3321 papers:
- QoSA-2015-DurisicST #architecture #identification #set #standard
- Identifying Optimal Sets of Standardized Architectural Features: A Method and its Automotive Application (DD, MS, MT), pp. 103–112.
- CASE-2015-BjorkenstamCL
- Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning (SB, JSC, BL), pp. 769–774.
- CASE-2015-DasCQMTMK #automation #monitoring #precise
- Devices, systems, and methods for automated monitoring enabling precision agriculture (JD, GC, CQ, AM, PT, YM, VK), pp. 462–469.
- CASE-2015-HayakawaI #fault #linear #reduction
- GPS error range reduction method based on linear kinematic model (TH, MI), pp. 1515–1520.
- CASE-2015-HolmOFUHAK #evolution #industrial #integration #performance #process
- Engineering method for the integration of modules into fast evolving production systems in the process industry (TH, MO, AF, LU, UH, TA, SK), pp. 1042–1047.
- CASE-2015-KaoLJ #mobile
- Application of potential field method and optimal path planning to mobile robot control (CCK, CML, JGJ), pp. 1552–1554.
- CASE-2015-Lee #locality #mobile #reliability
- A reliable range-free indoor localization method for mobile robots (YCL), pp. 720–727.
- CASE-2015-LiuY #modelling #predict #self
- A self-organizing method for predictive modeling with highly-redundant variables (GL, HY), pp. 1084–1089.
- CASE-2015-LiX #energy #learning #multi
- A multi-grid reinforcement learning method for energy conservation and comfort of HVAC in buildings (BL, LX), pp. 444–449.
- CASE-2015-LuTZ #assessment #design #estimation #industrial #modelling
- Model-based temperature estimation methods in design of industrial manipulator and their assessment (QL, GT, JZ), pp. 1242–1248.
- CASE-2015-WangZ #modelling #predict #simulation
- A prediction method for interior temperature of grain storage via dynamics models: A simulation study (DW, XZ), pp. 1477–1483.
- CASE-2015-YanLP #fault
- A fault diagnosis method for HVAC Air Handling Units considering fault propagation (YY, PBL, KRP), pp. 961–966.
- DAC-2015-DunbarQ
- A practical circuit fingerprinting method utilizing observability don’t care conditions (CD, GQ), p. 6.
- DAC-2015-HelalBH #parallel #simulation #using
- Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
- DAC-2015-SeshiaSS #formal method
- Formal methods for semi-autonomous driving (SAS, DS, SSS), p. 5.
- DAC-2015-WangLYSOC #grid #novel #power management #reduction
- Novel power grid reduction method based on L1 regularization (YW, ML, XY, ZS, MO, CC), p. 6.
- DAC-2015-WangLZYW #architecture #configuration management #control flow
- Acceleration of control flows on reconfigurable architecture with a composite method (JW, LL, JZ, SY, SW), p. 6.
- DATE-2015-AfacanBPDB #hybrid #monte carlo
- A hybrid Quasi Monte Carlo method for yield aware analog circuit sizing tool (EA, GB, AEP, GD, IFB), pp. 1225–1228.
- DATE-2015-AwanoHS #named #performance #probability
- ECRIPSE: an efficient method for calculating RTN-induced failure probability of an SRAM cell (HA, MH, TS), pp. 549–554.
- DATE-2015-FrancqF #detection #hardware
- Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
- DATE-2015-KadryKMNSPPJS #case study #comparative #generative #simulation #testing
- Comparative study of test generation methods for simulation accelerators (WK, DK, AM, AN, VS, JSP, SBP, WJ, JCS), pp. 321–324.
- DATE-2015-LiaperdosAT #detection #estimation #fault #probability #testing
- A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
- DATE-2015-LiFBLON #design
- Thermal aware design method for VCSEL-based on-chip optical interconnect (HL, AF, SLB, XL, IO, GN), pp. 1120–1125.
- DATE-2015-MacherSBAK #analysis #named
- SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
- DATE-2015-OyaSYT #classification #identification
- A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
- DATE-2015-RustP #approximate #design #multi
- Design method for multiplier-less two-variable numeric function approximation (JR, SP), pp. 948–953.
- DATE-2015-SuHL #encoding #named #recognition #scalability
- SubHunter: a high-performance and scalable sub-circuit recognition method with Prüfer-encoding (HYS, CHH, YLL), pp. 1583–1586.
- DRR-2015-FuLLQT #diagrams #learning #multi #retrieval
- A diagram retrieval method with multi-label learning (SF, XL, LL, JQ, ZT).
- HT-2015-BerettaMCM #interactive #twitter
- An Interactive Method for Inferring Demographic Attributes in Twitter (VB, DM, TC, EM), pp. 113–122.
- HT-2015-Jain #automation #social
- Automated Methods for Identity Resolution across Heterogeneous Social Platforms (PJ), pp. 307–310.
- SIGMOD-2015-ArulrajPD #database #memory management
- Let’s Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems (JA, AP, SD), pp. 707–722.
- VLDB-2015-KatsarouNT #performance #query #scalability
- Performance and Scalability of Indexed Subgraph Query Processing Methods (FK, NN, PT), pp. 1566–1577.
- VLDB-2015-NaidanBN #performance #permutation
- Permutation Search Methods are Efficient, Yet Faster Search is Possible (BN, LB, EN), pp. 1618–1629.
- ITiCSE-2015-ChaudhariD #formal method
- Introducing Formal Methods via Program Derivation (DLC, OPD), pp. 266–271.
- TACAS-2015-ZengSLH #precise #predict
- A Method for Improving the Precision and Coverage of Atomicity Violation Predictions (RZ, ZS, SL, XH), pp. 116–130.
- ICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using
- Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
- ICSME-2015-AsaduzzamanRMS #api #parametricity #recommendation
- Exploring API method parameter recommendations (MA, CKR, SM, KAS), pp. 271–280.
- ICSME-2015-AsaduzzamanRS #api #named #parametricity #recommendation
- PARC: Recommending API methods parameters (MA, CKR, KAS), pp. 330–332.
- MSR-2015-BlincoeHD #ecosystem #git #identification #using
- Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
- MSR-2015-WuMKGI #consistency #detection #nondeterminism #open source #scalability
- A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
- SANER-2015-HashimotoMI #fine-grained #scalability #source code
- A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
- SCAM-2015-GhafariGR #automation #identification #testing
- Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
- SCAM-2015-SteidlD #how #java #question
- How do Java methods grow? (DS, FD), pp. 151–160.
- SAS-2015-RapoportLT #analysis #correlation #data flow #precise
- Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
- STOC-2015-AmbainisFG #matrix #multi #performance
- Fast Matrix Multiplication: Limitations of the Coppersmith-Winograd Method (AA, YF, FLG), pp. 585–593.
- STOC-2015-BarakKS #composition #learning #taxonomy
- Dictionary Learning and Tensor Decomposition via the Sum-of-Squares Method (BB, JAK, DS), pp. 143–151.
- STOC-2015-FearnleyS #complexity
- The Complexity of the Simplex Method (JF, RS), pp. 201–208.
- CIAA-2015-Hulden #automaton #finite #regular expression
- From Two-Way to One-Way Finite Automata — Three Regular Expression-Based Methods (MH), pp. 176–187.
- ICALP-v1-2015-BhattacharyaHI #algorithm #design
- Design of Dynamic Algorithms via Primal-Dual Method (SB, MH, GFI), pp. 206–218.
- CHI-2015-Clarke #design
- The Work of Mad Men that Makes the Methods of Math Men Work: Practically Occasioned Segment Design (MFC), pp. 3275–3284.
- CHI-2015-JokinenSPS #validation
- Quick Affective Judgments: Validation of a Method for Primed Product Comparisons (JPPJ, JMS, PMHP, PS), pp. 2221–2230.
- CHI-2015-JonesCDTPDH #delphi #information management #using
- “For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
- CHI-2015-OLearyEKVRP #approach #comprehension #design #health #trade-off
- Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
- DHM-EH-2015-NakamuraYTLK
- The Digital Reminiscence Method: Effect on Dementia in Japanese Day Care Centers (MN, TY, KT, ML, NK), pp. 482–489.
- DHM-EH-2015-UchidaHKEMOUG #analysis #process #using
- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
- DHM-EH-2015-YamamotoABKGO
- Caregiver’s Eye Gaze and Field of View Presumption Method During Bathing Care in Elderly Facility (AY, TA, HCBJ, NK, AG, TO), pp. 524–532.
- DHM-HM-2015-EndoKSOTGH #case study
- Study on Method of Observing Maki-e Crafts Work in Urushi Craftspeople (AE, NK, YS, IO, YT, AG, HH), pp. 35–45.
- DHM-HM-2015-KikuchiSTGH #information management
- An Investigation on Conversion from Tacit Knowledge to Explicit Knowledge in Hand Lay-Up Fabrication Method (TK, ES, YT, AG, HH), pp. 114–123.
- DHM-HM-2015-KikuchiSZTGH #quantifier
- Effects of Quantified Instructional Tool on Spray-up Fabrication Method (TK, ES, YZ, YT, AG, HH), pp. 104–113.
- DHM-HM-2015-MigakiOTMKIH #experience
- The Relationship Between Mechanical Properties and the Method Technique of GFRP Plate by Hand Lay-up Method: Effect of the Workers Experience (MM, KO, RT, YM, EK, DI, HH), pp. 143–153.
- DHM-HM-2015-WangHM #case study
- A Study on Characteristic of Calligraphy Characters Part 1 Analytical Method with Computer Technology (ZW, IH, ZM), pp. 419–428.
- DUXU-DD-2015-ChasanidouGL #design #tool support
- Design Thinking Methods and Tools for Innovation (DC, AAG, EL), pp. 12–23.
- DUXU-DD-2015-FilippiBS #design #interactive
- Investigating Synergies Between Interaction Design Methods (SF, DB, PAS), pp. 179–190.
- DUXU-DD-2015-RenziF #delphi #human-computer
- Delphi Method to Explore Future Scenario Possibilities on Technology and HCI (ABR, SFdF), pp. 644–653.
- DUXU-IXD-2015-YangWP #empirical #research
- New Research Methods for Media and Cognition Experiment Course (YY, SW, LP), pp. 327–334.
- HCI-DE-2015-JensenRB #collaboration #design #interactive
- An Interaction Design Method to Support the Expression of User Intentions in Collaborative Systems (CJJ, JCdR, RB), pp. 214–226.
- HCI-IT-2015-BakaevA #complexity #human-computer #optimisation #user interface
- Defining and Optimizing User Interfaces Information Complexity for AI Methods Application in HCI (MB, TA), pp. 397–405.
- HCI-IT-2015-GuXCZ #using
- To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
- HCI-IT-2015-HuhJIKKP #case study #comparison #interactive
- Preliminary Study to Determine a “User-Friendly” Bending Method: Comparison Between Bending and Touch Interaction (BH, HJ, SI, HSK, GK, JP), pp. 175–183.
- HCI-IT-2015-MurataMT #comparison
- Optimal Scroll Method for Eye-Gaze Input System — Comparison of R-E and R-S Compatibility (AM, MM, YT), pp. 86–93.
- HCI-UC-2015-Obwegeser #development #matter #why
- Entrepreneurial IS Development: Why Techniques Matter and Methods Don’t (NO), pp. 218–225.
- HIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
- A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
- HIMI-IKC-2015-Iwata #difference #learning
- Method to Generate an Operation Learning Support System by Shortcut Key Differences in Similar Software (HI), pp. 332–340.
- HIMI-IKC-2015-KosakaN #behaviour #education
- Education Method for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 225–232.
- HIMI-IKC-2015-RobertsACC #communication #complexity
- A Method for Calculating Air Traffic Controller Communication Complexity (ZR, BA, JC, DC), pp. 25–32.
- HIMI-IKC-2015-SturreCVS #assessment #eye tracking #using
- Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
- HIMI-IKC-2015-UeokaI #development
- Development of the Horror Emotion Amplification System by Means of Biofeedback Method (RU, KI), pp. 657–665.
- HIMI-IKD-2015-0002S #approach #visualisation
- An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
- HIMI-IKD-2015-ArgyleLG #evaluation #predict
- Evaluation of Data Display Methods in a Flash Flood Prediction Tool (EMA, CL, JJG), pp. 15–22.
- HIMI-IKD-2015-HallettASRDJV #case study #comparative #design #usability #web
- The Usability of Magnification Methods: A Comparative Study Between Screen Magnifiers and Responsive Web Design (ECH, BA, JS, ZR, WD, TJ, KPLV), pp. 181–189.
- HIMI-IKD-2015-IchiharaHIK #behaviour #metric
- Presentation Method of Walking Sensation Based on Walking Behavior Measurement with Inertial Sensors and Pressure Sensors (KI, KH, YI, MK), pp. 374–385.
- HIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation
- Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
- ICEIS-v1-2015-BousdekisMAM
- Supporting the Selection of Prognostic-based Decision Support Methods in Manufacturing (AB, BM, DA, GM), pp. 487–494.
- ICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using
- Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
- ICEIS-v1-2015-VaroneA #multi #using
- Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
- ICEIS-v1-2015-Xylogiannopoulos #detection #roadmap
- Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
- ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
- ICEIS-v3-2015-PepinAAB #legacy
- A Method for Business-IT Alignment of Legacy Systems (JP, PA, CA, EB), pp. 229–237.
- ICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using
- Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
- ECIR-2015-ValcarcePB #case study #modelling #recommendation
- A Study of Smoothing Methods for Relevance-Based Language Modelling of Recommender Systems (DV, JP, AB), pp. 346–351.
- ECIR-2015-VieiraSCM #self #web
- A Self-training CRF Method for Recognizing Product Model Mentions in Web Forums (HSV, ASdS, MC, ESdM), pp. 257–264.
- ICML-2015-AybatWI #distributed #optimisation
- An Asynchronous Distributed Proximal Gradient Method for Composite Convex Optimization (NSA, ZW, GI), pp. 2454–2462.
- ICML-2015-BoutsidisKG #clustering
- Spectral Clustering via the Power Method — Provably (CB, PK, AG), pp. 40–48.
- ICML-2015-ChazalFLMRW #persistent
- Subsampling Methods for Persistent Homology (FC, BF, FL, BM, AR, LAW), pp. 2143–2151.
- ICML-2015-EneN #coordination #random
- Random Coordinate Descent Methods for Minimizing Decomposable Submodular Functions (AE, HLN), pp. 787–795.
- ICML-2015-GarberH #performance #set
- Faster Rates for the Frank-Wolfe Method over Strongly-Convex Sets (DG, EH), pp. 541–549.
- ICML-2015-GhoshdastidarD #clustering
- A Provable Generalized Tensor Spectral Method for Uniform Hypergraph Partitioning (DG, AD), pp. 400–409.
- ICML-2015-GongY #analysis #convergence #memory management
- A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
- ICML-2015-LimKPJ #performance #scalability #set
- Double Nyström Method: An Efficient and Accurate Nyström Scheme for Large-Scale Data Sets (WL, MK, HP, KJ), pp. 1367–1375.
- ICML-2015-NaessethLS #monte carlo
- Nested Sequential Monte Carlo Methods (CAN, FL, TBS), pp. 1292–1301.
- ICML-2015-TheisH #probability #streaming
- A trust-region method for stochastic variational inference with applications to streaming data (LT, MDH), pp. 2503–2511.
- ICML-2015-ZhangL #coordination #empirical #probability
- Stochastic Primal-Dual Coordinate Method for Regularized Empirical Risk Minimization (YZ, XL), pp. 353–361.
- ICML-2015-ZhaoYZL #adaptation #multi #probability
- Adaptive Stochastic Alternating Direction Method of Multipliers (PZ, JY, TZ, PL), pp. 69–77.
- ICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
- ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
- KDD-2015-GleichM #algorithm #graph #learning #using
- Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
- KDD-2015-Gomez-Rodriguez #machine learning #modelling #network #probability #problem #research #social
- Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods (MGR, LS), pp. 2315–2316.
- KDD-2015-KadkhodaieCSB #multi
- Accelerated Alternating Direction Method of Multipliers (MK, KC, MS, AB), pp. 497–506.
- KDD-2015-NikolaevDGUGS #composition #evaluation #online
- Extreme States Distribution Decomposition Method for Search Engine Online Evaluation (KN, AD, EG, AU, GG, PS), pp. 845–854.
- MLDM-2015-Prado #classification #named
- MOGACAR: A Method for Filtering Interesting Classification Association Rules (DBP), pp. 172–183.
- MLDM-2015-TanGZ #incremental #kernel #named
- IKLTSA: An Incremental Kernel LTSA Method (CT, JG, SZ), pp. 70–83.
- SEKE-2015-AlencarARRB #rule-based
- A Rule-based Method for Discovering Trajectory Profiles (LAdA, LOA, CR, AR, VB), pp. 244–249.
- SEKE-2015-CavalcanteRC #experience #named #user interface
- MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
- SEKE-2015-CostaSRSAP #collaboration #nearest neighbour
- A Collaborative Method to Reduce the Running Time and Accelerate the k-Nearest Neighbors Search (AAMC, RRdS, FBAR, GS, HOdA, AP), pp. 105–109.
- SEKE-2015-SchreiberMRM #comprehension #named #object-oriented #source code
- TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension (DS, ALAM, SSR, AM), pp. 278–283.
- SEKE-2015-VacariP #agile #bibliography #perspective
- Adopting Agile Methods in the Public Sector: A Systematic Literature Review (IV, RP), pp. 709–714.
- SEKE-2015-WangKN #feature model #re-engineering
- Stability of Three Forms of Feature Selection Methods on Software Engineering Data (HW, TMK, AN), pp. 385–390.
- SEKE-2015-XuZHX
- A Balanced Method for Budgeted Influence Maximization (XX, YZ, QH, CX), pp. 250–255.
- SIGIR-2015-GwizdkaoMW #information retrieval #research
- NeuroIR 2015: Neuro-Physiological Methods in IR Research (JG, JMJ, JM, MW), pp. 1151–1153.
- SIGIR-2015-LiCLPK #named #ranking #recommendation
- Rank-GeoFM: A Ranking based Geographical Factorization Method for Point of Interest Recommendation (XL, GC, XL, TANP, SK), pp. 433–442.
- MoDELS-2015-FarwickSBH #architecture #automation #documentation #enterprise
- A situational method for semi-automated enterprise architecture documentation (SoSyM abstract) (MF, CMS, RB, IH), p. 448.
- REFSQ-2015-VriezekolkEW #assessment #risk management #validation
- Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
- SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
- SAC-2015-BarbieriTPG #named #representation #video #visual notation
- Shot-HR: a video shot representation method based on visual features (TTSB, THT, MPPJ, RG), pp. 1257–1262.
- SAC-2015-BezuBRVVF #component #detection #multi #similarity #web
- Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
- SAC-2015-KhelladiBBLG #consistency #framework #process #verification
- A framework to formally verify conformance of a software process to a software method (DEK, RB, SB, YL, MPG), pp. 1518–1525.
- SAC-2015-MatuszykVSJG #incremental #matrix #recommendation
- Forgetting methods for incremental matrix factorization in recommender systems (PM, JV, MS, AMJ, JG), pp. 947–953.
- SAC-2015-MergelSS #mining #string #visual notation
- A method to support search string building in systematic literature reviews through visual text mining (GDM, MSS, TSdS), pp. 1594–1601.
- SAC-2015-OmatuYI #classification #learning #smell
- Smell classification of wines by the learning vector quantization method (SO, MY, YI), pp. 195–200.
- ESEC-FSE-2015-AllamanisBBS
- Suggesting accurate method and class names (MA, ETB, CB, CAS), pp. 38–49.
- ESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
- ESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
- A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
- ICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using
- Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
- ICSE-v1-2015-MorenoBPOM #how #question
- How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
- ICSE-v1-2015-YiYLZW #analysis #testing
- A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
- ICSE-v2-2015-GuerroujBR #documentation
- Leveraging Informal Documentation to Summarize Classes and Methods in Context (LG, DB, PCR), pp. 639–642.
- ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
- ICSE-v2-2015-MenziesMP #data analysis
- The Art and Science of Analyzing Software Data; Quantitative Methods (TM, LLM, FP), pp. 959–960.
- SPLC-2015-ValovGC #comparison #empirical #performance #predict #variability
- Empirical comparison of regression methods for variability-aware performance prediction (PV, JG, KC), pp. 186–190.
- PPoPP-2015-SeoKK #graph #named #scalability #streaming
- GStream: a graph streaming processing method for large-scale graphs on GPUs (HS, JK, MSK), pp. 253–254.
- CADE-2015-BalbianiB #composition #logic #parallel
- Tableaux Methods for Propositional Dynamic Logics with Separating Parallel Composition (PB, JB), pp. 539–554.
- CADE-2015-ChocronFR #revisited
- A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited (PC, PF, CR), pp. 419–433.
- ICLP-2015-Harrison #formal method #programming #set
- Formal Methods for Answer Set Programming (AH).
- TAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
- Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
- CBSE-2014-Dustdar
- Principles and methods for elastic computing (SD), pp. 1–2.
- CBSE-2014-KurodaYKKM #memory management
- A memory isolation method for OSGi-based home gateways (YK, IY, SK, YK, OM), pp. 117–122.
- ECSA-2014-RekhaM #architecture
- Suitability of Software Architecture Decision Making Methods for Group Decisions (VSR, HM), pp. 17–32.
- QoSA-2014-OlssonTWE #architecture #consistency #evaluation #game studies
- Evaluation of a static architectural conformance checking method in a line of computer games (TO, DT, AW, ME), pp. 113–118.
- WICSA-2014-SeeleSB #architecture #functional #modelling #web
- The Functional Architecture Modeling Method Applied on Web Browsers (WS, SS, SB), pp. 171–174.
- CASE-2014-ChiuC #bound #detection #image
- A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
- CASE-2014-ChowJCN #novel
- A novel vision guided knot-tying method for autonomous robotic surgery (DLC, RCJ, MCC, WSN), pp. 504–508.
- CASE-2014-LeePP #locality #using
- Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
- CASE-2014-LiuLS #monitoring
- A wavelet-based characteristic vector construction method for machining condition monitoring (CL, YL, WS), pp. 304–308.
- CASE-2014-LiuXL #approximate #capacity
- A queuing approximation method for capacity planning of emergency department with time-varying demand (QL, XX, RL), pp. 558–563.
- CASE-2014-ParkLH #generative #performance #using
- Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
- CASE-2014-ShiWS #approximate #matrix
- Approximation method to rank-one binary matrix factorization (ZS, LW, LS), pp. 800–805.
- CASE-2014-XuJGX #energy #scalability
- A new method to solve large-scale building energy management for energy saving (ZX, QSJ, XG, XX), pp. 940–945.
- CASE-2014-YanZJCC #3d #metric
- Hall-sensor-based orientation measurement method in three-dimensional space for electromagnetic actuators (LY, BZ, ZJ, CYC, IMC), pp. 182–187.
- CASE-2014-ZhaoUH #divide and conquer #flexibility #synthesis
- A divide-and-conquer method for the synthesis of non-blocking supervisors for flexible manufacturing systems (MZ, MU, YH), pp. 455–460.
- DAC-2014-LiuF
- A Time-Unrolling Method to Compute Sensitivity of Dynamic Systems (FL, PF), p. 6.
- DAC-2014-LuCCSHTC #named #using
- ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
- DAC-2014-RaoGHC #artificial reality #design
- Design Methods for Augmented Reality In-Vehicle Infotainment Systems (QR, CG, MH, SC), p. 6.
- DAC-2014-WaksmanRSS #analysis #assessment #functional #identification
- A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
- DAC-2014-ZhangYYX #approximate #framework #named
- ApproxIt: An Approximate Computing Framework for Iterative Methods (QZ, FY, RY, QX), p. 6.
- DATE-2014-BahrebarS #approach #network
- Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
- DATE-2014-FerentD #comparison #mining #novel #synthesis #using
- Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
- DATE-2014-NoursPB #architecture #evaluation #manycore #performance
- A dynamic computation method for fast and accurate performance evaluation of multi-core architectures (SLN, AP, NWB), pp. 1–6.
- DocEng-2014-DavisonMM #named #privacy #semantics #similarity
- P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
- DRR-2014-LiPLD #analysis #online #verification
- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
- HT-2014-Abdel-HafezXJ #generative #rating
- A rating aggregation method for generating product reputations (AAH, YX, AJ), pp. 291–293.
- SIGMOD-2014-ZengGMZ #approximate #estimation #fault #performance #query
- The analytical bootstrap: a new method for fast error estimation in approximate query processing (KZ, SG, BM, CZ), pp. 277–288.
- VLDB-2014-XuCC #clustering #graph #named
- LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
- ITiCSE-2014-Jasute #education #geometry #interactive #learning #visualisation
- An interactive visualization method of constructionist teaching and learning of geometry (EJ), p. 349.
- ITiCSE-2014-MI #bound #query
- A method to prove query lower bounds (JM, SI), pp. 81–86.
- CSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using
- Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
- ICPC-2014-GuptaS #program analysis #quality
- A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
- ICPC-2014-GuptaSVU #assessment #industrial #named #quality #scalability
- SCQAM: a scalable structured code quality assessment method for industrial software (SG, HKS, RDV, UU), pp. 244–252.
- ICPC-2014-MatsumuraIKI #execution #java #performance #visualisation
- Repeatedly-executed-method viewer for efficient visualization of execution paths and states in Java (TM, TI, YK, KI), pp. 253–257.
- ICPC-2014-McBurneyM #automation #documentation #generative #source code #summary
- Automatic documentation generation via source code summarization of method context (PWM, CM), pp. 279–290.
- ICPC-2014-SilvaTV #automation #recommendation #refactoring
- Recommending automated extract method refactorings (DS, RT, MTV), pp. 146–156.
- ICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
- ICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
- Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
- SCAM-2014-LozanoNJ #why
- Explaining Why Methods Change Together (AL, CN, VJ), pp. 185–194.
- SCAM-2014-YoshidaH #c #semiparsing #source code #syntax
- A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
- AFL-2014-Crespi-ReghizziP #commutative #composition
- Commutative Languages and their Composition by Consensual Methods (SCR, PSP), pp. 216–230.
- FM-2014-BjornerH #formal method #question
- 40 Years of Formal Methods — Some Obstacles and Some Possibilities? (DB, KH), pp. 42–61.
- FM-2014-FreitasW #formal method #proving
- Proof Patterns for Formal Methods (LF, IW), pp. 279–295.
- IFM-2014-TofanSR #composition #multi #proving
- A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset (BT, GS, WR), pp. 357–372.
- ICFP-2014-Fisher #formal method #using
- Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
- CHI-2014-DixonLF #implementation #runtime
- Pixel-based methods for widget state and style in a runtime implementation of sliding widgets (MED, GL, JAF), pp. 2231–2240.
- CHI-2014-YueLCSBGSZ #experience #research
- Photographing information needs: the role of photos in experience sampling method-style research (ZY, EL, CJC, JS, KB, ZG, NS, G(Z), pp. 1545–1554.
- CSCW-2014-SaveryGGB #consistency #experience #game studies #maintenance #performance
- The effects of consistency maintenance methods on player experience and performance in networked games (CS, TCNG, CG, MB), pp. 1344–1355.
- CSCW-2014-ShiltonKF #how #social
- How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
- DHM-2014-KikuchiTTGH #information management
- Biomechanics Investigation of Skillful Technician in Spray-up Fabrication Method — Converting Tacit Knowledge to Explicit Knowledge in the Fiber Reinforced Plastics Molding (TK, YT, YT, AG, HH), pp. 24–34.
- DHM-2014-Kull #using
- Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
- DHM-2014-YamamotoKGOAYB
- Caregiver’s Gaze and Field of View Presumption Method During Bath Care in the Elderly Facility (AY, NK, AG, TO, TA, SY, HBJ), pp. 78–87.
- DHM-2014-YangZYHZL #design
- Based on Upper Extremity Comfort ROM of Ergonomic Methods for Household Products Design (FY, QXZ, AY, HH, XZ, ZQL), pp. 167–173.
- DUXU-DI-2014-GencerBZV #detection #machine learning #mobile
- Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
- DUXU-DI-2014-MonatBL #visual notation
- Taking Decisions with Systems Oriented to the General Public — Applying Visual Information Based on Viennese Method (ASM, MB, RCL), pp. 463–471.
- DUXU-DI-2014-PalomakiHVH #bibliography #mobile #perspective #process
- Methods to Study Everyday Activities in a Mobile Work Context — A Literature Overview (EP, KH, MV, MH), pp. 301–312.
- DUXU-DI-2014-RugenhagenH #design #development #game studies #research
- Game Design Techniques in User Research Methods — A New Way to Reach the High Score in Development Teams (ER, TH), pp. 754–762.
- DUXU-DP-2014-Gatsou #generative
- From Inexperienced Users to Co-creators: An Exploration of a Generative Method (CG), pp. 244–252.
- DUXU-DP-2014-Schall14a
- New Methods for Measuring Emotional Engagement (AS), pp. 347–357.
- DUXU-TMT-2014-GoodeLSGB #approach #research
- A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
- DUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using
- Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
- DUXU-TMT-2014-HeimgartnerSH #agile #usability #using
- Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
- DUXU-TMT-2014-JerzakR #evaluation #game studies #heuristic
- Serious Games and Heuristic Evaluation — The Cross-Comparison of Existing Heuristic Evaluation Methods for Games (NJ, FR), pp. 453–464.
- DUXU-TMT-2014-SakamotoM #elicitation #interactive #mobile #named #perspective #requirements
- M4REMAIP: Method for Requirements Elicitation Based on Mobile Applications under an Interaction Perspective (SGS, LCdM), pp. 74–85.
- DUXU-TMT-2014-SchmidtKGSGW #education
- Bridging the Gap — Methods and Teaching of F-A-S-T — Framing-Art-Science- Technology (DS, GK, SG, CS, RG, MW), pp. 589–600.
- DUXU-TMT-2014-SchmuntzschF #design #how #smarttech
- How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
- DUXU-TMT-2014-SilvaMLO #quality #usability #user interface
- Evaluating Quality and Usability of the User Interface: A Practical Study on Comparing Methods with and without Users (CMS, VM, RL, MLLRO), pp. 318–328.
- HCI-AIMT-2014-KashimaMY #programming
- Proposal of a Method to Measure Difficulty Level of Programming Code with Eye-Tracking (TK, SM, SY), pp. 264–272.
- HCI-AIMT-2014-NakaI #communication #effectiveness #generative #gesture
- Proposal of the Effective Method of Generating Characteristic Gestures in Nonverbal Communication (TN, TI), pp. 102–112.
- HCI-AIMT-2014-YanikTMMBGW #gesture #learning
- A Method for Lifelong Gesture Learning Based on Growing Neural Gas (PMY, AT, JM, JM, JOB, KEG, IDW), pp. 191–202.
- HCI-AS-2014-TeracineM #assessment #usability #web
- Proposals for an Assessment Method of Accessibility and Usability in Web Software (ECT, FCM), pp. 80–89.
- HCI-TMT-2014-LiXTW #research #visual notation
- Color Saliency Research on Visual Perceptual Layering Method (JL, CX, WT, XW), pp. 86–97.
- HCI-TMT-2014-MatsumotoKKA #adaptation #automation #learning #student #word
- Evaluating an Automatic Adaptive Delivery Method of English Words Learning Contents for University Students in Science and Technology (SM, TK, TK, MA), pp. 510–520.
- HCI-TMT-2014-MauesB
- Reflections on the Cross-Platform Semiotic Inspection Method (RdAM, SDJB), pp. 533–544.
- HCI-TMT-2014-MayasHRK #testing #usability
- Evaluating Methods and Equipment for Usability Field Tests in Public Transport (CM, SH, CR, HK), pp. 545–553.
- HCI-TMT-2014-MotylF #comparison #design #generative #idea
- Comparison of Creativity Enhancement and Idea Generation Methods in Engineering Design Training (BM, SF), pp. 242–250.
- HCI-TMT-2014-YajimaTS #collaboration #learning
- Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT, RS), pp. 457–465.
- HIMI-AS-2014-AlkhateebHH #comprehension #using
- The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
- HIMI-AS-2014-JangKJS #analysis #framework #reliability
- A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
- HIMI-DE-2014-FukuzumiYTYYK
- A New Computational Method for Single-Trial-EEG-Based BCI — Proposal of the Number of Electrodes (SF, HY, KT, TY, TY, KK), pp. 148–156.
- HIMI-DE-2014-LinKT #analysis #collaboration #design #learning
- A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
- HIMI-DE-2014-SugayaNT #clustering #recognition #using
- Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
- HIMI-DE-2014-UedaA14a #twitter
- Suggestion of Operation Method of the Interest Shift Model of the Twitter User (YU, YA), pp. 664–677.
- AdaEurope-2014-IliasovLR #approach #formal method
- Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
- CAiSE-2014-VlaanderenDB #incremental
- Finding Optimal Plans for Incremental Method Engineering (KV, FD, SB), pp. 640–655.
- ICEIS-v1-2014-ChinoGRTT #named #scalability
- TrieMotif — A New and Efficient Method to Mine Frequent K-Motifs from Large Time Series (DYTC, RRdVG, LASR, CTJ, AJMT), pp. 60–69.
- ICEIS-v2-2014-BarretoFSJ #formal method #petri net #using
- A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
- ICEIS-v2-2014-PfisterHN #agile #concurrent #design #diagrams #framework #metamodelling #modelling #synthesis #towards #visual notation
- A Framework for Concurrent Design of Metamodels and Diagrams — Towards an Agile Method for the Synthesis of Domain Specific Graphical Modeling Languages (FP, MH, CN), pp. 298–306.
- ICEIS-v2-2014-VieiraJF #analysis #network
- A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
- ICEIS-v3-2014-RibeiroS #case study #evaluation #usability
- A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
- CIKM-2014-LiangZHGB #identification #named #novel #sentiment #word
- CONR: A Novel Method for Sentiment Word Identification (JL, XZ, YH, LG, SB), pp. 1943–1946.
- CIKM-2014-PaikO #fixpoint #query
- A Fixed-Point Method for Weighting Terms in Verbose Informational Queries (JHP, DWO), pp. 131–140.
- CIKM-2014-SongG #difference #named #privacy #query
- Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
- ECIR-2014-NainiA #feature model #learning #rank
- Exploiting Result Diversification Methods for Feature Selection in Learning to Rank (KDN, ISA), pp. 455–461.
- ICML-c1-2014-AzadiS #multi #probability #towards
- Towards an optimal stochastic alternating direction method of multipliers (SA, SS), pp. 620–628.
- ICML-c1-2014-LinX #adaptation #continuation #optimisation
- An Adaptive Accelerated Proximal Gradient Method and its Homotopy Continuation for Sparse Optimization (QL, LX), pp. 73–81.
- ICML-c1-2014-LiuJL #approximate #kernel #performance #using
- Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
- ICML-c1-2014-Suzuki #coordination #multi #probability
- Stochastic Dual Coordinate Ascent with Alternating Direction Method of Multipliers (TS), pp. 736–744.
- ICML-c1-2014-YogatamaS #multi #word
- Making the Most of Bag of Words: Sentence Regularization with Alternating Direction Method of Multipliers (DY, NAS), pp. 656–664.
- ICML-c1-2014-ZhongK #multi #performance #probability
- Fast Stochastic Alternating Direction Method of Multipliers (WZ, JTYK), pp. 46–54.
- ICML-c2-2014-BalleHP #comparison #empirical #learning #probability
- Methods of Moments for Learning Stochastic Languages: Unified Presentation and Empirical Comparison (BB, WLH, JP), pp. 1386–1394.
- ICML-c2-2014-Bou-AmmarERT #learning #multi #online #policy
- Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
- ICML-c2-2014-CarlssonMRS #clustering #network #symmetry
- Hierarchical Quasi-Clustering Methods for Asymmetric Networks (GEC, FM, AR, SS), pp. 352–360.
- ICML-c2-2014-CortesKM #predict
- Ensemble Methods for Structured Prediction (CC, VK, MM), pp. 1134–1142.
- ICML-c2-2014-DefazioDC #big data #incremental #named #performance #problem
- Finito: A faster, permutable incremental gradient method for big data problems (AD, JD, TSC), pp. 1125–1133.
- ICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using
- Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
- ICML-c2-2014-Sohl-DicksteinPG #optimisation #performance #probability #scalability
- Fast large-scale optimization by unifying stochastic gradient and quasi-Newton methods (JSD, BP, SG), pp. 604–612.
- ICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
- Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
- ICPR-2014-AghdamPS #adaptation #probability #segmentation
- Adaptive Probabilistic Thresholding Method for Accurate Breast Region Segmentation in Mammograms (HHA, DP, AS), pp. 3357–3362.
- ICPR-2014-CadoniLG #case study #comparative #multimodal #recognition
- Iconic Methods for Multimodal Face Recognition: A Comparative Study (MC, AL, EG), pp. 4612–4617.
- ICPR-2014-ChironGM #behaviour #parametricity #using
- Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
- ICPR-2014-DahlCB #image #multi #segmentation #using
- Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
- ICPR-2014-DuanHZCZ #image #segmentation #using
- A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
- ICPR-2014-DuCZ #aspect-oriented #identification #using
- A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
- ICPR-2014-FernandezT #analysis #documentation #layout
- EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
- ICPR-2014-FuKGYZ #ranking
- Binary Code Reranking Method Based on Bit Importance (HF, XK, YG, XY, LZ), pp. 2679–2684.
- ICPR-2014-GongWLT #consistency #video
- Temporal Consistency Based Method for Blind Video Deblurring (WG, WW, WL, ST), pp. 861–864.
- ICPR-2014-HedjamCK #detection #documentation #energy #image #multi #self
- Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
- ICPR-2014-HuangZLW #distance #feature model
- A Method of Discriminative Information Preservation and In-Dimension Distance Minimization Method for Feature Selection (SH, JZ, XL, LW), pp. 1615–1620.
- ICPR-2014-IshaqEW #evaluation #performance
- An Evaluation of the Faster STORM Method for Super-resolution Microscopy (OI, JE, CW), pp. 4435–4440.
- ICPR-2014-KhanVP #multi #visual notation
- A Generalized Search Method for Multiple Competing Hypotheses in Visual Tracking (MHK, MFV, TPP), pp. 2245–2250.
- ICPR-2014-KondoriYOLL #3d
- A Direct Method for 3D Hand Pose Recovery (FAK, SY, AO, LL, HL), pp. 345–350.
- ICPR-2014-LiCGW #hybrid #interactive #recognition #using
- A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
- ICPR-2014-LiewY #detection #feature model #novel #performance #robust
- Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
- ICPR-2014-MontagnerjH #machine learning
- A Machine Learning Based Method for Staff Removal (IdSM, RHJ, NSTH), pp. 3162–3167.
- ICPR-2014-NguyenTHM #classification #novel
- A Novel Sphere-Based Maximum Margin Classification Method (PN, DT, XH, WM), pp. 620–624.
- ICPR-2014-RozzaMP #graph #kernel #learning #novel
- A Novel Graph-Based Fisher Kernel Method for Semi-supervised Learning (AR, MM, AP), pp. 3786–3791.
- ICPR-2014-SuiTX #predict
- An Unsupervised Band Selection Method Based on Overall Accuracy Prediction (CS, YT, YX), pp. 3756–3761.
- ICPR-2014-WangZZ #segmentation
- An Improved BET Method for Brain Segmentation (LW, ZZ, RZ), pp. 3221–3226.
- ICPR-2014-Yasuda #effectiveness
- Effective Mean-Field Inference Method for Nonnegative Boltzmann Machines (MY), pp. 3600–3605.
- ICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using
- Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
- ICPR-2014-ZhaoTHTY #comparison #performance #segmentation
- A Performance Comparison between Circular and Spline-Based Methods for Iris Segmentation (YZ, CT, XH, AOT, RY), pp. 351–356.
- ICPR-2014-ZhuY #image #optimisation #quality
- A Bit Allocation Optimization Method for ROI Based Image Compression with Stable Image Quality (YZ, JY), pp. 849–854.
- KDD-2014-BenderskyPHJL #retrieval #scalability #video
- Up next: retrieval methods for large scale related video suggestion (MB, LGP, JJH, VJ, DL), pp. 1769–1778.
- KDD-2014-RamanJ
- Methods for ordinal peer grading (KR, TJ), pp. 1037–1046.
- KDD-2014-Ting #approximate
- Streamed approximate counting of distinct elements: beating optimal batch methods (DT), pp. 442–451.
- KDD-2014-WangZQZ #using
- Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
- KDD-2014-ZhaiXW #multi #optimisation
- A multi-class boosting method with direct optimization (SZ, TX, SW), pp. 273–282.
- KDIR-2014-AbdallahI #classification #modelling #n-gram #using #web
- URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
- KDIR-2014-PlansangketG #evaluation #performance #query #retrieval #state of the art
- Performance Evaluation of State-of-the-Art Ranked Retrieval Methods and Their Combinations for Query Suggestion (SP, JQG), pp. 141–148.
- KDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
- Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
- KDIR-2014-SatoNS #classification #kernel #using
- A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
- KDIR-2014-SenkoDPRK #modelling
- A Method for Evaluating Validity of Piecewise-linear Models (OVS, DSD, EAP, LYR, AVK), pp. 437–443.
- KMIS-2014-HisakaneOSK #multi
- A Tutoring Rule Selection Method for Case-based e-Learning by Multi-class Support Vector Machine (DH, MO, MS, NK), pp. 119–125.
- KMIS-2014-HisakaneS #learning #visualisation
- A Visualization System of Discussion Structure in Case Method Learning (DH, MS), pp. 126–132.
- KMIS-2014-ToureMM #architecture #design #information management #towards
- Re-Designing Knowledge Management Systems — Towards User-Centred Design Methods Integrating Information Architecture (CET, CM, JCM), pp. 298–305.
- KR-2014-BoothAR
- Interval Methods for Judgment Aggregation in Argumentation (RB, EA, IR).
- MLDM-2014-AnandWA #information management #scalability
- A Method of Crowd-Sourced Information Extraction From Large Data Files (IMA, AW, PA), pp. 431–436.
- MLDM-2014-SenkoD #multi
- Multiple Regression Method Based on Unexpandable and Irreducible Convex Combinations (OVS, AD), pp. 43–57.
- MLDM-2014-SharmaT #mining #social #social media
- A Generalized Relationship Mining Method for Social Media Text Data (TS, DT), pp. 376–392.
- SEKE-2014-GuimaraesSALC #alloy #consistency #using #verification
- A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
- SEKE-2014-GuptaAWD #empirical #modelling #verification
- Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
- SEKE-2014-LeeKB #twitter
- Method for Measuring Twitter Content Influence (EL, JDK, DKB), pp. 659–664.
- SEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
- SIGIR-2014-QianL0H
- Co-training on authorship attribution with very fewlabeled examples: methods vs. views (TQ, BL, MZ, GH), pp. 903–906.
- SIGIR-2014-RoitmanHK #using
- Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
- LOPSTR-2014-Balaniuk #induction #synthesis
- Drill and Join: A Method for Exact Inductive Program Synthesis (RB), pp. 219–237.
- LOPSTR-2014-TahatE #hybrid #protocol #self #synthesis #verification
- A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
- QAPL-2014-KempfLM #design #formal method #manycore
- Formal and Informal Methods for Multi-Core Design Space Exploration (JFK, OL, OM), pp. 78–92.
- RE-2014-KnaussH #assessment #named
- EAM: Ecosystemability assessment method (EK, IH), pp. 319–320.
- RE-2014-PutnamC #approach #game studies #multi #requirements
- Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
- RE-2014-WohlrabGKB #experience #industrial #performance #requirements
- Experience of pragmatically combining RE methods for performance requirements in industry (RW, TdG, AK, SB), pp. 344–353.
- SAC-2014-AlnajemZ #evaluation #mobile
- A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
- SAC-2014-AnjosTCON #3d #evaluation #interactive #statistics
- Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments (AMdA, RT, AC, SdO, FLSN), pp. 223–228.
- SAC-2014-BaeCPJKC #clustering #effectiveness #memory management
- An effective data clustering method based on expected update time in flash memory environment (DHB, JWC, SMP, BSJ, SWK, SjC), pp. 1492–1497.
- SAC-2014-BaeLKWP #network #privacy #social
- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
- SAC-2014-BarddalGE #classification #concept #named #network #social
- SFNClassifier: a scale-free social network method to handle concept drift (JPB, HMG, FE), pp. 786–791.
- SAC-2014-CorralGSS #android #energy #implementation
- Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
- SAC-2014-HuergoPD #approach #identification #modelling #using
- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
- SAC-2014-MoraCGZJEBAH #named
- MUSES: a corporate user-centric system which applies computational intelligence methods (AMM, PdlC, JJMG, SZ, MJ, AIEA, MB, HA, ZH), pp. 1719–1723.
- SAC-2014-SakamotoKTT #visualisation
- Method for visualizing undone operations based on changes on desktop screen (AS, TK, TT, MT), pp. 193–195.
- SAC-2014-TinK #clustering #distributed #performance
- Method for fast clustering of data distributed on a sphere surface (TT, SRK), pp. 1735–1736.
- SAC-2014-WangWPSC #collaboration #network #process
- A collaborative processes synchronization method with regards to system crashes and network failures (LW, AW, LFP, MvS, CC), pp. 1393–1398.
- FSE-2014-GoffiGMPT #search-based #sequence #synthesis
- Search-based synthesis of equivalent method sequences (AG, AG, AM, MP, PT), pp. 366–376.
- FSE-2014-HigoK #case study #functional #how #java #source code
- How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
- FSE-2014-KrkaBM #automation #invariant #mining #specification
- Automatic mining of specifications from invocation traces and method invariants (IK, YB, NM), pp. 178–189.
