFSQREFSQ-2010-GleichCK #ambiguity #detection #towards
Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources (BG, OC, LK), pp. 218–232.
SACSAC-2010-AnastasiadisSP #detection #multi #performance
A fast multiplier-less edge detection accelerator for FPGAs (NA, IS, KZP), pp. 510–515.
SACSAC-2010-AnelliLHL #detection #towards
Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP (PA, EL, FH, DMLP), pp. 663–669.
SACSAC-2010-BraynerCS #approach #detection #energy #network #quality #query #requirements
Dealing with application requirements and energy consumption in wireless sensor networks: a novelty detection approach for quality of query services (AB, ALVC, KMdS), pp. 786–790.
SACSAC-2010-ChengHR #detection #video
Advanced motion detection for intelligent video surveillance systems (FCC, SCH, SJR), pp. 983–984.
SACSAC-2010-HuangT #detection #semantics #specification
Semantic scene detection system for baseball videos based on the MPEG-7 specification (YFH, LHT), pp. 941–947.
SACSAC-2010-Kavallieratou #detection #segmentation
Text line detection and segmentation: uneven skew angles and hill-and-dale writing (EK), pp. 59–60.
SACSAC-2010-LeeJL #detection #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LesnerBBB #detection #exclamation #framework #novel #source code #student
A novel framework to detect source code plagiarism: now, students have to work for real! (BL, RB, CB, GB), pp. 57–58.
SACSAC-2010-LinsBT #automation #detection #documentation #image
Automatically detecting and classifying noises in document images (RDL, SB, MT), pp. 33–39.
SACSAC-2010-MaranzatoPLN #detection #using
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SACSAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity #using
Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SACSAC-2010-MissenBC #detection #using
Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SACSAC-2010-Mohy-ud-DinM #detection #probability
Detecting narrow passages in configuration spaces via spectra of probabilistic roadmaps (HMuD, AM), pp. 1294–1298.
SACSAC-2010-OliveiraGGD #case study #detection #experience
Experiences in reading detection with EEG signals (IO, OG, NG, CD), pp. 1236–1237.
SACSAC-2010-RieckSLHL #detection #named
Botzilla: detecting the “phoning home” of malicious software (KR, GS, TL, TH, PL), pp. 1978–1984.
SACSAC-2010-RosswogG #clustering #detection #mobile
Efficiently detecting clusters of mobile objects in the presence of dense noise (JR, KG), pp. 1095–1102.
SACSAC-2010-RoyPL #component #detection #documentation #image #using
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SACSAC-2010-SamiYPHH #api #detection #mining
Malware detection based on mining API calls (AS, BY, HR, NP, SH, AH), pp. 1020–1025.
SACSAC-2010-TeixeiraM #data type #detection
Data stream anomaly detection through principal subspace tracking (PHdST, RLM), pp. 1609–1616.
SACSAC-2010-WelferSM #approach #detection #image
A morphologic three-stage approach for detecting exudates in color eye fundus images (DW, JS, DRM), pp. 964–968.
FSEFSE-2010-EpifaniGT #black box #detection
Change-point detection for black-box services (IE, CG, GT), pp. 227–236.
FSEFSE-2010-JoshiNSG #detection #dynamic analysis #effectiveness
An effective dynamic analysis for detecting generalized deadlocks (PJ, MN, KS, DG), pp. 327–336.
FSEFSE-2010-LiCK #analysis #detection #effectiveness
Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
ICSEICSE-2010-Brondum #architecture #concept #detection
Software architecture for systems of software intensive systems (S3): the concepts and detection of inter-system relationships (JB), pp. 355–356.
ICSEICSE-2010-DeissenboeckHJ #clone detection #detection
Code clone detection in practice (FD, BH, EJ), pp. 499–500.
ICSEICSE-2010-JurgensDFHSWDS #clone detection #detection #quality #question #requirements #specification
Can clone detection support quality assessments of requirements specifications? (EJ, FD, MF, BH, BS, SW, CD, JS), pp. 79–88.
ICSEICSE-2010-LaiCC #detection #parallel #random #source code #testing #thread
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing (ZL, SCC, WKC), pp. 235–244.
