33 papers:
SAC-2015-Oikawa #adaptation #memory management- Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
ICPR-2014-KimK #estimation #image #multi #pattern matching #robust- Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions (JK, MK), pp. 4560–4563.
OSDI-2014-0001RB #concurrent #debugging #kernel #named- SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration (PF, RR, BBB), pp. 415–431.
FASE-2013-ZhongTX #api #behaviour #difference- Exposing Behavioral Differences in Cross-Language API Mapping Relations (HZ, ST, TX), pp. 130–145.
CHI-2013-MalacriaBHCG- Promoting Hotkey use through rehearsal with ExposeHK (SM, GB, JH, AC, CG), pp. 573–582.
ESEC-FSE-2013-BohmeOR #fault #interactive #testing- Regression tests to expose change interaction errors (MB, BCdSO, AR), pp. 334–344.
ICSE-2011-Bacchelli #email #re-engineering- Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
ASE-2010-QiRL #evolution #generative #source code #testing- Test generation to expose changes in evolving programs (DQ, AR, ZL), pp. 397–406.
ICPR-2010-ZhangZ #analysis #canonical #correlation #image #using- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
FSE-2010-SorrentinoFM #named #thread #weaving- PENELOPE: weaving threads to expose atomicity violations (FS, AF, PM), pp. 37–46.
CSMR-2009-FrancescomarinoMT #process #reverse engineering #web- Reverse Engineering of Business Processes exposed as Web Applications (CDF, AM, PT), pp. 139–148.
CHI-2009-LeeSRCT #dataset #named #roadmap- FacetLens: exposing trends and relationships to support sensemaking within faceted datasets (BL, GS, GGR, MC, DST), pp. 1293–1302.
ASPLOS-2009-ParkLZ #debugging #named- CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
CSMR-2008-LienhardGGN #execution #testing- Test Blueprint — Exposing Side Effects in Execution Traces to Support Writing Unit Tests (AL, TG, OG, ON), pp. 83–92.
ASPLOS-2008-TuckACT #analysis #hardware #named #optimisation- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CHI-2007-AhernEGKNN #mobile #online #privacy- Over-exposed?: privacy patterns and considerations in online and mobile photo sharing (SA, DE, NG, SK, MN, RN), pp. 357–366.
SIGAda-2007-Sward #ada #architecture #named #using #web #web service- SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
ICEIS-DISI-2007-DyachukD #workflow- Exposing workflows to load bursts (DD, RD), pp. 218–225.
SIGIR-2007-KaiserSJ #named #web- EXPOSE: searching the web for expertise (FK, HS, MJ), p. 906.
RE-2006-StoneS #information management- Exposing Tacit Knowledge via Pre-Requirements Tracing (AS, PS), pp. 346–347.
PPoPP-2005-PrabhuO #concurrent #parallel #specification #thread- Exposing speculative thread parallelism in SPEC2000 (MKP, KO), pp. 142–152.
PPoPP-2005-SonCKC #compilation #energy #layout #parallel- Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems (SWS, GC, MTK, ANC), pp. 174–185.
CSEET-2004-GerberC #development #education #object-oriented #student- Teaching Object-Oriented Systems Development to Structurally Exposed Students (AG, EC), pp. 52–58.
CGO-2004-WuPSRCA #memory management #profiling #using- Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
AdaEurope-2003-BriotGDCW #ada #memory management- Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
WCRE-2002-JrW #algorithm #image #parallel- Exposing Data-Level Parallelism in Sequential Image Processing Algorithms (LBBJ, LMW), pp. 245–254.
ASIA-PEPM-2002-Amarasinghe #architecture #compilation- Defying the speed of light: : a spatially-aware compiler for wire-exposed architectures (SPA), p. 70.
AdaEurope-2002-DewarHCW #ada #runtime- Exposing Uninitialized Variables: Strengthening and Extending Run-Time Checks in Ada (RD, OH, DC, PW), pp. 193–204.
ASPLOS-2002-GordonTKLMLLWHMA #architecture #compilation- A stream compiler for communication-exposed architectures (MIG, WT, MK, JL, ASM, AAL, CL, JW, HH, DM, SPA), pp. 291–303.
CIKM-2001-HaaseH #database #query- Exposing the Vagueness of Query Results on Partly Inaccessible Databases (OH, AH), pp. 49–56.
TOOLS-EUROPE-1999-WoodmanGHRM #concept- Employing Object Technology to Expose Fundamental Object Concepts (MW, RG, SH, HR, MM), pp. 371–383.
ICSE-1995-WeideHH #legacy #reverse engineering- Reverse Engineering of Legacy Code Exposed (BWW, WDH, JEH), pp. 327–331.
CAV-1991-FinkelP #composition #graph- Avoiding State Exposion by Composition of Minimal Covering Graphs (AF, LP), pp. 169–180.