- SPLC-2014-DillonRD #approach #product line
- A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
- RTA-TLCA-2014-Schmidt-Schauss #analysis #concurrent #programming language #semantics
- Concurrent Programming Languages and Methods for Semantic Analyses (Extended Abstract of Invited Talk) (MSS), pp. 21–30.
- VMCAI-2014-BloemKS #safety #satisfiability #specification #synthesis
- SAT-Based Synthesis Methods for Safety Specs (RB, RK, MS), pp. 1–20.
- ASE-2013-Fard #behaviour #detection #distributed #independence #using
- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
- ASE-2013-ThungWLL #api #automation #feature model #recommendation
- Automatic recommendation of API methods from feature requests (FT, SW, DL, JLL), pp. 290–300.
- CASE-2013-BentahaBD #composition #probability
- A decomposition method for stochastic partial disassembly line balancing with profit maximization (MLB, OB, AD), pp. 404–409.
- CASE-2013-ChowN
- Improved knot-tying methods for autonomous robot surgery (DLC, WSN), pp. 461–465.
- CASE-2013-DevesseRFW #realtime
- A real-time optimal control method for swing-free tower crane motions (WD, MR, LF, JW), pp. 336–341.
- CASE-2013-FerreiraL #generative #multi #tool support #using
- A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
- CASE-2013-LiuCXG #distributed #energy #optimisation
- A decentralized optimization method for energy saving of HVAC systems (ZL, XC, XX, XG), pp. 225–230.
- CASE-2013-Nieves-RiveraXJMZ #automation #development
- Development of a position sensitive device and control method for automated robot calibration (ENR, NX, YJ, CM, GZ), pp. 1127–1132.
- CASE-2013-QianY #named #navigation #performance #visual notation
- NCC-RANSAC: A fast plane extraction method for navigating a smart cane for the visually impaired (XQ, CY), pp. 261–267.
- DAC-2013-BombieriLFC #c++ #synthesis
- A method to abstract RTL IP blocks into C++ code and enable high-level synthesis (NB, HYL, FF, LPC), p. 9.
- DAC-2013-Fang #simulation
- A new time-stepping method for circuit simulation (GPF), p. 10.
- DAC-2013-KimOCHH #distributed #embedded #estimation #novel
- A novel analytical method for worst case response time estimation of distributed embedded systems (JK, HO, JC, HH, SH), p. 10.
- DAC-2013-LiuC #on the #synthesis
- On learning-based methods for design-space exploration with high-level synthesis (HYL, LPC), p. 7.
- DAC-2013-MillerVG #modelling #physics #statistics #using
- Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
- DATE-2013-ElfadelMA #formal method #industrial #manycore
- Closed-loop control for power and thermal management in multi-core processors: formal methods and industrial practice (IME, RM, DA), pp. 1879–1881.
- DATE-2013-KodakaTSYKTXSUTMM #manycore #power management #predict
- A near-future prediction method for low power consumption on a many-core processor (TK, AT, SS, AY, TK, TT, HX, TS, HU, JT, TM, NM), pp. 1058–1059.
- DATE-2013-PigorschS #locality
- Lemma localization: a practical method for downsizing SMT-interpolants (FP, CS), pp. 1405–1410.
- DATE-2013-WachterEAM #fault tolerance
- Topology-agnostic fault-tolerant NoC routing method (EW, AE, AMA, FM), pp. 1595–1600.
- DATE-2013-YanLH #adaptation #fault #self
- A dynamic self-adaptive correction method for error resilient application (LY, HL, ZH), pp. 943–946.
- DATE-2013-YingHH #3d #performance
- Fast and optimized task allocation method for low vertical link density 3-dimensional networks-on-chip based many core systems (HY, TH, KH), pp. 1777–1782.
- DocEng-2013-Esposito #documentation #machine learning
- Symbolic machine learning methods for historical document processing (FE), pp. 1–2.
- DocEng-2013-SrivastavaSM #graph #interactive #topic
- A graph-based topic extraction method enabling simple interactive customization (AS, AJS, EEM), pp. 71–80.
- DRR-2013-YangP #documentation #segmentation
- Local projection-based character segmentation method for historical Chinese documents (LY, LP).
- ICDAR-2013-AhmedSLD #segmentation #using
- A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
- ICDAR-2013-BuiVM #documentation #invariant #navigation
- Invariants Extraction Method Applied in an Omni-language Old Document Navigating System (QAB, MV, RM), pp. 1325–1329.
- ICDAR-2013-ChattopadhyayRG #automation #robust
- Automatic Selection of Binarization Method for Robust OCR (TC, VRR, UG), pp. 1170–1174.
- ICDAR-2013-Furukawa #composition #using
- A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
- ICDAR-2013-GacebLD #adaptation #documentation #image
- Adaptative Smart-Binarization Method: For Images of Business Documents (DG, FL, JD), pp. 118–122.
- ICDAR-2013-ItaniHI #using
- Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
- ICDAR-2013-LinGTBAS #detection #recognition
- A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
- ICDAR-2013-LiPXW #analysis #consistency #online #order #verification
- A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
- ICDAR-2013-MiyoshiNS #image #using
- Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
- ICDAR-2013-NguyenZN #online #recognition
- A Semi-incremental Recognition Method for On-Line Handwritten Japanese Text (CTN, BZ, MN), pp. 84–88.
- ICDAR-2013-PuriST #learning #network
- Bayesian Network Structure Learning and Inference Methods for Handwriting (MP, SNS, YT), pp. 1320–1324.
- ICDAR-2013-Ramirez-OrtegonMRC #documentation #metric
- An Objective Method to Evaluate Stroke-Width Measures for Binarized Documents (MARO, VM, RR, EC), pp. 175–179.
- ICDAR-2013-SekiAYNSN #documentation #image
- Color Drop-Out Binarization Method for Document Images with Color Shift (MS, EA, TY, HN, HS, TN), pp. 123–127.
- ICDAR-2013-SharmaSPBT #multi #segmentation #video #word
- A New Method for Character Segmentation from Multi-oriented Video Words (NS, PS, UP, MB, CLT), pp. 413–417.
- ICDAR-2013-ShivakumaraBGT #detection #video
- Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
- ICDAR-2013-SuDPL #comprehension #documentation #novel #word
- Cross-Language Sensitive Words Distribution Map: A Novel Recognition-Based Document Understanding Method for Uighur and Tibetan (BS, XD, LP, CL), pp. 255–259.
- ICDAR-2013-SurintaSW #comparison
- A Comparison of Feature and Pixel-Based Methods for Recognizing Handwritten Bangla Digits (OS, LS, MW), pp. 165–169.
- SIGMOD-2013-GaoLOWC #crowdsourcing #online
- An online cost sensitive decision-making method in crowdsourcing systems (JG, XL, BCO, HW, GC), pp. 217–228.
- SIGMOD-2013-SametSA #database #game studies
- Indexing methods for moving object databases: games and other applications (HS, JS, MA), pp. 169–180.
- VLDB-2013-HuaiMLO0 #clustering #comprehension
- Understanding Insights into the Basic Structure and Essential Issues of Table Placement Methods in Clusters (YH, SM, RL, OO, XZ), pp. 1750–1761.
- VLDB-2013-QardajiYL #comprehension
- Understanding Hierarchical Methods for Differentially Private Histograms (WHQ, WY, NL), pp. 1954–1965.
- ICPC-2013-MondalRS #co-evolution #empirical #identification
- Insight into a method co-change pattern to identify highly coupled methods: An empirical study (MM, CKR, KAS), pp. 103–112.
- WCRE-2013-SalesTMV #dependence #recommendation #refactoring #set #using
- Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
- ICALP-v2-2013-EtessamiSY #context-free grammar #probability #regular expression
- Stochastic Context-Free Grammars, Regular Languages, and Newton’s Method (KE, AS, MY), pp. 199–211.
- LATA-2013-LuttenbergerS #commutative #convergence
- Convergence of Newton’s Method over Commutative Semirings (ML, MS), pp. 407–418.
- CHI-2013-BauerK #design #named
- DesignLibs: a scenario-based design method for ideation (JSB, JAK), pp. 1955–1958.
- CHI-2013-Grosse-PuppendahlBKK #interface #proximity #recognition #ubiquitous
- Swiss-cheese extended: an object recognition method for ubiquitous interfaces based on capacitive proximity sensing (TAGP, AB, FK, AK), pp. 1401–1410.
- CHI-2013-JokelaL #collaboration #comparative #evaluation #interactive #mobile
- A comparative evaluation of touch-based methods to bind mobile devices for collaborative interactions (TJ, AL), pp. 3355–3364.
- CHI-2013-JungBLK #design
- Make it move: a movement design method of simple standing products based on systematic mapping of torso movements & product messages (JJ, SHB, JHL, MSK), pp. 1279–1288.
- CHI-2013-MankoffRF #research #using
- Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
- CHI-2013-VoelkerWB #evaluation
- An evaluation of state switching methods for indirect touch systems (SV, CW, JOB), pp. 745–754.
- CSCW-2013-HailpernDHSLK #communication #framework #named #research
- ACES: a cross-discipline platform and method for communication and language research (JMH, MD, AH, SS, RL, KK), pp. 515–526.
- DHM-HB-2013-GuoCWDL #design #e-commerce #interface
- An Interface Design Method for E-commerce Sites’ Homepage Considering Users’ Emotions (FG, YC, MW, YD, LWL), pp. 30–39.
- DHM-HB-2013-KeyvaniLBO #database #metric #using
- Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, RÖ), pp. 343–352.
- DHM-SET-2013-LauterbachS #evaluation #implementation #interactive
- Implementing Scenarios as an Evaluation Method of the Patient-Physician Interaction in Decision Aids (CVL, JDS), pp. 232–239.
- DUXU-CXC-2013-AsanoY #analysis #design
- Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
- DUXU-CXC-2013-Chang #evaluation #segmentation #usability
- Usability Evaluation of Two Chinese Segmentation Methods in Subtitles to Scaffold Chinese Novice (CKC), pp. 28–37.
- DUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management #using
- Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
- DUXU-NTE-2013-FukumotoI #algorithm #interactive #mobile #optimisation #search-based
- A Proposal for Optimization Method of Vibration Pattern of Mobile Device with Interactive Genetic Algorithm (MF, TI), pp. 264–269.
- DUXU-NTE-2013-ParkK #performance #representation
- Efficient Information Representation Method for Driver-Centered AR-HUD System (HP, KhK), pp. 393–400.
- DUXU-PMT-2013-FischerSN #design #set #towards #usability #validation
- Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design (HF, BS, KN), pp. 252–261.
- DUXU-PMT-2013-HamaKKIN #design #experience #framework #novel #social #user interface
- Novel Method of Evaluating GUI Design from the Viewpoint of Worker Experience — Central Control Systems for Social Infrastructure (DH, MK, MK, KI, MN), pp. 283–293.
- DUXU-PMT-2013-SuL #design #interactive
- Designing for Resonance by Evocative Objects: An Experiential Interaction Design Method (CSS, RHL), pp. 610–619.
- DUXU-PMT-2013-Yantac #design #education #experience #interactive #user interface
- A Method for Teaching Affordance for User Experience Design in Interactive Media Design Education (AEY), pp. 630–638.
- DUXU-WM-2013-OkazawaY #design #modelling
- A Proposal of Design Method of Obtaining the Construction Items of Mental Models in Product Design (NO, TY), pp. 408–413.
- HCI-AMTE-2013-ChamberlainC #named
- Engagingdesign — Methods for Collective Creativity (PC, CC), pp. 22–31.
- HCI-AMTE-2013-HirataY #design pattern #logic #user interface #using
- A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
- HCI-AMTE-2013-UedaGTHYY #design #experience
- Structured Scenario-Based Design Method for Experience Vision (YU, KG, KT, SH, KY, KY), pp. 500–509.
- HCI-AMTE-2013-YanagidaUGTHY #experience
- Method Format for Experience Vision (KY, YU, KG, KT, SH, KY), pp. 531–539.
- HCI-AMTE-2013-YasuIK #collaboration #design #enterprise #experience #user interface
- Collaborative User Experience Design Methods for Enterprise System (HY, NI, IK), pp. 146–155.
- HCI-III-2013-ItoON #biology #interactive
- A Method for Promoting Interaction Awareness by Biological Rhythm in Elementary School Children (KI, KO, SN), pp. 421–430.
- HCI-III-2013-RebenitschO #speech
- Facial Electromyogram Activation as Silent Speech Method (LR, CBO), pp. 464–473.
- HCI-III-2013-WangLDHY #detection #set
- A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
- HCI-III-2013-ZhaolaoZWFT #image #semantics
- Semantic Annotation Method of Clothing Image (LZ, MZ, XW, YF, XT), pp. 289–298.
- HCI-IMT-2013-EbisawaF #detection #using #video
- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
- HCI-IMT-2013-KurosawaST
- Keyboard Clawing: Input Method by Clawing Key Tops (TK, BS, JT), pp. 272–280.
- HCI-IMT-2013-MaWHZ #gesture #interactive
- A Method for Single Hand Fist Gesture Input to Enhance Human Computer Interaction (TM, WGW, CYH, XZ), pp. 291–300.
- HCI-IMT-2013-MurataHMH #case study #interface #using
- Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
- HCI-IMT-2013-MurataHO #estimation #interface
- Proposal of Estimation Method of Stable Fixation Points for Eye-gaze Input Interface (AM, TH, KO), pp. 330–339.
- HCI-IMT-2013-SakamotoTT #music #using
- A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
- HCI-IMT-2013-ShibuyaKM #web
- A Web Browsing Method on Handheld Touch Screen Devices for Preventing from Tapping Unintended Links (YS, HK, KM), pp. 491–496.
- HCI-IMT-2013-WongKCPW #documentation #multi
- Audio-Visual Documentation Method for Digital Storytelling for a Multimedia Art Project (CYW, CWK, KC, MAMP, MLW), pp. 750–758.
- HCI-UC-2013-FurukawaN #navigation
- A Pedestrian Navigation Method for User’s Safe and Easy Wayfinding (HF, YN), pp. 156–165.
- HCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
- HCI-UC-2013-LinCTH
- An Application of the Ballistic Movement Method for Evaluating Computer Mice (RFL, CWC, YCT, CYH), pp. 199–208.
- HCI-UC-2013-OkiTS #named #using
- AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
- HIMI-D-2013-IsogaiN #modelling #motivation #music #recommendation
- Modeling of Music Recommendation Methods to Promote the User’s Singing Motivation — For Next-Generation Japanese Karaoke Systems (SI, MN), pp. 439–448.
- HIMI-D-2013-MoriTK #adaptation
- Correction Method Based on KI-VPA Model for Changes in Vibratory Perception Caused by Adaptation (YM, TT, SK), pp. 107–116.
- HIMI-D-2013-OkuboN #composition #generative
- Proposal of Avatar Generating Method by Composition of the Portraits Made by Friends (MO, SN), pp. 515–523.
- HIMI-HSM-2013-MoreiraB #automation #interface
- A Semiotic Based Method for Evaluating Automated Cockpit Interfaces (WM, RB), pp. 530–539.
- HIMI-LCCB-2013-GuoZSP #axiom #usability
- Value Added by the Axiomatic Usability Method for Evaluating Consumer Electronics (YG, YZ, GS, RWP), pp. 457–466.
- HIMI-LCCB-2013-KimitaKWTS #evaluation #nondeterminism
- Service Evaluation Method for Managing Uncertainty (KK, YK, KW, TT, YS), pp. 569–578.
- HIMI-LCCB-2013-KuritaKWS #analysis
- A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
- HIMI-LCCB-2013-OmoriTU #3d #experience
- A Method of Viewing 3D Horror Contents for Amplifying Horror Experience (NO, MT, RU), pp. 228–237.
- HIMI-LCCB-2013-TomiokaSI #deployment #ontology #quality
- A Method for Developing Quality Function Deployment Ontology (KT, FS, SI), pp. 632–638.
- HIMI-LCCB-2013-YajimaHY #analysis #communication #design
- Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
- HILT-2013-Wing #formal method #industrial #perspective
- Formal methods: an industrial perspective (JMW), pp. 85–86.
- CAiSE-2013-DelmasP #formal method #policy #specification
- Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
- ICEIS-J-2013-AmmarTM #development #modelling #usability
- Dealing with Usability in Model-Driven Development Method (LBA, AT, AM), pp. 405–420.
- ICEIS-v1-2013-AndradeRYS #data-driven #database #novel #similarity
- A Novel Method for Similarity Search over Meteorological Time Series Data based on the Coulomb’s Law (CGdA, MXR, CAY, MTPS), pp. 209–216.
- ICEIS-v1-2013-Frank #enterprise #modelling #multi #self
- Multi-Perspective Enterprise Modelling as a Foundation of Method Engineering and Self-Referential Enterprise Systems (UF), p. IX.
- ICEIS-v1-2013-HayashiK #optimisation #performance
- Data Location Optimization Method to Improve Tiered Storage Performance (SH, NK), pp. 112–119.
- ICEIS-v1-2013-SimrinAD #heuristic #problem #using
- A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
- ICEIS-v2-2013-DjuanaXLJC #ontology #problem #recommendation
- An Ontology-based Method for Sparsity Problem in Tag Recommendation (ED, YX, YL, AJ, CC), pp. 467–474.
- ICEIS-v2-2013-SiepermannSL
- Electronic Exercises for the Metra Potential Method (MS, CS, RL), pp. 435–442.
- ICEIS-v3-2013-MiloszBL #empirical #evaluation #usability
- Memorability Experiment Vs. Expert Method in Websites Usability Evaluation (MM, MB, ML), pp. 151–157.
- ICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #using #web
- Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
- CIKM-2013-MengK #network
- Discovering influential authors in heterogeneous academic networks by a co-ranking method (QM, PJK), pp. 1029–1036.
- CIKM-2013-XuXWW #automation #feedback #image #ranking
- A heterogenous automatic feedback semi-supervised method for image reranking (XCX, XSX, YW, XW), pp. 999–1008.
- ECIR-2013-ChenC #analysis #multi #network #topic #using
- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
- ECIR-2013-MirkinS #clustering
- Least Square Consensus Clustering: Criteria, Methods, Experiments (BGM, AS), pp. 764–767.
- ECIR-2013-NeshatiAHB #classification #network #social
- A Joint Classification Method to Integrate Scientific and Social Networks (MN, EA, DH, HB), pp. 122–133.
- ECIR-2013-ZhukovskiiGS #ranking
- URL Redirection Accounting for Improving Link-Based Ranking Methods (MZ, GG, PS), pp. 656–667.
- ICML-c1-2013-ChevaleyreKZ #classification #linear
- Rounding Methods for Discrete Linear Classification (YC, FK, JDZ), pp. 651–659.
- ICML-c1-2013-OuyangHTG #multi #probability
- Stochastic Alternating Direction Method of Multipliers (HO, NH, LT, AGG), pp. 80–88.
- ICML-c1-2013-Suzuki #multi #online
- Dual Averaging and Proximal Gradient Descent for Online Alternating Direction Multiplier Method (TS), pp. 392–400.
- ICML-c3-2013-GittensM #machine learning #scalability
- Revisiting the Nystrom method for improved large-scale machine learning (AG, MWM), pp. 567–575.
- ICML-c3-2013-GoschinWL
- The Cross-Entropy Method Optimizes for Quantiles (SG, AW, MLL), pp. 1193–1201.
- ICML-c3-2013-TakacBRS
- Mini-Batch Primal and Dual Methods for SVMs (MT, ASB, PR, NS), pp. 1022–1030.
- ICML-c3-2013-TamarCM #difference
- Temporal Difference Methods for the Variance of the Reward To Go (AT, DDC, SM), pp. 495–503.
- KDD-2013-BakshyE #evaluation #nondeterminism #online
- Uncertainty in online experiments with dependent data: an evaluation of bootstrap methods (EB, DE), pp. 1303–1311.
- KDD-2013-EmersonWN #data mining #mining #profiling
- A data mining driven risk profiling method for road asset management (DE, JW, RN), pp. 1267–1275.
- KDD-2013-GaneshapillaiG #data-driven
- A data-driven method for in-game decision making in MLB: when to pull a starting pitcher (GG, JVG), pp. 973–979.
- KDD-2013-MorenoNK #graph #learning #modelling
- Learning mixed kronecker product graph models with simulated method of moments (SM, JN, SK), pp. 1052–1060.
- KDD-2013-NarasimhanA #bound #named #optimisation
- SVMpAUCtight: a new support vector method for optimizing partial AUC based on a tight convex upper bound (HN, SA), pp. 167–175.
- KDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
- Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
- KDIR-KMIS-2013-CunhaFM #clustering #documentation #integration
- Clustering and Classifying Text Documents — A Revisit to Tagging Integration Methods (EC, ÁF, ÓM), pp. 160–168.
- KEOD-2013-KarolyA #implementation
- The Implementation of a ReALIS-based Method of Static Intensional Interpretation (MK, GA), pp. 393–398.
- MLDM-2013-OthmanB #induction #reduction
- Preceding Rule Induction with Instance Reduction Methods (OO, CHB), pp. 209–218.
- RecSys-2013-AdamopoulosT #collaboration #predict #recommendation #using
- Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
- RecSys-2013-BabasCT #personalisation #recommendation #what
- You are what you consume: a bayesian method for personalized recommendations (KB, GC, ET), pp. 221–228.
- RecSys-2013-MouraoRKM #hybrid #recommendation
- Exploiting non-content preference attributes through hybrid recommendation method (FM, LCdR, JAK, WMJ), pp. 177–184.
- SEKE-2013-ChaoY #analysis #order #reachability #scalability
- A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
- SEKE-2013-DuHCLH #incremental #named #personalisation #recommendation
- ABEY: an Incremental Personalized Method Based on Attribute Entropy for Recommender Systems (S) (XD, TH, ZC, JL, CH), pp. 318–321.
- SEKE-2013-HeDWCL #collaboration #topic
- Comparing Collaborative Filtering Methods Based on User-Topic Ratings (TH, XD, WW, ZC, JL), pp. 312–317.
- SEKE-2013-KayaF #identification
- Identifying Extract Method Opportunities Based on Variable References (S) (MK, JWF), pp. 153–158.
- SEKE-2013-TriasCSM #migration #web
- An ADM-based Method for migrating CMS-based Web applications (FT, VdC, MLS, EM), pp. 256–261.
- SIGIR-2013-CuiMLWR #automation #image #nearest neighbour
- Ranking-oriented nearest-neighbor based method for automatic image annotation (CC, JM, TL, XW, ZR), pp. 957–960.
- SIGIR-2013-LuWTZHZ #rank #ranking #scalability
- A low rank structural large margin method for cross-modal ranking (XL, FW, ST, ZZ, XH, YZ), pp. 433–442.
- SIGIR-2013-ZhuC #adaptation
- An adaptive evidence weighting method for medical record search (DZ, BC), pp. 1025–1028.
- AMT-2013-TisoRL #model-to-text #testing
- A Method for Testing Model to Text Transformations (AT, GR, ML), pp. 22–31.
- RE-2013-GolnamRWK #case study #integration #scalability
- The integration of an RE method and AHP: A pilot study in a large Swiss bank (AG, GR, AW, SK), pp. 308–313.
- RE-2013-GuillermDS #safety
- A safety requirement engineering method and tool (RG, HD, NS), pp. 328–329.
- RE-2013-ZarghamiVESW #identification #risk management
- Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
- SAC-2013-AlitavoliJE #java #novel #source code
- A novel watermarking method for Java programs (MA, MJ, AE), pp. 1013–1018.
- SAC-2013-BrinkeMBBA #composition #design #energy
- A design method for modular energy-aware software (StB, SM, CB, LB, MA), pp. 1180–1182.
- SAC-2013-BuarqueCA #modelling #requirements
- The role of NFRs when transforming i* requirements models into OO-method models (AB, JC, FMRA), pp. 1305–1306.
- SAC-2013-FanYZ #architecture #framework #modelling #scalability
- A generic framework for deriving architecture modeling methods for large-scale software-intensive systems (ZF, TY, LZ), pp. 1750–1757.
- SAC-2013-KawakamiIYT #communication #data type
- A delivery method considering communication loads for sensor data stream with different collection cycles (TK, YI, TY, YT), pp. 611–618.
- SAC-2013-KinderenP #approach #named
- e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
- SAC-2013-MartinaP #induction #multi #protocol #security #using #verification
- Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
- SAC-2013-MendesW #navigation #realtime #using
- Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
- SAC-2013-SouzaRB #clustering #data access #metric #performance
- Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
- ESEC-FSE-2013-ZervoudakisREF #model checking #verification
- Cascading verification: an integrated method for domain-specific model checking (FZ, DSR, SGE, AF), pp. 400–410.
- ICSE-2013-CotroneoPR #testing
- A learning-based method for combining testing techniques (DC, RP, SR), pp. 142–151.
- ICSE-2013-FitzgeraldSOO #agile #case study #industrial #scalability
- Scaling agile methods to regulated environments: an industry case study (BF, KJS, RO, DO), pp. 863–872.
- ICSE-2013-SamarthyamSSG #assessment #design #industrial #named #quality
- MIDAS: a design quality assessment method for industrial software (GS, GS, TS, SG), pp. 911–920.
- SLE-2013-LammelMV #tool support #wiki
- Method and Tool Support for Classifying Software Languages with Wikipedia (RL, DM, AV), pp. 249–259.
- SPLC-2013-ClementsKSW #strict
- A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
- PPoPP-2013-Chen #algorithm #detection #fault #fault tolerance #named #online
- Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
- CADE-2013-GoreT #logic
- An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description (RG, JT), pp. 275–281.
- CADE-2013-HahnleSB #reuse #verification
- Reuse in Software Verification by Abstract Method Calls (RH, IS, RB), pp. 300–314.
- CAV-2013-StewartEY #automaton #bound #model checking #polynomial #probability
- Upper Bounds for Newton’s Method on Monotone Polynomial Systems, and P-Time Model Checking of Probabilistic One-Counter Automata (AS, KE, MY), pp. 495–510.
- ICST-2013-FarooqQA #effectiveness #empirical #performance #testing
- A Controlled Experiment to Evaluate Effectiveness and Efficiency of Three Software Testing Methods (SUF, SMKQ, NA), pp. 493–494.
- ICST-2013-IchidaSO #testing
- A Method of Making Single Function Tests for Constituting Scenario Tests (NI, TS, HO), pp. 479–480.
- ICST-2013-ShuSPC #fault #locality #named
- MFL: Method-Level Fault Localization with Causal Inference (GS, BS, AP, FC), pp. 124–133.
- ISSTA-2013-Buda #database #generative #testing #using
- Generation of test databases using sampling methods (TSB), pp. 366–369.
- WICSA-ECSA-2012-BassN #architecture #comprehension #evaluation
- Understanding the Context of Architecture Evaluation Methods (LB, RLN), pp. 277–281.
- WICSA-ECSA-2012-KoziolekDGVW #architecture #lightweight #named
- MORPHOSIS: A Lightweight Method Facilitating Sustainable Software Architectures (HK, DD, TG, PV, RJW), pp. 253–257.
- WICSA-ECSA-2012-LytraSZ #architecture #framework #integration #multi
- Architectural Decision Making for Service-Based Platform Integration: A Qualitative Multi-Method Study (IL, SS, UZ), pp. 111–120.
- ASE-2012-MorenoM #automation #identification #java #named
- JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
- CASE-2012-BaekKAYK #case study
- Study on iterative method of electro-hydraulic actuator in force control (SGB, HK, KTA, HGY, JCK), pp. 178–183.
- CASE-2012-KimPLPC #estimation #framework #parametricity
- A parameter estimation method for the bilateral teleoperation framework for an O2 lance manipulator (HK, BP, JL, YJP, WKC), pp. 564–568.
- CASE-2012-KosakiS #architecture #internet
- Control of pneumatic artificial muscles with the just-in-time method based on a client-server architecture via the internet (TK, MS), pp. 980–985.
- CASE-2012-LiZH #realtime
- A practical method for motor imagery based real-time prosthesis control (YNL, XDZ, ZXH), pp. 1052–1056.
- CASE-2012-WeiZW #detection #recognition #research
- Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
- CASE-2012-ZhuSZZ #assessment #kernel #multi
- A novelty degradation assessment method for equipment based on multi-kernel SVDD (YZ, YS, XZ, YZ), pp. 753–756.
- DAC-2012-SunGR #design #nondeterminism #robust
- A new uncertainty budgeting based method for robust analog/mixed-signal design (JS, PG, JMWR), pp. 529–535.
- DAC-2012-SuYZ #named #order #performance #reduction
- AMOR: an efficient aggregating based model order reduction method for many-terminal interconnect circuits (YS, FY, XZ), pp. 295–300.
- DAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
- PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
- DATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
- A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
- DATE-2012-LiuMG #estimation #performance #problem
- A fast analog circuit yield estimation method for medium and high dimensional problems (BL, JM, GGEG), pp. 751–756.
- DATE-2012-LiuTWY #simulation
- A GPU-accelerated envelope-following method for switching power converter simulation (XL, SXDT, HW, HY), pp. 1349–1354.
- DATE-2012-MitraBD #formal method #mining #ranking
- Formal methods for ranking counterexamples through assumption mining (SM, AB, PD), pp. 911–916.
- DATE-2012-ZhangPM #3d #analysis #grid #power management
- Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
- DRR-2012-DaherGEBV #categorisation #recognition
- Unsupervised categorization method of graphemes on handwritten manuscripts: application to style recognition (HD, DG, VE, SB, NV).
- DRR-2012-Obafemi-AjayiAX #classification #documentation
- Ensemble methods with simple features for document zone classification (TOA, GA, BX).
- DRR-2012-WalkerLR #dataset #documentation #image
- A synthetic document image dataset for developing and evaluating historical document processing methods (DDW, WBL, EKR).
- CSEET-2012-Kajko-Mattsson #design #education #re-engineering #source code
- A Method for Designing Software Engineering Educational Programs (MKM), pp. 139–143.
- ITiCSE-2012-MI #algorithm
- A method to construct counterexamples for greedy algorithms (JM, SI), pp. 238–243.
- ITiCSE-2012-SalzerHY #testing
- The scientific method and software testing integrated into the same lesson (HTS, BH, CY), p. 385.
- CSMR-2012-HeinemannBHH #api #recommendation
- Identifier-Based Context-Dependent API Method Recommendation (LH, VB, MH, BH), pp. 31–40.
- CSMR-2012-HottaHK #dependence #graph #identification #refactoring
- Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph (KH, YH, SK), pp. 53–62.
- CSMR-2012-KimKKB #analysis #database
- Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
- ICPC-2012-HottaHIK #named #refactoring
- CRat: A refactoring support tool for Form Template Method (KH, YH, HI, SK), pp. 250–252.
- ICPC-2012-LuciaPOPP #information retrieval #question #source code #using
- Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
- ICSM-2012-BiegelBHD #developer #how #order
- The Order of Things: How developers sort fields and methods (BB, FB, WH, SD), pp. 88–97.
- SAS-2012-ThakurR
- A Generalization of Stålmarck’s Method (AVT, TWR), pp. 334–351.
- STOC-2012-OrecchiaSV #algorithm #approximate #exponential
- Approximating the exponential, the lanczos method and an Õ(m)-time spectral algorithm for balanced separator (LO, SS, NKV), pp. 1141–1160.
- DLT-2012-GiambrunoMNS #bidirectional #finite
- A Generalization of Girod’s Bidirectional Decoding Method to Codes with a Finite Deciphering Delay (LG, SM, JN, CS), pp. 471–476.
- ICALP-v1-2012-AchlioptasM #bound #random #satisfiability
- Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method (DA, RMM), pp. 1–12.
- ICALP-v1-2012-BringmannP #performance
- Efficient Sampling Methods for Discrete Distributions (KB, KP), pp. 133–144.
- ICALP-v1-2012-ShiW #optimisation
- Epsilon-Net Method for Optimizations over Separable States (YS, XW), pp. 798–809.
- ICALP-v2-2012-BroadbentCHS #automaton
- A Saturation Method for Collapsible Pushdown Systems (CHB, AC, MH, OS), pp. 165–176.
- FM-2012-Degani #formal method
- Formal Methods in the Wild: Trains, Planes, & Automobile (AD), p. 6.
- FM-2012-OsaiweranFGR #case study #component #design #experience #formal method #using
- Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
- FM-2012-YangKK #formal method #lightweight #using
- Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
- GRAPHITE-2012-Cormie-Bowins #comparison #gpu #implementation #reachability
- A Comparison of Sequential and GPU Implementations of Iterative Methods to Compute Reachability Probabilities (ECB), pp. 20–34.
- CHI-2012-BabaianLO #collaboration
- Evaluating the collaborative critique method (TB, WTL, MKO), pp. 2137–2164.
- CHI-2012-GhomiFHCB #using
- Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
- CHI-2012-KapteinR #analysis #statistics
- Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
- CHI-2012-ZhangYELBI #lightweight
- See me, see you: a lightweight method for discriminating user touches on tabletop displays (HZ, XDY, BE, HNL, PB, PI), pp. 2327–2336.
- CSCW-2012-PhilipUASGLR #component #reuse
- Software reuse through methodical component reuse and amethodical snippet remixing (KP, MU, MA, SES, REGV, CVL, SR), pp. 1361–1370.
- ICEIS-J-2012-KaragiannisS #approach #design #hybrid #modelling
- An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
- ICEIS-J-2012-NikovskiEYST12a #automation #composition
- Matcher Composition Methods for Automatic Schema Matching (DN, AE, XY, MS, ST), pp. 108–123.
- ICEIS-J-2012-PolasikGWKPT12a #empirical #mobile #performance
- Time Efficiency of Point-of-Sale Payment Methods: Empirical Results for Cash, Cards and Mobile Payments (MP, JG, GW, JK, KP, NT), pp. 306–320.
- ICEIS-v1-2012-CarvalhoBSR #clustering
- Labeling Methods for Association Rule Clustering (VOdC, DSB, FFdS, SOR), pp. 105–111.
- ICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy #using
- A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
- ICEIS-v3-2012-TsudaASO #automation #classification
- A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
- CIKM-2012-BaeK #classification #effectiveness #recommendation
- An effective category classification method based on a language model for question category recommendation on a cQA service (KB, YK), pp. 2255–2258.
- CIKM-2012-ChenPZ #semantics
- A co-training based method for chinese patent semantic annotation (XC, ZP, CZ), pp. 2379–2382.
- CIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
- Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
- CIKM-2012-LiuSJL #web
- An unsupervised method for author extraction from web pages containing user-generated content (JL, XS, JJ, CYL), pp. 2387–2390.
- CIKM-2012-MaFL #database #relational
- A positional access method for relational databases (DM, JF, GL), pp. 2164–2168.
- CIKM-2012-OhY #framework #named
- iSampling: framework for developing sampling methods considering user’s interest (JO, HY), pp. 1667–1671.
- CIKM-2012-RenLZZ #collaboration #performance
- The efficient imputation method for neighborhood-based collaborative filtering (YR, GL, JZ, WZ), pp. 684–693.
- CIKM-2012-XuKZ #generative #timeline #word
- A picture paints a thousand words: a method of generating image-text timelines (SX, LK, YZ), pp. 2511–2514.
- ICML-2012-BalasubramanianL #multi #predict
- The Landmark Selection Method for Multiple Output Prediction (KB, GL), p. 41.
- ICML-2012-DefazioC #collaboration #performance #visual notation
- A Graphical Model Formulation of Collaborative Filtering Neighbourhood Methods with Fast Maximum Entropy Training (AD, TSC), p. 75.
- ICML-2012-DhillonRFU #modelling #using #word
- Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
- ICML-2012-HannahD #design #geometry #programming
- Ensemble Methods for Convex Regression with Applications to Geometric Programming Based Circuit Design (LH, DBD), p. 24.
- ICML-2012-HennigK
- Quasi-Newton Methods: A New Direction (PH, MK), p. 134.
- ICML-2012-RavanbakhshYG #approximate #modelling #visual notation
- A Generalized Loop Correction Method for Approximate Inference in Graphical Models (S(R, CNY, RG), p. 84.
- ICML-2012-WangB #online
- Online Alternating Direction Method (HW, AB), p. 221.
- ICML-2012-XiaoZ #problem
- A Proximal-Gradient Homotopy Method for the L1-Regularized Least-Squares Problem (LX, TZ), p. 160.
- ICPR-2012-AntoniukFH #learning #markov #network
- Learning Markov Networks by Analytic Center Cutting Plane Method (KA, VF, VH), pp. 2250–2253.
- ICPR-2012-FausserS #clustering #dataset #kernel #scalability
- Clustering large datasets with kernel methods (SF, FS), pp. 501–504.
- ICPR-2012-FrouzeshPH #modelling #optimisation
- A combined method for finding best starting points for optimisation in bernoulli mixture models (FF, SP, YH), pp. 1128–1131.
- ICPR-2012-FuLBF
- Spectral correspondence method for fingerprint minutia matching (XF, CL, JB, JF), pp. 1743–1746.
- ICPR-2012-GaoTLW #graph #re-engineering
- A graph-based method of newspaper article reconstruction (LG, ZT, XL, YW), pp. 1566–1569.
- ICPR-2012-GautamSV #performance
- An efficient, bolus-stage based method for motion correction in perfusion weighted MRI (RG, JS, RV), pp. 145–148.
- ICPR-2012-GonzalezBTB #image #recognition
- A character recognition method in natural scene images (ÁG, LMB, JJYT, SB), pp. 621–624.
- ICPR-2012-KangLH #adaptation #image
- Fusing soft-decision-adaptive and bicubic methods for image interpolation (XK, SL, JH), pp. 1043–1046.
- ICPR-2012-KovalenkoS #on the
- On methods for incorporating evidences into posterior scoring of hypotheses (DK, SNS), pp. 577–580.
- ICPR-2012-LiuSZ #feature model #graph
- Sparsity Score: A new filter feature selection method based on graph (ML, DS, DZ), pp. 959–962.
- ICPR-2012-LiuXL #performance #recognition
- An efficient method for occluded face recognition (WL, XX, KML), pp. 2993–2996.
- ICPR-2012-MinagawaKTH #automation #detection
- A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
- ICPR-2012-MoriyamaAS #analysis #using
- Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
- ICPR-2012-ShaoWCHW #array #automation #image
- An improved automatic gridding method for cDNA microarray images (GS, TW, ZC, YH, YW), pp. 1615–1618.
- ICPR-2012-ShivakumaraHZTP #video
- A new Iterative-Midpoint-Method for video character gap filling (PS, DBH, DZ, CLT, UP), pp. 673–676.
- ICPR-2012-SunH #component
- A component-tree based method for user-intention guided text extraction (LS, QH), pp. 633–636.
- ICPR-2012-TajimaIA #3d #correlation #using
- A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
- ICPR-2012-WangUL
- Part-based method on handwritten texts (SW, SU, ML), pp. 339–342.
- ICPR-2012-YangLP #effectiveness
- A simple and effective extrinsic calibration method of a camera and a single line scanning lidar (HY, XL, IP), pp. 1439–1442.
- ICPR-2012-ZangY0JZT #information management
- A score-level fusion method with prior knowledge for fingerprint matching (YZ, XY, KC, XJ, NZ, JT), pp. 2379–2382.
- ICPR-2012-ZhangLC #analysis #detection #multi #novel
- A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
- ICPR-2012-ZhangLMA #detection #independence #statistics
- A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
- ICPR-2012-ZhangW #image #segmentation
- An image fusion method based on region segmentation and Cauchy convolution (YQZ, XJW), pp. 392–395.
- ICPR-2012-ZhangWL #documentation #keyword #online
- A confidence-based method for keyword spotting in online Chinese handwritten documents (HZ, DHW, CLL), pp. 525–528.
- ICPR-2012-ZhaoL #3d #detection
- Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
- ICPR-2012-ZhaoYXJ #learning
- A near-optimal non-myopic active learning method (YZ, GY, XX, QJ), pp. 1715–1718.
- ICPR-2012-Zhu0N #normalisation #recognition
- Discriminative normalization method for handwritten Chinese character recognition (YZ, JS, SN), pp. 274–277.
- KDD-2012-BellalaMALB #power management
- Following the electrons: methods for power management in commercial buildings (GB, MM, MFA, GL, CB), pp. 994–1002.
- KDD-2012-CosciaRGP #community #named
- DEMON: a local-first discovery method for overlapping communities (MC, GR, FG, DP), pp. 615–623.
- KDD-2012-GleichS #community
- Vertex neighborhoods, low conductance cuts, and good seeds for local community methods (DFG, CS), pp. 597–605.
- KDIR-2012-MiaoLWZ #infinity #modelling #process #semantics #topic #wiki
- Infinite Topic Modelling for Trend Tracking — Hierarchical Dirichlet Process Approaches with Wikipedia Semantic based Method (YM, CL, HW, LZ), pp. 35–44.
- KEOD-2012-FernandezVML #fuzzy #named #ontology
- FuzzyAlign — A Fuzzy Method for Ontology Alignment (SF, JRV, IMM, MALC), pp. 98–107.
- KEOD-2012-HenriquesS #framework #ontology
- An Ontology-based Framework for Syndromic Surveillance Method Selection (GH, DAS), pp. 396–400.
- KMIS-2012-HamadaAS #generative #learning #using
- A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
- KMIS-2012-KataokaTKH #information management #network
- An Information Sharing Method for Skilled Management Operations based on Bayesian Network Inference (TK, KT, MK, MH), pp. 257–260.
- KMIS-2012-OtsukiAS #using
- An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
- KMIS-2012-PanTG #analysis #component
- A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
- KMIS-2012-RezendeLBJMRB #framework #information management #modelling
- Modelling and Knowledge Management in the Field of Road Infrastructure Operation and Regulation — Study on the Methods Application in an Organizational Unit (LR, MAL, CRNB, JdLPCJ, LAM, SAR, CAMB), pp. 265–268.
- MLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation #using
- EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
- MLDM-2012-JoenssenB
- Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
- MLDM-2012-StaroszczykOM #analysis #comparative #feature model #recognition
- Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
- RecSys-2012-NingK #linear #recommendation
- Sparse linear methods with side information for top-n recommendations (XN, GK), pp. 155–162.
- RecSys-2012-SchelterBM #pipes and filters #scalability #similarity
- Scalable similarity-based neighborhood methods with MapReduce (SS, CB, VM), pp. 163–170.
- SEKE-2012-ChenCZS #analysis #approach #integration
- A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
- SEKE-2012-GaoKN #feature model #metric
- Stability of Filter-Based Feature Selection Methods for Imbalanced Software Measurement Data (KG, TMK, AN), pp. 74–79.
- SEKE-2012-HuangL
- A Goal-Driven Method for Selecting Issues Used in Agent Negotiation (YCH, AL), pp. 759–762.
- SEKE-2012-HuiLCDM #e-commerce #empirical #recommendation
- An Empirical Study on Recommendation Methods for Vertical B2C E-commerce (CH, JL, ZC, XD, WM), pp. 139–142.
- SEKE-2012-LiLCZJZ #adaptation #continuation #self #verification
- A HybridUML and QdL Based Verification Method for CPS Self-Adaptability (JL, BL, QC, MZ, SJ, XZ), pp. 239–242.
- SEKE-2012-RiveroC #usability #using #web
- Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
- SEKE-2012-SubburajUS #safety #specification
- Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
- SEKE-2012-TanizakiAK #variability
- A Variability Management Method for Software Configuration Files (HT, TA, TK), pp. 672–677.
- SIGIR-2012-BerardiES #automation #classification #ranking
- A utility-theoretic ranking method for semi-automated text classification (GB, AE, FS), pp. 961–970.
- SIGIR-2012-CareniniM #mining
- Methods for mining and summarizing text conversations (GC, GM), pp. 1178–1179.
- SIGIR-2012-MetzlerK #information retrieval
- Experimental methods for information retrieval (DM, OK), pp. 1185–1186.
- SIGIR-2012-WeiLZMRZ #novel #web
- Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
- ECMFA-2012-QureshiCT #constraints #specification
- A Timed Automata-Based Method to Analyze EAST-ADL Timing Constraint Specifications (TNQ, DJC, MT), pp. 303–318.
- TOOLS-EUROPE-J-2011-SchwarzLN12 #fine-grained #named
- Seuss: Decoupling responsibilities from static methods for fine-grained configurability (NS, ML, ON), pp. 1–23.
- OOPSLA-2012-CousotCLB #abstract interpretation #contract #framework #refactoring
- An abstract interpretation framework for refactoring with application to extract methods with contracts (PC, RC, FL, MB), pp. 213–232.
- OOPSLA-2012-HuangMDE
- Reim & ReImInfer: checking and inference of reference immutability and method purity (WH, AM, WD, MDE), pp. 879–896.
- TOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #privacy #social
- Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
- TOOLS-EUROPE-2012-OlszakBJV #detection #quantifier
- Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
- TOOLS-EUROPE-2012-VranyKG #performance #smalltalk
- Efficient Method Lookup Customization for Smalltalk (JV, JK, CG), pp. 124–139.
- QAPL-2012-GazeauMP #analysis #float #robust #source code
- A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
- REFSQ-2012-BeckersFKS #identification
- A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
- REFSQ-2012-TekaCS #bibliography
- A Systematic Literature Review on Service Description Methods (AYT, NCF, BS), pp. 239–255.
- SAC-2012-ChenNX #collaboration #recommendation
- A common neighbour based two-way collaborative recommendation method (LC, RN, YX), pp. 214–215.
- SAC-2012-GrooteOW #case study #experience #formal method
- Experience report on developing the Front-end client unit under the control of formal methods (JFG, AO, JHW), pp. 1183–1190.