ICSEICSE-2010-PhamNNWNN #detection
Detecting recurring and similar software vulnerabilities (NHP, TTN, HAN, XW, ATN, TNN), pp. 227–230.
ICSEICSE-2010-SongWXZM #debugging #detection #named
JDF: detecting duplicate bug reports in Jazz (YS, XW, TX, LZ, HM), pp. 315–316.
ICSEICSE-2010-TorlakC #detection #effectiveness #interprocedural
Effective interprocedural resource leak detection (ET, SC), pp. 535–544.
LDTALDTA-J-2007-Schmitz #ambiguity #detection
An experimental ambiguity detection tool (SS), pp. 71–84.
LDTALDTA-2010-BastenV #ambiguity #detection #performance
Faster ambiguity detection by grammar filtering (BB, JJV), p. 5.
ASPLOSASPLOS-2010-ZhangSL #approach #concurrent #debugging #detection #named
ConMem: detecting severe concurrency bugs through an effect-oriented approach (WZ, CS, SL), pp. 179–192.
CGOCGO-2010-MarsVHS #detection #execution #online
Contention aware execution: online contention detection and response (JM, NV, RH, MLS), pp. 257–265.
OSDIOSDI-2010-EricksonMBO #concurrent #detection #effectiveness #kernel
Effective Data-Race Detection for the Kernel (JE, MM, SB, KO), pp. 151–162.
CAVCAV-2010-KahlonW #concurrent #debugging #detection #graph #precise #source code
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs (VK, CW), pp. 434–449.
CAVCAV-2010-KaiserKW #concurrent #detection #source code
Dynamic Cutoff Detection in Parameterized Concurrent Programs (AK, DK, TW), pp. 645–659.
ICLPICLP-J-2010-OetschPST #detection #source code
The system Kato: Detecting cases of plagiarism for answer-set programs (JO, JP, MS, HT), pp. 759–775.
ICSTICST-2010-BelliLBS #detection #fault #sequence #testing
Fault Detection Likelihood of Test Sequence Length (FB, ML, CJB, HAS), pp. 402–411.
ICSTICST-2010-SantelicesHO #detection #evolution #interactive #runtime
Precisely Detecting Runtime Change Interactions for Evolving Software (RAS, MJH, AO), pp. 429–438.
ISSTAISSTA-2010-GruskaWZ #detection #learning #lightweight
Learning from 6, 000 projects: lightweight cross-project anomaly detection (NG, AW, AZ), pp. 119–130.
ISSTAISSTA-2010-KwonS #automation #component #detection
Automatic detection of unsafe component loadings (TK, ZS), pp. 107–118.
WICSA-ECSAWICSA-ECSA-2009-FigueiredoGKGSPMSBRBAZM #architecture #case study #detection
Detecting architecture instabilities with concern traces: An exploratory study (EF, IG, SSK, AG, CS, AP, ALM, LFdS, TVB, RAR, PvdB, MA, SZ, AMDM), pp. 261–264.
ASEASE-2009-BurnimJSS #detection #infinity #lightweight #named #runtime
Looper: Lightweight Detection of Infinite Loops at Runtime (JB, NJ, CS, KS), pp. 161–169.
ASEASE-2009-KawrykowR #api #automation #detection
Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
ASEASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise #using
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASEASE-2009-SardinhaCWGR #aspect-oriented #automation #detection #named #requirements
EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements (AS, RC, NW, PG, AR), pp. 530–534.
ASEASE-2009-ThummalapentaX #detection #mining #named
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions (ST, TX), pp. 283–294.
CASECASE-2009-MakkapatiN #detection
Clump splitting based on detection of dominant points from contours (VM, SKN), pp. 197–201.
CASECASE-2009-SenguptaDBMD #detection #fault #modelling #using
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
DACDAC-2009-PotkonjakNNM #detection #hardware #using
Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DACDAC-2009-WenCCS #architecture #concurrent #debugging #detection #manycore #named
NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
DATEDATE-2009-AlvesNDB #detection #fault #multi #using
Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATEDATE-2009-BarontiLRS #detection #distributed #metric
Distributed sensor for steering wheel rip force measurement in driver fatigue detection (FB, FL, RR, RS), pp. 894–897.
