BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
memori (4)
test (4)
use (4)
object (4)
architectur (3)

Stem expos$ (all stems)

33 papers:

SACSAC-2015-Oikawa #adaptation #memory management
Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
ICPRICPR-2014-KimK #estimation #image #multi #pattern matching #robust
Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions (JK, MK), pp. 4560–4563.
OSDIOSDI-2014-0001RB #concurrent #debugging #kernel #named
SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration (PF, RR, BBB), pp. 415–431.
FASEFASE-2013-ZhongTX #api #behaviour #difference
Exposing Behavioral Differences in Cross-Language API Mapping Relations (HZ, ST, TX), pp. 130–145.
CHICHI-2013-MalacriaBHCG
Promoting Hotkey use through rehearsal with ExposeHK (SM, GB, JH, AC, CG), pp. 573–582.
ESEC-FSEESEC-FSE-2013-BohmeOR #fault #interactive #testing
Regression tests to expose change interaction errors (MB, BCdSO, AR), pp. 334–344.
ICSEICSE-2011-Bacchelli #email #re-engineering
Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
ASEASE-2010-QiRL #evolution #generative #source code #testing
Test generation to expose changes in evolving programs (DQ, AR, ZL), pp. 397–406.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
FSEFSE-2010-SorrentinoFM #named #thread #weaving
PENELOPE: weaving threads to expose atomicity violations (FS, AF, PM), pp. 37–46.
CSMRCSMR-2009-FrancescomarinoMT #process #reverse engineering #web
Reverse Engineering of Business Processes exposed as Web Applications (CDF, AM, PT), pp. 139–148.
CHICHI-2009-LeeSRCT #dataset #named #roadmap
FacetLens: exposing trends and relationships to support sensemaking within faceted datasets (BL, GS, GGR, MC, DST), pp. 1293–1302.
ASPLOSASPLOS-2009-ParkLZ #debugging #named
CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
CSMRCSMR-2008-LienhardGGN #execution #testing
Test Blueprint — Exposing Side Effects in Execution Traces to Support Writing Unit Tests (AL, TG, OG, ON), pp. 83–92.
ASPLOSASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CHICHI-2007-AhernEGKNN #mobile #online #privacy
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing (SA, DE, NG, SK, MN, RN), pp. 357–366.
AdaSIGAda-2007-Sward #ada #architecture #named #using #web #web service
SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
ICEISICEIS-DISI-2007-DyachukD #workflow
Exposing workflows to load bursts (DD, RD), pp. 218–225.
SIGIRSIGIR-2007-KaiserSJ #named #web
EXPOSE: searching the web for expertise (FK, HS, MJ), p. 906.
RERE-2006-StoneS #information management
Exposing Tacit Knowledge via Pre-Requirements Tracing (AS, PS), pp. 346–347.
PPoPPPPoPP-2005-PrabhuO #concurrent #parallel #specification #thread
Exposing speculative thread parallelism in SPEC2000 (MKP, KO), pp. 142–152.
PPoPPPPoPP-2005-SonCKC #compilation #energy #layout #parallel
Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems (SWS, GC, MTK, ANC), pp. 174–185.
CSEETCSEET-2004-GerberC #development #education #object-oriented #student
Teaching Object-Oriented Systems Development to Structurally Exposed Students (AG, EC), pp. 52–58.
CGOCGO-2004-WuPSRCA #memory management #profiling #using
Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
AdaEuropeAdaEurope-2003-BriotGDCW #ada #memory management
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
WCREWCRE-2002-JrW #algorithm #image #parallel
Exposing Data-Level Parallelism in Sequential Image Processing Algorithms (LBBJ, LMW), pp. 245–254.
PEPMASIA-PEPM-2002-Amarasinghe #architecture #compilation
Defying the speed of light: : a spatially-aware compiler for wire-exposed architectures (SPA), p. 70.
AdaEuropeAdaEurope-2002-DewarHCW #ada #runtime
Exposing Uninitialized Variables: Strengthening and Extending Run-Time Checks in Ada (RD, OH, DC, PW), pp. 193–204.
ASPLOSASPLOS-2002-GordonTKLMLLWHMA #architecture #compilation
A stream compiler for communication-exposed architectures (MIG, WT, MK, JL, ASM, AAL, CL, JW, HH, DM, SPA), pp. 291–303.
CIKMCIKM-2001-HaaseH #database #query
Exposing the Vagueness of Query Results on Partly Inaccessible Databases (OH, AH), pp. 49–56.
TOOLSTOOLS-EUROPE-1999-WoodmanGHRM #concept
Employing Object Technology to Expose Fundamental Object Concepts (MW, RG, SH, HR, MM), pp. 371–383.
ICSEICSE-1995-WeideHH #legacy #reverse engineering
Reverse Engineering of Legacy Code Exposed (BWW, WDH, JEH), pp. 327–331.
CAVCAV-1991-FinkelP #composition #graph
Avoiding State Exposion by Composition of Minimal Covering Graphs (AF, LP), pp. 169–180.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.