- SAC-2012-IkemotoDO #pseudo #reliability
- Estimating software reliability via pseudo maximum likelihood method (SI, TD, HO), pp. 1171–1176.
- SAC-2012-LiuHHYS #multi #performance
- An application of circumscribed circle filter in the Multi-Stencils Fast Marching method (HL, CCH, HH, MY, ES), pp. 33–38.
- SAC-2012-MaruhashiTT #identification
- A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
- SAC-2012-OtaMSA #dependence #flexibility #functional #named
- C-Mapping: a flexible XML-RDB mapping method based on functional and inclusion dependencies (SO, AM, NS, TA), pp. 834–839.
- SAC-2012-RajeDFRR #data access #implementation #ontology #using
- Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
- SAC-2012-TeymooriKY #fault tolerance #network #realtime
- A real-time data aggregation method for fault-tolerant wireless sensor networks (PT, MK, NY), pp. 605–612.
- SAC-2012-YuHJSLH #novel #programming #segmentation
- A novel segmentation method for convex lesions based on dynamic programming with local intra-class variance (MY, QH, RJ, ES, HL, CCH), pp. 39–44.
- FSE-2012-HuangM #java #named
- ReImInfer: method purity inference for Java (WH, AM), p. 38.
- ICSE-2012-DangWZZN #clustering #named #similarity #stack
- ReBucket: A method for clustering duplicate crash reports based on call stack similarity (YD, RW, HZ, DZ, PN), pp. 1084–1093.
- ICSE-2012-PanditaXZXOP #api #natural language #specification
- Inferring method specifications from natural language API descriptions (RP, XX, HZ, TX, SO, AMP), pp. 815–825.
- ICSE-2012-SingerS #re-engineering #social #using
- Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
- PLEASE-2012-ShimbaraWKKO #testing
- Feature-analysis-based selection method for system configuration for system testing (DS, HW, SK, MK, HO), pp. 61–64.
- SPLC-2012-Heymans #formal method
- Formal methods for the masses (PH), p. 4.
- CC-2012-HouVQJFV
- A New Method for Program Inversion (CH, GV, DJQ, DJ, RF, RWV), pp. 81–100.
- CGO-2012-AnsaloniBHC #multi #program analysis
- Deferred methods: accelerating dynamic program analysis on multicores (DA, WB, AH, LYC), pp. 242–251.
- CAV-2012-ChuJ #reduction #safety #symmetry #verification
- A Complete Method for Symmetry Reduction in Safety Verification (DHC, JJ), pp. 616–633.
- CAV-2012-ThakurR #symbolic computation
- A Method for Symbolic Computation of Abstract Operations (AVT, TWR), pp. 174–192.
- ICST-2012-EndoS #comparison #finite #generative #state machine #testing
- Experimental Comparison of Test Case Generation Methods for Finite State Machines (ATE, AdSS), pp. 549–558.
- ICST-2012-GrooteOW #formal method #using
- Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
- ICST-2012-Kapfhammer #database #testing #towards
- Towards a Method for Reducing the Test Suites of Database Applications (GMK), pp. 964–965.
- ICST-2012-KuhnHLKL #combinator #sequence #testing
- Combinatorial Methods for Event Sequence Testing (DRK, JMH, JL, RK, YL), pp. 601–609.
- ICTSS-2012-ChenV #protocol #testing
- Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
- SAT-2012-DemirovicG #composition #performance #satisfiability
- An Efficient Method for Solving UNSAT 3-SAT and Similar Instances via Static Decomposition — (Poster Presentation) (ED, HG), pp. 489–490.
- CBSE-2011-DistefanoFGM #analysis #composition #multi #reliability #workflow
- A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
- CBSE-2011-InoueH #analysis #component #data flow
- A method for data-flow analysis of business components (TI, SH), pp. 51–60.
- ECSA-2011-MullerKG #architecture
- A Question-Based Method for Deriving Software Architectures (MM, BK, MG), pp. 35–42.
- ECSA-2011-Naab #architecture #design #flexibility #information management
- Enhancing Architecture Design Methods for Improved Flexibility in Long-Living Information Systems (MN), pp. 194–198.
- WICSA-2011-PetrovBN #analysis #architecture #design #enterprise #multi
- The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
- WICSA-2011-RosS #architecture
- A Method for Evidence-Based Architecture Discovery (JPR, RSS), pp. 342–345.
- ASE-2011-HillPV #code search #natural language #source code
- Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
- CASE-2011-AranovskiyBB #identification #metric
- The method of identification for the “motor-dual-section device” system through output signal measurements (SA, AAB, VB), pp. 346–350.
- CASE-2011-CaoPW #scheduling
- A drum-buffer-rope based scheduling method for semiconductor manufacturing system (ZC, YP, YW), pp. 120–125.
- CASE-2011-LeonardoKKDS #monitoring #simulation
- Simulation of a hydraulic pump application for monitoring and diagnosis methods (DL, SK, AKH, AD, RS), pp. 341–345.
- CASE-2011-LiTL #process
- A GERT-based analytical method for remanufacturing process routing (CL, YT, CL), pp. 462–467.
- CASE-2011-PurwinsNBHKLPW #predict
- Regression methods for prediction of PECVD Silicon Nitride layer thickness (HP, AN, BB, UH, AK, BL, GP, KW), pp. 387–392.
- CASE-2011-WuS #bound #multi #problem
- A lower and upper bound guided nested partitions method for solving capacitated multi-level production planning problems (TW, LS), pp. 78–83.
- CASE-2011-ZanasiC #design #visual notation
- Direct method for digital lead-lag design: analytical and graphical solutions (RZ, SC), pp. 804–809.
- DAC-2011-HochmanBW #empirical #reduction
- A stabilized discrete empirical interpolation method for model reduction of electrical, thermal, and microelectromechanical systems (AH, BNB, JKW), pp. 540–545.
- DAC-2011-HsiaoD #bound #parallel #scalability
- A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
- DAC-2011-MillerBHDCB #analysis #testing #validation
- A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
- DAC-2011-ZhaoF #3d #gpu #parallel #performance
- Fast multipole method on GPU: tackling 3-D capacitance extraction on massively parallel SIMD platforms (XZ, ZF), pp. 558–563.
- DATE-2011-AadithyaDVR #modelling #named #random #simulation
- SAMURAI: An accurate method for modelling and simulating non-stationary Random Telegraph Noise in SRAMs (KVA, AD, SV, JSR), pp. 1113–1118.
- DATE-2011-BonannoBS #analysis #energy #modelling #monitoring #optimisation #tool support
- Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
- DATE-2011-ErbP #analysis #performance
- A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
- DATE-2011-KaraklajicFSV #detection #fault #low cost #using
- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
- DATE-2011-KeezerG #synthesis
- Two methods for 24 Gbps test signal synthesis (DCK, CEG), pp. 579–582.
- DATE-2011-LiuS #continuation #optimisation #performance
- An efficient mask optimization method based on homotopy continuation technique (FL, XS), pp. 1053–1058.
- DATE-2011-PanHHL #effectiveness
- A cost-effective substantial-impact-filter based method to tolerate voltage emergencies (SP, YH, XH, XL), pp. 311–315.
- DATE-2011-RekikADMN #development #evaluation
- An electrical test method for MEMS convective accelerometers: Development and evaluation (AAR, FA, ND, FM, PN), pp. 806–811.
- DATE-2011-ShinG #fault
- A new circuit simplification method for error tolerant applications (DS, SKG), pp. 1566–1571.
- DATE-2011-Sifakis #component #design #tool support
- Methods and tools for component-based system design (JS), p. 1022.
- DATE-2011-SommerKHSS #automation #design #generative #network
- A new method for automated generation of compensation networks — The EDA Designer Finger (RS, DK, EH, ES, CS), pp. 1666–1672.
- DATE-2011-VasicekS #optimisation
- A global postsynthesis optimization method for combinational circuits (ZV, LS), pp. 1525–1528.
- DATE-2011-YehHWL #framework #simulation
- Speeding Up MPSoC virtual platform simulation by Ultra Synchronization Checking Method (YFY, CYH, CAW, HCL), pp. 353–358.
- DATE-2011-YuH #fault #logic
- Trigonometric method to handle realistic error probabilities in logic circuits (CCY, JPH), pp. 64–69.
- DocEng-2011-CardosoJLRC #independence #performance
- An efficient language-independent method to extract content from news webpages (ETC, IVJ, ESL, RR, PC), pp. 121–128.
- DRR-2011-Dejean
- Unsupervised method to generate page templates (HD), pp. 1–10.
- DRR-2011-FujiiTTH #keyword #retrieval #robust
- Robust keyword retrieval method for OCRed text (YF, HT, HT, YH), pp. 1–10.
- DRR-2011-LemaitreCC #segmentation
- A perceptive method for handwritten text segmentation (AL, JC, BC), pp. 1–10.
- DRR-2011-Rodriguez-PineiroAPM #documentation #image
- A new method for perspective correction of document images (JRP, PCA, FPG, AMG), pp. 1–10.
- DRR-2011-SmithDL #documentation
- A mask-based enhancement method for historical documents (EHBS, JD, LLS), pp. 1–10.
- DRR-2011-SuPD #recognition
- SemiBoost-based Arabic character recognition method (BS, LP, XD), pp. 1–10.
- ICDAR-2011-AlmazanFV #feature model #recognition
- A Non-rigid Feature Extraction Method for Shape Recognition (JA, AF, EV), pp. 987–991.
- ICDAR-2011-ClausnerPA11a #analysis #documentation #evaluation #layout #performance
- Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
- ICDAR-2011-FangGBQTT #detection #documentation #multi #visual notation
- A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
- ICDAR-2011-GaoDL #documentation #multi #segmentation
- A Multi-scale Text Line Segmentation Method in Freestyle Handwritten Documents (YG, XD, CL), pp. 643–647.
- ICDAR-2011-GaoWJ #2d #optimisation #recognition
- A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition (XG, WW, LJ), pp. 232–236.
- ICDAR-2011-KurbielKE #analysis #component #independence #novel #preprocessor
- A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
- ICDAR-2011-LiangWS #image #segmentation
- A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther (YL, YW, ES), pp. 247–251.
- ICDAR-2011-LiuLZL #detection #image #novel
- A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
- ICDAR-2011-LiuZLL #clustering #image #locality
- A Chinese Character Localization Method Based on Intergrating Structure and CC-Clustering for Advertising Images (JL, SZ, HL, WL), pp. 1044–1048.
- ICDAR-2011-LuangvilayZN #online
- An On-line Handwritten Text Search Method Based on Directional Feature Matching (PL, BZ, MN), pp. 683–686.
- ICDAR-2011-ManoharVCPN #clustering #graph #segmentation
- Graph Clustering-Based Ensemble Method for Handwritten Text Line Segmentation (VM, SNPV, HC, RP, PN), pp. 574–578.
- ICDAR-2011-NavonKO
- Enhanced Active Contour Method for Locating Text (YN, VK, BO), pp. 222–226.
- ICDAR-2011-PhamDB #detection
- A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
- ICDAR-2011-PhanSST #segmentation #video
- A Gradient Vector Flow-Based Method for Video Character Segmentation (TQP, PS, BS, CLT), pp. 1024–1028.
- ICDAR-2011-RajendranSSLT #recognition #video #word
- A New Fourier-Moments Based Video Word and Character Extraction Method for Recognition (DR, PS, BS, SL, CLT), pp. 1165–1169.
- ICDAR-2011-RenLC #automation #recognition #retrieval #segmentation
- A New Method on the Segmentation and Recognition of Chinese Characters for Automatic Chinese Seal Imprint Retrieval (CR, DL, YC), pp. 972–976.
- ICDAR-2011-RusinolATL #documentation #word
- Browsing Heterogeneous Document Collections by a Segmentation-Free Word Spotting Method (MR, DA, RT, JL), pp. 63–67.
- ICDAR-2011-ShaoWXZZ11a #learning #multi
- Multiple Instance Learning Based Method for Similar Handwritten Chinese Characters Discrimination (YS, CW, BX, RZ, YZ), pp. 1002–1006.
- ICDAR-2011-ShivakumaraBSTP #recognition #segmentation #video
- A New Gradient Based Character Segmentation Method for Video Text Recognition (PS, SB, BS, CLT, UP), pp. 126–130.
- ICDAR-2011-SilvaL #automation #documentation #recognition
- An Automatic Method for Enhancing Character Recognition in Degraded Historical Documents (GPeS, RDL), pp. 553–557.
- ICDAR-2011-SongUL11a #case study #comparative #recognition
- Comparative Study of Part-Based Handwritten Character Recognition Methods (WS, SU, ML), pp. 814–818.
- ICDAR-2011-TanakaTH #documentation #optimisation #robust
- Robust Cell Extraction Method for Form Documents Based on Intersection Searching and Global Optimization (HT, HT, YH), pp. 354–358.
- ICDAR-2011-TerasawaSK #image #performance
- A Fast Appearance-Based Full-Text Search Method for Historical Newspaper Images (KT, TS, TK), pp. 1379–1383.
- ICDAR-2011-WangHL #embedded #novel #segmentation
- A Novel Method for Embedded Text Segmentation Based on Stroke and Color (XW, LH, CL), pp. 151–155.
- ICDAR-2011-WeiGB #word
- A Method for Removing Inflectional Suffixes in Word Spotting of Mongolian Kanjur (HW, GG, YB), pp. 88–92.
- ICDAR-2011-XuDPL #grid #independence #recognition
- An Improved Method Based on Weighted Grid Micro-structure Feature for Text-Independent Writer Recognition (LX, XD, LP, XL), pp. 638–642.
- ICDAR-2011-ZhangL #keyword #online
- A Lattice-Based Method for Keyword Spotting in Online Chinese Handwriting (HZ, CLL), pp. 1064–1068.
- ICDAR-2011-ZhangLYDW #random #recognition #using
- An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
- ICDAR-2011-ZhaoLL #detection #independence #robust
- A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
- ICDAR-2011-ZhuN11a #classification #online #recognition #scalability
- A Coarse Classifier Construction Method from a Large Number of Basic Recognizers for On-line Recognition of Handwritten Japanese Characters (BZ, MN), pp. 1090–1094.
- ICDAR-2011-ZhuN11b #online #recognition #using
- Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
- SIGMOD-2011-LiTP #named #sequence
- WHAM: a high-throughput sequence alignment method (YL, AT, JMP), pp. 445–456.
- VLDB-2012-LiDWF11 #named #similarity
- PASS-JOIN: A Partition-based Method for Similarity Joins (GL, DD, JW, JF), pp. 253–264.
- CSEET-2011-AndrianoMBR #assessment
- A quantitative assessment method for simulation-based e-learnings (NA, MGM, CB, DR), pp. 159–168.
- CSEET-2011-ChenZL #education #testing
- Teaching software testing methods based on diversity principles (ZC, JZ, BL), pp. 391–395.
- CSEET-2011-ChookittikulMK #agile #education
- Agile methods in Thai higher education and beyond (WC, PEM, JLK), p. 557.
- CSEET-2011-John #assessment #re-engineering #usability
- A quantitative usability assessment method for inclusion in software engineering courses (BEJ), pp. 537–539.
- CSEET-2011-LuLL #analysis #using
- Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
- CSEET-2011-MacekK #development #student
- The practical method of motivating students to iterative software development (OM, MK), pp. 512–516.
- ITiCSE-2011-VihavainenPLK #scalability
- Extreme apprenticeship method: key practices and upward scalability (AV, MP, ML, JK), pp. 273–277.
- ESOP-2011-JimM #parsing
- A New Method for Dependent Parsing (TJ, YM), pp. 378–397.
- ICPC-2011-SridharaPV #generative #parametricity #summary
- Generating Parameter Comments and Integrating with Method Summaries (GS, LLP, KVS), pp. 71–80.
- ICSM-2011-Demeyer #research
- Research methods in computer science (SD), p. 600.
- ICSM-2011-Dragan #object-oriented
- Emergent laws of method and class stereotypes in object oriented software (ND), pp. 550–555.
- ICSM-2011-GethersOPL #information retrieval #on the #orthogonal #traceability
- On integrating orthogonal information retrieval methods to improve traceability recovery (MG, RO, DP, ADL), pp. 133–142.
- ICSM-2011-GrooteOW #development #formal method #industrial
- Analyzing the effects of formal methods on the development of industrial control software (JFG, AO, JHW), pp. 467–472.
- ICSM-2011-HouP #api #code completion #evaluation #sorting
- An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
- ICSM-2011-KhadkaRSJH #legacy #migration
- A method engineering based legacy to SOA migration method (RK, GR, AS, SJ, JH), pp. 163–172.
- ICSM-2011-KuhnK #combinator #detection #fault #testing
- Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
- WCRE-2011-WangPV #automation #readability #segmentation
- Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
- ICALP-v1-2011-Zhang #bound #communication #complexity #on the #power of #quantum
- On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity (SZ), pp. 49–60.
- FM-2011-BowenR #case study #community #formal method
- From a Community of Practice to a Body of Knowledge: A Case Study of the Formal Methods Community (JPB, SR), pp. 308–322.
- SEFM-2011-EggersRNF #analysis #hybrid #satisfiability
- Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
- SEFM-2011-Hermanns #energy #formal method
- Formal Methods in Energy Informatics (HH), pp. 1–2.
- SEFM-2011-Metayer #formal method
- Formal Methods as a Link between Software Code and Legal Rules (DLM), pp. 3–18.
- CHI-2011-BrownRS #challenge
- Into the wild: challenges and opportunities for field trial methods (BB, SR, SS), pp. 1657–1666.
- CHI-2011-DixonLF #interface #reverse engineering
- Content and hierarchy in pixel-based methods for reverse engineering interface structure (MD, DL, JF), pp. 969–978.
- CHI-2011-EllingLJ #eye tracking #using
- Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
- CHI-2011-GerkenJZMR #api #concept #usability
- The concept maps method as a tool to evaluate the usability of APIs (JG, HCJ, MZ, MM, HR), pp. 3373–3382.
- CHI-2011-QuinnCRD #cost analysis #multi #on the
- On the costs of multiple trajectory pointing methods (PQ, AC, KJR, JD), pp. 859–862.
- CHI-2011-WacharamanothamHMKSB
- Evaluating swabbing: a touchscreen input method for elderly users with tremor (CW, JH, AM, MK, CMS, JOB), pp. 623–626.
- DHM-2011-FangF #automation
- An Automatic Method for Computerized Head and Facial Anthropometry (JJF, SYF), pp. 12–21.
- DHM-2011-GraggYB #modelling #re-engineering #simulation
- Posture Reconstruction Method for Mapping Joint Angles of Motion Capture Experiments to Simulation Models (JG, J(Y, RB), pp. 69–78.
- DUXU-v1-2011-AnderssonBORT #industrial
- To Develop Viable Human Factors Engineering Methods for Improved Industrial Use (JA, LOB, ALO, MJR, ST), pp. 355–362.
- DUXU-v1-2011-DinetVB #community #design #difference #towards
- Towards Future Methods to Take into Account Cross-Cultural Differences in Design: An Example with the “Expert Community Staff” (ECS) (JD, RV, EB), pp. 53–61.
- DUXU-v1-2011-FunadaIFS #effectiveness
- Studies on Imaging Methods to Realize Effective BCI through ERPs (MFF, YI, TF, MS), pp. 228–236.
- DUXU-v1-2011-Hsu #case study #design #interface
- A Study of Interface Design Method on Crossing Media-Dimension (HPH), pp. 247–255.
- DUXU-v2-2011-BohmSW11a #adaptation #constraints #usability
- Customized Usability Engineering for a Solar Control Unit: Adapting Traditional Methods to Domain and Project Constraints (PB, TS, CW), pp. 109–117.
- DUXU-v2-2011-MatsumotoINI #biology
- An Air Conditioning Control Method Based on Biological Fluctuation (HM, YI, YN, HI), pp. 608–615.
- DUXU-v2-2011-TengC #concept #design
- The Application of the Concept of Affordance to a Creative Design Method (CKT, MCC), pp. 215–224.
- HCD-2011-ChouC #interactive #physics
- Investigating Users’ Interaction with Physical Products Applying Qualitative and Quantitative Methods (CJC, CC), pp. 3–12.
- HCD-2011-GoreHHBM #approach #modelling #performance
- A Methodical Approach for Developing Valid Human Performance Models of Flight Deck Operations (BFG, BLH, NH, DLB, EM), pp. 379–388.
- HCD-2011-HoriKK #testing #usability
- Investigation of Indirect Oral Operation Method for Think Aloud Usability Testing (MH, YK, TK), pp. 38–46.
- HCD-2011-KondoK #design
- Consideration of HCD Methods for Service Innovation Design (AK, NK), pp. 74–80.
- HCD-2011-Yamaoka #design #evaluation
- A Proposal of Service Design Evaluation Method (TY), pp. 153–159.
- HCD-2011-Yamazaki #idea
- Idea Creation Method for HCD (KY), pp. 160–165.
- HCD-2011-YanagidaUGTHY #design
- Vision-Proposal Design Method (KY, YU, KG, KT, SH, KY), pp. 166–174.
- HCI-DDA-2011-ChiangT #design #education #interactive
- Interaction Design Teaching Method Design (CWC, KT), pp. 45–53.
- HCI-DDA-2011-HeL #graph #image #modelling #segmentation
- An Image Segmentation Method for Chinese Paintings by Combining Deformable Models with Graph Cuts (NH, KL), pp. 571–579.
- HCI-DDA-2011-MiyazakiNI #detection #image
- A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
- HCI-ITE-2011-KimiokaST #multi #using
- Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
- HCI-ITE-2011-KimRH #detection #multi #recognition
- A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
- HCI-ITE-2011-OkamotoYW #using #visual notation
- A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
- HCI-MIIE-2011-AoyagiOIS #behaviour #communication
- Proposal of a Method for Promotion of Continuous Pro-Environmental Behavior with Easy Communication (SA, TO, HI, HS), pp. 465–473.
- HCI-MIIE-2011-ShibuyaNM #diagrams #documentation #float #mobile #performance
- An Efficient Document Browsing Method with Floating Diagram Window on Mobile Device (YS, KN, KM), pp. 101–106.
- HCI-UA-2011-IshidaNKOT #word
- Therapeutic Category Improvement Method Based on the Words Appearing in Effect-Efficacy Description (HI, KN, MK, MO, FT), pp. 174–181.
- HCI-UA-2011-ItoIN #bias #information management #parametricity #using
- Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
- HCI-UA-2011-KanekoN #evaluation #simulation
- Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation (RK, YN), pp. 346–353.
- HCI-UA-2011-YajimaT #collaboration #learning
- Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT), pp. 113–120.
- HIMI-v1-2011-GuoPS #axiom #concept #evaluation #usability
- A Conceptual Model of the Axiomatic Usability Evaluation Method (YG, RWP, GS), pp. 93–102.
- HIMI-v1-2011-MikiHY #visualisation
- Methods for Service Sciences from Visualization Points (HM, NH, SY), pp. 231–238.
- HIMI-v2-2011-HosonoIMSNTY
- Service Science Method to Create Pictograms Referring to Sign Languages (NH, HI, HM, MS, YN, YT, SY), pp. 123–130.
- HIMI-v2-2011-NguyenBRHVSB #how #multi
- How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
- EDOC-2011-FakhfakhVP #multi #quality
- Multi-criteria Decision Making Method for Quality of Service Aggregation (NF, HV, FP), pp. 203–212.
- ICEIS-v1-2011-AbramoviciJ #industrial #monitoring
- A New Method for Monitoring Industrial Product-service Systems based on BSC and AHP (MA, FJ), pp. 190–196.
- ICEIS-v1-2011-GongG #evaluation #internet #performance #research
- Research on the Evaluation Index System and Method for Intelligent Performance of Smart Space based on Internet of Things Technology (XG, TG), pp. 301–307.
- ICEIS-v1-2011-Li #image #lifecycle #locality #novel
- A Novel Method for Dynamic Image Localization of Tourism Destination based on Butler Life Cycle Theory (CL), pp. 473–476.
- ICEIS-v1-2011-LiX
- A Method of Adjusting the Number of Replica Dynamically in HDFS (BL, KX), pp. 529–533.
- ICEIS-v1-2011-LuoS #network #novel
- A Novel Service Routing Method in a Service-oriented Network (XL, JS), pp. 560–563.
- ICEIS-v1-2011-XiaoXYZ #case study
- Study on Developing Warehouse Receipt Hypothecation Financing Method in China (XX, SX, CY, ZZ), pp. 295–300.
- ICEIS-v1-2011-ZhuXP
- A Differentiated Service based Content Distribution Method in CDN (BZ, KX, RP), pp. 576–579.
- ICEIS-v2-2011-JiananDF #summary
- Summary of LASSO and Relative Methods (XJ, SD, XF), pp. 131–134.
- ICEIS-v3-2011-DuLD #comparison #modelling
- Comparison Between the Business Modelling Methods Provided by MEASUR and RUP (HD, TL, DD), pp. 432–438.
- ICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
- Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
- ICEIS-v3-2011-LazarteVCTI #design #integration #modelling #process
- An MDA-based Method for Designing Integration Process Models in B2B Collaborations (IML, PDV, OC, LHT, CI), pp. 55–65.
- ICEIS-v3-2011-Li11c #identification #performance
- An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
- ICEIS-v3-2011-ZhouL #analysis #metric
- A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
- ICEIS-v4-2011-MartinsP #implementation #visual notation
- A Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users (LCGM, BEP), pp. 287–290.
- CIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
- A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
- CIKM-2011-HofmannWR #probability
- A probabilistic method for inferring preferences from clicks (KH, SW, MdR), pp. 249–258.
- CIKM-2011-JameelLYC #ranking
- An unsupervised ranking method based on a technical difficulty terrain (SJ, WL, CmAY, SC), pp. 1989–1992.
- CIKM-2011-LiaoLCW #named #performance
- KLEAP: an efficient cleaning method to remove cross-reads in RFID streams (GL, JL, LC, CW), pp. 2209–2212.
- CIKM-2011-MagdyJ #performance #using
- An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
- CIKM-2011-ParkSBY #distance #nearest neighbour #query
- k-Nearest neighbor query processing method based on distance relation pattern (YP, DS, KB, JY), pp. 2413–2416.
- CIKM-2011-PimentelCS #clustering #data-driven #database #kernel #metric
- A partitioning method for symbolic interval data based on kernelized metric (BAP, AFBFdC, RMCRdS), pp. 2189–2192.
- CIKM-2011-XuSPZ #kernel #named #performance
- TAKES: a fast method to select features in the kernel space (YX, FS, WP, JZ), pp. 683–692.
- CIKM-2011-YanWN #adaptation #performance
- Efficient methods for finding influential locations with adaptive grids (DY, RCWW, WN), pp. 1475–1484.
- ECIR-2011-BelloginWC #collaboration #ranking #retrieval
- Text Retrieval Methods for Item Ranking in Collaborative Filtering (AB, JW, PC), pp. 301–306.
- ECIR-2011-KeikhaGC #feedback #named
- TEMPER: A Temporal Relevance Feedback Method (MK, SG, FC), pp. 436–447.
- ECIR-2011-LiSD #ambiguity #wiki #word
- A Generalized Method for Word Sense Disambiguation Based on Wikipedia (CL, AS, AD), pp. 653–664.
- ECIR-2011-NeumayerMN #categorisation #feature model
- Combination of Feature Selection Methods for Text Categorisation (RN, RM, KN), pp. 763–766.
- ICML-2011-GermainLLMS #approach #kernel
- A PAC-Bayes Sample-compression Approach to Kernel Methods (PG, AL, FL, MM, SS), pp. 297–304.
- ICML-2011-JimenezS #performance
- Fast Newton-type Methods for Total Variation Regularization (ÁBJ, SS), pp. 313–320.
- ICML-2011-LeeW #identification #learning #online #probability
- Manifold Identification of Dual Averaging Methods for Regularized Stochastic Online Learning (SL, SJW), pp. 1121–1128.
- ICML-2011-LeNCLPN #learning #on the #optimisation
- On optimization methods for deep learning (QVL, JN, AC, AL, BP, AYN), pp. 265–272.
- KDD-2011-HsiehD #coordination #matrix #performance
- Fast coordinate descent methods with variable selection for non-negative matrix factorization (CJH, ISD), pp. 1064–1072.
- KDIR-2011-ArmengolP #case study #classification #information management #lazy evaluation #learning
- Combining Two Lazy Learning Methods for Classification and Knowledge Discovery — A Case Study for Malignant Melanoma Diagnosis (EA, SP), pp. 200–207.
- KDIR-2011-MohammadzadehGSN #documentation #web
- Extracting the Main Content of Web Documents based on a Naive Smoothing Method (HM, TG, FS, GN), pp. 470–475.
- KDIR-2011-OlegA #analysis #approach #clustering
- Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
- KDIR-2011-ShishiboriLK #metric
- An Improved Method to Select Candidates on Metric Index VP-tree (MS, SSL, KK), pp. 314–319.
- KDIR-2011-VanetikG #mining #named
- HashMax: A New Method for Mining Maximal Frequent Itemsets (NV, EG), pp. 140–145.
- KEOD-2011-AarnioSK #industrial #lightweight #semantics
- A Lightweight Element Matching Method for Industrial Terminology Harmonization — Exploiting Minimal Semantics based on Naming Conventions (PA, SS, KK), pp. 390–395.
- KEOD-2011-FrikhDO #hybrid #ontology #web
- A Hybrid Method for Domain Ontology Construction from the Web (BF, ASD, BO), pp. 285–292.
- KEOD-2011-OkumuraH #concept #using
- A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
- KMIS-2011-RamosSB #process
- A Method for Discovering the Relevance of External Context Variables to Business Processes (ECR, FMS, FAB), pp. 399–408.
- KMIS-2011-SaharkhizS #multi #network #privacy #social
- A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
- MLDM-2011-JoutsijokiJ #classification #image
- Comparing the One-vs-One and One-vs-All Methods in Benthic Macroinvertebrate Image Classification (HJ, MJ), pp. 399–413.
- RecSys-2011-KnijnenburgRW #how #interactive #recommendation
- Each to his own: how different users call for different interaction methods in recommender systems (BPK, NJMR, MCW), pp. 141–148.
- RecSys-2011-TakacsPT #collaboration #feedback
- Applications of the conjugate gradient method for implicit feedback collaborative filtering (GT, IP, DT), pp. 297–300.
- SEKE-2011-LiJ #classification #ontology
- An Ontology based Method for Building Understandable Hierarchical Classification Structure for Software Assets Browsing (GL, ZJ), pp. 521–526.
- SEKE-2011-SunHGZWY #detection #novel #petri net #using
- A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
- SIGIR-2011-AlonsoL #crowdsourcing #information retrieval
- Crowdsourcing for information retrieval: principles, methods, and applications (OA, ML), pp. 1299–1300.
- SIGIR-2011-EfronG #estimation #ranking
- Estimation methods for ranking recent information (ME, GG), pp. 495–504.
- SIGIR-2011-FernandesMSRA #web
- A site oriented method for segmenting web pages (DFdO, ESdM, ASdS, BARN, EBA), pp. 215–224.
- SIGIR-2011-HanSZ #graph #web
- Collective entity linking in web text: a graph-based method (XH, LS, JZ), pp. 765–774.
- SIGIR-2011-HeHS
- A weighted curve fitting method for result merging in federated search (CH, DH, LS), pp. 1177–1178.
- SIGIR-2011-KanhabuaN11a #comparison #ranking
- A comparison of time-aware ranking methods (NK, KN), pp. 1257–1258.
- SIGIR-2011-MartinHRF #music #retrieval #towards
- Towards an indexing method to speed-up music retrieval (BM, PH, MR, PF), pp. 1167–1168.
- SIGIR-2011-TangLWWL #ambiguity #graph #network #social
- A bipartite graph based social network splicing method for person name disambiguation (JT, QL, TW, JW, WL), pp. 1233–1234.
- OOPSLA-2011-ThummalapentaXTHS #sequence #testing
- Synthesizing method sequences for high-coverage testing (ST, TX, NT, JdH, ZS), pp. 189–206.
- GPCE-2011-SlattenKH #automation #case study #distributed #generative #industrial #reliability #specification #towards #validation #verification
- Towards automatic generation of formal specifications to validate and verify reliable distributed systems: a method exemplified by an industrial case study (VS, FAK, PH), pp. 147–156.
- RE-2011-FranqueiraTYWN #security
- Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
- RE-2011-UbayashiKHT #analysis #bound #embedded
- A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
- SAC-2011-AlencarRB #composition #evaluation #human-computer #hybrid
- Composition of HCI evaluation methods for hybrid virtual environments (MFCA, ABR, SDJB), pp. 1237–1244.
- SAC-2011-DumasDBB #partial order #verification
- Application of partial-order methods for the verification of closed-loop SDL systems (XD, PD, FB, EB), pp. 1666–1673.
- SAC-2011-EcharteACVL #classification #folksonomy
- A method for the classification of folksonomy resources (FE, JJA, AC, JEV, AL), pp. 1675–1680.
- SAC-2011-ElahiY #analysis #heuristic #metric #requirements #trade-off
- Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
- SAC-2011-LinCL #data-driven #navigation
- Service-oriented dynamic data driven application systems to potential field method vehicle navigation (SYL, KMC, CCL), pp. 462–467.
- SAC-2011-RosaGO #problem #quality #satisfiability
- Optimal stopping methods for finding high quality solutions to satisfiability problems with preferences (EDR, EG, BO), pp. 901–906.
- SAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
- Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
- SAC-2011-YatakaTTT #smarttech
- A context-aware audio presentation method in wearable computing (SY, KT, TT, MT), pp. 405–412.
- GTTSE-2011-MikhaielTNSX #difference #modelling #uml
- Differencing UML Models: A Domain-Specific vs. a Domain-Agnostic Method (RM, NT, NN, ES, ZX), pp. 159–196.
- ICSE-2011-OBrienGG #framework #metric
- A method for selecting SOA pilot projects including a pilot metrics framework (LO, JG, JG), pp. 653–662.
- ICSE-2011-OlivetoGBPL #identification #smell
- Identifying method friendships to remove the feature envy bad smell (RO, MG, GB, DP, ADL), pp. 820–823.
- ICSE-2011-Sethanandha #open source #process #tool support
- Improving open source software patch contribution process: methods and tools (BDS), pp. 1134–1135.
- ICSE-2011-SridharaPV #automation #detection
- Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
- SPLC-2011-ChastekDMM #product line
- Engineering a Production Method for a Software Product Line (GJC, PD, JDM, DM), pp. 277–286.
- CGO-2011-InoueHWN #compilation #java #jit
- A trace-based Java JIT compiler retrofitted from a method-based compiler (HI, HH, PW, TN), pp. 246–256.
- CGO-2011-SanchezASPS #compilation #using
- Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
- HPDC-2011-Chen
- Algorithm-based recovery for iterative methods without checkpointing (ZC), pp. 73–84.
- CADE-2011-KlinovP #hybrid #probability #satisfiability
- A Hybrid Method for Probabilistic Satisfiability (PK, BP), pp. 354–368.
- ICLP-J-2011-DrescherT #logic programming #named #prolog
- ALPprolog — A new logic programming method for dynamic domains (CD, MT), pp. 451–468.
- ICST-2011-EldhHP #analysis #design #testing
- Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
- ISSTA-2011-PradelG #detection #order
- Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
- ASE-2010-GermanMI #automation #identification #source code
- A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
- ASE-2010-SridharaHMPV #automation #generative #java #summary #towards
- Towards automatically generating summary comments for Java methods (GS, EH, DM, LLP, KVS), pp. 43–52.
- CASE-2010-PaullGLM #adaptation #using
- An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
- DAC-2010-El-MoselhyD #probability
- Stochastic dominant singular vectors method for variation-aware extraction (TAEM, LD), pp. 667–672.
- DAC-2010-FonsecaDBGPVB #analysis #reliability #simulation #statistics
- A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
- DAC-2010-KinsmanN #algorithm #design #hardware #robust
- Robust design methods for hardware accelerators for iterative algorithms in scientific computing (ABK, NN), pp. 254–257.
- DATE-2010-ForoutanTHJ #performance
- An analytical method for evaluating Network-on-Chip performance (SF, YT, RH, AJ), pp. 1629–1632.
- DATE-2010-GaoH #geometry #optimisation #programming #using
- A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
- DATE-2010-JavaidJHP #agile #estimation #pipes and filters #runtime
- Rapid runtime estimation methods for pipelined MPSoCs (HJ, AJ, MSH, SP), pp. 363–368.
- DATE-2010-KerstanO #design #realtime
- Design of a real-time optimized emulation method (TK, MO), pp. 646–649.
- DATE-2010-LiuFG #optimisation #performance
- An accurate and efficient yield optimization method for analog circuits based on computing budget allocation and memetic search technique (BL, FVF, GGEG), pp. 1106–1111.
- DATE-2010-OnoTKSNF #evaluation #execution #modelling #performance
- A modeling method by eliminating execution traces for performance evaluation (KO, MT, RK, YS, TN, NF), pp. 1337–1340.
- DATE-2010-SeiculescuMBM
- A method to remove deadlocks in Networks-on-Chips with Wormhole flow control (CS, SM, LB, GDM), pp. 1625–1628.
- DATE-2010-SuCG #multi
- A general method to make multi-clock system deterministic (MS, YC, XG), pp. 1480–1485.
- DATE-2010-VasicekSB #design #implementation
- A method for design of impulse bursts noise filters optimized for FPGA implementations (ZV, LS, MB), pp. 1731–1736.
- DATE-2010-WieckowskiSBCIPA #analysis #black box
- A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
- DocEng-2010-CahierMZ #documentation #hybrid #modelling #semantics #web
- Document and item-based modeling: a hybrid method for a socio-semantic web (JPC, XM, LZ), pp. 243–246.
- DRR-2010-KatsuyamaMHOK #classification
- A new pre-classification method based on associative matching method (YK, AM, YH, SO, NK), pp. 1–10.
- DRR-2010-SunPD #documentation #segmentation
- Touching character segmentation method for Chinese historical documents (XS, LP, XD), pp. 1–10.
- DRR-2010-ZhangZLT #learning #recognition
- A stacked sequential learning method for investigator name recognition from web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
- VLDB-2010-CormodeLLS
- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
- CSEET-2010-Cowling #education #formal method
- Stages in Teaching Formal Methods (AJC), pp. 17–24.
- ITiCSE-2010-Ezel #assessment #education #how #student
- Assessment methods and how teachers and students view them in a computer science course at Uppsala University (MCE), p. 309.
- ITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition #using
- Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
- FASE-2010-HashimotoM #evolution
- A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
- CSMR-2010-NagyPGB #dependence #towards
- Towards a Safe Method for Computing Dependencies in Database-Intensive Systems (CN, JP, TG, ÁB), pp. 166–175.
- CSMR-2010-SanchezNCP #case study #java #refactoring
- Refactoring Generics in JAVA: A Case Study on Extract Method (RMS, CLN, YC, FJP), pp. 212–221.
- ICPC-2010-OlivetoGPL #automation #equivalence #information retrieval #on the #traceability
- On the Equivalence of Information Retrieval Methods for Automated Traceability Link Recovery (RO, MG, DP, ADL), pp. 68–71.
- ICSM-2010-MirzaAghaeiPP #automation #evolution #testing
- Automatically repairing test cases for evolving method declarations (MM, FP, MP), pp. 1–5.
- ICSM-2010-QusefOL #testing #traceability
- Recovering traceability links between unit tests and classes under test: An improved method (AQ, RO, ADL), pp. 1–10.
- SAS-2010-KatoenMMM #automation #generative #invariant #probability #source code
- Linear-Invariant Generation for Probabilistic Programs: — Automated Support for Proof-Based Methods (JPK, AM, LM, CCM), pp. 390–406.
- SAS-2010-MatringeMR #algebra #generative #hybrid #invariant #linear
- Generating Invariants for Non-linear Hybrid Systems by Linear Algebraic Methods (NM, AVM, RR), pp. 373–389.
- STOC-2010-BayatiGT #approach #combinator #graph #random #scalability
- Combinatorial approach to the interpolation method and scaling limits in sparse random graphs (MB, DG, PT), pp. 105–114.
- STOC-2010-Kannan #matrix
- Spectral methods for matrices and tensors (RK), pp. 1–12.
- IFM-2010-Dimovski #composition #equivalence #nondeterminism #source code #termination
- A Compositional Method for Deciding Equivalence and Termination of Nondeterministic Programs (AD), pp. 121–135.
- SEFM-2010-Powell #analysis #behaviour #modelling #scalability
- Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
- SEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing #using
- A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
- CHI-2010-FarooqWZ #api #programming #usability
- API usability peer reviews: a method for evaluating the usability of application programming interfaces (UF, LW, DZ), pp. 2327–2336.
- CHI-2010-IlinkinK #case study #evaluation #mobile
- Evaluation of text entry methods for Korean mobile phones, a user study (II, SK), pp. 2023–2026.
- CHI-2010-SchwarzHHM #mobile #multi
- Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices (JS, CH, SEH, JM), pp. 1657–1660.
- CHI-2010-SongKLS #comparative #evaluation #scalability #visualisation
- A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs (HS, BHK, BL, JS), pp. 223–232.
- CSCW-2010-FarooqZ #api #programming #usability
- API peer reviews: a method for evaluating usability of application programming interfaces (UF, DZ), pp. 207–210.
- CAiSE-2010-EsfahaniYC #approach #evaluation
- Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach (HCE, ESKY, JC), pp. 424–438.
- ICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance #using
- Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
- ICEIS-AIDSS-2010-MasvoulaKM #bibliography #learning
- A Review of Learning Methods Enhanced in Strategies of Negotiating Agents (MM, PK, DM), pp. 212–219.
- ICEIS-AIDSS-2010-WatanabeRTT #classification #statistics
- Statistical Associative Classification of Mammograms — The SACMiner Method (CYVW, MXR, CTJ, AJMT), pp. 121–128.
- ICEIS-ISAS-2010-Looso
- A Generic Method for Best Practice Reference Model Application (SL), pp. 149–158.
- ICEIS-ISAS-2010-SeemuellerVHB #approach #development #process
- Situational Method Engineering Applied for the Enactment of Development Processes — An Agent based Approach (HS, HV, BH, BB), pp. 399–405.
- ICEIS-ISAS-2010-TaveiraAS #approach #incremental
- A Method for Portfolio Management and Prioritization — An Incremental Funding Method Approach (GT, AJA, EAS), pp. 23–33.
- ICEIS-J-2010-ClariziaGN10a #adaptation #automation #lightweight #ontology #optimisation
- An Adaptive Optimisation Method for Automatic Lightweight Ontology Extraction (FC, LG, PN), pp. 357–371.
- ICEIS-J-2010-WatanabeRTT10a #classification #image #named #statistics
- SACMiner: A New Classification Method Based on Statistical Association Rules to Mine Medical Images (CYVW, MXR, CTJ, AJMT), pp. 249–263.
- ICEIS-SAIC-2010-MatCS #approach #collaboration #network
- Selecting Partners for Collaborative Networks — Mixed Methods Approach (NACM, YC, HS), pp. 122–128.
- CIKM-2010-BamisFS #component
- A method for discovering components of human rituals from streams of sensor data (AB, JF, AS), pp. 779–788.
- CIKM-2010-FujinoUN #classification #learning #robust
- A robust semi-supervised classification method for transfer learning (AF, NU, MN), pp. 379–388.
- ECIR-2010-Martinez-RomoA #information retrieval #web
- Analyzing Information Retrieval Methods to Recover Broken Web Links (JMR, LA), pp. 26–37.
- ECIR-2010-SaldarriagaMV #information retrieval #online #ranking
- Ranking Fusion Methods Applied to On-Line Handwriting Information Retrieval (SPS, EM, CVG), pp. 253–264.
- ICML-2010-ChengDH #ranking
- Label Ranking Methods based on the Plackett-Luce Model (WC, KD, EH), pp. 215–222.
- ICML-2010-JenattonMOB #learning #taxonomy
- Proximal Methods for Sparse Hierarchical Dictionary Learning (RJ, JM, GO, FRB), pp. 487–494.
- ICML-2010-RouxF #performance
- A fast natural Newton method (NLR, AWF), pp. 623–630.
- ICML-2010-Yu #convergence #difference
- Convergence of Least Squares Temporal Difference Methods Under General Conditions (HY), pp. 1207–1214.
- ICPR-2010-AnthimopoulosVG #detection #evaluation #image
- A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
- ICPR-2010-ArslanSATY #comparison #data access #image #multi #retrieval
- Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
- ICPR-2010-Artigas-FuentesGB #approximate #mining #similarity
- A High-Dimensional Access Method for Approximated Similarity Search in Text Mining (FJAF, RGG, JMBC), pp. 3155–3158.
- ICPR-2010-AungSN #3d #precise
- Traj Align: A Method for Precise Matching of 3-D Trajectories (ZA, KS, WSN), pp. 3818–3821.
- ICPR-2010-BanimahdE #distance #image #segmentation #set #using
- Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
- ICPR-2010-BrezovanBGSS #adaptation #detection #image #performance #visual notation
- An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
- ICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation #using
- A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
- ICPR-2010-FausserS #approximate #learning
- Learning a Strategy with Neural Approximated Temporal-Difference Methods in English Draughts (SF, FS), pp. 2925–2928.
- ICPR-2010-FujitaHSTS #detection #image #using
- An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
- ICPR-2010-GangehKD #categorisation #random
- Random Subspace Method in Text Categorization (MJG, MSK, RPWD), pp. 2049–2052.
- ICPR-2010-GhiasiS #identification #independence #performance
- An Efficient Method for Offline Text Independent Writer Identification (GG, RS), pp. 1245–1248.