DATEDATE-2009-BhagawatDC #architecture #detection
Systolic like soft-detection architecture for 4×4 64-QAM MIMO system (PB, RD, GC), pp. 870–873.
DATEDATE-2009-DSilvaK #detection #fixpoint #multi
Fixed points for multi-cycle path detection (VD, DK), pp. 1710–1715.
DATEDATE-2009-GhoseGDAW #architecture #detection #memory management
Architectural support for low overhead detection of memory violations (SG, LG, PD, AA, CW), pp. 652–657.
DATEDATE-2009-YanHL #detection #fault #online
A unified online Fault Detection scheme via checking of Stability Violation (GY, YH, XL), pp. 496–501.
DATEDATE-2009-YilmazC #detection #fault
Seed selection in LFSR-reseeding-based test compression for the detection of small-delay defects (MY, KC), pp. 1488–1493.
DRRDRR-2009-BeusekomSB #detection #documentation #image #independence
Resolution Independent Skew and Orientation Detection for document images (JvB, FS, TMB), pp. 1–10.
DRRDRR-2009-FaureV #detection
Simultaneous detection of vertical and horizontal text lines based on perceptual organisation (CF, NV), pp. 1–10.
DRRDRR-2009-SmithNL #detection
Mark Detection from Scanned Ballots (EHBS, GN, DPL), pp. 1–10.
ICDARICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming #using
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDARICDAR-2009-BoubakerKA #algorithm #detection
New Algorithm of Straight or Curved Baseline Detection for Short Arabic Handwritten Writing (HB, MK, AMA), pp. 778–782.
ICDARICDAR-2009-FujiyoshiSU #detection
Syntactic Detection and Correction of Misrecognitions in Mathematical OCR (AF, MS, SU), pp. 1360–1364.
ICDARICDAR-2009-HanifP #algorithm #detection #image #locality #using
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDARICDAR-2009-LiuBMG #bound #detection #fault #sequence
Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
ICDARICDAR-2009-Martin-ToralAP #corpus #detection #documentation
Detection of Incoherences in a Document Corpus Based on the Application of a Neuro-Fuzzy System (SMT, VA, GISP), pp. 1101–1105.
ICDARICDAR-2009-PhanST #detection #video
A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
ICDARICDAR-2009-RoyPL #approach #detection #documentation #recognition
Seal Detection and Recognition: An Approach for Document Indexing (PPR, UP, JL), pp. 101–105.
ICDARICDAR-2009-ShivakumaraPT #detection #difference #video
A Gradient Difference Based Technique for Video Text Detection (PS, TQP, CLT), pp. 156–160.
ICDARICDAR-2009-ShivakumaraPT09a #detection #robust #video
A Robust Wavelet Transform Based Technique for Video Text Detection (PS, TQP, CLT), pp. 1285–1289.
ICDARICDAR-2009-Smith #analysis #detection #hybrid #layout
Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
ICDARICDAR-2009-SunK #detection #embedded
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds (WS, KK), pp. 341–345.
ICDARICDAR-2009-SunNFTH #detection #image #string
Trinary Image Mosaicing Based Watermark String Detection (JS, SN, YF, HT, YH), pp. 306–310.
ICDARICDAR-2009-WangC #bound #detection #documentation #image
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
SIGMODSIGMOD-2009-FrankeG #detection #named #network
ORDEN: outlier region detection and exploration in sensor networks (CF, MG), pp. 1075–1078.
SIGMODSIGMOD-2009-JiangYCC #ad hoc #detection #named #query
AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
SIGMODSIGMOD-2009-MeiM #adaptation #cost analysis #detection #named #query
ZStream: a cost-based query processor for adaptively detecting composite events (YM, SM), pp. 193–206.
SIGMODSIGMOD-2009-SunLDC #analysis #detection #workflow
Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
VLDBVLDB-2009-BeskalesSIB #detection #modelling #query
Modeling and Querying Possible Repairs in Duplicate Detection (GB, MAS, IFI, SBD), pp. 598–609.