- ICPR-2010-HarandiAABL #random #recognition
- Directed Random Subspace Method for Face Recognition (MTH, MNA, BNA, AB, BCL), pp. 2688–2691.
- ICPR-2010-IwahoriIWKFK #performance
- Extending Fast Marching Method under Point Light Source Illumination and Perspective Projection (YI, KI, RJW, HK, SF, KK), pp. 1650–1653.
- ICPR-2010-KayaCC #design #using
- Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
- ICPR-2010-KeuperSPHPBR #3d #parametricity #robust #self
- 3D Deformable Surfaces with Locally Self-Adjusting Parameters — A Robust Method to Determine Cell Nucleus Shapes (MK, TS, JP, PH, KP, HB, OR), pp. 2254–2257.
- ICPR-2010-KohGC #locality #robust #using
- A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
- ICPR-2010-LiuCLL #automation #locality #parametricity #using
- A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
- ICPR-2010-LiuZYL #hybrid #image #performance
- A Fast Image Inpainting Method Based on Hybrid Similarity-Distance (JL, SZ, WY, HL), pp. 4432–4435.
- ICPR-2010-MezghaniPMLG #network #order
- A Computer-Aided Method for Scoliosis Fusion Level Selection by a Topologicaly Ordered Self Organizing Kohonen Network (NM, PP, AM, HL, JAdG), pp. 4012–4015.
- ICPR-2010-MochizukiKISI #energy
- An Iterative Method for Superresolution of Optical Flow Derived by Energy Minimisation (YM, YK, AI, TS, TI), pp. 2270–2273.
- ICPR-2010-MonzoAAM #case study #comparative #locality #recognition #using
- A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
- ICPR-2010-OrtegaGJV #configuration management #self #video
- A Combined Self-Configuring Method for Object Tracking in Colour Video (JARO, GAG, ÁRJ, VLAV), pp. 2081–2084.
- ICPR-2010-Parker #classification #empirical #feature model
- An Empirical Study of Feature Extraction Methods for Audio Classification (CP), pp. 4593–4596.
- ICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
- Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
- ICPR-2010-Ramirez-OrtegonR #documentation #evaluation
- Unsupervised Evaluation Methods Based on Local Gray-Intensity Variances for Binarization of Historical Documents (MARO, RR), pp. 2029–2032.
- ICPR-2010-RenHHLC #detection
- A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
- ICPR-2010-SakarK #analysis #canonical #correlation #feature model #hybrid
- A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
- ICPR-2010-SattiGCP #adaptation #human-computer #interface
- A Covariate Shift Minimisation Method to Alleviate Non-stationarity Effects for an Adaptive Brain-Computer Interface (ARS, CG, DC, GP), pp. 105–108.
- ICPR-2010-SemenovichS #higher-order #performance
- Tensor Power Method for Efficient MAP Inference in Higher-order MRFs (DS, AS), pp. 734–737.
- ICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition #using
- Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
- ICPR-2010-SethiC #analysis #motivation #probability #process #video
- A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
- ICPR-2010-SodaI #composition #dataset #integration #learning
- Decomposition Methods and Learning Approaches for Imbalanced Dataset: An Experimental Integration (PS, GI), pp. 3117–3120.
- ICPR-2010-SomolGP #algorithm #feature model #problem #set
- The Problem of Fragile Feature Subset Preference in Feature Selection Methods and a Proposal of Algorithmic Workaround (PS, JG, PP), pp. 4396–4399.
- ICPR-2010-SukF
- Refined Morphological Methods of Moment Computation (TS, JF), pp. 966–970.
- ICPR-2010-Temerinac-OttKB #evaluation
- Evaluation of a New Point Clouds Registration Method Based on Group Averaging Features (MTO, MK, HB), pp. 2452–2455.
- ICPR-2010-Thurau #classification #scalability
- Nearest Archetype Hull Methods for Large-Scale Data Classification (CT), pp. 4040–4043.
- ICPR-2010-WangC #3d #estimation
- 3D Human Pose Estimation by an Annealed Two-Stage Inference Method (YKW, KYC), pp. 535–538.
- ICPR-2010-WeiXZ
- Calibration Method for Line Structured Light Vision Sensor Based on Vanish Points and Lines (ZW, MX, GZ), pp. 794–797.
- ICPR-2010-WshahGCL #novel #recognition #reduction
- A Novel Lexicon Reduction Method for Arabic Handwriting Recognition (SW, VG, YC, HL), pp. 2865–2868.
- ICPR-2010-YamashitaW #correlation #matrix
- Subspace Methods with Globally/Locally Weighted Correlation Matrix (YY, TW), pp. 4259–4262.
- ICPR-2010-YangSZ #analysis #multi #recognition #using
- Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
- ICPR-2010-ZhangGA #analysis #linear
- An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
- ICPR-2010-ZhangH #clustering
- A Hierarchical Clustering Method for Color Quantization (JZ, JH), pp. 786–789.
- ICPR-2010-ZhangW10a #modelling #random #validation
- LLN-based Model-Driven Validation of Data Points for Random Sample Consensus Methods (LZ, DW), pp. 3436–3439.
- ICPR-2010-ZouH #3d #performance #using
- Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
- KDD-2010-LichtenwalterLC #predict
- New perspectives and methods in link prediction (RL, JTL, NVC), pp. 243–252.
- KDIR-2010-Bernard #formal method #modelling #reuse
- Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
- KDIR-2010-DoucetA #evaluation #statistics
- Statistical Methods for the Evaluation of Indexing Phrases (AD, HAM), pp. 141–149.
- KDIR-2010-GuderSC #kernel #modelling #quality
- Integrated Instance-based and Kernel Methods for Power Quality Knowledge Modeling (MG, ÖS, IÇ), pp. 352–357.
- KDIR-2010-Molokov #combinator #identification
- Application of Combinatorial Methods to Protein Identification in Peptide Mass Fingerprinting (LM), pp. 307–313.
- KDIR-2010-ViswanathBK #classification #nearest neighbour #performance #set
- A Method to Generate a Reduced Training Set for Faster and Better Nearest Neighbor Classification (PV, VSB, TNK), pp. 232–236.
- KDIR-2010-WangSFR #concept
- A Meta-learning Method for Concept Drift (RW, LS, MÓF, ER), pp. 257–262.
- KEOD-2010-MatsumotoMM #development #information management #modelling
- A Model-driven Systems Development Method for Management Information Systems (KM, TM, NM), pp. 10–16.
- KEOD-2010-MazakSL #approximate #heuristic #ontology
- align++ — A Heuristic-based Method for Approximating the Mismatch-at-Risk in Schema-based Ontology Alignment (AM, BS, ML), pp. 17–26.
- KEOD-2010-MurdockBA #ontology
- Two Methods for Evaluating Dynamic Ontologies (JM, CB, CA), pp. 110–122.
- KEOD-2010-NirenburgMBC #elicitation #hybrid
- Hybrid Methods of Knowledge Elicitation within a Unified Representational Knowledge Scheme (SN, MM, SB, RC), pp. 177–182.
- KMIS-2010-BrockV #analysis #data flow #semantics #using
- A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
- KMIS-2010-DienstAHF #knowledge base #visual notation
- Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
- KMIS-2010-EtoMKM #evaluation #process
- Externalization Method and Its Evaluation of Know-how Information for Care Planning Processes by Awareness of Novices (KE, MM, YK, TM), pp. 201–206.
- KMIS-2010-SultanowWL #communication
- Solve Insufficient Communications — A Measurement-method for Satisfied Communication in Business Organizations (ES, EW, RL), pp. 367–371.
- SEKE-2010-ChangK #architecture #modelling #process
- A Model-based Business Process Diagnosis Method in Service Oriented Architecture (SHC, SDK), pp. 458–461.
- SEKE-2010-MadieshW #process #top-down
- A Top-Down Method for Secure SOA-based B2B Processes (MM, GW), pp. 698–703.
- SIGIR-2010-JiangPL #challenge #information retrieval #mining #web
- Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
- SIGIR-2010-KardanGB #automation
- A method to automatically construct a user knowledge model in a forum environment (AK, MG, BB), pp. 717–718.
- SIGIR-2010-Keikha #retrieval
- Investigation on smoothing and aggregation methods in blog retrieval (MK), p. 923.
- ECMFA-2010-OnoTKSNF #abstraction #embedded #execution #modelling #performance
- A Model-Based Method for Evaluating Embedded System Performance by Abstraction of Execution Traces (KO, MT, RK, YS, TN, NF), pp. 233–244.
- ECOOP-2010-MonperrusBM #detection #object-oriented
- Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
- GPCE-J-2007-PirkelbauerSS10 #c++ #design #evaluation #multi
- Design and evaluation of C++ open multi-methods (PP, YS, BS), pp. 638–667.
- GPCE-2010-GrechRF #generative #named #similarity
- JEqualityGen: generating equality and hashing methods (NG, JR, BF), pp. 177–186.
- RE-2010-YoungA #identification #policy #requirements
- A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
- REFSQ-2010-VillelaDJ #evaluation #evolution #product line
- Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line (KV, JD, IJ), pp. 113–127.
- SAC-2010-AddicksA #architecture #enterprise
- A method for application evaluations in context of enterprise architecture (JSA, HJA), pp. 131–136.
- SAC-2010-AraujoOS #hybrid #quantum
- Hybrid evolutionary quantum inspired method to adjust time phase distortions in financial time series (RdAA, ALIdO, SCBS), pp. 1153–1154.
- SAC-2010-AraujoSCA #process #validation
- A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
- SAC-2010-BaeCK
- Flash-aware record management method (DHB, JWC, SWK), pp. 554–555.
- SAC-2010-BattistelliMMSS #documentation
- Avoiding to dispense with accuracy: a method to make different DTDs documents comparable (MB, SM, LAM, PS, SS), pp. 862–866.
- SAC-2010-CaetanoST #composition #principle #process
- A method for business process decomposition based on the separation of concerns principle (AC, ARS, JMT), pp. 79–85.
- SAC-2010-HilaireGGK #approach #documentation
- An approach based upon OWL-S for method fragments documentation and selection (VH, NG, SG, AK), pp. 938–939.
- SAC-2010-LanLSH #algorithm #classification #image #using
- An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
- SAC-2010-LoTLC #named #performance
- Swap-before-hibernate: a time efficient method to suspend an OS to a flash drive (SWL, WsT, JgL, GsC), pp. 201–205.
- SAC-2010-PeixotoPR #education #game studies #simulation
- Semiotic inspection method in the context of educational simulation games (DCCP, ROP, RFR), pp. 1207–1212.
- SAC-2010-RiosBKO #documentation #evaluation #set #word
- Evaluation of different feature sets in an OCR free method for word spotting in printed documents (IR, AdSBJ, ALK, LSO), pp. 52–56.
- SAC-2010-RyuLYS #clustering #file system
- Flash-aware cluster allocation method based on filename extension for FAT file system (SR, CL, SY, SS), pp. 502–509.
- SAC-2010-SerugendoFR #architecture #development #named #self
- MetaSelf: an architecture and a development method for dependable self-* systems (GDMS, JSF, AR), pp. 457–461.
- ICSE-2010-Chan #approach #formal method #taxonomy #web #web service
- Formal methods for web services: a taxonomic approach (KSMC), pp. 357–360.
- ICSE-2010-SharpdD #re-engineering #research #using
- Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
- ICSE-2010-SridharanN #data analysis #re-engineering
- Bayesian methods for data analysis in software engineering (MS, ASN), pp. 477–478.
- ICSE-2010-WangZ #case study #development #multi #policy
- Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
- LDTA-2009-SingerBLPY10 #java
- Fundamental Nano-Patterns to Characterize and Classify Java Methods (JS, GB, ML, AP, PY), pp. 191–204.
- SLE-2010-HostO #canonical #identification #implementation #java #semantics #using
- Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
- SPLC-2010-YoshimuraAF #constraints #feature model #identification #mining
- A Method to Identify Feature Constraints Based on Feature Selections Mining (KY, YA, TF), pp. 425–429.
- ICLP-2010-OetschPT10 #source code
- Methods and Methodologies for Developing Answer-Set Programs — Project Description (JO, JP, HT), pp. 154–161.
- ICST-2010-Laurent #concept #formal method #process #testing #using #validation #verification
- Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
- ICST-2010-SilvaJA #cost analysis #execution #machine learning #symmetry #testing
- Machine Learning Methods and Asymmetric Cost Function to Estimate Execution Effort of Software Testing (DGeS, MJ, BTdA), pp. 275–284.
- SAT-2010-PankratovB #on the #problem #satisfiability
- On the Relative Merits of Simple Local Search Methods for the MAX-SAT Problem (DP, AB), pp. 223–236.
- SAT-2010-TompkinsH #satisfiability
- Dynamic Scoring Functions with Variable Expressions: New SLS Methods for Solving SAT (DADT, HHH), pp. 278–292.
- WICSA-ECSA-2009-BielG #architecture #towards #usability
- Towards a Method for Analyzing Architectural Support Levels of Usability (BB, VG), pp. 273–276.
- WICSA-ECSA-2009-HoylandA #development
- RQ-Tech method for user-involved software development (CAH, KMA), pp. 257–260.
- WICSA-ECSA-2009-XuZSL #architecture #distributed
- An architecting method for distributed process-intensive systems (XX, LZ, MS, YL), pp. 277–280.
- ASE-2009-PradelG #automation #generative #scalability #specification
- Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
- ASE-2009-VakilianDBOAJ #summary
- Inferring Method Effect Summaries for Nested Heap Regions (MV, DD, RLBJ, JO, VSA, REJ), pp. 421–432.
- CASE-2009-ChengP #predict
- A fusion prognostics method for remaining useful life prediction of electronic products (SC, MGP), pp. 102–107.
- CASE-2009-FiorentiniSRS #standard #towards
- Towards a method for harmonizing information standards (XF, RS, SR, RDS), pp. 466–471.
- CASE-2009-WuS #heuristic #multi #problem
- A new heuristic method for capacitated multi-level lot sizing problem with backlogging (TW, LS), pp. 483–488.
- DAC-2009-IsshikiLKIS #multi #simulation
- Trace-driven workload simulation method for Multiprocessor System-On-Chips (TI, DL, HK, TI, KS), pp. 232–237.
- DAC-2009-TamPB #automation #validation
- Automated failure population creation for validating integrated circuit diagnosis methods (WCT, OP, RD(B), pp. 708–713.
- DAC-2009-UzelacM #realtime
- A real-time program trace compressor utilizing double move-to-front method (VU, AM), pp. 738–743.
- DATE-2009-HsiehLH #reduction
- A physical-location-aware X-filling method for IR-drop reduction in at-speed scan test (WWH, ISL, TH), pp. 1234–1237.
- DATE-2009-KorhonenK #identification
- A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
- DATE-2009-LadharMB #fault #performance
- Efficient and accurate method for intra-gate defect diagnoses in nanometer technology and volume data (AL, MM, LB), pp. 988–993.
- DATE-2009-RemersaroRRP #generative #scalability #testing
- A scalable method for the generation of small test sets (SR, JR, SMR, IP), pp. 1136–1141.
- DATE-2009-TzengH #named
- QC-Fill: An X-Fill method for quick-and-cool scan test (CWT, SYH), pp. 1142–1147.
- DRR-2009-KhurshidSFV #comparison #documentation
- Comparison of Niblack inspired binarization methods for ancient documents (KK, IS, CF, NV), pp. 1–10.
- DRR-2009-LiD #difference #independence #using #verification
- Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
- DRR-2009-ZhangZLT #learning
- A semi-supervised learning method to classify grant-support zone in web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
- HT-2009-ParisCW #evaluation #information management
- A cost-benefit evaluation method for web-based information systems (CP, NC, RW), pp. 353–354.
- ICDAR-2009-ChiangK #automation
- A Method for Automatically Extracting Road Layers from Raster Maps (YYC, CAK), pp. 838–842.
- ICDAR-2009-CoustatyOPV #composition
- Drop Caps Decomposition for Indexing a New Letter Extraction Method (MC, JMO, RP, NV), pp. 476–480.
- ICDAR-2009-DingJG #approach #online #recognition #word
- A New Method for Rotation Free Method for Online Unconstrained Handwritten Chinese Word Recognition: A Holistic Approach (KD, LJ, XG), pp. 1131–1135.
- ICDAR-2009-HamamuraAI #probability #recognition #word
- An A Posteriori Probability Calculation Method for Analytic Word Recognition Applicable to Address Recognition (TH, TA, BI), pp. 391–395.
- ICDAR-2009-ImuraT #documentation #image #string
- Compression and String Matching Method for Printed Document Images (HI, YT), pp. 291–295.
- ICDAR-2009-MuramatsuYM #authentication #online #using
- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
- ICDAR-2009-PhanST #detection #video
- A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
- ICDAR-2009-Pletschacher #adaptation #self
- A Self-Adaptive Method for Extraction of Document-Specific Alphabets (SP), pp. 656–660.
- ICDAR-2009-ShahabiR #documentation #identification
- A New Method for Writer Identification of Handwritten Farsi Documents (FS, MR), pp. 426–430.
- ICDAR-2009-SundaramR #online #recognition #using
- An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
- ICDAR-2009-XiaJ
- A Kai Style Calligraphic Beautification Method for Handwriting Chinese Character (WX, LJ), pp. 798–802.
- ICDAR-2009-YinL #segmentation
- A Variational Bayes Method for Handwritten Text Line Segmentation (FY, CLL), pp. 436–440.
- SIGMOD-2009-GhotingM #parallel #performance
- Serial and parallel methods for i/o efficient suffix tree construction (AG, KM), pp. 827–840.
- VLDB-2009-KimH #clustering #network
- A Particle-and-Density Based Evolutionary Clustering Method for Dynamic Networks (MSK, JH), pp. 622–633.
- VLDB-2009-KimuraHRMZ #correlation #dependence #functional
- Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
- VLDB-2009-WongOYFL #nearest neighbour #performance
- Efficient Method for Maximizing Bichromatic Reverse Nearest Neighbor (RCWW, MTÖ, PSY, AWCF, LL), pp. 1126–1137.
- CSEET-2009-SkevoulisCHVT #health #industrial
- Engineering a Software Supported Health Risk Appraisal Method: A Joint Effort between Academia and Health Care Industry (SS, JC, KH, JV, ST), pp. 113–116.
- ITiCSE-2009-MoraPJC #assessment #collaboration #learning #student
- Learning method based on collaborative assessment performed by the students: an application to computer science (HMM, MTSP, RCJ, JMGC), p. 372.
- FASE-2009-LeinoM #consistency #proving
- Proving Consistency of Pure Methods and Model Fields (KRML, RM), pp. 231–245.
- CSMR-2009-FrankeJLUHEK #assessment #metric #network #using
- A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
- CSMR-2009-Sneed #development
- Stevens Lecture on Software Development Methods at CSMR 2009 (HMS), pp. 5–6.
- CSMR-2009-TsantalisC #identification #refactoring
- Identification of Extract Method Refactoring Opportunities (NT, AC), pp. 119–128.
- ICPC-2009-ShternT #algorithm #clustering
- Methods for selecting and improving software clustering algorithms (MS, VT), pp. 248–252.
- ICSM-2009-DraganCM #using
- Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
- ICSM-2009-WangWYZY #evolution #kernel #linux #network #novel
- Linux kernels as complex networks: A novel method to study evolution (LW, ZW, CY, LZ, QY), pp. 41–50.
- WCRE-1999-AnquetilL99b #clustering #years after
- Ten Years Later, Experiments with Clustering as a Software Remodularization Method (NA, TCL), p. 7.
- WCRE-1999-SerebrenikRRB99a #diagrams #enterprise #java #reverse engineering #sequence chart
- Reverse Engineering Sequence Diagrams for Enterprise JavaBeans with Business Method Interceptors (AS, SAR, EER, MvdB), pp. 269–273.
- STOC-2009-KannanN #linear #programming #random
- Random walks on polytopes and an affine interior point method for linear programming (RK, HN), pp. 561–570.
- CIAA-2009-LiuYLT #automaton
- A Table Compression Method for Extended Aho-Corasick Automaton (YL, YY, PL, JT), pp. 84–93.
- ICALP-v2-2009-FotakisKS #design #network #performance
- Efficient Methods for Selfish Network Design (DF, ACK, PGS), pp. 459–471.
- FM-2009-BicarreguiFLW #bibliography #formal method #industrial #perspective
- Industrial Practice in Formal Methods: A Review (JB, JSF, PGL, JCPW), pp. 810–813.
- FM-2009-BonzanniFFK #biology #formal method #question #what
- What Can Formal Methods Bring to Systems Biology? (NB, KAF, WF, EK), pp. 16–22.
- FM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement #using
- A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
- FM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight #using
- An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
- FM-2009-TschantzW #formal method #privacy
- Formal Methods for Privacy (MCT, JMW), pp. 1–15.
- CHI-2009-BlytheC
- Critical methods and user generated content: the iPhone on YouTube (MB, PAC), pp. 1467–1476.
- CHI-2009-BruunGHS #comparison #testing #usability
- Let your users do the testing: a comparison of three remote asynchronous usability testing methods (AB, PG, LH, JS), pp. 1619–1628.
- CHI-2009-JakobsenH #source code #using #visualisation
- Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
- CHI-2009-PooleCMGE
- Computer help at home: methods and motivations for informal technical support (ESP, MC, TM, REG, WKE), pp. 739–748.
- CHI-2009-ZimmermanRHTM #communication #effectiveness
- User-created forms as an effective method of human-agent communication (JZ, KR, IH, AT, KM), pp. 1869–1878.
- DHM-2009-AndreoniMCZRCP #assessment #gesture
- Method for Movement and Gesture Assessment (MMGA) in Ergonomics (GA, MM, OC, MZ, MR, FC, EP), pp. 591–598.
- DHM-2009-NiedermaierDEK #process #usability
- The New BMW iDrive — Applied Processes and Methods to Assure High Usability (BN, SD, LE, AK), pp. 443–452.
- DHM-2009-Pauzie
- Method to Evaluate Driver’s Workload in Real Road Context (AP), pp. 453–462.
- DHM-2009-WuLN #3d #assessment
- A 3D Method for Fit Assessment of a Sizing System (JW, ZL, JN), pp. 737–743.
- HCD-2009-Cinar #case study #eye tracking #usability #web
- Eye Tracking Method to Compare the Usability of University Web Sites: A Case Study (MOÇ), pp. 671–678.
- HCD-2009-KimY #consistency #design #interactive #multi
- A Method for Consistent Design of User Interaction with Multifunction Devices (DSK, WCY), pp. 202–211.
- HCD-2009-LinO #analysis #information management
- The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
- HCD-2009-MisawaF #case study #experience #generative #idea #user interface #using
- A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
- HCD-2009-NakanoR #analysis #corpus #multimodal #usability
- Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
- HCD-2009-Nishiguchi #people #user interface
- Support Method for Improving the Ability of People with Cerebral Palsy to Efficiently Point a Mouse at Objects on a GUI Screen (HN), pp. 531–537.
- HCD-2009-RuggeRS #development #human-computer #process #smarttech #towards
- Changes of HCI Methods towards the Development Process of Wearable Computing Solutions (IR, CR, BSR), pp. 302–311.
- HCD-2009-RunonenM #concept #development #research #tool support
- Shaping the Future with Users — Futures Research Methods as Tools for User-Centered Concept Development (MR, PM), pp. 904–911.
- HCD-2009-Seland #design #game studies #mobile #using
- Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
- HCD-2009-WadaY #analysis
- The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
- HCD-2009-YanagidaUGTHY #design
- Structured Scenario-Based Design Method (KY, YU, KG, KT, SH, KY), pp. 374–380.
- HCI-AUII-2009-Dai #design #research
- Nine Assistant Guiding Methods in Subway Design — A Research of Shanghai Subway Users (LD), pp. 125–132.
- HCI-AUII-2009-HongE #multi
- Point and Control: The Intuitive Method to Control Multi-device with Single Remote Control (SSH, JIE), pp. 416–422.
- HCI-AUII-2009-IbenWK #feedback #smarttech #visual notation
- The Impact of Different Visual Feedback Presentation Methods in a Wearable Computing Scenario (HI, HW, EMK), pp. 752–759.
- HCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi #using
- Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
- HCI-NIMT-2009-NisimuraMKI #development #interactive #speech
- Development of Speech Input Method for Interactive VoiceWeb Systems (RN, JM, HK, TI), pp. 710–719.
- HCI-NT-2009-AbeOO #automation #image #using
- Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
- HCI-NT-2009-AsahiIF #evaluation #usability
- A Usability Evaluation Method Applying AHP and Treemap Techniques (TA, TI, SF), pp. 195–203.
- HCI-NT-2009-FukuzumiIO #development #evaluation #usability
- Development of Quantitative Usability Evaluation Method (SF, TI, HO), pp. 252–258.
- HCI-NT-2009-KimuraUOM #evaluation #metric #towards #usability
- Toward Constructing an Electroencephalogram Measurement Method for Usability Evaluation (MK, HU, MO, KiM), pp. 95–104.
- HCI-NT-2009-ShastriPW #monitoring
- A Method to Monitor Operator Overloading (DS, IP, AW), pp. 169–175.
- HCI-NT-2009-WatanabeSMY #design #interface
- Time-Oriented Interface Design: Picking the Right Time and Method for Information Presentation (KW, KS, SM, MY), pp. 752–759.
- HCI-NT-2009-Yang #design #development #evaluation #interface
- Website Designer as an Evaluator: A Formative Evaluation Method for Website Interface Development (CYY), pp. 372–381.
- HIMI-DIE-2009-IshiiS #perspective #representation
- Representation Method for Engineering Perspective (GI, MS), pp. 69–76.
- HIMI-DIE-2009-KawashimoSDAT
- A Skill Transfer Method for Manual Machine Tool Operation Utilizing Cutting Sound (TK, NS, DD, MA, TT), pp. 77–86.
- HIMI-DIE-2009-MatsumotoSS #case study #effectiveness #visual notation
- A Study on Effective Methods of Visual Inspection for Reused-Parts by Inspectors (TM, HS, KS), pp. 131–139.
- HIMI-DIE-2009-SrinivasSPK #classification #feature model #performance #using
- Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
- HIMI-DIE-2009-TaguchiKT
- A Method for Evaluating the Relationship among Four Perspectives of the Balanced Scorecard (YT, TK, TT), pp. 163–170.
- HIMI-DIE-2009-YamaguchiNKN #evaluation
- Evaluation for Adjustment Method of Vehicle’s Location by Recognizing Crosswalks (YY, TN, HK, SN), pp. 648–656.
- HIMI-DIE-2009-YatsuzukaTT #case study #motivation
- A Study on a Method of Support for Improving the Motivation of Employees (DY, YT, TT), pp. 197–204.
- HIMI-II-2009-NabetaKOT
- A Proposal of a Method to Extract Active Ingredient Names from Package Inserts (KN, MK, MO, FT), pp. 576–585.
- HIMI-II-2009-NakamuraS #learning
- Construction of Systematic Learning Support System of Business Theory and Method (YN, KS), pp. 669–678.
- HIMI-II-2009-NozawaK #analysis #comparison #realtime #reduction
- A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
- HIMI-II-2009-OotsukiIOT #evaluation #similarity
- Examination of Evaluation Method for Appearance Similarity of PTP Sheets (YO, AI, MO, FT), pp. 586–593.
- HIMI-II-2009-SawaragiIHN #approach #identification #using
- Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
- HIMI-II-2009-ShibuyaNMKT #3d #distance #empirical #evaluation #mobile
- Empirical Evaluation of Throwing Method to Move Object for Long Distance in 3D Information Space on Mobile Device (YS, KN, KM, IK, YT), pp. 468–475.
- HIMI-II-2009-TakaoIS #keyword #web
- A Coauthoring Method of Keyword Dictionaries for Knowledge Combination on Corporate Discussion Web Sites (ST, TI, AS), pp. 84–93.
- IDGD-2009-TranL #interface #question #research
- Attention to Effects of Different Cross-Cultural Levels in User Research Method’s Interface: Discipline or Nationality — Which Has Stronger Force? (TTT, KPL), pp. 127–134.
- OCSC-2009-SongNKE #recommendation #using #word
- A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
- CAiSE-2009-EspanaGP #analysis #communication #information management #requirements
- Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
- CAiSE-2009-Franch #metric #modelling
- A Method for the Definition of Metrics over i* Models (XF), pp. 201–215.
- ICEIS-AIDSS-2009-RoperoGLC #fuzzy #information management #logic #novel #web
- Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction (JR, AG, CL, AC), pp. 130–137.
- ICEIS-DISI-2009-RomeuAC #integration #metric #using
- Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
- ICEIS-ISAS-2009-BifflFHM #analysis #automation #evaluation #open source #process #tool support
- Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
- ICEIS-ISAS-2009-GruhnK #analysis #mobile #modelling #process
- Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
- ICEIS-ISAS-2009-KillispergerPSS #generative #process #validation
- Method Manual based Process Generation and Validation (PK, GP, MS, TS), pp. 256–261.
- ICEIS-ISAS-2009-NascimentoITR #legacy #process #using
- A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
- ICEIS-J-2009-CallegariB #fuzzy #logic #multi #using
- A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
- ICEIS-SAIC-2009-ClariziaCSN #probability #semantics #web
- Semantic Indexing of Web Pages Via Probabilistic Methods — In Search of Semantics Project (FC, FC, MDS, PN), pp. 134–140.
- CIKM-2009-ChenWL #kernel #learning #novel #rank
- Learning to rank with a novel kernel perceptron method (XwC, HW, XL), pp. 505–512.
- CIKM-2009-HeZL #comparison #evaluation #retrieval
- Evaluation of methods for relative comparison of retrieval systems based on clickthroughs (JH, CZ, XL), pp. 2029–2032.
- CIKM-2009-KhaitanDGS #data-driven
- Data-driven compound splitting method for english compounds in domain names (SK, AD, SG, AS), pp. 207–214.
- CIKM-2009-LaberSJACRTV #performance
- A fast and simple method for extracting relevant content from news webpages (ESL, CPdS, IVJ, ECFdA, ETC, RPR, LCT, CDV), pp. 1685–1688.
- CIKM-2009-LiuZ #classification #sentiment #using
- Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
- CIKM-2009-LvZ09a #case study #comparative #feedback #modelling #pseudo #query
- A comparative study of methods for estimating query language models with pseudo feedback (YL, CZ), pp. 1895–1898.
- CIKM-2009-YuOH #performance #ranking
- Efficient feature weighting methods for ranking (HY, JO, WSH), pp. 1157–1166.
- ECIR-2009-HauffAH #evaluation #performance #predict #query
- The Combination and Evaluation of Query Performance Prediction Methods (CH, LA, DH), pp. 301–312.
- ICML-2009-JiY
- An accelerated gradient method for trace norm minimization (SJ, JY), pp. 457–464.
- ICML-2009-Shalev-ShwartzT #probability
- Stochastic methods for l1 regularized loss minimization (SSS, AT), pp. 929–936.
- ICML-2009-SuttonMPBSSW #approximate #learning #linear #performance
- Fast gradient-descent methods for temporal-difference learning with linear function approximation (RSS, HRM, DP, SB, DS, CS, EW), pp. 993–1000.
- ICML-2009-WallachMSM #evaluation #modelling #topic
- Evaluation methods for topic models (HMW, IM, RS, DMM), pp. 1105–1112.
- ICML-2009-YangJY #learning #online
- Online learning by ellipsoid method (LY, RJ, JY), pp. 1153–1160.
- KDD-2009-AshrafiN
- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
- KDD-2009-BifetHPKG #data type #evolution
- New ensemble methods for evolving data streams (AB, GH, BP, RK, RG), pp. 139–148.
- KDD-2009-LozanoALR #modelling #visual notation
- Grouped graphical Granger modeling methods for temporal causal modeling (ACL, NA, YL, SR), pp. 577–586.
- KDD-2009-Mannila #data mining #mining
- Randomization methods in data mining (HM), pp. 5–6.
- KDD-2009-XueW #classification #quantifier
- Quantification and semi-supervised classification methods for handling changes in class distribution (JCX, GMW), pp. 897–906.
- KDD-2009-YaoMM #documentation #model inference #performance #streaming #topic
- Efficient methods for topic model inference on streaming document collections (LY, DMM, AM), pp. 937–946.
- KDIR-2009-CallejaFGA #learning #set
- A Learning Method for Imbalanced Data Sets (JdlC, OF, JG, RMAP), pp. 307–310.
- KDIR-2009-Fang #development #gender
- Development and Application of a Roach Gene Regulation Profile based Gender Discrimination Method (YF), pp. 263–269.
- KDIR-2009-KimRM #retrieval #semantics #using
- A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
- KEOD-2009-ChimientiDNM #evaluation #ontology
- Evaluation of Ontology Building Methodologies — A Method based on Balanced Scorecards (MC, MD, ADN, MM), pp. 141–146.
- KEOD-2009-StanevOW #design #formal method #modelling #validation
- Formal Method for Validation of Product Design through Knowledge Modelling (SS, JO, WW), pp. 166–170.
- KEOD-2009-TsalapatiSK #approximate #ontology #problem #reuse
- A Method for Approximation to Ontology Reuse Problem (ET, GBS, GK), pp. 416–419.
- KEOD-2009-ZambachM #implementation #logic #ontology
- Applying Terminological Methods and Description Logic for Creating and Implementing an Ontology on Inhibition (SZ, BNM), pp. 452–455.
- MLDM-2009-ChanguelLB #automation #html #learning
- A General Learning Method for Automatic Title Extraction from HTML Pages (SC, NL, BBM), pp. 704–718.
- MLDM-2009-KobayashiS #classification #distributed #linear #representation #using
- A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
- MLDM-2009-TronciGR
- Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method (RT, GG, FR), pp. 163–177.
- MLDM-2009-XiongBS #detection
- A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
- RecSys-2009-KnijnenburgW #adaptation #comprehension #elicitation #recommendation #user satisfaction
- Understanding the effect of adaptive preference elicitation methods on user satisfaction of a recommender system (BPK, MCW), pp. 381–384.
- RecSys-2009-SchclarTRMA #collaboration #performance
- Ensemble methods for improving the performance of neighborhood-based collaborative filtering (AS, AT, LR, AM, LA), pp. 261–264.
- SEKE-2009-AhsanFW #debugging #estimation #machine learning #using
- Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
- SEKE-2009-JiCXZ #analysis #clustering #novel
- A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
- SEKE-2009-KongLLYW #feedback #refinement #traceability
- A Requirement Traceability Refinement Method Based on Relevance Feedback (LK, JL, YL, YY, QW), pp. 37–42.
- SEKE-2009-PengSZ #architecture #evolution #product line
- An Architecture-based Evolution Management Method for Software Product Line (XP, LS, WZ), pp. 135–140.
- SEKE-2009-XieWXWY #named #scheduling
- PP-HAS: A Task Priority Based Preemptive Human Resource Scheduling Method (LX, QW, JX, YW, YY), pp. 655–660.
- SEKE-2009-ZepedaCRCCC #modelling
- A Model Driven Method for Data Warehouse (LZ, EC, JR, JC, NCF, MC), pp. 676–681.
- SEKE-2009-ZhaoWX #optimisation #web #web service
- User Perceived Response-time Optimization Method for Composite Web Services (JZ, YW, BX), pp. 356–363.
- SIGIR-2009-AmbaiY #clustering #image #multi #ranking #set #visual notation
- Multiclass VisualRank: image ranking method in clustered subsets based on visual features (MA, YY), pp. 732–733.
- SIGIR-2009-CormackCB #learning #rank
- Reciprocal rank fusion outperforms condorcet and individual rank learning methods (GVC, CLAC, SB), pp. 758–759.
- SIGIR-2009-KazaiMC #quality #towards
- Towards methods for the collective gathering and quality control of relevance assessments (GK, NMF, JC), pp. 452–459.
- SIGIR-2009-MeijMZ #evaluation #query
- An evaluation of entity and frequency based query completion methods (EM, PM, HZ), pp. 678–679.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- ECOOP-2009-HostO #debugging
- Debugging Method Names (EWH, BMØ), pp. 294–317.
- RE-2009-DecreusSP #challenge #modelling #process
- Practical Challenges for Methods Transforming i* Goal Models into Business Process Models (KD, MS, GP), pp. 15–23.
- REFSQ-2009-KhurumGAF #empirical #requirements
- A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
- REFSQ-2009-SeyffGMG #case study #experience #requirements
- Scenarios in the Wild: Experiences with a Contextual Requirements Discovery Method (NS, FG, NAMM, PG), pp. 147–161.
- SAC-2009-BangerthJ #adaptation #finite #problem
- Adaptive finite element methods for nonlinear inverse problems (WB, AJ), pp. 1002–1006.
- SAC-2009-BeckerR #evaluation #modelling #off the shelf #requirements
- Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentation (CB, AR), pp. 401–402.
- SAC-2009-ChaovalitG #clustering #data type
- A method for clustering transient data streams (PC, AG), pp. 1518–1519.
- SAC-2009-ChoppyR #state machine #uml
- A method for developing UML state machines (CC, GR), pp. 382–388.
- SAC-2009-FloraTB #forensics #identification #image #using
- Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
- SAC-2009-KiyoharaMMNK #embedded #performance
- Method for fast compression of program codes for remote updates in embedded systems (RK, SM, MM, MN, SK), pp. 1683–1684.
- SAC-2009-LandZEL #enterprise #integration #ontology #performance #towards
- Towards a fast enterprise ontology based method for post merger integration (MOL, HZ, PE, QL), pp. 245–252.
- SAC-2009-LievensH #encapsulation #multi #symmetry
- Symmetric encapsulated multi-methods to abstract over application structure (DL, WH), pp. 1873–1880.
- SAC-2009-SuzukiOSKTK #generative #quality #requirements
- A systematic method for generating quality requirements spectrum (SS, AO, TS, HK, MT, KK), pp. 399–400.
- SAC-2009-TanakaKTN #navigation #predict #using
- A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
- SAC-2009-TokoroTT #smarttech #using
- A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
- SAC-2009-XuMX #game studies
- A method to construct knowledge table-base in k-in-a-row games (CX, ZMM, XX), pp. 929–933.
- LDTA-2008-Basten09 #ambiguity #context-free grammar #detection #usability
- The Usability of Ambiguity Detection Methods for Context-Free Grammars (BB), pp. 35–46.
- CADE-2009-McLaughlinP #performance #proving #theorem proving
- Efficient Intuitionistic Theorem Proving with the Polarized Inverse Method (SM, FP), pp. 230–244.
- CAV-2009-CernyA #analysis #automation #java
- Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
- ICLP-2009-Raiser #constraints #graph transformation #research #summary #using
- Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (Research Summary) (FR), pp. 540–541.
- RTA-2009-MoserS #complexity #dependence
- The Derivational Complexity Induced by the Dependency Pair Method (GM, AS), pp. 255–269.
- TAP-2009-Chetali #certification #formal method #security #smarttech #testing
- Security Testing and Formal Methods for High Levels Certification of Smart Cards (BC), pp. 1–5.
- TAP-2009-Gladisch #contract #invariant #question
- Could We Have Chosen a Better Loop Invariant or Method Contract? (CG), pp. 74–89.
- CBSE-2008-AlbaniOB #component #identification #towards
- Towards a Systematic Method for Identifying Business Components (AA, SO, DB), pp. 262–277.
- ECSA-2008-AngelovTG #architecture #case study #evaluation #experience #towards
- Towards a Method for the Evaluation of Reference Architectures: Experiences from a Case (SA, JJMT, PWPJG), pp. 225–240.
- WICSA-2008-StollWN #architecture
- Guiding Architectural Decisions with the Influencing Factors Method (PS, AW, CN), pp. 179–188.
- WICSA-2008-ZimmermannZGL #architecture #design #modelling #pattern matching #reuse
- Combining Pattern Languages and Reusable Architectural Decision Models into a Comprehensive and Comprehensible Design Method (OZ, UZ, TG, FL), pp. 157–166.
- ASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
- An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
- CASE-2008-0001LYS #optimisation
- An improved lagrangian relaxation method for discrete optimization applications (WW, PBL, JHY, GAS), pp. 359–364.
- CASE-2008-JungL #clustering #performance #scheduling #tool support
- Efficient scheduling method based on an assignment model for robotized cluster tools (CJ, TEL), pp. 79–84.
- CASE-2008-KangXWW #assembly #scheduling
- A swarm-dynamic scheduling method for semiconductor assembly production line (QK, HX, LW, QW), pp. 91–96.
- CASE-2008-KuanCJ #modelling
- Method for proposing sort screen thresholds based on modeling etest/sort-class in semiconductor manufacturing (WKY, LCC, WJL), pp. 236–241.
- CASE-2008-SunZL
- An enhanced nested partitions method (JS, QZ, PBL), pp. 377–382.
- CASE-2008-SunZL08a #framework #optimisation
- A unified optimization framework for population-based methods (JS, QZ, PBL), pp. 383–387.
- DAC-2008-YeZP #analysis #equation #linear #multi
- Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
- DATE-2008-BinkleyGGR #design
- From Transistor to PLL — Analogue Design and EDA Methods (DB, HEG, GGEG, JSR).
- DATE-2008-CongX #network
- Simultaneous FU and Register Binding Based on Network Flow Method (JC, JX), pp. 1057–1062.
- DATE-2008-CornetMM #development #modelling #performance #transaction
- A Method for the Efficient Development of Timed and Untimed Transaction-Level Models of Systems-on-Chip (JC, FM, LMC), pp. 9–14.
- DATE-2008-ErnstJSBC #analysis #formal method #optimisation #performance
- Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
- DATE-2008-FrankWESN #analysis #architecture #design #evaluation #standard #tool support
- Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
- DATE-2008-GouraryRUZMG #analysis #injection
- Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
- DATE-2008-HalakY #optimisation
- Bandwidth-Centric Optimisation for Area-Constrained Links with Crosstalk Avoidance Methods (BH, AY), pp. 438–443.
- DATE-2008-LiTM #analysis #grid #named #network #power management
- ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
- DATE-2008-LiXHL #named #reduction #testing
- iFill: An Impact-Oriented X-Filling Method for Shift- and Capture-Power Reduction in At-Speed Scan-Based Testing (JL, QX, YH, XL), pp. 1184–1189.
- DATE-2008-NessL #design #fault tolerance #statistics
- Guiding Circuit Level Fault-Tolerance Design with Statistical Methods (DCN, DJL), pp. 348–353.
- DATE-2008-StratigopoulosTM #estimation #parametricity
- A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation (HGDS, JT, SM), pp. 68–73.
- DATE-2008-ZhangYWYJX #correlation #performance #process #statistics
- An Efficient Method for Chip-Level Statistical Capacitance Extraction Considering Process Variations with Spatial Correlation (WZ, WY, ZW, ZY, RJ, JX), pp. 580–585.
- DocEng-2008-Nguyen #algorithm #documentation #image #using
- A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
- DRR-2008-BaiNS #composition #using
- Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
- DRR-2008-LemaitreCC #documentation #recognition
- A generic method for structure recognition of handwritten mail documents (AL, JC, BC), p. 68150.
- SIGMOD-2008-HeS #data access #database #graph #named #query
- Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
- SIGMOD-2008-LiOFWZ #effectiveness #keyword #named
- EASE: an effective 3-in-1 keyword search method for unstructured, semi-structured and structured data (GL, BCO, JF, JW, LZ), pp. 903–914.
- SIGMOD-2008-ShaullSX #named
- Skippy: a new snapshot indexing method for time travel in the storage manager (RS, LS, HX), pp. 637–648.
- SIGMOD-2008-VuOPT #database #graph #keyword
- A graph method for keyword-based selection of the top-K databases (QHV, BCO, DP, AKHT), pp. 915–926.
- VLDB-2008-WangLLG #documentation #query #xml
- Hash-base subgraph query processing method for graph-structured XML documents (HW, JL, JL, HG), pp. 478–489.
- ITiCSE-2008-ApplinH #library #multi #research
- Computing research methods multi-perspective digital library: a call for participation (AGA, HJH), p. 337.
- ITiCSE-2008-GunawardenaBO #comprehension
- A method for analyzing reading comprehension in computer science courses (AG, JB, AO), p. 348.
- ESOP-2008-LeinoM #verification
- Verification of Equivalent-Results Methods (KRML, PM), pp. 307–321.
- FoSSaCS-2008-BraunCP #composition #information management
- Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
- CSMR-2008-Oliveto #information retrieval #traceability
- Traceability Management meets Information Retrieval Methods “Strengths and Limitations” (RO), pp. 302–305.
- ICSM-2008-XiaoWLYZX #constraints #development #maintenance #process #scheduling
- A constraint-driven human resource scheduling method in software development and maintenance process (JX, QW, ML, YY, FZ, LX), pp. 17–26.
- MSR-2008-ChangM #detection #evaluation #source code
- Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
- PASTE-2008-JashkiZB #impact analysis #performance #towards
- Towards a more efficient static software change impact analysis method (MAJ, RZ, EB), pp. 84–90.
- STOC-2008-Sherstov #bound #communication #matrix #quantum
- The pattern matrix method for lower bounds on quantum communication (AAS), pp. 85–94.
- DLT-J-2007-Freivalds08 #automaton #finite #probability
- Non-Constructive Methods for Finite Probabilistic Automata (RF), pp. 565–580.
- ICALP-A-2008-EsparzaGKS #approximate #equation
- Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations (JE, TG, SK, HS), pp. 698–710.
- ICALP-B-2008-EsparzaKL
- Newton’s Method for ω-Continuous Semirings (JE, SK, ML), pp. 14–26.
- FM-2008-ChetaliN #evaluation #formal method #industrial #security
- Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
- FM-2008-Katz #aspect-oriented #formal method
- Aspects and Formal Methods (SK), pp. 1–11.
- FM-2008-KiniryZ #formal method
- Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
- FM-2008-LintelmanRLS #formal method #security
- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
- FM-2008-RudichDM #specification
- Checking Well-Formedness of Pure-Method Specifications (AR, ÁD, PM), pp. 68–83.
- FM-2008-VerhulstJM #case study #development #formal method #industrial
- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS (EV, GGdJ, VM), pp. 411–418.
- FM-2008-WijbransBRG #case study #development #experience #formal method #re-engineering
- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System (KW, FB, RR, WG), pp. 419–424.
- SEFM-2008-BartheKPS #hybrid #proving #verification
- Preservation of Proof Pbligations for Hybrid Verification Methods (GB, CK, DP, JSF), pp. 127–136.
- SEFM-2008-BonifacioMS #generative #modelling #testing
- A Generalized Model-Based Test Generation Method (ALB, AVM, AdSS), pp. 139–148.
- SEFM-2008-PetrenkoP #challenge #formal method
- Formal Methods and Innovation Economy: Facing New Challenges (AKP, OLP), pp. 367–371.
- SFM-2008-Gillespie #biology #simulation
- Simulation Methods in Systems Biology (DTG), pp. 125–167.
- GT-VC-2007-Bruggink08 #graph transformation #proving #termination #towards
- Towards a Systematic Method for Proving Termination of Graph Transformation Systems (HJSB), pp. 23–38.
- CHI-2008-EverettGBWDST #performance
- Electronic voting machines versus traditional methods: improved preference, similar performance (SPE, KKG, MDB, DSW, KD, DS, TT), pp. 883–892.
- CHI-2008-KramerR #behaviour #modelling #word
- Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
- CHI-2008-ShiIGS #named
- PressureFish: a method to improve control of discrete pressure-based input (KS, PI, SG, SS), pp. 1295–1298.
- CAiSE-2008-NiknafsR #analysis
- Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
- EDOC-2008-CarbonJMN #collaboration #development
- A Method for Collaborative Development of Systems of Systems in the Office Domain (RC, GJ, DM, MN), pp. 339–345.
- EDOC-2008-EngelsA #architecture #concept #enterprise #evolution
- Service-Oriented Enterprise Architectures: Evolution of Concepts and Methods (GE, MA).
- EDOC-2008-SchropferS
- Introducing a Method to Derive an Enterprise-Specific SOA Operating Model (CS, MS), pp. 235–244.
- EDOC-2008-SimoninADTJN #architecture #development #enterprise #named
- EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (JS, FA, JPD, YLT, JMJ, BN), pp. 279–285.
- ICEIS-AIDSS-2008-BiscarriMLGBM #data mining #mining #variability
- A Data Mining Method Based on the Variability of the Customer Consumption — A Special Application on Electric Utility Companies (FB, IM, CL, JIG, JB, RM), pp. 370–374.
- ICEIS-AIDSS-2008-KompaoreMT #information retrieval #query
- Combining Indexing Methods and Query Sizes in Information Retrieval in French (DK, JM, LT), pp. 149–154.
- ICEIS-AIDSS-2008-PanahiT #clustering #hybrid #performance #problem
- An Efficient Hybrid Method for Clustering Problems (HP, RTM), pp. 288–294.
- ICEIS-AIDSS-2008-RokachMS #elicitation #recommendation
- Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System (LR, AM, AS), pp. 268–275.
- ICEIS-DISI-2008-MendezPM #testing
- Improving Software Test Strategy with a Method to Specify Test Cases (MSTC) (EMM, MAP, LEM), pp. 159–164.
- ICEIS-DISI-2008-SilveiraPM #enterprise #information management #integration #towards
- Towards a Method for Enterprise Information Systems Integration (RS, JP, EM), pp. 349–354.
- ICEIS-HCI-2008-LeivaCGA #development #maintenance #using #workflow
- A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
- ICEIS-ISAS1-2008-VlaanderenVP #web
- Improvement of a Web Engineering Method Applying Situational Method Engineering (KV, FV, OP), pp. 147–154.
- ICEIS-ISAS2-2008-EngelsHHJLRVW #architecture
- A Method for Engineering a True Service-Oriented Architecture (GE, AH, BH, OJ, ML, JPR, MV, JW), pp. 272–281.
- ICEIS-ISAS2-2008-GoekenA #framework
- IT Governance Frameworks as Methods (MG, SA), pp. 331–338.
- ICEIS-ISAS2-2008-SantosBBR #analysis #architecture #modelling #semantics
- A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
- ICEIS-ISAS2-2008-SchultK #adaptation #automation #concept #data mining #enterprise #mining #self
- Self-Adaptive Customizing with Data Mining Methods — A Concept for the Automatic Customizing of an ERP System with Data Mining Methods (RS, GK), pp. 70–75.
- CIKM-2008-BarskySTU #using
- A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
- CIKM-2008-HeW #feedback #information retrieval
- Translation enhancement: a new relevance feedback method for cross-language information retrieval (DH, DW), pp. 729–738.
- CIKM-2008-HsuC #predict #social
- A method to predict social annotations (MHH, HHC), pp. 1375–1376.
- CIKM-2008-ItoNHN #analysis #wiki
- Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
- CIKM-2008-LeeL #clustering #data type #multi #online
- A coarse-grain grid-based subspace clustering method for online multi-dimensional data streams (JWL, WSL), pp. 1521–1522.
- CIKM-2008-Moschitti #categorisation #kernel #relational #semantics #syntax
- Kernel methods, syntax and semantics for relational text categorization (AM), pp. 253–262.
- CIKM-2008-RazenteBTFT #approach #data access #metric #novel #optimisation #process #query #similarity
- A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
- CIKM-2008-ZubizarretaFCACGLV #multi #web
- A georeferencing multistage method for locating geographic context in web search (ÁZ, PdlF, JMC, MA, JCA, GGB, CL, JV), pp. 1485–1486.
- ECIR-2008-FishbeinE #classification #encoding
- Integrating Structure and Meaning: A New Method for Encoding Structure for Text Classification (JMF, CE), pp. 514–521.
- ECIR-2008-FishbeinE08a #classification #modelling #semantics
- Methods for Augmenting Semantic Models with Structural Information for Text Classification (JMF, CE), pp. 575–579.
- ECIR-2008-LoponenPJK #implementation #novel
- A Novel Implementation of the FITE-TRT Translation Method (AL, AP, KJ, HK), pp. 138–149.
- ECIR-2008-NaderiR #evaluation #graph #similarity
- Graph-Based Profile Similarity Calculation Method and Evaluation (HN, BR), pp. 637–641.
- ECIR-2008-VanB #hybrid #library #personalisation
- Hybrid Method for Personalized Search in Digital Libraries (TTV, MB), pp. 647–651.
- ECIR-2008-WuKT #information retrieval
- Book Search Experiments: Investigating IR Methods for the Indexing and Retrieval of Books (HW, GK, MT), pp. 234–245.
- ICML-2008-CevikalpTP #classification
- Nearest hyperdisk methods for high-dimensional classification (HC, BT, RP), pp. 120–127.
- ICML-2008-CunninghamSS #estimation #performance #process
- Fast Gaussian process methods for point process intensity estimation (JPC, KVS, MS), pp. 192–199.
- ICML-2008-HsiehCLKS #coordination #linear #scalability
- A dual coordinate descent method for large-scale linear SVM (CJH, KWC, CJL, SSK, SS), pp. 408–415.
- ICPR-2008-AliFG #estimation #parametricity
- Analytical method for MGRF Potts model parameter estimation (AMA, AAF, GLG), pp. 1–4.
- ICPR-2008-BorsN #estimation #kernel #modelling #probability
- Kernel bandwidth estimation in methods based on probability density function modelling (AGB, NN), pp. 1–4.
- ICPR-2008-BridsonA #analysis #approach #evaluation #geometry #layout #performance
- A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
- ICPR-2008-ChandraS #using
- A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
- ICPR-2008-ChenCC #performance
- A performance controllable octree construction method (ZC, HLC, WCC), pp. 1–4.
- ICPR-2008-Cleuziou #clustering
- An extended version of the k-means method for overlapping clustering (GC), pp. 1–4.
- ICPR-2008-Correa-MorrisRPE #incremental
- Incremental nested partition method (JCM, JRS, APP, DLEI), pp. 1–4.
- ICPR-2008-HuangLZ #detection
- A method of small object detection and tracking based on particle filters (YH, JL, CZ), pp. 1–4.
- ICPR-2008-HulkkonenH #detection #monitoring
- A minimum description length principle based method for signal change detection in machine condition monitoring (JJH, JVH), pp. 1–4.
- ICPR-2008-IshidaTIM #recognition
- A Hilbert warping method for camera-based finger-writing recognition (HI, TT, II, HM), pp. 1–5.
- ICPR-2008-IwahoriNWFK #performance #self
- Shape from self-calibration and Fast Marching Method (YI, TN, RJW, SF, HK), pp. 1–4.
- ICPR-2008-JiangDX #design
- An affinity propagation based method for vector quantization codebook design (WJ, FD, QLX), pp. 1–4.
- ICPR-2008-KangBK #3d #modelling #multi
- Multi-resolution 3D morphable models and its matching method (BNK, HB, DK), pp. 1–4.
- ICPR-2008-KawabataHS #agile #kernel
- A rapid anomalous region extraction method by iterative projection onto kernel eigenspace (SK, SH, KS), pp. 1–4.
- ICPR-2008-KobayashiO #strict
- Cone-restricted subspace methods (TK, NO), pp. 1–4.
- ICPR-2008-LeKM #clustering #graph
- Coring method for clustering a graph (TVL, CAK, IBM), pp. 1–4.
- ICPR-2008-LiL #incremental #segmentation
- An incremental method for accurate iris segmentation (PL, XL), pp. 1–4.
- ICPR-2008-LongJ #novel #online #recognition #word
- A novel orientation free method for online unconstrained cursive handwritten chinese word recognition (TL, LJ), pp. 1–4.
- ICPR-2008-Lu #performance
- Markerless human motion capture: An application of simulated annealing and Fast Marching Method (YL), pp. 1–4.
- ICPR-2008-LuJZ #detection #effectiveness #segmentation
- An effective method for detection and segmentation of the body of human in the view of a single stationary camera (HL, CJ, RZ), pp. 1–4.
- ICPR-2008-OkadaH #incremental #network #recognition #self
- Motion recognition based on Dynamic-Time Warping method with Self-Organizing Incremental Neural Network (SO, OH), pp. 1–4.
- ICPR-2008-PorroHTNDB #evaluation #performance
- Performance evaluation of relevance vector machines as a nonlinear regression method in real-world chemical spectroscopic data (DP, NHG, ITB, ON, AD, RJB), pp. 1–4.
- ICPR-2008-SaitohMK #analysis #performance
- Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
- ICPR-2008-Sakai #approach #classification #incremental #monte carlo
- Monte Carlo subspace method: An incremental approach to high-dimensional data classification (TS), pp. 1–4.
- ICPR-2008-SatoOKI #image #realtime
- Real-time image-based rendering system for virtual city based on image compression technique and eigen texture method (RS, SO, HK, KI), pp. 1–4.
- ICPR-2008-ThomasRCB #analysis #comparative
- Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
- ICPR-2008-TsuchiyaF #feature model #using
- A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
- ICPR-2008-VazquezRC #image #recognition
- A new image division for LBP method to improve face recognition under varying lighting conditions (HMV, EBGR, YCM), pp. 1–4.
- ICPR-2008-Wang #algorithm #string
- A new method to obtain the shift-table in Boyer-Moore’s string matching algorithm (YW), pp. 1–4.
- ICPR-2008-YamaguchiH #detection #image
- Improved percolation-based method for crack detection in concrete surface images (TY, SH), pp. 1–4.
- ICPR-2008-YangB08a #feature model #recognition #sketching
- Feature extraction method based on cascade noise elimination for sketch recognition (JY, HB), pp. 1–4.
- ICPR-2008-YangQ #analysis #component #detection #independence #network #using
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- ICPR-2008-ZhangK #automation #detection
- Automatic road sign detection method based on Color Barycenters Hexagon model (QZ, SiK), pp. 1–4.
- ICPR-2008-ZhangYLCG
- A covariance-based method for dynamic background subtraction (SZ, HY, SL, XC, WG), pp. 1–4.
- KDD-2008-CuiDSAJ #learning
- Learning methods for lung tumor markerless gating in image-guided radiotherapy (YC, JGD, GCS, BMA, SBJ), pp. 902–910.
- KDD-2008-KeerthiSCHL #linear #multi #scalability
- A sequential dual method for large scale multi-class linear svms (SSK, SS, KWC, CJH, CJL), pp. 408–416.
- KR-2008-Cortes-CalabuigDAB #approximate #database #fixpoint #performance #query
- Accuracy and Efficiency of Fixpoint Methods for Approximate Query Answering in Locally Complete Databases (ACC, MD, OA, MB), pp. 81–91.
- RecSys-2008-MaidelSST #evaluation #personalisation
- Evaluation of an ontology-content based filtering method for a personalized newspaper (VM, PS, BS, MTM), pp. 91–98.
- RecSys-2008-YildirimK #collaboration #problem #random
- A random walk method for alleviating the sparsity problem in collaborative filtering (HY, MSK), pp. 131–138.
- SEKE-2008-CuiSXM #architecture #design #reuse
- A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
- SEKE-2008-HeWTG #process #reuse
- A Systematic Method for Process Tailoring Based on Knowledge Reuse (XyH, YsW, YxT, JgG), pp. 38–41.
- SEKE-2008-QuNXZ #testing
- A Dynamic Adjusting Method for Test Case Prioritization (BQ, CN, BX, XZ), pp. 484–487.
- SEKE-2008-XieXLW #scheduling
- A Project Scheduling Method Based on Human Resource Availability (LX, JX, DL, QW), pp. 161–166.
- SEKE-2008-XiPLH #component #repository
- A Goal-oriented Mixed-granularity Component Selection Method for Huge Component Repositories (XX, JP, JL, SH), pp. 573–576.
- SIGIR-2008-ChenC #named #novel #summary #topic
- TSCAN: a novel method for topic summarization and content anatomy (CCC, MCC), pp. 579–586.
- SIGIR-2008-Diaz #retrieval
- A method for transferring retrieval scores between collections with non-overlapping vocabularies (FDD), pp. 805–806.
- SIGIR-2008-LeeCA #clustering #feedback #pseudo
- A cluster-based resampling method for pseudo-relevance feedback (KSL, WBC, JA), pp. 235–242.
- SIGIR-2008-LiT #documentation #image #word
- A word shape coding method for camera-based document images (LL, CLT), pp. 771–772.
- SIGIR-2008-WangFZ #case study #feedback
- A study of methods for negative relevance feedback (XW, HF, CZ), pp. 219–226.
- SIGIR-2008-YilmazKA #performance
- A simple and efficient sampling method for estimating AP and NDCG (EY, EK, JAA), pp. 603–610.
- MoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- MoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
- An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
- PPDP-2008-DeckerM #consistency #nondeterminism
- Classifying integrity checking methods with regard to inconsistency tolerance (HD, DM), pp. 195–204.
- PADL-2008-KellerCCSB #generative #monte carlo
- Specialising Simulator Generators for High-Performance Monte-Carlo Methods (GK, HCM, MMTC, DS, CBK), pp. 116–132.
- RE-2008-MakinoO #difference #generative
- A Method of Scenario Generation with Differential Scenario (MM, AO), pp. 337–338.
- RE-2008-Szoke #automation #scheduling #using
- A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
- REFSQ-2008-AlenljungP #named #requirements #tool support
- DESCRY: A Method for Evaluating Decision-Supporting Capabilities of Requirements Engineering Tools (BA, AP), pp. 52–57.
- REFSQ-2008-BrinkkemperWSV #approach #process #requirements
- Process Improvement in Requirements Management: A Method Engineering Approach (SB, IvdW, MS, JV), pp. 6–22.
- REFSQ-2008-FrickerG #framework #requirements
- Negotiation Constellations — Method Selection Framework for Requirements Negotiation (SF, PG), pp. 37–51.
- SAC-2008-AndresAN #experience #formal method #information management #using
- Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
- SAC-2008-AndronickN #embedded #protocol
- Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
- SAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
- An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
- SAC-2008-CimadamoreV #java #prolog #type inference
- Integrating Java and Prolog through generic methods and type inference (MC, MV), pp. 198–205.
- SAC-2008-DornS #3d #approximate #named #predict
- CReF: a central-residue-fragment-based method for predicting approximate 3-D polypeptides structures (MD, ONdS), pp. 1261–1267.
- SAC-2008-KuangZ #algorithm #detection #using
- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
- SAC-2008-NaderiRP #collaboration #graph #information retrieval #similarity
- A graph-based profile similarity calculation method for collaborative information retrieval (HN, BR, JMP), pp. 1127–1131.
- SAC-2008-RazenteBTT #feedback #image #query #retrieval #similarity
- Aggregate similarity queries in relevance feedback methods for content-based image retrieval (HLR, MCNB, AJMT, CTJ), pp. 869–874.
- SAC-2008-Santos-NetoRP #evaluation #information management #modelling #testing
- An evaluation of a model-based testing method for information systems (PdAdSN, RFR, CIPdSeP), pp. 770–776.
- SAC-2008-SchmitzAA #implementation #nondeterminism #order
- A method for defining the implementation order of software projects under uncertainty (EAS, AJA, CMdA), pp. 844–845.
- SAC-2008-TakanoC #documentation #feature model #feedback
- A light-weight feedback method for reconstructing a document vector space on a feature extraction model (KT, XC), pp. 1169–1170.
- SAC-2008-YuB #detection #effectiveness #multi #performance
- A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
- SAC-2008-ZhouZCZ #concept #ontology #semantics
- A method for semantics-based conceptual expansion of ontology (LZ, DZ, XC, CZ), pp. 1583–1587.
- FSE-2008-StylosM #api
- The implications of method placement on API learnability (JS, BAM), pp. 105–112.
- ICSE-2008-McCafferyPR #agile #assessment #hybrid #named #safety
- Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
- ICSE-2008-Murphy-HillB #refactoring #tool support
- Breaking the barriers to successful refactoring: observations and tools for extract method (ERMH, APB), pp. 421–430.
- ICSE-2008-WangCW #automation #distributed
- Four enhancements to automated distributed system experimentation methods (YW, AC, ALW), pp. 491–500.
- SPLC-2008-Krueger08b #product line
- Pragmatic Methods for Commercial Software Product Line Engineering Practice (CWK), p. 376.
- CC-2008-KhedkerK #analysis #data flow #interprocedural #performance #precise #string
- Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
- HPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety #using
- Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
- ICST-2008-BousquetS #inheritance
- Relation between Depth of Inheritance Tree and Number of Methods to Test (LdB, MRS), pp. 161–170.
- ICST-2008-KimC #object-oriented #sequence #source code #testing
- A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs (MK, YC), pp. 537–540.
- ICST-2008-RahaJ #automation #testing #xml
- Automation Method for Testing XML/DB/XML Layers (DR, MJ), pp. 458–464.
- ICST-2008-WongWQZ #effectiveness #fault #locality #statistics
- A Crosstab-based Statistical Method for Effective Fault Localization (WEW, TW, YQ, LZ), pp. 42–51.
- IJCAR-2008-HirokawaM #analysis #automation #complexity #dependence
- Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
- IJCAR-2008-SchmidtT #first-order #logic
- A General Tableau Method for Deciding Description Logics, Modal Logics and Related First-Order Fragments (RAS, DT), pp. 194–209.
- RTA-2008-Schmidt-SchaussM #call-by #finite #nondeterminism #simulation #λ-calculus
- A Finite Simulation Method in a Non-deterministic Call-by-Need λ-Calculus with Letrec, Constructors, and Case (MSS, EM), pp. 321–335.
- WICSA-2007-FalessiCK #architecture #design #question
- Do Architecture Design Methods Meet Architects’ Needs? (DF, GC, PK), p. 5.
- WICSA-2007-MurthyRH #refactoring
- Refactoring Methods (PVRM, TR, SH), p. 37.
- WICSA-2007-SangwanH #analysis #architecture #design #object-oriented
- Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
- ASE-2007-Easterbrook #empirical #re-engineering #research
- Empirical research methods for software engineering (SME), p. 574.
- ASE-2007-WapplerS #testing
- Improving evolutionary class testing in the presence of non-public methods (SW, IS), pp. 381–384.
- CASE-2007-ChengYT #evaluation #testing
- A Quantitative Knife-edge Testing Method for Local Deformation Evaluation in Optical Aspheric Fabrication (HC, YY, HT), pp. 818–822.
- CASE-2007-HablaDMPE
- A Short-Term Forecast Method for Demand Quantities in Semiconductor Manufacturing (CH, RD, LM, TP, HE), pp. 94–99.
- CASE-2007-NishiHI #problem #scheduling
- A Successive Lagrangian Relaxation Method for Solving Flowshop Scheduling Problems with Total Weighted Tardiness (TN, YH, MI), pp. 875–880.
- CASE-2007-NishiHIG #composition #generative #multi #scheduling
- A Decomposition Method with Cut Generation for Simultaneous Production Scheduling and Routing for multiple AGVs (TN, YH, MI, IEG), pp. 658–663.
- CASE-2007-ZhuangXZD #multi #optimisation #set
- Von Mises Stress and Level Set Method based Structural Topology Optimization with Multi-phase Materials (CZ, ZX, XZ, HD), pp. 945–949.
- DAC-2007-IwataYF
- A DFT Method for Time Expansion Model at Register Transfer Level (HI, TY, HF), pp. 682–687.
- DAC-2007-RastogiCK #on the
- On Estimating Impact of Loading Effect on Leakage Current in Sub-65nm Scaled CMOS Circuits Based on Newton-Raphson Method (AR, WC, SK), pp. 712–715.
- DAC-2007-TaylorP #combinator #design #logic #optimisation #physics
- Exact Combinatorial Optimization Methods for Physical Design of Regular Logic Bricks (BT, LTP), pp. 344–349.
- DAC-2007-VytyazLLMMM #parametricity
- Parameter Finding Methods for Oscillators with a Specified Oscillation Frequency (IV, DCL, SL, AM, UKM, KM), pp. 424–429.
- DAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
- Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
- DATE-2007-0004XJ #analysis #novel #statistics
- A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
- DATE-2007-BjerregaardSS #architecture #scalability
- A scalable, timing-safe, network-on-chip architecture with an integrated clock distribution method (TB, MBS, JS), pp. 648–653.
- DATE-2007-HongSCY #adaptation
- A two-tone test method for continuous-time adaptive equalizers (DH, SS, KTC, CPY), pp. 1283–1288.
- DATE-2007-KeezerMD #multi
- Method for reducing jitter in multi-gigahertz ATE (DCK, DM, PD), pp. 701–706.
- DATE-2007-LisselGG #design #industrial #perspective #verification
- Introducing new verification methods into a company’s design flow: an industrial user’s point of view (RL, JG), pp. 689–694.
- DATE-2007-SeongM #performance #taxonomy #using
- An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
- DATE-2007-SingheeR #monte carlo #novel #performance #simulation #statistics
- Statistical blockade: a novel method for very fast Monte Carlo simulation of rare circuit events, and its application (AS, RAR), pp. 1379–1384.
- DATE-2007-VerbauwhedeS #design #security #trust
- Design methods for security and trust (IV, PS), pp. 672–677.
- DATE-2007-XuC #array
- A cross-referencing-based droplet manipulation method for high-throughput and pin-constrained digital microfluidic arrays (TX, KC), pp. 552–557.
- DATE-2007-ZhuZCXZ #grid #probability #process
- A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology (HZ, XZ, WC, JX, DZ), pp. 1514–1519.
- DATE-2007-ZjajoAG #interactive #monitoring #parametricity #process
- Interactive presentation: BIST method for die-level process parameter variation monitoring in analog/mixed-signal integrated circuits (AZ, MJBA, JPdG), pp. 1301–1306.
- DocEng-2007-KimYHKK #documentation #modelling #scalability #xml
- A document object modeling method to retrieve data from a very large XML document (SMK, SIY, EH, TGK, IKK), pp. 59–68.
- DRR-2007-AndraNLZBBHST #effectiveness
- Frequency coding: an effective method for combining dichotomizers (SA, GN, CLL, IZ, EB, AB, LH, KMS, MT).
- ICDAR-2007-AbedM #comparison #feature model #preprocessor #recognition
- Comparison of Different Preprocessing and Feature Extraction Methods for Offline Recognition of Handwritten ArabicWords (HEA, VM), pp. 974–978.
- ICDAR-2007-AntonacopoulosB #analysis #framework #layout #performance
- Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
- ICDAR-2007-BaudrierR #image #visualisation
- A Method for Image Local-Difference Visualization (EB, AR), pp. 949–953.
- ICDAR-2007-ChenLJ #learning #pseudo #recognition
- Learning Handwritten Digit Recognition by the Max-Min Posterior Pseudo-Probabilities Method (XC, XL, YJ), pp. 342–346.
- ICDAR-2007-NejadR #identification #verification
- A New Method for Writer Identification and Verification Based on Farsi/Arabic Handwritten Texts (FN, MR), pp. 829–833.
- ICDAR-2007-PapavassiliouSKC #parametricity #verification
- A Parametric Spectral-Based Method for Verification of Text in Videos (VP, TS, VK, GC), pp. 879–883.
- ICDAR-2007-RabasseGF #synthesis
- A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
- ICDAR-2007-Renaudin #collaboration
- A General Method of Segmentation-Recognition Collaboration Applied to Pairs of Touching and Overlapping Symbols (CR), pp. 659–663.
- ICDAR-2007-TabboneZ #documentation #visual notation
- An Indexing Method for Graphical Documents (ST, DZ), pp. 789–793.
- ICDAR-2007-WuLFLX #2d #image #modelling
- A Model Based Book Dewarping Method to Handle 2D Images Captured by a Digital Camera (MW, RL, BF, WL, ZX), pp. 158–162.
- SIGMOD-2007-MorseP #performance #similarity
- An efficient and accurate method for evaluating time series similarity (MDM, JMP), pp. 569–580.
- VLDB-2007-ChenCB #estimation #performance
- A Simple and Efficient Estimation Method for Stream Expression Cardinalities (AC, JC, TB), pp. 171–182.
- VLDB-2007-WuJ #set
- A Bayesian Method for Guessing the Extreme Values in a Data Set (MW, CJ), pp. 471–482.
- CSEET-2007-FrezzaT #behaviour #developer #testing
- Testing as a Mental Discipline: Practical Methods for Affecting Developer Behavior (STF, MHT), pp. 355–356.
- ITiCSE-2007-CaronnaSMIHT #predict #using
- Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
- FASE-2007-DarvasL #implementation #reasoning
- Practical Reasoning About Invocations and Implementations of Pure Methods (ÁD, KRML), pp. 336–351.
- TACAS-2007-HarelS #flexibility #source code
- Planned and Traversable Play-Out: A Flexible Method for Executing Scenario-Based Programs, (DH, IS), pp. 485–499.
- WCRE-J-2005-ChristlKS07 #automation #clustering
- Automated clustering to support the reflexion method (AC, RK, MADS), pp. 255–274.
- SCAM-2007-JuilleratH #implementation #refactoring #towards
- Toward an Implementation of the “Form Template Method” Refactoring (NJ, BH), pp. 81–90.
- WCRE-2007-FrenzelKBA #product line
- Extending the Reflexion Method for Consolidating Software Variants into Product Lines (PF, RK, APJB, KA), pp. 160–169.
- STOC-2007-DunaganH
- Iteratively constructing preconditioners via the conjugate gradient method (JD, NJAH), pp. 207–216.
- STOC-2007-KieferLE #convergence #equation #on the #polynomial
- On the convergence of Newton’s method for monotone systems of polynomial equations (SK, ML, JE), pp. 217–226.
- CIAA-2007-Yli-JyraK #compilation #parallel
- A New Method for Compiling Parallel Replacement Rules (AYJ, KK), pp. 320–321.
- DLT-2007-EsparzaKL
- An Extension of Newton’s Method to ω-Continuous Semirings (JE, SK, ML), pp. 157–168.
- DLT-2007-Freivalds #automaton #finite #probability
- Non-constructive Methods for Finite Probabilistic Automata (RF), pp. 169–180.
- ICALP-2007-BlomerN
- Sampling Methods for Shortest Vectors, Closest Vectors and Successive Minima (JB, SN), pp. 65–77.
- SEFM-2007-AichernigPWW #consistency #formal method #industrial #protocol #testing
- Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
- SEFM-2007-Cousot #abstract interpretation #formal method
- The Rôle of Abstract Interpretation in Formal Methods (PC), pp. 135–140.
- CHI-2007-AndreasenNSS #empirical #testing #usability #what
- What happened to remote usability testing?: an empirical study of three methods (MSA, HVN, SOS, JS), pp. 1405–1414.
- CHI-2007-ZimmermanFE #design #human-computer #interactive #research
- Research through design as a method for interaction design research in HCI (JZ, JF, SE), pp. 493–502.
- DHM-2007-ChoiNCC #3d #generative
- A Method for Garment Pattern Generation by Flattening 3D Body Scan Data (YLC, YN, KMC, MHC), pp. 803–812.
- DHM-2007-DingYYYL #case study
- Study on the Appraisal Methods of Hand Fatigue (LD, FY, CY, XY, YL), pp. 33–41.
- DHM-2007-HelinVMAM #design #modelling
- Digital Human Model Based Participatory Design Method to Improve Work Tasks and Workplaces (KH, JV, JM, SA, TM), pp. 847–855.
- DHM-2007-LuoYZ #identification
- A Method for Gene Identification by Dynamic Feature Choosing (JL, LY, XZ), pp. 678–683.
- DHM-2007-NiuLS #3d #analysis #bibliography #comparison #perspective
- Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
- DHM-2007-Soltysinski #human-computer #interactive #multimodal #novel
- Novel Methods for Human-Computer Interaction in Multimodal and Multidimensional Noninvasive Medical Imaging (TS), pp. 717–726.
- DHM-2007-XiangZ07a #database #performance #retrieval #scalability
- Motion Retrieval Based on an Efficient Index Method for Large-Scale Mocap Database (JX, HZ), pp. 234–242.
- DHM-2007-ZhuXYM #detection #novel
- A Novel Method for Cloth-Body Collision Detection (XZ, SX, YY, TM), pp. 1056–1063.
- HCI-AS-2007-JeenHKLP #interactive #persuasion
- Persuasive Interaction Strategy for Self Diet System: Exploring the Relation of User Attitude and Intervention by Computerized Systematic Methods (YJ, JH, HK, KL, PP), pp. 450–458.
- HCI-AS-2007-KojimaIN #documentation #using
- Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
- HCI-AS-2007-LinKTKT #design #development #process #verification #visual notation
- Verification of Development of Scenarios Method and Visual Formats for Design Process (HL, MK, HT, HK, TT), pp. 1095–1101.
- HCI-IDU-2007-CortierdA #java #user interface #validation
- Formal Validation of Java/Swing User Interfaces with the Event B Method (AC, Bd, YAA), pp. 1062–1071.
- HCI-IDU-2007-DaimotoAMK #case study #research #safety
- Application of Micro-Scenario Method (MSM) to User Research for the Motorcycle’s Informatization — A Case Study for the Information Support System for Safety (HD, SA, MM, MK), pp. 49–57.
- HCI-IDU-2007-DomingoHM #comprehension #game studies #process
- A Game to Promote Understanding About UCD Methods and Process (MGD, MAH, EM), pp. 446–452.
- HCI-IDU-2007-Go #design
- A Scenario-Based Design Method with Photo Diaries and Photo Essays (KG), pp. 88–97.
- HCI-IDU-2007-KangY #difference #performance
- Age Differences in Performance, Operation Methods, and Workload While Interacting with an MP3 Player (NEK, WCY), pp. 854–861.
- HCI-IDU-2007-KoutsabasisSD #case study #evaluation #usability
- Evaluating Usability Evaluation Methods: Criteria, Method and a Case Study (PK, TS, JD), pp. 569–578.
- HCI-IDU-2007-ResterPWHMPO #evaluation #interactive
- Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
- HCI-IPT-2007-HuaP #data access #mobile
- WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
- HCI-IPT-2007-IshidoKIO #evaluation #interface
- Evaluation of Content Handling Methods for Tabletop Interface (RI, KK, TI, KiO), pp. 326–335.
- HCI-IPT-2007-LiK #automation #image
- A Color Adjustment Method for Automatic Seamless Image Blending (XL, DK), pp. 82–91.
- HCI-IPT-2007-OtsukiKNST #artificial reality #interactive #novel
- RealSound Interaction: A Novel Interaction Method with Mixed Reality Space by Localizing Sound Events in Real World (MO, AK, TN, FS, HT), pp. 653–662.
- HCI-IPT-2007-ParkSKPJ #composition #modelling #user interface
- User Customization Methods Based on Mental Models: Modular UI Optimized for Customizing in Handheld Device (BP, SS, JK, WP, HJ), pp. 445–451.
- HCI-IPT-2007-SongKPPJ #design
- Designing Input Method of Hand-Held Device with International User Studies (SS, JK, WP, BP, HJ), pp. 480–485.
- HCI-IPT-2007-WuH #visualisation
- The Perceptual Eye View: A User-Defined Method for Information Visualization (LHW, PYH), pp. 181–190.
- HCI-IPT-2007-XuRMMB #challenge #evaluation #user interface
- Evaluation of Tangible User Interfaces (TUIs) for and with Children — Methods and Challenges (DYX, JCR, EM, SM, MB), pp. 1008–1017.
- HCI-MIE-2007-ChanCCHH #detection #multi #using
- A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
- HCI-MIE-2007-LeePWP #artificial reality #robust
- Robust Gaze Tracking Method for Stereoscopic Virtual Reality Systems (ECL, KRP, MCW, JP), pp. 700–709.
- HCI-MIE-2007-NodaITF #adaptation #semantics #web
- An Adaptive Web Browsing Method for Various Terminals: A Semantic Over-Viewing Method (HN, TI, YT, SF), pp. 440–448.
- HIMI-IIE-2007-AndoM #education #student
- A New Method for Teachers and Students to Record Daily Progress in a Class (AA, KM), pp. 245–251.
- HIMI-IIE-2007-AnseT #evaluation
- Evaluation Method of e-Learning Materials by α-Wave and β-Wave of EEG (MA, TT), pp. 252–259.
- HIMI-IIE-2007-HorinouchiWAT #case study #effectiveness
- A Study of an Effective Rehearsal Method in e-Learning (TH, SW, MA, TT), pp. 328–336.
- HIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
- A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
- HIMI-IIE-2007-KusukawaMA #e-commerce
- Impact of E-Commerce Environment on Selection of Sales Methods Considering Delivery Lead Time of Goods (EK, SM, IA), pp. 929–938.
- HIMI-IIE-2007-ObayashiKTTHSIY #development
- Development of an Illumination Control Method to Improve Office Productivity (FO, MK, MT, KT, YH, HS, HI, HY), pp. 939–947.
- HIMI-IIE-2007-ShimodaIHIYOT #development #evaluation
- Development of Productivity Evaluation Method to Improve Office Environment (HS, KI, YH, HI, HY, FO, MT), pp. 965–972.
- HIMI-IIE-2007-YajimaWS #evaluation #information management #multi
- Evaluation of the Participant-Support Method for Information Acquisition in the “Multiplex Risk Communicator” (HY, TW, RS), pp. 195–203.
- HIMI-MTT-2007-Jeong #comprehension #using
- Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
- HIMI-MTT-2007-JiGC #comparison #using #word
- Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
- HIMI-MTT-2007-OkaMS #information management
- An Information Filtering Method Based on User’s Moods, Situations, and Preferences (MO, HM, MS), pp. 715–719.
- HIMI-MTT-2007-ParkK07a #case study #effectiveness #mobile
- A Case Study on Effective Application of Inquiry Methods to Find Out Mobile Phone’s New Function (SP, YK), pp. 163–170.
- HIMI-MTT-2007-SatoAT
- A Method for Constructing a Movie-Selection Support System Based on Kansei Engineering (NS, MA, TT), pp. 526–534.
- HIMI-MTT-2007-TsengTW #implementation #process
- Implementing the HCD Method into the Developing Process of a CPD System (KCT, THT, KCW), pp. 199–207.
- HIMI-MTT-2007-XuLSB
- A Method for Rule Extraction by Discernible Vector (EX, LS, ST, BY), pp. 779–784.
- HIMI-MTT-2007-YamamotoW #development #image
- Development of an Embodied Image Telecasting Method Via a Robot with Speech-Driven Nodding Response (MY, TW), pp. 1017–1025.
- HIMI-MTT-2007-YangDJB #human-computer
- Human-Friendly HCI Method for the Control of Home Appliance (SEY, JHD, HJ, ZB), pp. 218–226.
- OCSC-2007-DayF #analysis #community #concept #named #network #research
- CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
- OCSC-2007-SagaT #network #ranking #social
- Ranking Method for Mediators in Social Network (RS, HT), pp. 151–159.
- CAiSE-2007-DjebbiS #product line #requirements
- RED-PL, a Method for Deriving Product Requirements from a Product Line Requirements Model (OD, CS), pp. 279–293.
- CAiSE-2007-ThevenetS
- Aligning IS to Organization’s Strategy: The InStAlMethod (LHT, CS), pp. 203–217.
- CAiSE-2007-WeerdBV #concept #empirical #evolution #incremental #requirements #validation
- Concepts for Incremental Method Evolution: Empirical Exploration and Validation in Requirements Management (IvdW, SB, JV), pp. 469–484.
- ICEIS-AIDSS-2007-CuellarDP #algorithm #hybrid #network #problem
- Problems and Features of Evolutionary Algorithms to Build Hybrid Training Methods for Recurrent Neural Networks (MPC, MD, MdCPJ), pp. 204–211.
- ICEIS-AIDSS-2007-FurstT #concept #graph #ontology
- Heavyweight Ontology Matching — A Method and a Tool based on the Conceptual Graphs Model (FF, FT), pp. 265–270.
- ICEIS-DISI-2007-OsbornB #2d
- An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
- ICEIS-DISI-2007-RayG #using
- A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
- ICEIS-DISI-2007-SantosB #clustering #named #optimisation
- PIN: A partitioning and indexing optimization method for olap (RJS, JB), pp. 170–177.
- ICEIS-EIS-2007-KornyshovaS #multi #process #re-engineering
- Business Process Priorisation with Multicriteria Methods — Case of Business Process Reengineering (EK, CS), pp. 138–143.
- ICEIS-EIS-2007-MaamarBG #design #named #web #web service
- CP4WS — A Method for Designing and Developing Systems Based on Web Services (ZM, DB, CG), pp. 452–458.
- ICEIS-HCI-2007-Godet-BarRDJ #analysis #human-computer
- Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
- ICEIS-J-2007-Barjis07a #modelling #process #simulation #using
- A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
- CIKM-2007-EavisT #named #performance
- Mapgraph: efficient methods for complex olap hierarchies (TE, AT), pp. 465–474.
- CIKM-2007-GarakaniIHH #named #novel #query #xml
- Ntjfsatnot: a novel method for query with not-predicates on xml data (VG, SKI, MH, MH), pp. 885–888.
- CIKM-2007-InokuchiT #online
- A method for online analytical processing of text data (AI, KT), pp. 455–464.
- CIKM-2007-ShinL #data type #interactive #online
- An on-line interactive method for finding association rules data streams (SJS, WSL), pp. 963–966.
- ECIR-2007-CasanovaQB #comparison #multi #retrieval #standard
- Overall Comparison at the Standard Levels of Recall of Multiple Retrieval Methods with the Friedman Test (JMC, MAPQ, AB), pp. 682–685.
- ECIR-2007-HeD #classification #naive bayes #using
- Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
- ECIR-2007-PanLZTC #retrieval #video
- Retrieval Method for Video Content in Different Format Based on Spatiotemporal Features (XP, JL, YZ, ST, JC), pp. 728–731.
- ICML-2007-KimP #learning #recursion
- A recursive method for discriminative mixture learning (MK, VP), pp. 409–416.
- ICML-2007-KropotovV #learning #on the
- On one method of non-diagonal regularization in sparse Bayesian learning (DK, DV), pp. 457–464.
- ICML-2007-LinWK #scalability #trust
- Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
- ICML-2007-SriperumbudurTL #programming
- Sparse eigen methods by D.C. programming (BKS, DAT, GRGL), pp. 831–838.
- KDD-2007-ArnoldLA #modelling #visual notation
- Temporal causal modeling with graphical granger methods (AA, YL, NA), pp. 66–75.
- KDD-2007-DasguptaDHJM #classification #feature model
- Feature selection methods for text classification (AD, PD, BH, VJ, MWM), pp. 230–239.
- KDD-2007-DruckPMZ #classification #generative #hybrid
- Semi-supervised classification with hybrid generative/discriminative methods (GD, CP, AM, XZ), pp. 280–289.
- KDD-2007-WanNHL #privacy
- Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
- MLDM-2007-HulsmannF #algorithm #comparison #multi #novel #optimisation #parametricity
- Comparison of a Novel Combined ECOC Strategy with Different Multiclass Algorithms Together with Parameter Optimization Methods (MH, CMF), pp. 17–31.
- MLDM-2007-MendezCGRD #performance
- Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes (JRM, BC, DGP, FFR, FD), pp. 364–378.
- MLDM-2007-WangLYC #classification #data type #fuzzy #incremental #mining
- An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams (TW, ZL, YY, HC), pp. 91–103.
- SEKE-2007-HummelJA #component #performance #repository #retrieval
- Evaluating the Efficiency of Retrieval Methods for Component Repositories (OH, WJ, CA), pp. 404–409.
- SEKE-2007-LiZXS #classification #component #generative #ontology #retrieval
- Ontology Based Classification Generating Method for Browsing-Based Component Retrieval (GL, LZ, BX, WS), p. 428–?.
- SEKE-2007-ZanattaV #agile #integration #modelling #quality #requirements #towards
- Agile Methods and Quality Models: Towards an Integration in Requirements Engineering (ALZ, PV), pp. 173–178.
- SEKE-2007-ZiemerC #development #release planning #web
- Knowledge Sharing through a Simple Release Planning Method for Web Application Development (SZ, ICC), pp. 686–691.
- SIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
- An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
- SIGIR-2007-PopoviciMM #documentation #effectiveness
- An effective method for finding best entry points in semi-structured documents (EP, PFM, GM), pp. 851–852.
- SIGIR-2007-ThomasH
- Evaluating sampling methods for uncooperative collections (PT, DH), pp. 503–510.
- SIGIR-2007-TsaiLQCM #named #ranking
- FRank: a ranking method with fidelity loss (MFT, TYL, TQ, HHC, WYM), pp. 383–390.
- SIGIR-2007-YueFRJ #optimisation #precise
- A support vector method for optimizing average precision (YY, TF, FR, TJ), pp. 271–278.
- MoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
- A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
- MoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
- A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
- OOPSLA-2007-ShanerLN #composition #higher-order #source code #verification
- Modular verification of higher-order methods with mandatory calls specified by model programs (SMS, GTL, DAN), pp. 351–368.
- TOOLS-EUROPE-2007-DenkerDLM
- Sub-Method Reflection (MD, SD, AL, PM), pp. 275–295.
- TOOLS-EUROPE-2007-KusmierekB
- Hygienic methods Ñ Introducing HygJava (JDMK, VB), pp. 209–229.
- GPCE-2007-PirkelbauerSS #c++ #multi
- Open multi-methods for c++ (PP, YS, BS), pp. 123–134.
- REFSQ-2007-HerrmannKD
- Exploring the Characteristics of NFR Methods — A Dialogue About Two Approaches (AH, DK, JD), pp. 320–334.
- SAC-OOPS-J-2006-BeugnardS07 #encapsulation
- Method Overloading and Overriding Cause Distribution Transparency and Encapsulation Flaws (AB, SS), pp. 31–45.
- SAC-2007-BarratT #learning #recognition
- A progressive learning method for symbols recognition (SB, ST), pp. 627–631.
- SAC-2007-BoussellaaZA #hybrid #using
- A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
- SAC-2007-InokiF #approach #evolution #product line
- Software product line evolution method based on kaizen approach (MI, YF), pp. 1207–1214.
- SAC-2007-KarwaczynskiKMN #peer-to-peer #proximity
- Dual proximity neighbour selection method for peer-to-peer-based discovery service (PK, DK, JM, MN), pp. 590–591.
- SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-LinsS #algorithm #documentation
- A quantitative method for assessing algorithms to remove back-to-front interference in documents (RDL, JMMdS), pp. 610–616.
- SAC-2007-TetsuyaAHN #ad hoc #generative #network #using
- Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
- SAC-2007-TreeprapinKHN #mobile #network
- A mobile sensor control method for sparse sensor networks (KT, AK, TH, SN), pp. 886–890.
- SAC-2007-ZengS #combinator #geometry #optimisation #problem
- Semi-mechanization method for a unsolved optimization problem in combinatorial geometry (ZZ, MS), pp. 762–766.
- SPLC-2007-ChangK #adaptation #modelling #variability
- A Variability Modeling Method for Adaptable Services in Service-Oriented Computing (SHC, SDK), pp. 261–268.
- CC-2007-CheremR #analysis #lightweight #summary
- A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
- PPoPP-2007-LeeBSSSM #learning #modelling #parallel #performance
- Methods of inference and learning for performance modeling of parallel applications (BCL, DMB, BRdS, MS, KS, SAM), pp. 249–258.
- PPoPP-2007-ZhangSZSG #concurrent
- Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
- AMOST-2007-KorelKT #evaluation #heuristic #modelling
- Model-based test prioritization heuristic methods and their evaluation (BK, GK, LHT), pp. 34–43.