VLDBVLDB-2009-ChandramouliGM #detection #on the fly #query
On-the-fly Progress Detection in Iterative Stream Queries (BC, JG, DM), pp. 241–252.
VLDBVLDB-2009-DongBS09a #detection
Truth Discovery and Copying Detection in a Dynamic World (XLD, LBE, DS), pp. 562–573.
VLDBVLDB-2009-HassanzadehCML #algorithm #clustering #detection #framework
Framework for Evaluating Clustering Algorithms in Duplicate Detection (OH, FC, RJM, HCL), pp. 1282–1293.
VLDBVLDB-2009-SunLNDC #analysis #detection #named #workflow
WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
FASEFASE-2009-ChenWYS #detection #named #static analysis
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
FASEFASE-2009-NguyenNPAN #clone detection #detection #feature model #performance
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection (HAN, TTN, NHP, JMAK, TNN), pp. 440–455.
TACASTACAS-2009-SchollDPK #constraints #detection #linear
Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints (CS, SD, FP, SK), pp. 383–397.
ICPCICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-GodeK #clone detection #detection #incremental
Incremental Clone Detection (NG, RK), pp. 219–228.
ICPCICPC-2009-ChilowiczDR #detection #similarity #source code #syntax
Syntax tree fingerprinting for source code similarity detection (MC, ÉD, GR), pp. 243–247.
ICPCICPC-2009-KarumuriR #automation #detection
Automatic detection of internal queues and stages in message processing systems (SK, SPR), pp. 315–316.
ICPCICPC-2009-KnieselB #approach #data fusion #design pattern #detection
Standing on the shoulders of giants — A data fusion approach to design pattern detection (GK, AB), pp. 208–217.
ICSMEICSM-2009-FengG #detection
Detecting virus mutations via dynamic matching (MF, RG), pp. 105–114.
ICSMEICSM-2009-NguyenNAPN #clone detection #detection #evolution #incremental #scalability
Scalable and incremental clone detection for evolving software (TTN, HAN, JMAK, NHP, TNN), pp. 491–494.
ICSMEICSM-2009-Roy #analysis #detection
Detection and analysis of near-miss software clones (CKR), pp. 447–450.
SCAMSCAM-2009-TiarksKF #assessment #detection #state of the art #tool support
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools (RT, RK, RF), pp. 67–76.
WCREWCRE-1999-HigoK99a #clone detection #dependence #detection #graph #quality
Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
WCREWCRE-1999-KawaguchiYUFKNI99a #automation #clone detection #detection #ide #named
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
WCREWCRE-1999-KrishnamoorthyDF99a #detection #fault #static analysis
Static Detection of Disassembly Errors (NK, SKD, KF), pp. 259–268.
PEPMPEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPMPEPM-2009-LiT #clone detection #detection #erlang #refactoring
Clone detection and removal for Erlang/OTP within a refactoring environment (HL, SJT), pp. 169–178.
PLDIPLDI-2009-FlanaganF #concurrent #detection #named #performance #precise
FastTrack: efficient and precise dynamic race detection (CF, SNF), pp. 121–133.
PLDIPLDI-2009-JoshiPSN #detection #program analysis #random
A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
PLDIPLDI-2009-MarinoMN #concurrent #detection #effectiveness #lightweight #named
LiteRace: effective sampling for lightweight data-race detection (DM, MM, SN), pp. 134–143.
PLDIPLDI-2009-TournavitisWFO #approach #detection #parallel #towards
Towards a holistic approach to auto-parallelization: integrating profile-driven parallelism detection and machine-learning based mapping (GT, ZW, BF, MFPO), pp. 177–187.
SASSAS-2009-SeidlV #analysis #concurrent #detection
Region Analysis for Race Detection (HS, VV), pp. 171–187.
STOCSTOC-2009-AharonovALV #detection #quantum
The detectability lemma and quantum gap amplification (DA, IA, ZL, UVV), pp. 417–426.