- CADE-2007-Baumgartner #logic
- Logical Engineering with Instance-Based Methods (PB), pp. 404–409.
- CADE-2007-GhilardiNRZ #infinity #model checking #satisfiability
- Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems (SG, EN, SR, DZ), pp. 362–378.
- CAV-2007-Kropf #debugging #development #formal method #industrial #question
- Software Bugs Seen from an Industrial Perspective or Can Formal Methods Help on Automotive Software Development? (TK), p. 3.
- ICLP-2007-Morozov #analysis #design #logic programming #visual notation
- Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
- LICS-2007-Hales #geometry #problem
- Some Methods of Problem Solving in Elementary Geometry (TCH), pp. 35–40.
- LICS-2007-MontanariP
- A Contraction Method to Decide MSO Theories of Deterministic Trees (AM, GP), pp. 141–150.
- TestCom-FATES-2007-DesmoulinV #generative #testing
- A New Method for Interoperability Test Generation (AD, CV), pp. 58–73.
- QoSA-2006-LiuGBHA #architecture #middleware #named
- MEMS: A Method for Evaluating Middleware Architectures (YL, IG, LB, CH, SA), pp. 9–26.
- ASE-2006-PontissoC #automation #formal method #modelling
- TOPCASED Combining Formal Methods with Model-Driven Engineering (NP, DC), pp. 359–360.
- ASE-2006-Singer #evaluation #testing #tool support
- Testing Tools and Techniques: A Mini-Tutorial on Evaluation Methods for ASE (JS), pp. 371–374.
- CASE-2006-CapachoPGD #assembly #heuristic #problem
- Heuristic Methods to Solve the Alternative Subgraphs Assembly Line Balancing Problem (LC, RP, OG, AD), pp. 501–506.
- CASE-2006-ChengSOYII #performance #scheduling
- A fast rescheduling method in semiconductor manufacturing allowing for tardiness and scheduling stability (MC, MS, JO, MY, HI, KI), pp. 100–105.
- CASE-2006-HuSHL #modelling #probability #using
- Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
- CASE-2006-LiLWC #automation #component #equation #generative #graph #linear #using
- Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
- CASE-2006-LiZY #development #fault #integration #probability #research
- Research on Computational Method of Fault Probability for New Product Development Based on Intelligence and Integration (FL, LZ, YY), pp. 319–324.
- CASE-2006-Mishima #development #evaluation #performance
- Development of a micro manufacturing system and its efficiency evaluation method (NM), pp. 478–483.
- CASE-2006-PiPS #problem
- Nested Partitions Method for the Local Pickup and Delivery Problem (LP, YP, LS), pp. 375–380.
- CASE-2006-SunXZ #adaptation #correlation #performance #self
- Self-adaptive Surge Adjustment based on Fast Correlation Integral Method in Centrifugal Compressors (TS, GX, CZ), pp. 661–666.
- CASE-2006-SunZF #convergence #parallel
- Convergence of parallel dynamic iteration methods for nonlinear DAEs of index-2 (WS, JHZ, XGF), pp. 129–133.
- CASE-2006-XiaoX #modelling #monitoring #process
- Monitoring of batch processes with non-linear modeling methods (YX, BX), pp. 140–143.
- DAC-2006-Gluska #verification
- Practical methods in coverage-oriented verification of the merom microprocessor (AG), pp. 332–337.
- DAC-2006-LiZJ #concurrent #named #network #proximity
- DyXY: a proximity congestion-aware deadlock-free dynamic routing method for network on chip (ML, QAZ, WBJ), pp. 849–852.
- DAC-2006-MeiR #robust
- A robust envelope following method applicable to both non-autonomous and oscillatory circuits (TM, JSR), pp. 1029–1034.
- DAC-2006-NakamuraTOTY #design #scalability
- Budgeting-free hierarchical design method for large scale and high-performance LSIs (YN, MT, TO, ST, KY), pp. 955–958.
- DAC-2006-TanimotoYNH #realtime #using
- A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
- DAC-2006-WuJYLT #estimation #functional
- A systematic method for functional unit power estimation in microprocessors (WW, LJ, JY, PL, SXDT), pp. 554–557.
- DATE-2006-HosseinabadyBBN #concurrent #testing
- A concurrent testing method for NoC switches (MH, AB, MNB, ZN), pp. 1171–1176.
- DATE-2006-JerinicLHM #functional #metric #verification
- New methods and coverage metrics for functional verification (VJ, JL, UH, DM), pp. 1025–1030.
- DATE-2006-KrautzP0TWV #detection #fault #formal method #logic #using
- Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
- DATE-2006-KunzliPBT #analysis #formal method #performance #simulation
- Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
- DATE-2006-Liu
- A practical method to estimate interconnect responses to variabilities (FL), pp. 545–546.
- DATE-2006-MeiR #analysis #performance #using
- Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
- DATE-2006-VandersteenBDR
- Systematic stability-analysis method for analog circuits (GV, SB, PD, YR), pp. 150–155.
- DATE-2006-ZengFSCZC #domain model #order #reduction
- Time domain model order reduction by wavelet collocation method (XZ, LF, YS, WC, DZ, CC), pp. 21–26.
- DRR-2006-WangDLL #authentication #documentation
- A new document authentication method by embedding deformation characters (XW, XD, HL, CL).
- VLDB-2006-RaoDTC #data analysis
- A Deferred Cleansing Method for RFID Data Analytics (JR, SD, HT, LSC), pp. 175–186.
- CSEET-2006-FrezzaT #behaviour #student #testing
- Testing as a Mental Discipline: Practical Methods for Affecting Student Behavior (STF, MHT), p. 241.
- ITiCSE-2006-DonyC #education #programming
- A tool for helping teach a programming method (ID, BLC), pp. 212–216.
- ICSM-2006-DraganCM #reverse engineering
- Reverse Engineering Method Stereotypes (ND, MLC, JIM), pp. 24–34.
- ICSM-2006-NgoT #fault #maintenance
- A Method to Aid Recovery and Maintenance of the Input Error Correction Features (MNN, HBKT), pp. 360–369.
- ICSM-2006-ShenM #architecture #named
- ESDM — A Method for Developing Evolutionary Scenarios for Analysing the Impact of Historical Changes on Architectural Elements (YS, NHM), pp. 45–54.
- ICSM-2006-TomaszewskiGL #fault #predict
- A Method for an Accurate Early Prediction of Faults in Modified Classes (PT, HG, LL), pp. 487–496.
- MSR-2006-ZimmermannBLL #mining
- Mining additions of method calls in ArgoUML (TZ, SB, CL, VBL), pp. 169–170.
- STOC-2006-AmbainisSW #bound #quantum #theorem #trade-off
- A new quantum lower bound method, : with applications to direct product theorems and time-space tradeoffs (AA, RS, RdW), pp. 618–633.
- STOC-2006-FischerRV #adaptation #convergence #performance
- Fast convergence to Wardrop equilibria by adaptive sampling methods (SF, HR, BV), pp. 653–662.
- FM-2006-BacheriniFTZ #formal method
- A Story About Formal Methods Adoption by a Railway Signaling Manufacturer (SB, AF, MT, NZ), pp. 179–189.
- FM-2006-BackesPW #encryption #formal method
- Formal Methods and Cryptography (MB, BP, MW), pp. 612–616.
- FM-2006-Boute #formal method #independence #problem #using
- Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
- FM-2006-Mostowski #java #logic #reasoning
- Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic (WM), pp. 444–459.
- FM-2006-Oheimb #formal method #security
- Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche (DvO), pp. 592–597.
- FM-2006-Stephan #formal method #lightweight #plugin #security
- Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline (WS), pp. 587–591.
- FM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented #using
- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
- SEFM-2006-Rushby06a #automation #formal method #named #tutorial
- Tutorial: Automated Formal Methods with PVS, SAL, and Yices (JMR), p. 262.
- SFM-2006-GuptaGW #hardware #satisfiability #verification
- SAT-Based Verification Methods and Applications in Hardware Verification (AG, MKG, CW), pp. 108–143.
- CHI-2006-GongT #evaluation #fault #metric
- A new error metric for text entry method evaluation (JG, PT), pp. 471–474.
- CHI-2006-GuanLCR #eye tracking
- The validity of the stimulated retrospective think-aloud method as measured by eye tracking (ZG, SL, EC, JR), pp. 1253–1262.
- CHI-2006-ProschowskySJ
- An intuitive text input method for touch wheels (MP, NS, NEJ), pp. 467–470.
- CHI-2006-RotoPKV #mobile #named #visualisation #web
- Minimap: a web page visualization method for mobile phones (VR, AP, AK, EV), pp. 35–44.
- CSCW-2006-PalenB
- Of pill boxes and piano benches: “home-made” methods for managing medication (LP, SAB), pp. 79–88.
- CAiSE-2006-HaggmarkA #analysis #logic #principle #why
- Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
- CAiSE-2006-Saeki #configuration management
- Configuration Management in a Method Engineering Context (MS), pp. 384–398.
- CAiSE-2006-ValderasPP #approach #development #towards #web
- Towards an End-User Development Approach for Web Engineering Methods (PV, VP, OP), pp. 528–543.
- EDOC-2006-Hashemzadeh #navigation #network #performance
- A Fast and Efficient Route Finding Method for Car Navigation Systems with Neural Networks (MH), pp. 423–426.
- ICEIS-AIDSS-2006-BoudjeloudP #data mining #interactive #mining
- Semi Interactive Method for Data Mining (LB, FP), pp. 3–10.
- ICEIS-AIDSS-2006-Grzeszczyk #evaluation #set
- Application of the Rough Set Method for Evaluation of Structural Funds Projects (TAG), pp. 202–207.
- ICEIS-HCI-2006-CoppolaCMFP #clustering #distance #empirical
- A Fuzzy-Based Distance to Improve Empirical Methods for Menu Clustering (CC, GC, SDM, FF, TP), pp. 59–64.
- ICEIS-ISAS-2006-BurmesterG #modelling
- Method for User Oriented Modelling of Data Warehouse Systems (LB, MG), pp. 366–374.
- ICEIS-ISAS-2006-Ohnishi #generative
- Supporting Methods of Generating Alternative Scenarios from a Normal Scenario (AO), pp. 110–117.
- CIKM-2006-HlaouaSB #feedback #retrieval #xml
- A structure-oriented relevance feedback method for XML retrieval (LH, KS, MB), pp. 780–781.
- CIKM-2006-LuPLA #feature model #identification #machine learning #query
- Coupling feature selection and machine learning methods for navigational query identification (YL, FP, XL, NA), pp. 682–689.
- CIKM-2006-TaylorZCRB #multi #optimisation #parametricity #ranking
- Optimisation methods for ranking functions with multiple parameters (MJT, HZ, NC, SR, CB), pp. 585–593.
- CIKM-2006-VieiraSPMCF #detection #performance #robust #web
- A fast and robust method for web page template detection and removal (KV, ASdS, NP, ESdM, JMBC, JF), pp. 258–267.
- ICML-2006-AgarwalHKS #algorithm
- Algorithms for portfolio management based on the Newton method (AA, EH, SK, RES), pp. 9–16.
- ICML-2006-ChapelleCZ #continuation
- A continuation method for semi-supervised SVMs (OC, MC, AZ), pp. 185–192.
- ICML-2006-GeurtsWd #kernel
- Kernelizing the output of tree-based methods (PG, LW, FdB), pp. 345–352.
- ICML-2006-Haffner #kernel #learning #performance
- Fast transpose methods for kernel learning on sparse data (PH), pp. 385–392.
- ICML-2006-VishwanathanSSM #probability #random
- Accelerated training of conditional random fields with stochastic gradient methods (SVNV, NNS, MWS, KPM), pp. 969–976.
- ICML-2006-XiaoSB #reduction
- A duality view of spectral methods for dimensionality reduction (LX, JS, SPB), pp. 1041–1048.
- ICPR-v1-2006-CaoN
- New RHT-Based Ellipsoid Recovery Method (CKC, TSN), pp. 622–625.
- ICPR-v1-2006-CaparG #concurrent #performance #recognition #segmentation
- Concurrent Segmentation and Recognition with Shape-Driven Fast Marching Methods (AÇ, MG), pp. 155–158.
- ICPR-v1-2006-CayouetteC #realtime
- Generic Real-Time Tracking Method on Semi-Dynamic Scenes (FC, JRC), pp. 711–714.
- ICPR-v1-2006-ChenCW #complexity #image
- LBT Based Low Complexity Image Compression Method (BC, LC, HW), pp. 941–944.
- ICPR-v1-2006-IshidaTIMM #generative #identification #learning
- Identification of degraded traffic sign symbols by a generative learning method (HI, TT, II, YM, HM), pp. 531–534.
- ICPR-v1-2006-KoTSH #image #learning #segmentation
- A New Image Segmentation Method for Removing Background of Object Movies by Learning Shape Priors (CHK, YPT, ZCS, YPH), pp. 323–326.
- ICPR-v1-2006-NieseAM #estimation #feature model
- A Stereo and Color-based Method for Face Pose Estimation and Facial Feature Extraction (RN, AAH, BM), pp. 299–302.
- ICPR-v1-2006-SchrotterZ #analysis #image #modelling #multi #robust
- Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
- ICPR-v1-2006-ViswanathP #clustering #hybrid #performance
- l-DBSCAN : A Fast Hybrid Density Based Clustering Method (PV, RP), pp. 912–915.
- ICPR-v1-2006-WangCWG #invariant #recognition #verification
- A Verification Method for Viewpoint Invariant Sign Language Recognition (QW, XC, CW, WG), pp. 456–459.
- ICPR-v1-2006-WangS #robust
- Background Subtraction Based on a Robust Consensus Method (HW, DS), pp. 223–226.
- ICPR-v1-2006-WuMLC #segmentation
- A New Method of Object Segmentation in the Basketball Videos (LW, XM, XL, SC), pp. 319–322.
- ICPR-v1-2006-XuS #robust
- A Robust and Accurate Method for Pupil Features Extra (ZX, PS), pp. 437–440.
- ICPR-v1-2006-ZhangG #human-computer #interface #kernel #locality
- A Kernel-based Signal Localization Method for NIRS Brain-computer Interfaces (HZ, CG), pp. 1158–1161.
- ICPR-v1-2006-ZhuWCW #classification #human-computer #interface #predict
- GMM-Based Classification Method for Continuous Prediction in Brain-Computer Interface (XZ, JW, YC, YW), pp. 1171–1174.
- ICPR-v2-2006-ChenS #graph #verification
- A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
- ICPR-v2-2006-ChouKC #nearest neighbour #reduction
- The Generalized Condensed Nearest Neighbor Rule as A Data Reduction Method (CHC, BHK, FC), pp. 556–559.
- ICPR-v2-2006-GanLY #analysis #detection
- Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
- ICPR-v2-2006-JiangDR #recognition #string
- Substring Alignment Method for Lexicon Based Handwritten Chinese String Recognition and Its Application to Address Line Recognition (YJ, XD, ZR), pp. 683–686.
- ICPR-v2-2006-JinM #learning #parametricity #recognition
- A Non-Parametric HMM Learning Method for Shape Dynamics with Application to Human Motion Recognition (NJ, FM), pp. 29–32.
- ICPR-v2-2006-KelmPM #classification #generative #learning #multi
- Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning (BMK, CP, AM), pp. 828–832.
- ICPR-v2-2006-KoideY #kernel #symmetry
- Asymmetric kernel method and its application to Fisher’s discriminant (NK, YY), pp. 820–824.
- ICPR-v2-2006-LeL #hybrid
- A Hybrid License Plate Extraction Method for Complex Scenes (WL, SL), pp. 324–327.
- ICPR-v2-2006-LiLW #feature model #hybrid #ranking
- A Hybrid Method of Unsupervised Feature Selection Based on Ranking (YL, BLL, ZFW), pp. 687–690.
- ICPR-v2-2006-LuX #estimation
- A PDE-Based Method For Optical Flow Estimation (ZL, WX), pp. 78–81.
- ICPR-v2-2006-MaceA #documentation #online
- A Generic Method for Eager Interpretation of On-Line Handwritten Structured Documents (SM, ÉA), pp. 1106–1109.
- ICPR-v2-2006-MahiniKDD #locality #performance
- An Efficient Features — Based License Plate Localization Method (HM, SK, FD, FD), pp. 841–844.
- ICPR-v2-2006-RaoGSK #image
- A Heterogeneous Feature-based Image Alignment Method (CR, YG, HSS, RK), pp. 345–350.
- ICPR-v2-2006-SadriSB #clustering #recognition
- A New Clustering Method for Improving Plasticity and Stability in Handwritten Character Recognition Systems (JS, CYS, TDB), pp. 1130–1133.
- ICPR-v2-2006-ShiratoriGK #performance #using
- An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
- ICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering #using
- Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
- ICPR-v2-2006-ViswanathJ #clustering #performance
- A Fast and Efficient Ensemble Clustering Method (PV, KJ), pp. 720–723.
- ICPR-v2-2006-YaslanC #classification #feature model #music #using
- Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ZÇ), pp. 573–576.
- ICPR-v2-2006-ZhengLY #kernel #learning #problem
- Weakly Supervised Learning on Pre-image Problem in Kernel Methods (WSZ, JHL, PCY), pp. 711–715.
- ICPR-v3-2006-BaudrierMNR #comparison #performance #quantifier
- A fast binary-image comparison method with local-dissimilarity quantification (EB, GM, FN, SR), pp. 216–219.
- ICPR-v3-2006-ChengC #problem
- A Complementary Ordering Method for Class Imbalanced Problem (HTC, CSC), pp. 429–432.
- ICPR-v3-2006-FujitaMH #detection
- A Method for Crack Detection on a Concrete Structure (YF, YM, YH), pp. 901–904.
- ICPR-v3-2006-HuangL #image #using
- A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
- ICPR-v3-2006-JinJL #image #modelling
- A Method of Reducing Speckle Noise of SAR Images Based on Wavelets and Wedgelet HMT Models (HyJ, LJ, FL), pp. 635–638.
- ICPR-v3-2006-KananFE #locality #performance #recognition #using
- An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
- ICPR-v3-2006-LenzS
- Lie Methods in Color Signal Processing: Illumination Effects (RL, MS), pp. 738–741.
- ICPR-v3-2006-NagasakiMKS #adaptation #classification #image
- A Coupon Classification Method Based on Adaptive Image Vector Matching (TN, KM, TK, HS), pp. 280–283.
- ICPR-v3-2006-PeiLX #detection #information retrieval
- A Method For IR Point Target Detection Based on Spatial-temporal Bilateral Filter (JP, ZL, WX), pp. 846–849.
- ICPR-v3-2006-PengWT #image #performance
- A New Efficient SVM-based Image Registration Method (DP, DW, JWT), pp. 782–785.
- ICPR-v3-2006-PozdnoukhovB #graph #invariant #kernel #pattern matching #pattern recognition #recognition
- Graph-based transformation manifolds for invariant pattern recognition with kernel methods (AP, SB), pp. 1228–1231.
- ICPR-v3-2006-RothausJL #comparison #estimation #parametricity
- Comparison of Methods for Hyperspherical Data Averaging and Parameter Estimation (KR, XJ, ML), pp. 395–399.
- ICPR-v3-2006-SalmonDW #detection
- A new method to detect arcs and segments from curvature profiles (JPS, IDR, LW), pp. 387–390.
- ICPR-v3-2006-SuSDW #multimodal #recognition
- A Multimodal and Multistage Face Recognition Method for Simulated Portrait (GS, YS, CD, JW), pp. 1013–1017.
- ICPR-v3-2006-XieQW
- Bootstrap Methods for Reject Rules of Fisher LDA (JX, ZQ, JW), pp. 425–428.
- ICPR-v3-2006-ZhengYYWY #agile #feature model #recognition
- A Complete and Rapid Feature Extraction Method for Face Recognition (YJZ, JYY, JY, XW, DY), pp. 469–472.
- ICPR-v4-2006-ChaiWJZ #novel #recognition
- A Novel Human Gait Recognition Method by Segmenting and Extracting the Region Variance Feature (YC, QW, JJ, RZ), pp. 425–428.
- ICPR-v4-2006-DuB #image #segmentation
- A New Hierarchical Image Segmentation Method (XD, TDB), pp. 108–112.
- ICPR-v4-2006-GurevichKMSV #analysis #automation
- Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
- ICPR-v4-2006-HeCTW
- Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
- ICPR-v4-2006-KwonYKL #clustering #using
- Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
- ICPR-v4-2006-LienY #performance #predict #using
- A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
- ICPR-v4-2006-LiuH #automation #predict #segmentation #speech
- A Bayesian Predictive Method for Automatic Speech Segmentation (ML, TSH), pp. 290–293.
- ICPR-v4-2006-PozdnoukhovB06a #graph #invariant #kernel #pattern matching #pattern recognition #recognition
- Graph-based transformation manifolds for invariant pattern recognition with kernel methods (AP, SB), p. 956.
- ICPR-v4-2006-ProencaA #identification #image #normalisation
- A Method for the Identification of Noisy Regions in Normalized Iris Images (HP, LAA), pp. 405–408.
- ICPR-v4-2006-SekoSHMK #image #lens #quote #scalability
- “Firefly capturing method”: Motion capturing by monocular camera with large spherical aberration of lens and Hough-transform-based image processing (YS, YS, HH, JM, HK), pp. 821–824.
- ICPR-v4-2006-TeshimaSOYI #estimation #image
- Vehicle Lateral Position Estimation Method Based on Matching of Top-View Images (TT, HS, SO, KY, TI), pp. 626–629.
- ICPR-v4-2006-VandeportaeleCMG #linear
- A New Linear Calibration Method for Paracatadioptric Cameras (BV, MC, PM, PG), pp. 647–651.
- ICPR-v4-2006-WuQ #geometry #identification #using
- A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
- ICPR-v4-2006-ZhangZX #segmentation
- A Two-level Method for Unsupervised Speaker-based Audio Segmentation (SZ, SZ, BX), pp. 298–301.
- KDD-2006-IwataSY #recommendation
- Recommendation method for extending subscription periods (TI, KS, TY), pp. 574–579.
- SEKE-2006-BaileyS #empirical #modelling #tool support
- Applying Models of Technology Adoption to Software Tools and Methods: An Empirical Study (SAB, SES), pp. 200–205.
- SEKE-2006-HuangC06a #nondeterminism #rule-based
- A New Method of Value-Adding Treatment Inference for Rule-based Uncertainty Knowledge (CJH, MYC), pp. 51–56.
- SEKE-2006-HuangH #modelling #object-oriented
- A Method for Modeling Object-Oriented Systems with PZ nets (YH, XH), pp. 456–462.
- SEKE-2006-ZengA #classification #multi #representation
- Classification by Multi-Perspective Representation Method (JZ, RA), pp. 85–90.
- SIGIR-2006-AslamPY #evaluation #statistics #using
- A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
- SIGIR-2006-DiaoS #summary #web
- A new web page summarization method (QD, JS), pp. 639–640.
- SIGIR-2006-NaguraSKA #documentation #rating #web
- A method of rating the credibility of news documents on the web (RN, YS, NK, MA), pp. 683–684.
- OOPSLA-2006-CavazosO #compilation #using
- Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
- GPCE-2006-LeavensABBCFHJMJSSS #roadmap #verification
- Roadmap for enhanced languages and methods to aid verification (GTL, JRA, DSB, MJB, AC, KF, ECRH, CBJ, DM, SLPJ, MS, DRS, AS), pp. 221–236.
- SAC-2006-Beugnard #assembly #component #empirical #encapsulation
- Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components (AB), pp. 1424–1428.
- SAC-2006-CavalinBBSO #recognition #string
- An implicit segmentation-based method for recognition of handwritten strings of characters (PRC, AdSBJ, FB, RS, LESdO), pp. 836–840.
- SAC-2006-ChenJH #detection #fault #generative #multi #sequence #testing
- A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences (KC, FJ, CdH), pp. 1791–1797.
- SAC-2006-ChenPSW
- An integrated computational proteomics method to extract protein targets for Fanconi Anemia studies (JYC, SLP, CS, MW), pp. 173–179.
- SAC-2006-KramerMH #case study #elicitation #mobile #using
- Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
- SAC-2006-LangstonPSSV #data analysis
- Innovative computational methods for transcriptomic data analysis (MAL, ADP, AMS, JAS, BHV), pp. 190–194.
- SAC-2006-PetrakisKVM #feedback #image #retrieval #web
- Relevance feedback methods for logo and trademark image retrieval on the web (EGMP, KK, EV, EEM), pp. 1084–1088.
- SAC-2006-ReeveHB #named #summary
- BioChain: lexical chaining methods for biomedical text summarization (LHR, HH, ADB), pp. 180–184.
- SAC-2006-SchmidtT #design #development #guidelines #ubiquitous
- Methods and guidelines for the design and development of domestic ubiquitous computing applications (AS, LT), pp. 1928–1929.
- SAC-2006-WinterS #design #modelling #perspective
- Reference modeling and method construction: a design science perspective (RW, JS), pp. 1561–1562.
- ICSE-2006-Abrial #formal method #industrial #problem
- Formal methods in industry: achievements, problems, future (JRA), pp. 761–768.
- ICSE-2006-HazzanD #development #education #framework
- Teaching framework for software development methods (OH, YD), pp. 703–706.
- ICSE-2006-LiHSL #programming #release planning
- A risk-driven method for eXtreme programming release planning (ML, MH, FS, JL), pp. 423–430.
- ICSE-2006-MaurerM #agile #industrial #towards
- Agile methods: moving towards the mainstream of the software industry (FM, GM), pp. 1057–1058.
- SPL-BOOK-2006-Immonen #architecture #predict #reliability
- A Method for Predicting Reliability and Availability at the Architecture Level (AI), pp. 373–422.
- SPL-BOOK-2006-ReuysRKP #product line #testing
- The ScenTED Method for Testing Software Product Lines (AR, SR, EK, KP), pp. 479–520.
- SPL-BOOK-2006-RommesA #architecture #product line
- A Scenario-Based Method for Software Product Line Architecting (ER, PA), pp. 3–52.
- SPLC-2006-Krueger #development #product line
- New Methods in Software Product Line Development (CWK), pp. 95–102.
- SPLC-2006-Krueger06a #generative #named #product line #tutorial
- Tutorial: New Methods Behind the New Generation of Software Product Line Success Stories (CWK), p. 216.
- HPCA-2006-VenkatesanHR #agile
- Retention-aware placement in DRAM (RAPID): software methods for quasi-non-volatile DRAM (RKV, SH, ER), pp. 155–165.
- HPDC-2006-DjerrahCCR #bound #framework #optimisation #problem
- Bob++: Framework for Solving Optimization Problems with Branch-and-Bound methods (AD, BLC, VDC, CR), pp. 369–370.
- CAV-2006-Harel #aspect-oriented #game studies #source code #verification
- Playing with Verification, Planning and Aspects: Unusual Methods for Running Scenario-Based Programs (DH), pp. 3–4.
- CAV-2006-SenV #model checking #parallel #source code #thread
- Model Checking Multithreaded Programs with Asynchronous Atomic Methods (KS, MV), pp. 300–314.
- IJCAR-2006-BaumgartnerS #bottom-up #generative
- Blocking and Other Enhancements for Bottom-Up Model Generation Methods (PB, RAS), pp. 125–139.
- IJCAR-2006-ChaudhuriPP #logic
- A Logical Characterization of Forward and Backward Chaining in the Inverse Method (KC, FP, GP), pp. 97–111.
- LICS-2006-Bryant #infinity #using #verification
- Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 3–4.
- MBT-2006-BraspenningMR #development #integration #modelling #testing
- A Model-based Integration and Testing Method to Reduce System Development Effort (NCWMB, JMvdMF, JER), pp. 13–28.
- MBT-2006-ConradK #classification #embedded
- An Extension of the Classification-Tree Method for Embedded Systems for the Description of Events (MC, AK), pp. 3–11.
- RTA-2006-Bryant #infinity #using #verification
- Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
- SAT-2006-HsuM #satisfiability
- Characterizing Propagation Methods for Boolean Satisfiability (EIH, SAM), pp. 325–338.
- SAT-2006-HyvarinenJN #satisfiability
- A Distribution Method for Solving SAT in Grids (AEJH, TAJ, IN), pp. 430–435.
- VMCAI-2006-JaffarSV #abstraction #composition
- A CLP Method for Compositional and Intermittent Predicate Abstraction (JJ, AES, RV), pp. 17–32.
- VMCAI-2006-Mine #abstract domain #precise
- Symbolic Methods to Enhance the Precision of Numerical Abstract Domains (AM), pp. 348–363.
- WICSA-2005-SagarduiAE #architecture #experience
- The ADOV Method: an Experience in Selecting the Relevant Views of an Architecture in a SME (GSM, GA, LE), pp. 259–260.
- WICSA-2005-WangSM #analysis #architecture #named
- ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
- DAC-2005-PengL #named #performance #power management #using
- Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method (YP, XL), pp. 813–818.
- DAC-2005-Rossi #design #formal method #question #scalability #verification
- Can we really do without the support of formal methods in the verification of large designs? (UR), pp. 672–673.
- DAC-2005-SuWKLK #analysis #effectiveness #embedded #functional #performance
- A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
- DAC-2005-TiwaryR #megamodelling #on-demand #scalability
- Scalable trajectory methods for on-demand analog macromodel extraction (SKT, RAR), pp. 403–408.
- DAC-2005-XuGFM
- A green function-based parasitic extraction method for inhomogeneous substrate layers (CX, RG, TSF, KM), pp. 141–146.
- DATE-2005-AsadiT #estimation #probability
- An Accurate SER Estimation Method Based on Propagation Probability (GA, MBT), pp. 306–307.
- DATE-2005-DykaL #encryption #hardware #implementation #performance
- Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
- DATE-2005-KumarLTW #multi #probability #process #statistics
- A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching (YSK, JL, CT, JMW), pp. 770–775.
- DATE-2005-LiauS
- Computational Intelligence Characterization Method of Semiconductor Device (EL, DSL), pp. 456–461.
- DATE-2005-LiS #performance #simulation
- An Efficiently Preconditioned GMRES Method for Fast Parasitic-Sensitive Deep-Submicron VLSI Circuit Simulation (ZL, CJRS), pp. 752–757.
- DATE-2005-Takeuchi #debugging #lightweight #monitoring #using #virtual machine
- OS Debugging Method Using a Lightweight Virtual Machine Monitor (TT), pp. 1058–1059.
- DATE-2005-TiriV #constant #design #difference #logic #power management
- Design Method for Constant Power Consumption of Differential Logic Circuits (KT, IV), pp. 628–633.
- DocEng-2005-SimskeLA #classification #image #statistics
- A statistical method for binary classification of images (SJS, DL, JSA), pp. 127–129.
- DRR-2005-WangDJH #recognition #statistics
- New statistical method for machine-printed Arabic character recognition (HW, XD, JJ, MH), pp. 127–135.
- ICDAR-2005-Aradhye
- A Generic Method for Determining the Up/Down Orientation of Text in Roman and Non-roman Scripts (HBA), pp. 187–191.
- ICDAR-2005-BulacuS #clustering #comparison #identification #verification
- A Comparison of Clustering Methods for Writer Identification and Verification (MB, LS), pp. 1275–1279.
- ICDAR-2005-EzakiKMBS #detection
- Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons (NE, KK, BTM, MB, LS), pp. 257–261.
- ICDAR-2005-FarooqGP #documentation #preprocessor
- Pre-processing Methods for Handwritten Arabic Documents (FF, VG, MPP), pp. 267–271.
- ICDAR-2005-FinkP #feature model #independence #on the #recognition
- On Appearance-Based Feature Extraction Methods for Writer-Independent Handwritten Text Recognition (GAF, TP), pp. 1070–1074.
- ICDAR-2005-HeDDK #comparison #documentation
- A Comparison of Binarization Methods for Historical Archive Documents (JH, QDMD, ACD, JHK), pp. 538–542.
- ICDAR-2005-HeTFDY #identification #novel
- A Novel Method for Off-line Handwriting-based Writer Identification (ZH, YYT, BF, JD, XY), pp. 242–246.
- ICDAR-2005-KangG #ranking #recognition
- A New Feature Ranking Method in a HMM-Based Handwriting Recognition System (SK, VG), pp. 779–783.
- ICDAR-2005-KboubiCA #evaluation #recognition
- Table Recognition Evaluation and Combination Methods (FK, AHC, MBA), pp. 1237–1241.
- ICDAR-2005-LeeI #performance #recognition #word
- A Simple and Efficient Method for Global Handwritten Word Recognition Applied to Brazilian Bankchecks (LLL, SI), pp. 950–955.
- ICDAR-2005-LiSC #analysis #matrix #multi
- A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
- ICDAR-2005-LiuLCL #performance #recognition
- Fast Vector Matching Methods and Their Applications to Handwriting Recognition (YHL, WHL, FC, CCL), pp. 871–877.
- ICDAR-2005-MandalCDC #automation #identification #segmentation
- A Hierarchical Method for Automated Identification and Segmentation of Forms (SM, SPC, AKD, BC), pp. 705–709.
- ICDAR-2005-NomuraYOK #effectiveness #image #recognition
- A Proposal of the Effective Recognition Method for Low-Resolution Characters from Motion Images (MN, KY, HO, KK), pp. 720–724.
- ICDAR-2005-PervouchineLM
- Three-stage Handwriting Stroke Extraction Method with Hidden Loop Recovery (VP, GL, KM), pp. 307–311.
- ICDAR-2005-RaghavendraNSRS #learning #online #prototype #recognition
- Prototype Learning Methods for Online Handwriting Recognition (BSR, CKN, GS, AGR, MS), pp. 287–291.
- ICDAR-2005-ShimaOY
- A Form Dropout Method based on Line-elimination and Image-subtraction (YS, HO, MY), pp. 126–130.
- ICDAR-2005-TerasawaNK #documentation #image #retrieval
- Eigenspace Method for Text Retrieval in Historical Document Images (KT, TN, TK), pp. 437–441.
- ICDAR-2005-TerashimaSKW #3d #representation
- Method for Representing 3-D Virtual Origami (TT, HS, JK, TW), pp. 1211–1215.
- ICDAR-2005-YangYS
- A New Method of Recognizing Chinese Fonts (ZY, LY, CYS), pp. 962–966.
- PODS-2005-Dobra #approximate #question
- Histograms revisited: when are histograms the best approximation method for aggregates over joins? (AD), pp. 228–237.
- PODS-2005-Gehrke #analysis #modelling #privacy #tutorial
- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
- SIGMOD-2005-PapadiasMH #clustering #concept #monitoring #nearest neighbour #performance
- Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring (KM, MH, DP), pp. 634–645.
- VLDB-2005-BartaCM #data access #multi #query #summary #xml
- Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
- VLDB-2005-IoannidisK #information retrieval #modelling #personalisation #perspective
- Personalized Systems: Models and Methods from an IR and DB Perspective (YEI, GK), p. 1365.
- CSEET-2005-Cowling #approach #diagrams #formal method
- Translating Diagrams: A New Approach to Introducing Formal Methods (AJC), pp. 121–128.
- ITiCSE-2005-Deibel #interactive
- Team formation methods for increasing interaction during in-class group work (KD), pp. 291–295.
- WRLA-2004-JohnsenOA05 #concurrent #runtime
- A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls (EBJ, OO, EWA), pp. 375–392.
- ICSM-2005-LuoZS #clustering #composition #identification #object-oriented
- A Hierarchical Decomposition Method for Object-Oriented Systems Based on Identifying Omnipresent Clusters (JL, LZ, JS), pp. 647–650.
- ICSM-2005-SalahDMSV #named #reverse engineering #sequence
- Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
- IWPC-2005-Storey #comprehension #past present future #tool support
- Theories, Methods and Tools in Program Comprehension: Past, Present and Future (MADS), pp. 181–191.
- MSR-2005-RoblesG #developer #identification
- Developer identification methods for integrated data from various sources (GR, JMGB), pp. 66–70.
- PASTE-2005-Hamlet #formal method #invariant #testing
- Invariants and state in testing and formal methods (DH), pp. 48–51.
- WCRE-2005-ChristlKS #automation #clustering
- Equipping the Reflexion Method with Automated Clustering (AC, RK, MADS), pp. 89–98.
- ICALP-2005-SpalekS #quantum
- All Quantum Adversary Methods Are Equivalent (RS, MS), pp. 1299–1311.
- FM-2005-Broadfoot #cost analysis #formal method #industrial
- ASD Case Notes: Costs and Benefits of Applying Formal Methods to Industrial Control Software (GHB), pp. 548–551.
- FM-2005-Gaudel #approximate #correctness #formal method #testing
- Formal Methods and Testing: Hypotheses, and Correctness Approximations (MCG), pp. 2–8.
- FM-2005-Johnson #debugging #formal method #using
- The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions (CWJ), pp. 9–25.
- IFM-2005-BodeveixFLM #domain-specific language #formal method
- Formal Methods Meet Domain Specific Languages (JPB, MF, JLL, GM), pp. 187–206.
- IFM-2005-Lang #composition #flexibility #on the fly #partial order #verification
- Exp.Open 2.0: A Flexible Tool Integrating Partial Order, Compositional, and On-The-Fly Verification Methods (FL), pp. 70–88.
- IFM-2005-PaigeB #agile #formal method
- Agile Formal Method Engineering (RFP, PJB), pp. 109–128.
- IFM-2005-Parnas #documentation #product line
- A Family of Mathematical Methods for Professional Software Documentation (DLP), pp. 1–4.
- SEFM-2005-DorofeevaYEC #evaluation #testing
- Experimental Evaluation of FSM-Based Testing Methods (RD, NY, KEF, ARC), pp. 23–32.
- SEFM-2005-Hall #formal method
- Making Formal Methods Work (AH), pp. 261–262.
- SFM-2005-AcquavivaABBBL #formal method #impact analysis #power management #predict
- A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management (AA, AA, MB, AB, EB, EL), pp. 155–189.
- CHI-2005-MankoffFT #case study #comparative #web
- Is your web page accessible?: a comparative study of methods for assessing web page accessibility for the blind (JM, HF, TT), pp. 41–50.
- CHI-2005-SauroK #metric #standard #usability
- A method to standardize usability metrics into a single score (JS, EK), pp. 401–409.
- VISSOFT-2005-DucasseLR #comprehension #multi #using
- Multi-level Method Understanding Using Microprints (SD, ML, RR), pp. 33–38.
- SIGAda-2005-Davis #formal method #re-engineering
- The affordable application of formal methods to software engineering (JFD), pp. 57–62.
- CAiSE-2005-NetoRP #automation #information management #testing
- A Method for Information Systems Testing Automation (PdAdSN, RFR, CIPdSeP), pp. 504–518.
- EDOC-2005-Molina-JimenezSW #contract #interactive #specification
- A Method for Specifying Contract Mediated Interactions (CMJ, SKS, JPW), pp. 106–118.
- ICEIS-v3-2005-KloseKB #integration #modelling #process #specification
- Process Modelling for Service Processes — Modelling Methods Extensions for Specifying and Analysing Customer Integration (KK, RK, JB), pp. 260–265.
- ICEIS-v3-2005-TanL #enterprise #framework #modelling #problem #simulation #using
- Enterprise Infrastructure Planning — Modelling and Simulation Using the Problem Articulation Method (ST, KL), pp. 240–245.
- ICEIS-v3-2005-YangLZ #analysis #performance #process
- A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
- ICEIS-v4-2005-OnoMK #evaluation #online
- Evaluation of Methods for Converting Request for Quotation Data into Ordinal Preference Data: Estimating Product Preference in Online Shopping System (TO, HM, NK), pp. 24–31.
- CIKM-2005-ArvolaJK #information retrieval #xml
- Generalized contextualization method for XML information retrieval (PA, MJ, JK), pp. 20–27.
- CIKM-2005-ZhuYL #distributed #rank
- Distributed PageRank computation based on iterative aggregation-disaggregation methods (YZ, SY, XL), pp. 578–585.
- ECIR-2005-CamposFH #diagrams #documentation #evaluation #retrieval #strict
- Improving the Context-Based Influence Diagram Model for Structured Document Retrieval: Removing Topological Restrictions and Adding New Evaluation Methods (LMdC, JMFL, JFH), pp. 215–229.
- ECIR-2005-ChenDWLZ #feature model
- AP-Based Borda Voting Method for Feature Extraction in TRECVID-2004 (LC, DD, DW, FL, BZ), pp. 568–570.
- ECIR-2005-SkopalM #data access #metric #performance
- Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
- ICML-2005-BachJ #composition #kernel #predict #rank
- Predictive low-rank decomposition for kernel methods (FRB, MIJ), pp. 33–40.
- ICML-2005-DaumeM #approximate #learning #optimisation #predict #scalability
- Learning as search optimization: approximate large margin methods for structured prediction (HDI, DM), pp. 169–176.
- ICML-2005-HillD #adaptation #classification #problem
- Adapting two-class support vector classification methods to many class problems (SIH, AD), pp. 313–320.
- ICML-2005-IlghamiMNA #approximate #learning
- Learning approximate preconditions for methods in hierarchical plans (OI, HMA, DSN, DWA), pp. 337–344.
- ICML-2005-Joachims #metric #multi #performance
- A support vector method for multivariate performance measures (TJ), pp. 377–384.
- ICML-2005-MannorPR #classification
- The cross entropy method for classification (SM, DP, RYR), pp. 561–568.
- ICML-2005-NguyenH #performance
- An efficient method for simplifying support vector machines (DN, TBH), pp. 617–624.
- ICML-2005-ShaS #analysis #reduction
- Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
- ICML-2005-ZhuL #graph #induction #learning #modelling #scalability
- Harmonic mixtures: combining mixture models and graph-based methods for inductive and scalable semi-supervised learning (XZ, JDL), pp. 1052–1059.
- LSO-2005-BjornsonS #framework #process
- Harvesting Knowledge through a Method Framework in an Electronic Process Guide (FOB, TS), pp. 107–111.
- LSO-2005-DingsoyrB #using
- Using Open Space Technology as a Method to Share Domain Knowledge (TD, FOB), pp. 102–106.
- MLDM-2005-Boulle #category theory #scalability
- A Grouping Method for Categorical Attributes Having Very Large Number of Values (MB), pp. 228–242.
- MLDM-2005-GhoshGYB #algorithm #analysis #comparative #network #search-based
- Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
- MLDM-2005-HalveyKS #clustering #internet #navigation #predict #using
- Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
- MLDM-2005-LegrandN #feature model #using
- Feature Selection Method Using Preferences Aggregation (GL, NN), pp. 203–217.
- MLDM-2005-TakigawaKN #classification #combinator #product line #set #subclass
- The Convex Subclass Method: Combinatorial Classifier Based on a Family of Convex Sets (IT, MK, AN), pp. 90–99.
- SEKE-2005-BabarNJ #architecture #bibliography #framework #using
- Assessing a Framework of Comparing Architecture Review Methods Using CMMI (MAB, MN, DRJ), pp. 400–403.
- SEKE-2005-BeydounGLH #metamodelling #multi #towards #validation
- Towards Method Engineering for Multi-Agent Systems: A preliminary validation of a Generic MAS Metamodel (GB, CGP, GL, BHS), pp. 51–56.
- SEKE-2005-HongCC #fuzzy #learning #performance
- Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method (CMH, CMC, HYC), pp. 556–595.
- SIGIR-2005-AslamYP #metric #retrieval
- The maximum entropy method for analyzing retrieval measures (JAA, EY, VP), pp. 27–34.
- SIGIR-2005-HawkingT #hybrid
- Server selection methods in hybrid portal search (DH, PT), pp. 75–82.
- SIGIR-2005-LiY #analysis #recursion
- Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
- SIGIR-2005-SekiM #categorisation #ontology
- An application of text categorization methods to gene ontology annotation (KS, JM), pp. 138–145.
- SIGIR-2005-YangYZK #adaptation #benchmark #evaluation #robust
- Robustness of adaptive filtering methods in a cross-benchmark evaluation (YY, SY, JZ, BK), pp. 98–105.
- SIGIR-2005-ZhuJXG #classification #multi #using
- Multi-labelled classification using maximum entropy method (SZ, XJ, WX, YG), pp. 274–281.
- PPDP-2005-Mitchell #analysis #logic #network #protocol #security
- Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
- RE-2005-DorrKKOS #case study #industrial #non-functional #requirements
- Non-Functional Requirements in Industry — Three Case Studies Adopting an Experience-based NFR Method (JD, DK, TK, TO, TS), pp. 373–384.
- SAC-2005-BraunWHW #approach
- Method construction — a core approach to organizational engineering (CB, FW, MH, RW), pp. 1295–1299.
- SAC-2005-ChenCG #biology #database #query
- A complex biological database querying method (JYC, JVC, NG), pp. 110–114.
- SAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
- MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
- SAC-2005-DuanHW #detection #network
- Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
- SAC-2005-FradkinK #classification #learning
- Methods for learning classifier combinations: no clear winner (DF, PBK), pp. 1038–1043.
- SAC-2005-JangSSH #comparison #identification
- A comparison on information fusion methods for air target identification (DJ, SYS, CYS, CCH), pp. 45–46.
- SAC-2005-JayadevaprakashMP #generative #graph #transitive #using
- Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
- SAC-2005-KaminaT #composition #mixin
- Selective method combination in mixin-based composition (TK, TT), pp. 1269–1273.
- SAC-2005-LimZLR #graph #heuristic #problem
- Heuristic methods for graph coloring problems (AL, YZ, QL, BR), pp. 933–939.
- SAC-2005-TebriBC #incremental #learning
- Incremental profile learning based on a reinforcement method (HT, MB, CC), pp. 1096–1101.
- SAC-OOPS-J-2005-KaminaT #flexibility #mixin #type system
- Flexible Method Combination based on Mixin Subtyping (TK, TT), pp. 95–115.
- ICSE-2005-BryceCC #framework #interactive #testing
- A framework of greedy methods for constructing interaction test suites (RCB, CJC, MBC), pp. 146–155.
- ICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
- Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
- ICSE-2005-MaurerM #agile #what
- What you always wanted to know about agile methods but did not dare to ask (FM, GM), pp. 731–732.
- ICSE-2005-MelnikM #agile #student
- A cross-program investigation of students’ perceptions of agile methods (GM, FM), pp. 481–488.
- ICSE-2005-MenziesPCHS #modelling #validation
- Validation methods for calibrating software effort models (TM, DP, ZC, JH, SS), pp. 587–595.
- CC-2005-QianH #analysis #case study #jit
- A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
- SOSP-2005-QinTSZ #debugging #named
- Rx: treating bugs as allergies — a safe method to survive software failures (FQ, JT, JS, YZ), pp. 235–248.
- AMOST-2005-SchillingMDSFF #design #testing #user interface
- An integrated method for designing user interfaces based on tests (AS, KM, PD, KSS, EF, VF).
- CADE-2005-ChaudhuriP #first-order #linear #logic #proving #theorem proving
- A Focusing Inverse Method Theorem Prover for First-Order Linear Logic (KC, FP), pp. 69–83.
- CADE-2005-YorshM #generative
- A Combination Method for Generating Interpolants (GY, MM), pp. 353–368.
- CAV-2005-BarnerGR #concurrent #debugging #formal method #named #using
- Wolf — Bug Hunter for Concurrent Software Using Formal Methods (SB, ZG, IR), pp. 153–157.
- CSL-2005-ChaudhuriP #linear #logic
- Focusing the Inverse Method for Linear Logic (KC, FP), pp. 200–215.
- SAT-2005-GentR #learning
- Local and Global Complete Solution Learning Methods for QBF (IPG, AGDR), pp. 91–106.
- SAT-2005-SheiniS #integer #linear #logic #satisfiability #scalability
- A Scalable Method for Solving Satisfiability of Integer Linear Arithmetic Logic (HMS, KAS), pp. 241–256.
- TLCA-2005-MatwinFHC #data mining #formal method #mining #privacy #using
- Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
- WICSA-2004-Tekinerdogan #analysis #architecture #named
- ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
- ASE-2004-HillR #automation
- Automatic Method Completion (RH, JR), pp. 228–235.
- ASE-2004-HopcroftB #csp #development
- Combining the Box Structure Development Method and CSP (PJH, GHB), pp. 340–345.
- DAC-2004-CarballoNYVCN #adaptation #design
- Requirement-based design methods for adaptive communications links (JAC, KJN, SMY, IV, CC, VRN), pp. 93–98.
- DAC-2004-KahngR #concept #feedback
- Placement feedback: a concept and method for better min-cut placements (ABK, SR), pp. 357–362.
- DAC-2004-MeiRCHD #performance #robust
- Robust, stable time-domain methods for solving MPDEs of fast/slow systems (TM, JSR, TSC, SAH, DMD), pp. 848–853.
- DAC-2004-NakamuraHKYY #c #c++ #communication #hardware #performance #using
- A fast hardware/software co-verification method for system-on-a-chip by using a C/C++ simulator and FPGA emulator with shared register communication (YN, KH, IK, KY, TY), pp. 299–304.
- DAC-2004-NookalaS
- A method for correcting the functionality of a wire-pipelined circuit (VN, SSS), pp. 570–575.
- DAC-2004-SasaoM #logic #multi
- A method to decompose multiple-output logic functions (TS, MM), pp. 428–433.
- DATE-v1-2004-FernandesSOT #probability #testing
- A Probabilistic Method for the Computation of Testability of RTL Constructs (JMF, MBS, ALO, JPT), pp. 176–181.
- DATE-v1-2004-VazquezLHRH #parametricity #self
- A Method for Parameter Extraction of Analog Sine-Wave Signals for Mixed-Signal Built-In-Self-Test Applications (DV, GL, GH, AR, JLH), pp. 298–305.
- DATE-v2-2004-ZhouZLLZC #analysis #using
- Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
- DRR-2004-WangD #segmentation
- Comprehensive printed Tibetan/English mixed text segmentation method (HW, XD), pp. 136–146.
- DRR-2004-WangD04a #multi #statistics
- New statistical method for multifont printed Tibetan/English OCR (HW, XD), pp. 155–165.
- VLDB-2004-ChengXPSV #nondeterminism #performance #probability #query
- Efficient Indexing Methods for Probabilistic Threshold Queries over Uncertain Data (RC, YX, SP, RS, JSV), pp. 876–887.
- VLDB-2004-XiaLOH #named #performance
- Gorder: An Efficient Method for KNN Join Processing (CX, HL, BCO, JH), pp. 756–767.
- CSEET-2004-Nikula #case study #experience #requirements
- Experiences of Embedding Training in a Basic Requirements Engineering Method (UN), pp. 104–109.
- ITiCSE-2004-Kerren #education #generative #learning
- Generation as method for explorative learning in computer science education (AK), pp. 77–81.
- ITiCSE-WGR-2004-CanningMRR #c #using
- Reading types in C using the right left walk method (JC, WM, AR, DR), pp. 52–54.
- ITiCSE-WGR-2004-Clear #agile #student
- Students becoming political and “incorrect” through agile methods (TC), pp. 13–15.
- ESOP-2004-GuttmanTCHRS #trust
- Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
- FASE-2004-GhezziMP #static analysis #type system
- Enhancing Remote Method Invocation through Type-Based Static Analysis (CG, VM, GPP), pp. 339–353.
- TACAS-2004-MailundW #graph #reachability #using
- Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method (TM, MW), pp. 177–191.
- TACAS-2004-Schmidt #automation #generative
- Automated Generation of a Progress Measure for the Sweep-Line Method (KS0), pp. 192–204.
- ICSM-2004-Chapin #agile #evolution
- Agile Methods’ Contributions in Software Evolution (NC), p. 522.
- ICSM-2004-Kung #lifecycle #maintenance
- Quantitative Method to Determine Software Maintenance Life Cycle (HJK), pp. 232–241.
- ICSM-2004-LuoJZMS #analysis #case study #component #graph #object-oriented
- An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
- ICSM-2004-Rountev #identification #java #precise
- Precise Identification of Side-Effect-Free Methods in Java (AR), pp. 82–91.
- DLT-2004-Truthe
- A Method for Deciding the Finiteness of Deterministic Tabled Picture Languages (BT), pp. 406–417.
- IFM-2004-BallCLR #formal method #verification
- SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft (TB, BC, VL, SKR), pp. 1–20.
- IFM-2004-Boute #abstraction #formal method
- Integrating Formal Methods by Unifying Abstractions (RTB), pp. 441–460.
- IFM-2004-MorilloV #compilation
- A Method for Compiling and Executing Expressive Assertions (FJGM, JMCV), pp. 521–540.
- SEFM-2004-RouffVHTR #behaviour #formal method #predict
- Properties of a Formal Method for Prediction of Emergent Behaviors in Swarm-Based Systems (CR, AV, MGH, WT, JLR), pp. 24–33.
- CHI-2004-IngmarssonDZ #named
- TNT: a numeric keypad based text input method (MI, DD, SZ), pp. 639–646.
- AdaEurope-2004-Gogolla #formal method #problem
- Benefits and Problems of Formal Methods (MG), pp. 1–15.
- CAiSE-2004-RalyteRD #towards
- Towards a Meta-tool for Change-Centric Method Engineering: A Typology of Generic Operators (JR, CR, RD), pp. 202–218.
- CAiSE-2004-WistrandK #component
- Method Components — Rationale Revealed (KW, FK), pp. 189–201.
- EDOC-2004-YoshiokaHF #coordination #performance #security
- Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems (NY, SH, AF), pp. 84–97.
- ICEIS-v1-2004-Gilb04a
- Competitive Engineering: A Totally Metrics-Based System-Development Method (TG), p. XXXI.
- ICEIS-v2-2004-Kabiri #approximate #comparison #learning #network
- A Comparison Between the Proportional Keen Approximator and the Neural Networks Learning Methods (PK), pp. 159–164.
- ICEIS-v2-2004-Martinez-OtzetaS #algorithm #analysis #nearest neighbour #probability
- Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
- ICEIS-v2-2004-ZengLV #xml
- An XML-Based Bootstrapping Method for Pattern Acquisition (XZ, FL, DZ, AV), pp. 303–308.
- ICEIS-v3-2004-LingsL #automation
- Method-in-Action and Method-in-Tool: Some Implications for CASE (BL, BL), pp. 623–628.
- ICEIS-v3-2004-PicaultBDPT #architecture #information management #specification #standard
- Specifying Information System Architectures with DASIBAO — A Standard Based Method (AP, PB, JLD, JP, BT), pp. 254–264.
- ICEIS-v5-2004-QuekS #bibliography #comparative #development #information management
- A Comparative Survey of Activity-Based Methods for Information Systems Development (AQ, HS), pp. 221–232.
- CIKM-2004-Banaei-KashaniS #data access #named #network #peer-to-peer #product line
- SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
- CIKM-2004-ChenGS #rank
- Local methods for estimating pagerank values (YYC, QG, TS), pp. 381–389.
- CIKM-2004-RenRPS #detection
- A vertical distance-based outlier detection method with local pruning (DR, IR, WP, KS), pp. 279–284.
- CIKM-2004-SiersdorferSW #classification #documentation #parametricity
- Goal-oriented methods and meta methods for document classification and their parameter tuning (SS, SS, GW), pp. 59–68.
- ICML-2004-BleiJ #process
- Variational methods for the Dirichlet process (DMB, MIJ).
- ICML-2004-CastilloW #case study #comparative #learning #multi
- A comparative study on methods for reducing myopia of hill-climbing search in multirelational learning (LPC, SW).
- ICML-2004-NguyenWJ #classification #detection #distributed #kernel #using
- Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
- ICML-2004-VuralD #multi
- A hierarchical method for multi-class support vector machines (VV, JGD).
- ICPR-v1-2004-ArcaCL #detection #performance #recognition
- An Efficient Method to Detect Facial Fiducial Points for Face Recognition (SA, PC, RL), pp. 532–535.
- ICPR-v1-2004-ChenD #recognition
- A Universal Method for Single Character Type Recognition (LC, XD), pp. 413–416.
- ICPR-v1-2004-GunterB #evaluation #feature model #recognition #word
- An Evaluation of Ensemble Methods in Handwritten Word Recognition Based on Feature Selection (SG, HB), pp. 388–392.
- ICPR-v1-2004-KannalaB #lens
- A Generic Camera Calibration Method for Fish-Eye Lenses (JK, SSB), pp. 10–13.
- ICPR-v1-2004-MaedaKI #clustering #data-driven #database #probability #process #segmentation
- Segmentation of Range Data Based on A Stochastic Clustering Method with Competitive Process (MM, KK, KI), pp. 624–627.
- ICPR-v1-2004-YaoC #performance
- An Efficient Image-Based Rendering Method (JY, WkC), pp. 88–91.
- ICPR-v2-2004-ChangLC #hybrid #recognition
- Applying A Hybrid Method To Handwritten Character Recognition (FC, CCL, CJC), pp. 529–532.
- ICPR-v2-2004-HaseSTS #multi #robust
- A Robust Method of Recognizing Multi-font Rotated Characters (HH, TS, ST, CYS), pp. 363–366.
- ICPR-v2-2004-HongliangC #hybrid #statistics
- A hybrid License Plate Extraction Method Based On Edge Statistics and Morphology (HB, CL), pp. 831–834.
- ICPR-v2-2004-KaratzasA #image #segmentation #using #web
- Text Extraction from Web Images Based on A Split-and-Merge Segmentation Method Using Colour Perception (DK, AA), pp. 634–637.
- ICPR-v2-2004-KoKB #image #retrieval
- SVM-based Salient Region(s) Extraction Method for Image Retrieval (BK, SYK, HB), pp. 977–980.
- ICPR-v2-2004-KubasovaT #image
- Lossless Compression Methods for Hyperspectral Images (OK, PJT), pp. 803–806.
- ICPR-v2-2004-LiNCS #segmentation
- A Segmentation Method for Touching Italic Characters (YL, SN, MC, CYS), pp. 594–597.
- ICPR-v2-2004-LiZYH #image #performance #robust #segmentation #sequence
- FFT Snake: A Robust and Efficient Method for the Segmentation of Arbitrarily Shaped Objects in Image Sequences (TL, YZ, DY, DH), pp. 116–119.
- ICPR-v2-2004-ManoMT #generative
- Factorization-Based Planar Mapping Method for Generating Intermediate Views (HM, AM, NT), pp. 891–894.
- ICPR-v2-2004-SoiferKK #analysis #fuzzy
- Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
- ICPR-v2-2004-SukF #generative #graph #invariant
- Graph Method for Generating Affine Moment Invariants (TS, JF), pp. 192–195.
- ICPR-v2-2004-TamSS #categorisation #documentation
- Applying the Conjugate Gradient Method for Text Document Categorization (VT, RS, AS), pp. 558–561.
- ICPR-v2-2004-TanakaSO #image #multi #retrieval
- Retrieval Method for Multi-category Images (HT, HS, SO), pp. 965–968.
- ICPR-v2-2004-TanakaT #image #probability
- Probabilistic Image Processing based on the Q-Ising Model by Means of the Mean-Field Method and Loopy Belief Propagation (KT, DMT), pp. 40–43.
- ICPR-v2-2004-ToyozumiYMKMST #case study #recognition #segmentation #using
- A Study of Symbol Segmentation Method for Handwritten Mathematical Formula Recognition using Mathematical Structure Information (KT, NY, KM, TK, KM, YS, TT), pp. 630–633.
- ICPR-v2-2004-WangZKT #distance #image #segmentation #set
- Level Set Methods, Distance Function and Image Segmentation (DW, JZ, SCK, ZT), pp. 110–115.
- ICPR-v2-2004-WeiXMJS #hybrid
- A Hybrid SOM-SVM Method for Analyzing Zebra Fish Gene Expression (WW, LX, XM, PJ, RS), pp. 323–326.
- ICPR-v2-2004-ZhangHHL #kernel
- Kernel-Based Method for Tracking Objects with Rotation and Translation (HZ, ZH, WH, LL), pp. 728–731.
- ICPR-v3-2004-BolleRP #estimation #evaluation #fault
- An Evaluation of Error Confidence Interval Estimation Methods (RMB, NKR, SP), pp. 103–106.
- ICPR-v3-2004-ChenYC #distance #multi #recognition
- Inter-Subspace Distance: A New Method for Face Recognition with Multiple Samples (JHC, SLY, CSC), pp. 140–143.
- ICPR-v3-2004-DouretB #3d #monitoring #multi
- A Multi-Cameras 3D Volumetric Method for Outdoor Scenes : A Road Traffic Monitoring Application (JD, RB), pp. 334–337.
- ICPR-v3-2004-FurukawaKMSMT #3d #approximate #estimation #image #physics #using
- Spine Posture Estimation Method from Human Images Using 3D Spine Model — Computation of the rough approximation of the physical forces working on vertebral bodies (DF, TK, KM, YS, KM, TT), pp. 322–325.
- ICPR-v3-2004-GanLY #array #estimation #set
- Missing Microarray Data Estimation Based on Projection onto Convex Sets Method (XG, AWCL, HY), pp. 782–785.
- ICPR-v3-2004-GurevichM #analysis #image
- Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
- ICPR-v3-2004-HaindlFA #image #modelling
- BTF Image Space Utmost Compression and Modelling Method (MH, JF, MA), pp. 194–197.
- ICPR-v3-2004-HuangMP #hybrid #markov #random #recognition #using
- A Hybrid Face Recognition Method using Markov Random Fields (RH, DNM, VP), pp. 157–160.
- ICPR-v3-2004-HuangWTC #recognition #segmentation
- A New Iris Segmentation Method for Recognition (JH, YW, TT, JC), pp. 554–557.
- ICPR-v3-2004-KashinoKK #clustering #video
- A Quick Video Search Method based on Local and Global Feature Clustering (KK, AK, TK), pp. 894–897.
- ICPR-v3-2004-KitaSK #modelling
- A Deformable Model Driven Method for Handling Clothes (YK, FS, NK), pp. 243–247.
- ICPR-v3-2004-KovalevK #quantifier
- A New Method for Quantification of Age-Related Brain Changes (VAK, FK), pp. 770–773.
- ICPR-v3-2004-LiMH
- New Method for Sparse Point-Sets Matching with Underlying Non-Rigidity (BL, QM, HH), pp. 8–11.
- ICPR-v3-2004-MatsuiCUM #markov #monte carlo #recognition #using
- Bayesian Face Recognition using a Markov Chain Monte Carlo Method (AM, SC, FU, TM), pp. 918–921.
- ICPR-v3-2004-SprevakAW #assessment #classification
- A Non-Random Data Sampling Method for Classification Model Assessment (DS, FA, HW), pp. 406–409.
- ICPR-v3-2004-YanLWW #automation
- Automatic Template Matching Method for Tropical Cyclone Eye Fix (KYW, CLY, PWL, WWT), pp. 650–653.
- ICPR-v3-2004-YuanTR #performance #robust #scalability #video
- Fast and Robust Search Method for Short Video Clips from Large Video Collection (JY, QT, SR), pp. 866–869.
- ICPR-v3-2004-YuCS #quality
- Vignetting Distortion Correction Method for High Quality Digital Imaging (WY, YC, JS), pp. 666–669.
- ICPR-v4-2004-Amano #image
- Image Interpolation by High Dimensional Projection based on Subspace Method (TA), pp. 665–668.
- ICPR-v4-2004-AnJWZL #performance
- An Efficient Rectification Method for Trinocular Stereovision (LA, YJ, JW, XZ, ML), pp. 56–59.
- ICPR-v4-2004-CuiWHTS #image #synthesis
- An Iris Image Synthesis Method Based on PCA and Super-Resolution (JC, YW, JH, TT, ZS), pp. 471–474.
- ICPR-v4-2004-HsiehYCH #analysis
- A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
- ICPR-v4-2004-KamberovK #evaluation #formal method #performance
- Conformal Method for Quantitative Shape Extraction: Performance Evaluation (GK, GK), pp. 31–35.
- ICPR-v4-2004-KuzmenkoZ #network #self
- Structure Relaxation Method for Self-Organizing Neural Networks (AK, NZ), pp. 589–592.
- ICPR-v4-2004-LeeNG #automation #detection
- Automated Detection of Solar Loops by the Oriented Connectivity Method (JKL, TSN, GAG), pp. 315–318.
- ICPR-v4-2004-MurakitaII #markov #monte carlo #using
- Human Tracking using Floor Sensors based on the Markov Chain Monte Carlo Method (TM, TI, HI), pp. 917–920.
- ICPR-v4-2004-NakamuraFTMYMTI #image #recognition #using
- Eigen Nodule: View-Based Recognition of Lung Nodule in Chest X-ray CT Images Using Subspace Method (YN, GF, HT, SM, SY, TM, YT, TI), pp. 681–684.
- ICPR-v4-2004-PoonWS
- A New Method in Locating and Segmenting Palmprint into Region-of-Interest (CP, DCMW, HCS), pp. 533–536.
- ICPR-v4-2004-SamsonB #clustering #learning #parallel #robust #video
- Learning Classes for Video Interpretation with a Robust Parallel Clustering Method (VS, PB), pp. 569–572.
- ICPR-v4-2004-TongLL #detection #effectiveness #performance
- An Effective and Fast Soccer Ball Detection and Tracking Method (XFT, HQL, QSL), pp. 795–798.
- ICPR-v4-2004-UekiKIKISKK #classification #gender #image
- A Method of Gender Classification by Integrating Facial, Hairstyle, and Clothing Images (KU, HK, SI, KK, NS, JK, TK), pp. 446–449.
- ICPR-v4-2004-ZhuRL04a #algorithm #optimisation #robust
- A Robust Regularised Restoration Algorithm Based on Topkis-Veinott Optimisation Method (DZ, MR, RAL), pp. 705–708.
- KDD-2004-AbeZL #learning #multi
- An iterative method for multi-class cost-sensitive learning (NA, BZ, JL), pp. 3–11.
- KDD-2004-BiZB #kernel
- Column-generation boosting methods for mixture of kernels (JB, TZ, KPB), pp. 521–526.
- KDD-2004-CohenS #integration #markov #process
- Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods (WWC, SS), pp. 89–98.
- KDD-2004-DengPML #rank
- A rank sum test method for informative gene discovery (LD, JP, JM, DLL), pp. 410–419.
- KR-2004-QiLG #consistency #knowledge base
- A Split-Combination Method for Merging Inconsistent Possibilistic Knowledge Bases (GQ, WL, DHG), pp. 348–356.
- SEKE-2004-CairoA #architecture #problem #reuse
- The KAMET II Architecture for Problem-Solving Method Reuse (OC, JCA), pp. 435–438.
- SIGIR-2004-HunnisettT #categorisation
- Context-based methods for text categorisation (DSH, WJT), pp. 578–579.
- SIGIR-2004-JinS #case study #collaboration #normalisation
- A study of methods for normalizing user ratings in collaborative filtering (RJ, LS), pp. 568–569.
- OOPSLA-2004-GeorgesBEB #behaviour #java
- Method-level phase behavior in java workloads (AG, DB, LE, KDB), pp. 270–287.
- RE-2004-GordijnKSWA
- Developing a Domain-Specific Cross-Organizational RE Method (JG, VK, JS, RW, HA), pp. 134–143.
- SAC-J-2003-CavarraCD04 #automation #generative #modelling #testing
- A method for the automatic generation of test suites from object models (AC, CC, JD), pp. 309–314.
- SAC-J-2003-YuNPC04 #on the #testing
- On the testing methods used by beginning software testers (YTY, SPN, PLP, TYC), pp. 329–335.
- SAC-2004-BamasakZ #mobile
- A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
- SAC-2004-BeckerAN
- Organizational engineering in public administrations: a method for process-oriented egovernment projects (JB, LA, BN), pp. 1385–1389.
- SAC-2004-Cazzola #named #performance
- SmartMethod: an efficient replacement for method (WC), pp. 1305–1309.
- SAC-2004-ChenC #database #graph #object-oriented
- Signature file hierarchies and signature graphs: a new index method for object-oriented databases (YC, YC), pp. 724–728.
- SAC-2004-JanssensSHV #coordination #design
- An agent design method promoting separation between computation and coordination (NJ, ES, TH, PV), pp. 456–461.
- SAC-2004-JezierskiMW #database #maintenance #object-oriented #prototype #type system
- Prototype system for method materialisation and maintenance in object-oriented databases (JJ, MM, RW), pp. 1323–1327.
- SAC-2004-Kavakli #analysis #modelling
- Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
- SAC-2004-PereiraS #architecture #enterprise #framework #using
- A method to define an Enterprise Architecture using the Zachman Framework (CMP, PMAS), pp. 1366–1371.
- SAC-2004-QianZ #automation #clustering #named #performance
- GraphZip: a fast and automatic compression method for spatial data clustering (YQ, KZ), pp. 571–575.
- SAC-2004-Rigaux #rating
- An iterative rating method: application to web-based conference management (PR), pp. 1682–1687.
- SAC-2004-TrutaFB #metric
- Disclosure risk measures for the sampling disclosure control method (TMT, FF, DCBJ), pp. 301–306.
- SAC-2004-WuC #documentation
- Shadow document methods of resutls merging (SW, FC), pp. 1067–1072.
- ICSE-2004-AkgulMP #assembly #execution #performance #slicing
- A Fast Assembly Level Reverse Execution Method via Dynamic Slicing (TA, VJMI, SP), pp. 522–531.
- ICSE-2004-BoehmT #agile
- Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods (BWB, RT), pp. 718–719.
- ICSE-2004-Matinlassi #architecture #comparison #design #performance #product line
- Comparison of Software Product Line Architecture Design Methods: COPA, FAST, FORM, KobrA and QADA (MM), pp. 127–136.
- LDTA-2004-GoldreiS #attribute grammar #formal method #off the shelf #using #verification
- Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties (SG, AMS), pp. 33–54.
- ASPLOS-2004-WuJMC #multi #online
- Formal online methods for voltage/frequency control in multiple clock domain microprocessors (QW, PJ, MM, DWC), pp. 248–259.
- CAV-2004-Hunt #verification
- Mechanical Mathematical Methods for Microprocessor Verification (WAHJ), pp. 523–533.
- CSL-2004-MetcalfeOG #logic
- Goal-Directed Methods for Lukasiewicz Logic (GM, NO, DMG), pp. 85–99.
- ICLP-2004-CumboFGL #datalog #source code
- Enhancing the Magic-Set Method for Disjunctive Datalog Programs (CC, WF, GG, NL), pp. 371–385.
- IJCAR-2004-Bonichon #deduction #named
- TaMeD: A Tableau Method for Deduction Modulo (RB), pp. 445–459.
- IJCAR-2004-Weispfenning #constraints
- Solving Constraints by Elimination Methods (VW), pp. 336–341.
- LICS-2004-Abramsky #quantum
- High-Level Methods for Quantum Computation and Information (SA), pp. 410–414.
- TestCom-2004-El-FakihTSY #automaton #multi #testing
- FSM Based Interoperability Testing Methods for Multi Stimuli Model (KEF, VT, NS, NY), pp. 60–75.
- VMCAI-2004-PodelskiR #linear #ranking #synthesis
- A Complete Method for the Synthesis of Linear Ranking Functions (AP, AR), pp. 239–251.
- DAC-2003-LiYRP #generative #markov #using
- A scan BIST generation method using a markov source and partial bit-fixing (WL, CY, SMR, IP), pp. 554–559.
- DAC-2003-PimentelE #communication #refinement
- An IDF-based trace transformation method for communication refinement (ADP, CE), pp. 402–407.
- DATE-2003-HondaT #design #evaluation
- Evaluation of Applying SpecC to the Integrated Design Method of Device Driver and Device (SH, HT), pp. 20138–20143.
- DATE-2003-JersakREBJW #formal method #integration
- Formal Methods for Integration of Automotive Software (MJ, KR, RE, JCB, ZYJ, FW), pp. 20045–20050.
- DATE-2003-LeeC #3d #grid #linear #power management #simulation
- The Power Grid Transient Simulation in Linear Time Based on 3D Alternating-Direction-Implicit Method (YML, CCPC), pp. 11020–11025.
- DATE-2003-LoKWH #design #identification #standard
- A Custom-Cell Identification Method for High-Performance Mixed Standard/Custom-Cell Designs (JYLL, WAK, ACHW, TH), pp. 11102–11103.
- DATE-2003-MansourM #reduction
- Model-Order Reduction Based on PRONY’s Method (MMM, AM), pp. 10530–10535.
- DATE-2003-NicolescuV #approach #detection #fault #tool support
- Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results (BN, RV), pp. 20057–20063.
- DATE-2003-OhtakeOF #algorithm #fault #generative #testing #using
- A Method of Test Generation fo Path Delay Faults Using Stuck-at Fault Test Generation Algorithms (SO, KO, HF), pp. 10310–10315.
- DocEng-2003-BayerlLGWN #analysis #documentation #semantics
- Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
- DRR-2003-SunW #retrieval #similarity
- Similarity-based matching method for handwriting retrieval (KS, JW), pp. 156–163.
- ICDAR-2003-BesagniBB #segmentation
- A Segmentation Method for Bibliographic References by Contextual Tagging of Fields (DB, AB, NB), pp. 384–388.
- ICDAR-2003-HamamuraMI #classification #multi
- A Multiclass Classification Method Based on Multiple Pairwise Classifiers (TH, HM, BI), pp. 809–813.
- ICDAR-2003-HaoLS03a #algorithm #classification #comparison #search-based #set
- Comparison of Genetic Algorithm and Sequential Search Methods for Classifier Subset Selection (HH, CLL, HS), pp. 765–769.
- ICDAR-2003-Ishitani #data-driven #database #documentation #xml
- Document Transformation System from Papers to XML Data Based on Pivot XML Document Method (YI), pp. 250–255.
- ICDAR-2003-JeongNK #recognition
- Non-similar candidate removal method for off-line handwritten Korean character recognition (SHJ, YSN, HKK), pp. 323–328.
- ICDAR-2003-Ratzlaff #bibliography #comparison #database #recognition
- Methods, Report and Survey for the Comparison of Diverse Isolated Character Recognition Results on the UNIPEN Database (EHR), pp. 623–628.
- ICDAR-2003-ZouariHLA #classification #parallel
- A New Classifier Simulator for Evaluating Parallel Combination Methods (HZ, LH, YL, AMA), pp. 26–30.
- SIGMOD-2003-WangJLY #estimation #modelling
- Containment Join Size Estimation: Models and Methods (WW, HJ, HL, JXY), pp. 145–156.
- SIGMOD-2003-WangPFY #named #query #xml
- ViST: A Dynamic Index Method for Querying XML Data by Tree Structures (HW, SP, WF, PSY), pp. 110–121.
- VLDB-2003-CeriM #tool support #web
- Constructing and integrating data-centric Web Applications: Methods, Tools, and Techniques (SC, IM), p. 1151.
- VLDB-2003-PapadiasTS #predict #query
- The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries (YT, DP, JS), pp. 790–801.
- ESOP-2003-Nieto #higher-order
- The Rely-Guarantee Method in Isabelle/HOL (LPN), pp. 348–362.
- ICALP-2003-MerroN #bisimulation #mobile #proving
- Bisimulation Proof Methods for Mobile Ambients (MM, FZN), pp. 584–598.
- FME-2003-Henderson #correctness #proving #using
- Proving the Correctness of Simpson’s 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method (NH), pp. 244–263.
- FME-2003-StidolphW #formal method
- Managerial Issues for the Consideration and Use of Formal Methods (DCS, EJWJ), pp. 170–186.
- FME-2003-WassyngL #formal method #implementation #industrial #lessons learnt
- Lessons Learned from a Successful Implementation of Formal Methods in an Industrial Project (AW, ML), pp. 133–153.
- SEFM-2003-AstesianoR #development #towards #uml
- Towards a Well-Founded UML-Based Development Method (EA, GR), p. 102–?.
- SFM-2003-BertolinoIM #architecture #formal method #testing
- Formal Methods in Testing Software Architectures (AB, PI, HM), pp. 122–147.
- CAiSE-2003-RalyteDR #towards
- Towards a Generic Model for Situational Method Engineering (JR, RD, CR), pp. 95–110.
- CAiSE-2003-Saeki #development #information management #metric
- Embedding Metrics into Information Systems Development Methods: An Application of Method Engineering Technique (MS), pp. 374–389.
- EDOC-2003-DunlopIR
- Methods for Conflict Resolution in Policy-Based Management Systems (ND, JI, KR), pp. 98–111.
- EDOC-2003-KoehlerHKWK #modelling
- A Model-Driven Transformation Method (JK, RH, SK, FYW, SK), pp. 186–197.
- EDOC-2003-SilaghiS #aspect-oriented #development
- Integrating CBSE, SoC, MDA, and AOP in a Software Development Method (RS, AS), pp. 136–146.
- ICEIS-v1-2003-MontilvaB #component #web
- A Component-Based Method for Developing Web Applications (JAM, JB), pp. 334–340.
- ICEIS-v2-2003-BailonDF #fuzzy
- Extension of the Box-Counting Method to Measure the Fractal Dimension of Fuzzy Data (ABB, MD, WF), pp. 185–190.
- ICEIS-v2-2003-MaciasVSR #data mining #development #mining
- A Data Mining Method to Support Decision Making in Software Development Projects (JLÁM, JMV, JCRS, IR), pp. 11–18.
- ICEIS-v2-2003-OkuharaSMIN
- Application of Group Method of Data Handling to Virtual Environment Simulator (KO, WS, YM, HI, TN), pp. 545–548.
- ICEIS-v3-2003-AgerfalkW #analysis #concept #development #framework
- Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
- ICEIS-v3-2003-AgerfalkWKBEM #process #research
- Flexibile Processes and Method Configuration: Outline of a Joint Industry-Academia Research Project (PJÅ, KW, FK, GB, ME, KM), pp. 519–522.
- ICEIS-v3-2003-TyrvainenP #analysis #communication #how #metric
- How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
- ICEIS-v3-2003-YangZ #data access #enterprise #xml
- An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
- CIKM-2003-CaladoCMZRG #classification #documentation #web
- Combining link-based and content-based methods for web document classification (PC, MC, ESdM, NZ, BARN, MAG), pp. 394–401.
- CIKM-2003-MelucciO #generative #markov #modelling #novel
- A novel method for stemmer generation based on hidden markov models (MM, NO), pp. 131–138.
- CIKM-2003-TaoFP #estimation #multi #query
- The power-method: a comprehensive estimation technique for multi-dimensional queries (YT, CF, DP), pp. 83–90.
- ICML-2003-BrownW #ambiguity #composition #learning #network
- The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods (GB, JLW), pp. 67–74.
- ICML-2003-CumbyR #kernel #learning #on the #relational
- On Kernel Methods for Relational Learning (CMC, DR), pp. 107–114.
- ICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
- Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
- ICML-2003-KwokT03a #kernel #problem
- The Pre-Image Problem in Kernel Methods (JTK, IWT), pp. 408–415.
- ICML-2003-LiY #analysis #categorisation #classification
- A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
- ICML-2003-MannorRG #performance #policy
- The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
- ICML-2003-SalakhutdinovR #adaptation #bound #optimisation
- Adaptive Overrelaxed Bound Optimization Methods (RS, STR), pp. 664–671.
- ICML-2003-WiewioraCE #learning
- Principled Methods for Advising Reinforcement Learning Agents (EW, GWC, CE), pp. 792–799.
- KDD-2003-KorenH #clustering #visualisation
- A two-way visualization method for clustered data (YK, DH), pp. 589–594.
- KDD-2003-LeungP #empirical
- Empirical comparisons of various voting methods in bagging (KTL, DSPJ), pp. 595–600.
- MLDM-2003-AntunesO #constraints #mining
- Generalization of Pattern-Growth Methods for Sequential Pattern Mining with Gap Constraints (CA, ALO), pp. 239–251.
- MLDM-2003-Boulle #named
- Khiops: A Discretization Method of Continuous Attributes with Guaranteed Resistance to Noise (MB), pp. 50–64.
- MLDM-2003-CeciAM
- Simplification Methods for Model Trees with Regression and Splitting Nodes (MC, AA, DM), pp. 20–34.
- SEKE-2003-AstesianoMMR #execution #multi #prototype #specification
- From Requirement Specification to Prototype Execution: a Combination of Multiview Use-Case Driven Methods and Agent-Oriented Techniques (EA, MM, VM, GR), pp. 578–585.
- SEKE-2003-ChenJ #fuzzy #induction #information management #learning #multi #named
- MFILM: a multi-dimensional fuzzy inductive learning method for knowledge acquisition (YTC, BJ), pp. 445–449.
- SEKE-2003-CiancariniPA #communication #design #ontology
- An Ontology Driven Design Method for inter-Agent Communication (PC, VP, LA), pp. 90–94.
- SEKE-2003-JiehanL
- Relative Index Term Frequency (RITF) Method (ZJ, HL), pp. 427–431.
- SEKE-2003-Ochs #assessment #off the shelf #requirements #risk management #using
- Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
- SEKE-2003-RezaH #architecture
- An Integrated Method to Software Architecture (HR, XH), pp. 398–405.
- SIGIR-2003-DarwishO #probability #query
- Probabilistic structured query methods (KD, DWO), pp. 338–344.
- SIGIR-2003-NottelmannF #quality #retrieval
- Evaluating different methods of estimating retrieval quality for resource selection (HN, NF), pp. 290–297.
- SIGIR-2003-SiC #documentation #estimation
- Relevant document distribution estimation method for resource selection (LS, JPC), pp. 298–305.
- SIGIR-2003-ZhaiCL #evaluation #independence #metric #retrieval #topic
- Beyond independent relevance: methods and evaluation metrics for subtopic retrieval (CZ, WWC, JDL), pp. 10–17.
- SIGIR-2003-ZhangY #categorisation #classification #linear #robust
- Robustness of regularized linear classification methods in text categorization (JZ, YY), pp. 190–197.
- RE-2003-HaggeK #benchmark #information management #metric
- A Benchmarking Method for Information Systems (LH, JK), p. 245.
- RE-2003-MaidenJF #case study #requirements #specification
- Integrating RE Methods to Support Use Case Based Requirements Specification (NAMM, SJ, MF), pp. 369–370.
- RE-2003-OshiroWS #elicitation #generative #idea #requirements
- Goal-Oriented Idea Generation Method for Requirements Elicitation (KO, KW, MS), pp. 363–364.
- SAC-2003-ChenYT #feature model
- The Bitmap-based Feature Selection Method (WCC, MCY, SST), pp. 465–469.
- SAC-2003-DaviesCC #automation #generative #modelling #testing
- A Method for the Automatic Generation of Test Suites from Object Models (JD, CC, AC), pp. 1104–1109.
- SAC-2003-RendaS #rank #web
- Web Metasearch: Rank vs. Score Based Rank Aggregation Methods (MER, US), pp. 841–846.
- SAC-2003-ShinjoKP #code generation #empirical #performance
- Efficient Mediators through Dynamic Code Generation: a Method and an Experiment (YS, TK, CP), pp. 1147–1154.
- SAC-2003-TsengT #mining #mobile #performance #web
- An Efficient Method for Mining Associated Service Patterns in Mobile Web Environments (SMT, CFT), pp. 455–459.
- SAC-2003-WuC #information retrieval #ranking
- Methods for Ranking Information Retrieval Systems Without Relevance Judgments (SW, FC), pp. 811–816.
- SAC-2003-YuNPC #classification #on the #testing
- On the Use of the Classification-Tree Method by Beginning Software Testers (YTY, SPN, PLP, TYC), pp. 1123–1127.
- ICSE-2003-AbrahamssonWSR #agile #analysis #comparative
- New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
- ICSE-2003-CoppitS #analysis #effectiveness #modelling #tool support
- Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
- CADE-2003-HirokawaM #automation #dependence
- Automating the Dependency Pair Method (NH, AM), pp. 32–46.
- CAV-2003-SeshiaB #automaton #bound #model checking #using
- Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
- ICLP-2003-BackofenW #approach #constraints #modelling #predict
- A Constraint-Based Approach to Structure Prediction for Simplified Protein Models That Outperforms Other Existing Methods (RB, SW), pp. 49–71.
- SAT-2003-SemerjianM #case study #physics #problem #random #satisfiability
- A Study of Pure Random Walk on Random Satisfiability Problems with “Physical” Methods (GS, RM), pp. 120–134.
- TestCom-2003-En-NouaaryD #automaton #testing
- A Guided Method for Testing Timed Input Output Automata (AEN, RD), pp. 211–225.
- CBSE-2002-LiuR #component #specification
- Specifying Component Method Properties for Component State Recovery in RAIC (CL, DJR), p. 9.
- DAC-2002-AnastasakisDMS #performance
- A practical and efficient method for compare-point matching (DA, RFD, HKTM, TS), pp. 305–310.
- DAC-2002-DillJRBFFRSW #verification
- Formal verification methods: getting around the brick wall (DLD, NJ, SR, GB, LF, HF, RKR, GS, CW), pp. 576–577.
- DAC-2002-EderB #logic #performance #pipes and filters #verification
- Achieving maximum performance: a method for the verification of interlocked pipeline control logic (KE, GB), pp. 135–140.
- DAC-2002-Higuchi #detection #multi #scalability
- An implication-based method to detect multi-cycle paths in large sequential circuits (HH), pp. 164–169.
- DAC-2002-KannanBB #estimation #metric #on the
- On metrics for comparing routability estimation methods for FPGAs (PK, SB, DB), pp. 70–75.
- DAC-2002-MahawarSS #performance
- A solenoidal basis method for efficient inductance extraction (HM, VS, WS), pp. 751–756.
- DAC-2002-Pogge #challenge #effectiveness
- The next chip challenge: effective methods for viable mixed technology SoCs (HBP), pp. 84–87.
- DAC-2002-Roychowdhury
- A time-domain RF steady-state method for closely spaced tones (JSR), pp. 510–513.
- DAC-2002-YangP #component #multi #simulation #using
- Time-domain steady-state simulation of frequency-dependent components using multi-interval Chebyshev method (BY, JRP), pp. 504–509.
- DATE-2002-BontempiK #data analysis #performance #predict
- A Data Analysis Method for Software Performance Prediction (GB, WK), pp. 971–976.
- DATE-2002-BrachtendorfLLMF #continuation #using
- Steady State Calculation of Oscillators Using Continuation Methods (HGB, SL, RL, RCM, PF), p. 1139.
- DATE-2002-ChenBKR #reduction #using
- Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods (YC, VB, CKK, KR), pp. 931–935.
- DATE-2002-DrozdLD #array #float #online #performance #testing
- Efficient On-Line Testing Method for a Floating-Point Iterative Array Divider (AVD, MVL, JVD), p. 1127.
- DATE-2002-LevantR #design
- An EMC-Compliant Design Method of High-Density Integrated Circuits (JLL, MR), p. 1115.
- DATE-2002-PenzesM #energy #estimation
- An Energy Estimation Method for Asynchronous Circuits with Application to an Asynchronous Microprocessor (PIP, AJM), pp. 640–647.
- DATE-2002-PronathGA #design #fault #float
- A Test Design Method for Floating Gate Defects (FGD) in Analog Integrated Circuits (MP, HEG, KA), pp. 78–83.
- DATE-2002-SommerRHGMMECSN #design #layout #specification #top-down
- From System Specification To Layout: Seamless Top-Down Design Methods for Analog and Mixed-Signal Applications (RS, IRH, EH, UG, PM, FM, KE, CC, PS, GN), pp. 884–891.
- DATE-2002-ThielenV #performance #simulation
- Fast Method to Include Parasitic Coupling in Circuit Simulations (BLAVT, GAEV), pp. 1033–1037.
- SIGMOD-2002-MoonWH #database #sequence
- General match: a subsequence matching method in time-series databases based on generalized windows (YSM, KYW, WSH), pp. 382–393.
- VLDB-2002-Mohan02a #performance #using
- An Efficient Method for Performing Record Deletions and Updates Using Index Scans (CM), pp. 940–949.
- CSEET-2002-Host #education #empirical #re-engineering
- Introducing Empirical Software Engineering Methods in Education (MH), p. 170–?.
- ITiCSE-2002-SkevoulisF #education #formal method #tool support
- Integrating formal methods tools into undergraduate computer science curriculum (SS, MF), p. 232.
- ESOP-2002-WandW #analysis #composition #proving
- A Modular, Extensible Proof Method for Small-Step Flow Analyses (MW, GBW), pp. 213–227.
- FASE-2002-AhrendtBBGHHMMS #design #formal method #object-oriented
- The KeY System: Integrating Object-Oriented Design and Formal Methods (WA, TB, BB, MG, EH, RH, WM, WM, PHS), pp. 327–330.
- FoSSaCS-2002-JancarKMS #automaton #bound #proving
- Equivalence-Checking with One-Counter Automata: A Generic Method for Proving Lower Bounds (PJ, AK, FM, ZS), pp. 172–186.
- CSMR-2002-CarM #maintenance #modelling #process
- A Method for Modeling and Evaluating Software Maintenance Process Performances (ZC, BM), pp. 15–23.
- IWPC-2002-TakadaOI #information management #lightweight #slicing #using
- Dependence-Cache Slicing: A Program Slicing Method Using Lightweight Dynamic Information (TT, FO, KI), pp. 169–177.
- WCRE-2002-ShokoufandehMM #clustering
- Applying Spectral Methods to Software Clustering (AS, SM, MM), pp. 3–10.
- WCRE-2002-TrogerC #analysis
- Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
- FLOPS-2002-Futatsugi #formal method
- Formal Methods in CafeOBJ (KF), pp. 1–20.
- ICALP-2002-Mannila #data mining #mining #problem
- Local and Global Methods in Data Mining: Basic Techniques and Open Problems (HM), pp. 57–68.
- FME-2002-Casset #development #embedded #formal method #java #using #verification
- Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
- FME-2002-KristensenM #safety
- A Generalised Sweep-Line Method for Safety Properties (LMK, TM), pp. 549–567.
- FME-2002-OheimbN #hoare #logic #revisited
- Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited (DvO, TN), pp. 89–105.
- ICFP-2002-Moore #formal method #functional
- Functional formal methods (JSM), p. 123.
- CHI-2002-HeerC #categorisation #web
- Separating the swarm: categorization methods for user sessions on the web (JH, EHhC), pp. 243–250.
- CHI-2002-IsokoskiK #comparison
- Comparison of two touchpad-based methods for numeric entry (PI, MK), pp. 25–32.
- CAiSE-2002-ArjonaCRT #semantics #web
- A Practical Agent-Based Method to Extract Semantic Information from the Web (JLA, RC, ARC, MT), pp. 697–700.
- CAiSE-2002-MonteroDA #bibliography #development #hypermedia #requirements
- Requirements for Hypermedia Development Methods: A Survey of Outstanding Methods (SM, PD, IA), pp. 747–751.
- CAiSE-2002-PrakashB #modelling
- Generic Models for Engineering Methods of Diverse Domains (NP, MPSB), pp. 612–625.
- CAiSE-2002-Saeki #model transformation
- Role of Model Transformation in Method Engineering (MS), pp. 626–642.