FMFM-2009-LangM #composition #confluence #detection #partial order #reduction #using
Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
HCIHCI-AUII-2009-GlasnappB #detection
A Human-Centered Model for Detecting Technology Engagement (JG, OB), pp. 621–630.
HCIHCI-AUII-2009-SunQPW #case study #detection
A Study of Fire Information Detection on PDA Device (XS, WQ, TP, LW), pp. 105–113.
HCIHCI-NT-2009-Rebolledo-MendezDMVFLG #assessment #detection #usability
Assessing NeuroSky’s Usability to Detect Attention Levels in an Assessment Exercise (GRM, ID, EMM, MDVC, SdF, FL, ARGG), pp. 149–158.
HCIHCI-NT-2009-TogawaKY #communication #detection #mining #peer-to-peer #visualisation
Peer-to-Peer File Sharing Communication Detection System with Traffic Mining and Visualization (ST, KK, YY), pp. 900–909.
HCIHCI-VAD-2009-ChenGSEJ #detection #learning
Computer-Based Learning to Improve Breast Cancer Detection Skills (YC, AGG, HJS, AE, JJ), pp. 49–57.
HCIHIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics #using
Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HCIHIMI-DIE-2009-ShinPC #bound #detection
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
VISSOFTVISSOFT-2009-Reiss #detection #java #memory management #problem #visualisation
Visualizing the Java heap to detect memory problems (SPR), pp. 73–80.
CAiSECAiSE-2009-BlancMMM #consistency #detection #incremental #nondeterminism
Incremental Detection of Model Inconsistencies Based on Model Operations (XB, AM, IM, TM), pp. 32–46.
ICEISICEIS-AIDSS-2009-AlbusacCLVL #analysis #detection
Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
ICEISICEIS-AIDSS-2009-BiscarriMLGBM #detection #framework #mining
A Mining Framework to Detect Non-technical Losses in Power Utilities (FB, IM, CL, JIG, JB, RM), pp. 96–101.
ICEISICEIS-AIDSS-2009-ElzingaPVD #concept analysis #detection
Detecting Domestic Violence — Showcasing a Knowledge Browser based on Formal Concept Analysis and Emergent Self Organizing Maps (PE, JP, SV, GD), pp. 11–18.
ICEISICEIS-ISAS-2009-HidalgoGT #consistency #data type #detection #nondeterminism #performance
Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates (SPH, RMG, FTdlR), pp. 176–181.
ICEISICEIS-ISAS-2009-SarmientoBC #approach #detection #interactive #requirements
Applying an Event-based Approach for Detecting Requirements Interaction (ES, MRSB, MLMC), pp. 225–230.
ICEISICEIS-J-2009-IorioSVM #approach #detection #documentation #multi
A Natural and Multi-layered Approach to Detect Changes in Tree-Based Textual Documents (ADI, MS, FV, CM), pp. 90–101.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network #using
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
CIKMCIKM-2009-ChenR #analysis #detection
Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
CIKMCIKM-2009-ChenTJ #classification #detection #framework #social #social media #web
A co-classification framework for detecting web spam and spammers in social media web sites (FC, PNT, AKJ), pp. 1807–1810.
CIKMCIKM-2009-GardnerX #approach #automation #detection #sequence
Automatic link detection: a sequence labeling approach (JJG, LX), pp. 1701–1704.
CIKMCIKM-2009-GunnemannMFS #concept #detection #orthogonal
Detection of orthogonal concepts in subspaces of high dimensional data (SG, EM, IF, TS), pp. 1317–1326.
CIKMCIKM-2009-HeCPQMG #detection #evolution #how #question #topic
Detecting topic evolution in scientific literature: how can citations help? (QH, BC, JP, BQ, PM, CLG), pp. 957–966.
CIKMCIKM-2009-ViyanonM #database #detection #relational #similarity #using #xml
A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKMCIKM-2009-ZhangJZZ #bidirectional #detection
Exploiting bidirectional links: making spamming detection easier (YZ, QJ, LZ, YZ), pp. 1839–1842.
ECIRECIR-2009-Barron-CedenoR #automation #comparison #detection #n-gram #on the
On Automatic