- EDOC-2002-KoehlerTK #consistency #implementation #process #verification
- From Business Process Model to Consistent Implementation: A Case for Formal Verification Methods (JK, GT, SK), p. 96–?.
- EDOC-2002-SalinesiP #adaptation #information management
- A Method to Analyse Changes in the Realisation of Business Intentions and Strategies for Information System Adaptation (CS, MJP), pp. 84–95.
- ICEIS-2002-Bider #modelling #process #requirements
- Business Process Modeling as a Method of Requirements Engineering (IB), pp. 13–15.
- ICEIS-2002-DelaitreGM
- The AEX Method and Its Instrumentation (SD, AG, SM), pp. 473–481.
- ICEIS-2002-Petit
- A Method for WIS Centered on Users Goals (NP), pp. 975–980.
- ICEIS-2002-Poels #enterprise #functional #metric #modelling
- A Functional Size Measurement Method for Event-Based Objectoriented Enterprise Models (GP), pp. 667–675.
- ICEIS-2002-Prosser
- Proposing a Method for Planning the Materialisation of Views in a Data Warehouse (AP), pp. 155–162.
- ICEIS-2002-Rodriguez-Luna #process #word
- Stemming Process in Spanish Words with the Successor Variety Method. Methodology and Result (MRL), pp. 838–842.
- CIKM-2002-LohLAL #analysis #query
- Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
- CIKM-2002-SpanglerK #editing #interactive #taxonomy #validation
- Interactive methods for taxonomy editing and validation (WSS, JTK), pp. 665–668.
- CIKM-2002-TrainaTFF #data access #how #metric
- How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
- ECIR-2002-Sormunen #evaluation #interactive #performance #query
- A Retrospective Evaluation Method for Exact-Match and Best-Match Queries Applying an Interactive Query Performance Analyser (ES), pp. 334–352.
- ICML-2002-AberdeenB #scalability
- Scalable Internal-State Policy-Gradient Methods for POMDPs (DA, JB), pp. 3–10.
- ICML-2002-GlobersonT #analysis #novel #reduction
- Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
- ICPR-v1-2002-BingLP #recognition
- A New LDA-Based Method for Face Recognition (YB, JL, CP), pp. 168–171.
- ICPR-v1-2002-CaronMV #detection
- A Method for Detecting Artificial Objects in Natural Environments (YC, PM, NV), pp. 600–603.
- ICPR-v1-2002-CoquinB #image
- A New Method to Compute the Distortion Vector Field from Two Images (DC, PB), pp. 279–282.
- ICPR-v1-2002-DebaqueSD #3d #modelling
- An Area-Based Alignment Method for 3D Urban Models (BD, GS, MPD), pp. 61–64.
- ICPR-v1-2002-DeschampsC #3d #performance
- Fast Extraction of Tubular and Tree 3D Surfaces with Front Propagation Methods (TD, LDC), pp. 731–734.
- ICPR-v1-2002-HuangHN
- A Region-Based Method for Model-Free Object Tracking (YH, TSH, HN), pp. 592–595.
- ICPR-v1-2002-LuWL #detection
- A Target Detection Method in Range-Doppler Domain from SAR Echo Data (LL, RW, WL), pp. 91–94.
- ICPR-v1-2002-OhyamaWKTS #automation #correlation
- Automatic Tracking of Local Myocardial Motion by Correlation Weighted Velocity Method (WO, TW, FK, ST, KS), pp. 711–714.
- ICPR-v1-2002-TangFYLS #geometry #modelling #novel
- A Novel Method for Harmonic Geometric Transformation Model Based on Wavelet Collocation (YYT, XCF, XY, ZWL, LS), pp. 49–52.
- ICPR-v1-2002-YuLC #multi #synthesis
- Multiresolution Block Sampling-Based Method for Texture Synthesis (YY, JL, CWC), pp. 239–242.
- ICPR-v2-2002-ArseneauC #automation #robust
- Automated Feature Registration for Robust Tracking Methods (SA, JRC), pp. 1078–1081.
- ICPR-v2-2002-GiugnoS #graph #named #performance #query
- GraphGrep: A Fast and Universal Method for Querying Graphs (RG, DS), pp. 112–115.
- ICPR-v2-2002-HuangT #classification #fault #pattern matching #pattern recognition #recognition
- An RBF-Based Pattern Recognition Method by Competitively Reducing Classification-Oriented Error (YSH, YHT), pp. 180–183.
- ICPR-v2-2002-SinghG #pattern matching #pattern recognition #recognition #slicing #using
- Pattern Recognition Using Information Slicing Method (pRISM) (SS, AG), pp. 144–147.
- ICPR-v2-2002-XieJ #detection #performance
- A New Efficient Ellipse Detection Method (YX, QJ), pp. 957–960.
- ICPR-v2-2002-ZhaoSHS #named
- Super-Fusion: A Super-Resolution Method Based on Fusion (WYZ, HSS, MWH, SS), pp. 269–272.
- ICPR-v2-2002-ZouY #image
- A POCS-Based Method for Reducing Artifacts in BDCT Compressed Images (JJZ, HY), pp. 253–256.
- ICPR-v3-2002-Cuesta-FrauPAN #case study #clustering #comparative #feature model
- Feature Extraction Methods Applied to the Clustering of Electrocardiographic Signals. A Comparative Study (DCF, JCPC, GAG, DN), pp. 961–964.
- ICPR-v3-2002-GarciaP #feature model #integration #multi #pattern matching #pattern recognition #recognition
- Improving Texture Pattern Recognition by Integration of Multiple Texture Feature Extraction Methods (MAG, DP), pp. 7–10.
- ICPR-v3-2002-GurevichJS #image #invariant #recognition
- A Method of Image Recognition Based on the Fusion of Reduced Invariant Representations: Mathematical Substantiation (IBG, IAJ, YGS), pp. 391–394.
- ICPR-v3-2002-KimKRK #image #robust
- A Robust License-Plate Extraction Method under Complex Image Conditions (SK, DK, YR, GK), pp. 216–219.
- ICPR-v3-2002-KitasakaMHT #3d #automation #image #modelling #using
- A Method for Automated Extraction of Aorta and Pulmonary Artery in the Mediastinum Using Medial Line Models from 3D Chest X-ray CT Images without Contrast Materials (TK, KM, JiH, JiT), p. 273–?.
- ICPR-v3-2002-KurozumiKM #information retrieval #music #robust
- A Robust Audio Searching Method for Cellular-Phone-Based Music Information Retrieval (TK, KK, HM), pp. 991–994.
- ICPR-v3-2002-LeungKCT #documentation #fuzzy #image #normalisation #using
- Normalization of Contrast in Document Images Using Generalized Fuzzy Operator with Least Square Method (CCL, PCKK, FHYC, WKT), pp. 115–118.
- ICPR-v3-2002-MolinaMKV #image #modelling #multi #using
- A General Multichannel Image Restoration Method Using Compound Models (RM, JM, AKK, MV), pp. 835–838.
- ICPR-v3-2002-PeiC #adaptation #fault #novel #predict
- Novel Error Concealment Method with Adaptive Prediction to the Abrupt and Gradual Scene Changes (SCP, YZC), pp. 827–830.
- ICPR-v3-2002-QuanTH #recognition #robust #speech
- A Robust Method for the Vietnamese Handwritten and Speech Recognition (VHQ, PNT, NDHH), pp. 732–735.
- ICPR-v3-2002-RavindranF #linear
- A Simple Linear Method to Obtain Height Ordering of Scene Points (PR, NJF), pp. 719–722.
- ICPR-v3-2002-WangPH #classification #documentation
- A Method for Document Zone Content Classification (YW, ITP, RMH), p. 196–?.
- ICPR-v3-2002-ZhangB #detection #multi
- A Wavelet-Based Edge Detection Method by Scale Multiplication (LZ, PB), pp. 501–500.
- ICPR-v4-2002-YuiHZH #3d #adaptation #modelling #performance
- A Fast Narrow Band Method and Its Application in Topology-Adaptive 3-D Modeling (SY, KH, HZ, TH), pp. 122–125.
- KDD-2002-BennettDM
- Exploiting unlabeled data in ensemble methods (KPB, AD, RM), pp. 289–296.
- LSO-2002-DingsoyrH #agile #feedback
- Extending Agile Methods: Postmortem Reviews as Extended Feedback (TD, GKH), pp. 4–12.
- SEKE-2002-CanforaT #evaluation #nondeterminism #re-engineering #tool support
- The importance of dealing with uncertainty in the evaluation of software engineering methods and tools (GC, LT), pp. 691–698.
- SEKE-2002-GriffithsHLO #web
- A simple method & tool for web engineering (GG, BDH, MAL, BJO), pp. 755–762.
- SEKE-2002-MorisioST
- A new method to evaluate software artifacts against predefined profiles (MM, IS, AT), pp. 811–818.
- SEKE-2002-RuheEP #requirements
- Quantitative WinWin: a new method for decision support in requirements negotiation (GR, AE, DP), pp. 159–166.
- SEKE-2002-SvahnbergWLM #architecture #comprehension #quality
- A method for understanding quality attributes in software architecture structures (MS, CW, LL, MM), pp. 819–826.
- SIGIR-2002-KimRL #classification #estimation #multi #naive bayes #parametricity
- A new method of parameter estimation for multinomial naive bayes text classifiers (SBK, HCR, HSL), pp. 391–392.
- SIGIR-2002-ScheinPUP #metric #recommendation
- Methods and metrics for cold-start recommendations (AIS, AP, LHU, DMP), pp. 253–260.
- UML-2002-Dietzsch #adaptation #case study #experience #modelling #uml
- Adapting the UML to Business Modelling’s Needs — Experiences in Situational Method Engineering (AD), pp. 73–83.
- ECOOP-2002-GlewP #type safety
- Type-Safe Method Inlining (NG, JP), pp. 525–544.
- POPL-2002-Manohar #design #scalability
- Scalable formal design methods for asynchronous VLSI (RM), pp. 245–246.
- RE-2002-GrossMZH #convergence #development
- The Reference Point Method: Requirements-Based ICT Convergence Solution Development (WG, TM, FZ, CH), p. 193.
- RE-2002-KaiyaHS #analysis #named #requirements
- AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
- SAC-2002-AghbariKM #performance #reduction #video
- Topological mapping: a dimensionality reduction method for efficient video search (ZA, KK, AM), pp. 470–475.
- SAC-2002-ChangJ #clustering #data mining #mining #scalability
- A new cell-based clustering method for large, high-dimensional data in data mining applications (JWC, DSJ), pp. 503–507.
- SAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #using
- A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
- SAC-2002-KimL #adaptation #clustering #distance #documentation #effectiveness #metric #using
- An effective document clustering method using user-adaptable distance metrics (HjK, SgL), pp. 16–20.
- SAC-2002-KoC #documentation #retrieval
- A structured documents retrieval method supporting attribute-based structure information (SKK, YCC), pp. 668–674.
- SAC-2002-MartinezDF #documentation #evolution #generative
- A method for the dynamic generation of virtual versions of evolving documents (MMM, JCD, PdlF), pp. 476–482.
- SAC-2002-MathiasCDM #architecture #distributed #heuristic #metaheuristic #named #optimisation
- DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods (ENM, CMdC, FLD, FMM), pp. 870–875.
- SAC-2002-ParsopoulosV #multi #optimisation #problem
- Particle swarm optimization method in multiobjective problems (KEP, MNV), pp. 603–607.
- ICSE-2002-Butler #approach #evaluation #security
- Security attribute evaluation method: a cost-benefit approach (SAB), pp. 232–240.
- SPLC-2002-KishiNK #framework #product line
- A Method for Product Line Scoping Based on a Decision-Making Framework (TK, NN, TK), pp. 348–365.
- SPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering #using
- Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
- CAV-2002-ColonS #proving #termination
- Practical Methods for Proving Program Termination (MC, HS), pp. 442–454.
- CAV-2002-McMillan #bound #model checking #satisfiability
- Applying SAT Methods in Unbounded Symbolic Model Checking (KLM), pp. 250–264.
- ICLP-2002-Cabalar #semantics
- A Rewriting Method for Well-Founded Semantics with Explicit Negation (PC), pp. 378–392.
- ISSTA-2002-ChenTZ #evaluation #named #symbolic computation #testing
- Semi-proving: an integrated method based on global symbolic evaluation and metamorphic testing (TYC, THT, ZZ), pp. 191–195.
- SAT-2002-ManyaABCL
- Resolution methods for many-valued CNF formulas (FM, CA, RB, AC, CML), p. 42.
- SAT-2002-MonassonC #algorithm #analysis #exponential #random #satisfiability #scalability
- Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
- TestCom-2002-Ahtiainen #formal method #mobile #protocol #testing
- Applying Formal Method in Mobile Protocol Testing (AA), p. 187–?.
- TestCom-2002-El-FakihYB
- FSM-based Re-Testing Methods (KEF, NY, GvB), pp. 373–390.
- VMCAI-2002-FocardiPR #bisimulation #data flow #proving #security
- Proofs Methods for Bisimulation Based Information Flow Security (RF, CP, SR), pp. 16–31.
- WICSA-2001-KloukinasI #architecture
- SPIN-ning Software Architectures: A Method for Exploring Complex (CK, VI), pp. 67–76.
- ASE-2001-GouraudDGM #automation #statistics #testing
- A New Way of Automating Statistical Testing Methods (SDG, AD, MCG, BM), pp. 5–12.
- DAC-2001-ChenC #analysis #grid #performance #power management #scalability
- Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
- DAC-2001-GorenSW #analysis #novel #pipes and filters #probability
- A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
- DAC-2001-YalcinPMBSH #dependence #using
- An Advanced Timing Characterization Method Using Mode Dependency (HY, RP, MM, CB, KAS, JPH), pp. 657–660.
- DATE-2001-Axelsson #architecture #tool support
- Methods and tools for systems engineering of automotive electronic architectures (JA), p. 112.
- DATE-2001-DoboliV #analysis #network #scalability
- A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
- DATE-2001-DrozdL #float #online #performance #testing
- Efficient on-line testing method for a floating-point adder (AVD, MVL), pp. 307–313.
- DATE-2001-NguyenJ #communication #simulation
- Simulation method to extract characteristics for digital wireless communication systems (LN, VJ), pp. 176–181.
- DATE-2001-XuM #difference #modelling #performance #using
- Efficient and passive modeling of transmission lines by using differential quadrature method (QX, PM), pp. 437–444.
- ICDAR-2001-AkselaLOK #adaptation #classification
- Rejection Methods for an Adaptive Committee Classifier (MA, JL, EO, JK), pp. 982–986.
- ICDAR-2001-BogushMAUK #correlation #image #matrix #performance
- An Efficient Correlation Computation Method for Binary Images Based on Matrix Factorisation (RB, SM, SA, SU, SiK), pp. 312–316.
- ICDAR-2001-ChoisyB #normalisation #recognition #using
- Handwriting Recognition Using Local Methods for Normalization and Global Methods for Recognition (CC, AB), pp. 23–27.
- ICDAR-2001-Couasnon #automation #documentation #generative #named #recognition
- DMOS: A Generic Document Recognition Method, Application to an Automatic Generator of Musical Scores, Mathematical Formulae and Table Structures Recognition Systems (BC), pp. 215–220.
- ICDAR-2001-CouasnonP #documentation #evaluation #recognition
- A Real-World Evaluation of a Generic Document Recognition Method Applied to a Military Form of the 19th Century (BC, LP), pp. 779–783.
- ICDAR-2001-FujimotoON #image
- A Ruled-Line Extraction Method for Digital Camera Images (KF, AO, SN), pp. 297–301.
- ICDAR-2001-HiranoOY
- Field Extraction Method from Existing Forms Transmitted by Facsimile (TH, YO, FY), pp. 738–742.
- ICDAR-2001-Hullender #parametricity #performance
- An Efficient Method for Tuning Handwriting Parameters (GNH), pp. 251–254.
- ICDAR-2001-IshideraS #recognition #reduction
- A Candidate Reduction Method for Handwritten Kanji Character Recognition (EI, AS), pp. 8–13.
- ICDAR-2001-Ishitani #documentation #fault #image #information management #modelling
- Model-Based Information Extraction Method Tolerant of OCR Errors for Document Images (YI), pp. 908–915.
- ICDAR-2001-KameshiroHOY #documentation #retrieval
- A Document Retrieval Method from Handwritten Characters Based on OCR and Character Shape Information (TK, TH, YO, FY), pp. 597–601.
- ICDAR-2001-KogaMSF #2d #bottom-up #parsing #recognition #segmentation
- A Recognition Method of Machine-Printed Monetary Amounts Based on the Two-Dimensional Segmentation and the Bottom-up Parsing (MK, RM, HS, HF), pp. 968–971.
- ICDAR-2001-NatteeN #classification #comprehension #documentation #geometry #machine learning #online #using
- Geometric Method for Document Understanding and Classification Using On-line Machine Learning (CN, MN), pp. 602–606.
- ICDAR-2001-OkamotoIT #evaluation #performance #recognition #robust
- Performance Evaluation of a Robust Method for Mathematical Expression Recognition (MO, HI, KT), pp. 121–128.
- ICDAR-2001-PengCLDZ #automation #documentation #evaluation #performance #segmentation
- An Automatic Performance Evaluation Method for Document Page Segmentation (LP, MC, CL, XD, JZ), pp. 134–137.
- ICDAR-2001-PietikainenO #detection #documentation #image
- Edge-Based Method for Text Detection from Complex Document Images (MP, OO), pp. 286–291.
- ICDAR-2001-WangHP #automation #generative
- Automatic Table Ground Truth Generation and a Background-Analysis-Based Table Structure Extraction Method (YW, RMH, ITP), pp. 528–532.
- ICDAR-2001-YamaguchiYSTT #segmentation
- A Segmentation Method for Touching Japanese Handwritten Characters Based on Connecting Condition of Line (TY, TY, TS, ST, MT), pp. 837–843.
- ICDAR-2001-ZhuS #feedback #recognition
- A Handwritten Character Recognition Method with ANN Feedback (XZ, YS), pp. 255–259.
- VLDB-2001-AnSVKIG #behaviour #data access #energy
- Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
- VLDB-2001-OoiYTJ #distance #performance
- Indexing the Distance: An Efficient Method to KNN Processing (CY, BCO, KLT, HVJ), pp. 421–430.
- VLDB-2001-PapadiasT #named #query
- MV3R-Tree: A Spatio-Temporal Access Method for Timestamp and Interval Queries (YT, DP), pp. 431–440.
- ITiCSE-2001-AedoD #hypermedia #re-engineering
- Applying software engineering methods for hypermedia systems (IA, PD), pp. 5–8.
- ITiCSE-2001-HabermanK #black box #concept #education
- Activating “black boxes” instead of opening “zipper” — a method of teaching novices basic CS concepts (BH, YBDK), pp. 41–44.
- TACAS-2001-ChristensenKM
- A Sweep-Line Method for State Space Exploration (SC, LMK, TM), pp. 450–464.
- CSMR-2001-BeszedesGSCG #c #maintenance #scalability #slicing #source code
- Dynamic Slicing Method for Maintenance of Large C Programs (ÁB, TG, ZMS, JC, TG), pp. 105–113.
- ICSM-2001-OtaniY #component #network #off the shelf
- A Customization Method for Network Management Functions without Modification of Off-the-Shelf Components (TO, YY), pp. 460–469.
- ICSM-2001-SchauerK #behaviour #metric
- The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
- IWPC-2001-AntoniolDCM #concept analysis #legacy
- A Method to Re-Organize Legacy Systems via Concept Analysis (GA, MDP, GC, EM), pp. 281–290.
- IWPC-2001-AversanoCS #case study #comprehension #maintenance #process
- Understanding and Improving the Maintenance Process: A Method and Two Case Studies (LA, GC, SS), pp. 199–208.
- IWPC-2001-GannodC #formal method #reverse engineering #tool support #using
- A Suite of Tools for Facilitating Reverse Engineering Using Formal Methods (GCG, BHCC), pp. 221–232.
- IWPC-2001-GoldB #concept #flexibility #segmentation
- A Flexible Method for Segmentation in Concept Assignmen (NG, KHB), pp. 135–144.
- SCAM-2001-Lucia #slicing
- Program Slicing: Methods and Applications (ADL), pp. 144–151.
- PLDI-2001-GhiyaLS #ambiguity #analysis #c #memory management #on the #points-to #source code
- On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
- CIAA-2001-GranaBA #automaton #compilation #finite #scalability
- Compilation Methods of Minimal Acyclic Finite-State Automata for Large Dictionaries (JG, FMB, MAA), pp. 135–148.
- ICALP-2001-Roura
- A New Method for Balancing Binary Search Trees (SR), pp. 469–480.
- FME-2001-Jackson #formal method #lightweight
- Lightweight Formal Methods (DJ), p. 1.
- CHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
- Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
- CAiSE-2001-BrinkkemperSH #development
- A Method Engineering Language for the Description of Systems Development Methods (SB, MS, FH), pp. 473–476.
- CAiSE-2001-EcksteinAN #development #information management #reuse
- Increasing Reusability in Information Systems Development by Applying Generic Methods (SE, PA, KN), pp. 251–266.
- CAiSE-2001-RalyteR #assembly #process
- An Assembly Process Model for Method Engineering (JR, CR), pp. 267–283.
- EDOC-2001-WangC #distributed #enterprise #risk management
- A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
- ICEIS-v2-2001-CaleroPG #metric
- Method for Obtaining Correct Metrics (CC, MP, MG), pp. 779–784.
- CIKM-2001-ChoHLP #integer #using
- Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
- ICML-2001-DomingosH #algorithm #clustering #machine learning #scalability
- A General Method for Scaling Up Machine Learning Algorithms and its Application to Clustering (PMD, GH), pp. 106–113.
- ICML-2001-MarxDB #clustering #detection
- Coupled Clustering: a Method for Detecting Structural Correspondence (ZM, ID, JMB), pp. 353–360.
- KDD-2001-CarageaCH #classification #using
- Gaining insights into support vector machine pattern classifiers using projection-based tour methods (DC, DC, VH), pp. 251–256.
- KDD-2001-DingHZ #component #graph #web
- A spectral method to separate disconnected and nearly-disconnected web graph components (CHQD, XH, HZ), pp. 275–280.
- KDD-T-2001-HanLP #bibliography #mining #perspective #scalability
- Scalable frequent-pattern mining methods: an overview (JH, LVSL, JP), pp. 264–324.
- MLDM-2001-ImiyaI #detection #statistics
- Statistics of Flow Vectors and Its Application to the Voting Method for the Detection of Flow Fields (AI, KI), pp. 293–306.
- SEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
- Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
- SEKE-2001-MorenoS #classification #detection #requirements
- A Method for Detection, Classification and Resolution of Discrepancies in Viewpoint-based Requirements Engineering (AMM, AS), pp. 110–119.
- SIGIR-2001-OakesGF #classification #documentation
- A Method Based on the Chi-Square Test for Document Classification (MPO, RJG, HF), pp. 440–441.
- SIGIR-2001-ZhaiL #ad hoc #case study #information retrieval #modelling
- A Study of Smoothing Methods for Language Models Applied to Ad Hoc Information Retrieval (CZ, JDL), pp. 334–342.
- OOPSLA-2001-Whaley #compilation #using
- Partial Method Compilation using Dynamic Profile Information (JW), pp. 166–179.
- TOOLS-USA-2001-HeSH #multi #refinement #requirements #standard
- Extensions of Standard Z Refinement Relation for Multiple Viewpoints Oriented Requirements Method (YH, QS, QH), pp. 253–262.
- PADL-2001-TyagiT #algorithm #interface #prolog
- A Most Specific Method Finding Algorithm for Reflection Based Dynamic Prolog-to-Java Interfaces (ST, PT), pp. 322–336.
- POPL-2001-Ganzinger #deduction #performance #program analysis
- Efficient deductive methods for program analysis (HG), pp. 102–103.
- POPL-2001-Mitchell #programming language #security
- Programming language methods in computer security (JCM), pp. 1–3.
- POPL-2001-Monniaux #analysis #monte carlo #probability #source code
- An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
- POPL-2001-Vouillon #calculus
- Combining subsumption and binary methods: an object calculus with views (JV), pp. 290–303.
- RE-2001-JarzabekZ #domain model #modelling #requirements #xml
- XML-Based Method and Tool for Handling Variant Requirements in Domain Models (SJ, HZ), pp. 166–173.
- SAC-2001-BadgerK #taxonomy
- Picking fruit from the tree of life: comments on taxonomic sampling and quartet methods (JHB, PEK), pp. 61–67.
- SAC-2001-CiSN #network #performance #using
- Improving performance of MAC layer by using congestion control/avoidance methods in wireless network (SC, HS, GN), pp. 420–424.
- SAC-2001-LuZP #multi #transaction #version control
- A dual copy method for transaction separation with multiversion control for read-only transactions (BL, QZ, WP), pp. 290–294.
- SAC-2001-Viroli #implementation #java #morphism #parametricity #performance #polymorphism
- Parametric polymorphism in Java: an efficient implementation for parametric methods (MV), pp. 610–619.
- SAC-2001-Zhang #automation #satisfiability #symmetry
- Automatic symmetry breaking method combined with SAT (JZ0), pp. 17–21.
- ESEC-FSE-2001-MorisawaT #architecture #distributed #product line
- An architectural style of product lines for distributed processing systems, and practical selection method (YM, KT), pp. 11–20.
- ESEC-FSE-2001-WallnauHS #component #concept #experience #re-engineering #tutorial
- Half day tutorial in methods of component-based software engineering essential concepts and classroom experience (KCW, SAH, RCS), pp. 314–315.
- ICSE-2001-BachmannB #design
- Introduction to the Attribute Driven Design Method (FB, LJB), pp. 745–746.
- ICSE-2001-BerstelCRP #automation #design #formal method #scalability #user interface
- A Scalable Formal Method for Design and Automatic Checking of User Interfaces (JB, SCR, GR, PSP), pp. 453–462.
- ICSE-2001-SmithOB #analysis #architecture #component #mining #product line #re-engineering
- Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
- ICSE-2001-Wallnau #component #concept #experience #re-engineering
- Methods of Component-Based Software Engineering: Essential Concepts and Classroom Experience (KCW), pp. 709–710.
- CC-2001-TiceG #generative #robust
- A Practical, Robust Method for Generating Variable Range Tables (CT, SLG), pp. 102–117.
- IJCAR-2001-BaaderT #approach #automaton #satisfiability
- The Inverse Method Implements the Automata Approach for Modal Satisfiability (FB, ST), pp. 92–106.
- IJCAR-2001-HodasT #agile #first-order #implementation #linear #logic #named #proving #theorem proving
- lolliCop — A Linear Logic Implementation of a Lean Connection-Method Theorem Prover for First-Order Classical Logic (JSH, NT), pp. 670–684.
- IJCAR-2001-Peltier #automation #deduction #using
- A General Method for Using Schematizations in Automated Deduction (NP), pp. 578–592.
- CBSE-2000-BurgHHMPSW
- Exploring a Comprehensive CBD Method: Use of CBD/e in Practice (WDB, JSH, DPH, KM, ASP, SS, RW), p. 9.
- ASE-2000-LaleauM #bibliography #generative #specification #uml
- An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations (RL, AM), pp. 269–272.
- DAC-2000-HsiehBLS #design #embedded #performance
- Efficient methods for embedded system design space exploration (HH, FB, LL, ALSV), pp. 607–612.
- DAC-2000-KanapkaPW #performance
- Fast methods for extraction and sparsification of substrate coupling (JK, JRP, JW), pp. 738–743.
- DAC-2000-LevySMW #analysis #performance
- A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
- DAC-2000-WangN #analysis #linear #multi #order
- Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
- DAC-2000-YangP #multi #performance #simulation
- A multi-interval Chebyshev collocation method for efficient high-accuracy RF circuit simulation (BY, JRP), pp. 178–183.
- DAC-2000-Zhao #3d
- Singularity-treated quadrature-evaluated method of moments solver for 3-D capacitance extraction (JZ), pp. 536–539.
- DATE-2000-BjureusJ #control flow #named #specification
- MASCOT: A Specification and Cosimulation Method Integrating Data and Control Flow (PB, AJ), pp. 161–168.
- DATE-2000-EdwardsG #configuration management #design #object-oriented
- An Object Oriented Design Method for Reconfigurable Computing Systems (ME, PG), pp. 692–696.
- DATE-2000-FrohlichGF #clustering #parallel #simulation
- A New Partitioning Method for Parallel Simulation of VLSI Circuits on Transistor Level (NF, VG, JF), pp. 679–684.
- DATE-2000-KacNMZ #using
- Alternative Test Methods Using IEEE 1149.4 (UK, FN, SM, MSZ), pp. 463–467.
- DATE-2000-SchwenckerSGA #automation #bound #design
- The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
- SIGMOD-2000-PalmerF #clustering #data mining #mining
- Density Biased Sampling: An Improved Method for Data Mining and Clustering (CRP, CF), pp. 82–92.
- VLDB-2000-JiangSLB
- The BT-tree: A Branched and Temporal Access Method (LJ, BS, DBL, MBG), pp. 451–460.
- CSEET-2000-AbernethyKSKP #formal method #specification
- Technology Transfer Issues for Formal Methods of Software Specification (KA, JCK, AEKS, JDK, JDP), pp. 23–31.
- CSEET-2000-DampierW #education #re-engineering #realtime
- Teaching Scientific Method for Real-Time Software Engineering (DAD, REW), p. 199.
- CSEET-2000-SobelSSH #education #formal method #re-engineering
- Teaching Formal Methods Early in the Software Engineering Curriculum (panel) (AEKS, HS, AMS, PBH), p. 55–?.
- CSEET-2000-Tremblay #formal method #question #re-engineering
- Formal Methods: Mathematics, Computer Science, or Software Engineering? (GT), pp. 273–282.
- ESOP-2000-DenneyJ #correctness #java #logic
- Correctness of Java Card Method Lookup via Logical Relations (ED, TPJ), pp. 104–118.
- FASE-2000-DondossolaB #fault tolerance #formal method #specification
- System Fault Tolerance Specification: Proposal of a Method Combining Semi-formal and Formal Approaches (GD, OB), pp. 82–96.
- FASE-2000-Wehrheim #automation #case study #formal method #specification #using
- Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods (HW), pp. 334–348.
- TACAS-2000-AronsP #comparison #execution #verification
- A Comparison of Two Verification Methods for Speculative Instruction Execution (TA, AP), pp. 487–502.
- TACAS-2000-BraunLSS #consistency #formal method #integration
- Consistent Integration of Formal Methods (PB, HL, BS, OS), pp. 48–62.
- CSMR-2000-BojicV #architecture #comprehension #re-engineering #reuse
- A Use-Case Driven Method of Architecture Recovery for Program Understanding and Reuse Reengineering (DB, DMV), pp. 23–32.
- CSMR-2000-KellerS #assessment #towards
- Towards a Quantitative Assessment of Method Replacement (RKK, RS), pp. 141–150.
- WCRE-2000-BianchiCV #legacy #process #re-engineering
- Method and Process for Iterative Reengineering of Data in a Legacy System (AB, DC, GV), p. 86–?.
- IFM-2000-Ameur #development #formal method #process
- Cooperation of Formal Methods in an Engineering Based Software Development Process (YAA), pp. 136–155.
- IFM-2000-Schulte #formal method #question #why
- Why Doesn’t Anyone Use Formal Methods? (WS), pp. 297–298.
- CHI-2000-Spencer #constraints #development #social
- The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company (RS), pp. 353–359.
- EDOC-2000-GinbayashiYH #architecture #component #framework #modelling
- Business Component Framework and Modeling Method for Component-Based Application Architecture (JG, RY, KH), pp. 184–193.
- EDOC-2000-SudaTHN #distributed #scalability
- New Control Methods for the Realization of an Ultra-Large-Scale Cooperative Distributed System (SS, HT, AH, KN), pp. 13–20.
- ICEIS-2000-KundaB #approach #bibliography #off the shelf
- Accessing Success of a Social-Technical Method for Cots Software Selection: A Survey Approach (DK, LB), pp. 294–298.
- ICEIS-2000-Laleau #database #formal method #on the #specification #uml
- On the Interest of Combining UML with the B Formal Method for the Specification of Database Applications (RL), pp. 56–63.
- ICEIS-2000-Stamper #requirements #social
- Information Requirements are Human, Computers only Machines: Measur’s Rigorous Methods Based on Social Norms (RKS), p. XXVII-XXX.
- CIKM-2000-SakuraiYUK
- The Subspace Coding Method: A New Indexing Scheme for High-Dimensional Data (YS, MY, SU, HK), pp. 210–218.
- CIKM-2000-ZwolA #database #integration #multi #retrieval
- The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval (RvZ, PMGA), pp. 438–445.
- ICML-2000-MargineantuD #classification #evaluation
- Bootstrap Methods for the Cost-Sensitive Evaluation of Classifiers (DDM, TGD), pp. 583–590.
- ICPR-v1-2000-AwanzinoLDLV #locality
- A Method Designed for Trihedron Localization in a Textured Environment (CA, JML, MD, LL, MV), pp. 1664–1667.
- ICPR-v1-2000-AzuelaG #image
- New Method to Count Objects into an Image (JHSA, GG), pp. 1470–1473.
- ICPR-v1-2000-FujikiK #modelling #recursion
- Recursive Factorization Method for the Paraperspective Model Based on the Perspective Projection (JF, TK), pp. 1406–1410.
- ICPR-v1-2000-HuangH #using
- Road Sign Interpretation Using Matching Pursuit Method (CLH, SHH), pp. 1329–1334.
- ICPR-v1-2000-KimH #self
- A Practical Self-Calibration Method of Rotating and Zooming Cameras (HK, KSH), pp. 1354–1357.
- ICPR-v1-2000-KitaKWN #2d #3d
- A Quick 3D-2D Registration Method for a Wide-Range of Applications (YK, NK, DLW, JAN), pp. 1981–1986.
- ICPR-v1-2000-OkataniD #fault #image #metric #multi
- A Method for Fine Registration of Multiple View Range Images Considering the Measurement Error Properties (ISO, KD), pp. 1280–1283.
- ICPR-v1-2000-RibeiroWH
- An Eigendecomposition Method for Shape-from-Texture (ER, PLW, ERH), pp. 1758–1761.
- ICPR-v1-2000-RosenbergerC #clustering #estimation #image #segmentation
- Unsupervised Clustering Method with Optimal Estimation of the Number of Clusters: Application to Image Segmentation (CR, KC), pp. 1656–1659.
- ICPR-v2-2000-BauerHK #recognition #statistics #using
- Video-Based Continuous Sign Language Recognition Using Statistical Methods (BB, HH, KFK), pp. 2463–2466.
- ICPR-v2-2000-Ben-HurSHV #clustering
- A Support Vector Clustering Method (ABH, HTS, DH, VV), pp. 2724–2727.
- ICPR-v2-2000-ChapronBA #multi
- A Multiresolution Based Method for Recognizing Weeds in Corn Fields (MC, PB, LA), pp. 2303–2306.
- ICPR-v2-2000-KimSK #recognition #segmentation #string
- Recognition of Unconstrained Handwritten Numeral Strings by Composite Segmentation Method (KKK, CYS, JHK), pp. 2594–2597.
- ICPR-v2-2000-MottlDLM #pattern matching #pattern recognition #recognition
- Pattern Recognition in Spatial Data: A New Method of Seismic Explorations for Oil and Gas in Crystalline Basement Rocks (VM, SD, VL, IBM), pp. 2315–2318.
- ICPR-v2-2000-QianS #clustering
- Clustering Combination Method (YQ, CYS), pp. 2732–2735.
- ICPR-v2-2000-RibaCVJ #classification #invariant
- Methods for Invariant Signature Classification (JRR, AC, SV, IJ), pp. 2953–2956.
- ICPR-v2-2000-Sato #classification #fault #learning
- A Learning Method for Definite Canonicalization Based on Minimum Classification Error (AS), pp. 2199–2202.
- ICPR-v2-2000-Tambouratzis #classification
- Improving the Classification Accuracy of the Scanning n-tuple Method (GT), pp. 6046–6049.
- ICPR-v2-2000-UmRK #clustering #comparison #verification
- Comparison of Clustering Methods for MLP-Based Speaker Verification (ITU, JHR, MHK), pp. 2475–2474.
- ICPR-v2-2000-VinokourovG #clustering #documentation #probability
- Probabilistic Hierarchical Clustering Method for Organizing Collections of Text Documents (AV, MG), pp. 2182–2185.
- ICPR-v2-2000-ZhouLC
- A Theoretical Justification of Nearest Feature Line Method (ZZ, SZL, KLC), pp. 2759–2762.
- ICPR-v3-2000-GashnikovGS #realtime
- Compression Method for Real-Time Systems of Remote Sensing (MVG, NJG, VVS), pp. 3232–3235.
- ICPR-v3-2000-Ichimura #feature model #segmentation #using
- Motion Segmentation Using Feature Selection and Subspace Method Based on Shape Space (NI), pp. 3858–3864.
- ICPR-v3-2000-Jehan-BessonBA #detection #set #using
- Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
- ICPR-v3-2000-KoubaroulisMK #multimodal #performance
- The Multimodal Signature Method: An Efficiency and Sensitivity Study (DK, JM, JK), pp. 3379–3382.
- ICPR-v3-2000-LuJ #approach #image
- A New Bayesian Approach to Image Denoising with a Combination of MRFs and Pixon Method (QL, TJ), pp. 3734–3737.
- ICPR-v3-2000-LuTH #detection #estimation #novel #robust
- A Novel Method for Camera Planar Motion Detection and Robust Estimation of the 1D Trifocal Tensor (LL, HTT, ZH), pp. 3815–3818.
- ICPR-v3-2000-NelsonLCC #biology #estimation
- Time-Frequency Methods for Biological Signal Estimation (DN, PJL, GC, LC), pp. 3114–3118.
- ICPR-v3-2000-PeceP #composition #performance
- Fast Atomic Decomposition by the Inhibition Method (AECP, NP), pp. 3215–3218.
- ICPR-v3-2000-RajanC #image
- A Perceptually Organized Method for Image Interpolation (DR, SC), pp. 3742–3745.
- ICPR-v3-2000-RibeiroH00a #adaptation
- A Scale Adaptive Method for Focusing Spectral Peaks (ER, ERH), pp. 3123–3126.
- ICPR-v3-2000-StoeckelVVV #evaluation
- An Evaluation of Ridge Extraction Methods for Portal Imaging (JS, FV, PHV, AMV), pp. 3433–3436.
- ICPR-v3-2000-SugiyamaA #detection #reliability
- Edge Detection Method Based on Edge Reliability with Fixed Thresholds: Consideration of Uniformity and Gradation (TS, KA), pp. 3660–3663.
- ICPR-v3-2000-ZhangW #clustering #image #segmentation
- A New Method of Color Image Segmentation Based on Intensity and Hue Clustering (CZ, PSPW), pp. 3617–3620.
- ICPR-v4-2000-HuynhCT #automation #evaluation #linear #metric #re-engineering #self
- Semi-Automatic Metric Reconstruction of Buildings from Self-Calibration: Preliminary Results on the Evaluation of a Linear Camera Self-Calibration Method (DQH, YSC, HTT), pp. 4599–4602.
- ICPR-v4-2000-Ishii #3d #metric #using
- 3-D Shape Measurement Using a Focused-Section Method (AI), pp. 4828–4832.
- ICPR-v4-2000-IskeRMS #behaviour #learning #navigation
- A Bootstrapping Method for Autonomous and in Site Learning of Generic Navigation Behavior (BI, UR, KM, JS), pp. 4656–4659.
- ICPR-v4-2000-Kauppinen #fault #recognition
- A Two Stage Defect Recognition Method for Parquet Slab Grading (HK), pp. 4803–4806.
- ICPR-v4-2000-LeungCKC #bound #detection #fuzzy
- Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
- ICPR-v4-2000-MataNS #detection #multi #using
- Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
- ICPR-v4-2000-MurakamiW #automation
- An Automatic Extraction and Display Method of Walking Person’s Trajectories (SiM, AW), pp. 4611–4614.
- ICPR-v4-2000-NewmanY #detection
- Compound Extraction and Fitting Method for Detecting Cardiac Ventricle in SPECT Data (TSN, HY), pp. 4328–4331.
- ICPR-v4-2000-OhyamaWKTS #automation #detection
- Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method (WO, TW, FK, ST, KS), pp. 4320–4323.
- ICPR-v4-2000-OkunP #analysis #automation #documentation #evaluation #generative #layout
- Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
- ICPR-v4-2000-SziranyiC #optimisation #parallel #segmentation #using
- Spatio-Temporal Segmentation with Edge Relaxation and Optimization Using Fully Parallel Methods (TS, LC), pp. 4820–4823.
- ICPR-v4-2000-TakahashiSO #3d #estimation #image #realtime #using
- Remarks on a Real-Time 3D Human Body Posture Estimation Method Using Trinocular Images (KT, TS, JO), pp. 4693–4697.
- ICPR-v4-2000-YamadaIN #documentation #image
- A Method of Analyzing the Handling of Paper Documents in Motion Images (KY, KI, NN), pp. 4413–4416.
- KDD-2000-KittsFV #independence #named #performance #recommendation
- Cross-sell: a fast promotion-tunable customer-item recommendation method based on conditionally independent probabilities (BK, DF, MV), pp. 437–446.
- SIGIR-2000-DownieN #effectiveness #evaluation #information retrieval #music
- Evaluation of a simple and effective music information retrieval method (JSD, MN), pp. 73–80.
- SIGIR-2000-HoashiMIH #documentation #using
- Document filtering method using non-relevant information profile (KH, KM, NI, KH), pp. 176–183.
- SIGIR-2000-JarvelinK #documentation #evaluation #information retrieval
- IR evaluation methods for retrieving highly relevant documents (KJ, JK), pp. 41–48.
- SIGIR-2000-Ogawa #documentation #n-gram #performance #pseudo #ranking #retrieval
- Pseudo-frequency method: an efficient document ranking retrieval method for n-gram indexing (YO), pp. 321–323.
- SIGIR-2000-OhML #categorisation #hypermedia #incremental #using
- A practical hypertext categorization method using links and incrementally available class information (HJO, SHM, MHL), pp. 264–271.
- SIGIR-2000-PetasisCVPKS #adaptation #automation #machine learning #probability
- Automatic adaptation of proper noun dictionaries through cooperation of machine learning and probabilistic methods (GP, AC, PV, GP, VK, CDS), pp. 128–135.
- SIGIR-2000-SlonimT #clustering #documentation #using #word
- Document clustering using word clusters via the information bottleneck method (NS, NT), pp. 208–215.
- SIGIR-2000-Sormunen #effectiveness #evaluation #novel #query
- A novel method for the evaluation of Boolean query effectiveness across a wide operational range (ES), pp. 25–32.
- SIGIR-2000-YangAPL #categorisation
- Improving text categorization methods for event tracking (YY, TA, TP, CWL), pp. 65–72.
- OOPSLA-2000-LeeKK #modelling #realtime #simulation
- A real world object modeling method for creating simulation environment of real-time systems (JYL, HJK, KCK), pp. 93–104.
- OOPSLA-2000-SundaresanHRVLGG #java
- Practical virtual method call resolution for Java (VS, LJH, CR, RVR, PL, EG, CG), pp. 264–280.
- TOOLS-ASIA-2000-Taibi #development #hybrid #object-oriented #process
- Hybrid Object-Oriented Method (HOOM): The Software Development Process (TT), pp. 8–17.
- TOOLS-ASIA-2000-YaoGL #development #multi
- Application of Development Method Based on Multi-Agents (SY, SG, YL), pp. 158–161.
- TOOLS-PACIFIC-2000-BornHK #design #development #distributed #uml #using
- A Method for the Design and Development of Distributed Applications Using UML (MB, EH, OK), pp. 253–265.
- TOOLS-PACIFIC-2000-CohenG #java #metric #self
- Self-Calibration of Metrics of Java Methods (TC, JYG), pp. 94–107.
- TOOLS-PACIFIC-2000-ForaxDR #framework #java #multi
- Java Multi-Method Framework (RF, ÉD, GR), pp. 45–56.
- ICRE-2000-HubbardSM #assessment #performance #process #requirements
- An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process with Respect to the Conventional Interview Method (RH, CNS, NRM), pp. 178–188.
- SAC-2000-FeekinC #detection #sorting #using
- Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
- SAC-2000-LohHTN #concurrent #database #hybrid #mobile
- A Hybrid Method for Concurrent Updates on Disconnected Databases in Mobile Computing Environments (YHL, TH, MT, SN), pp. 563–565.
- SAC-2000-SakureiTO #self
- Effect of Background Knowledge in a Task Model Self-organization Method (SS, HT, RO), pp. 20–27.
- SAC-2000-SchreckC #implementation #using
- R-Tree Implementation Using Branch-Grafting Method (TS, ZC), pp. 328–332.
- SAC-2000-TousidouM #comparison #data access #performance
- A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
- ICSE-2000-LittlewoodS #assessment #concept #reliability #tutorial
- Software reliability (tutorial session): basic concepts and assessment methods (BL, LS), p. 831.
- ICSE-2000-Miranda #evaluation
- An evaluation of the paired comparisons method for software sizing (EM), pp. 597–604.
- SPLC-2000-AmericaOOL #architecture #component #framework #named #product line
- CoPAM: A component-oriented platform architecting method family for product family engineering (PA, JHO, RCvO, FvdL), pp. 167–180.
- SPLC-2000-CoriatJB
- The SPLIT Method (MC, JJ, FB), pp. 147–166.
- LCTES-2000-LeeSJ #communication #multi
- An Integrated Push/Pull Buffer Management Method in Multimedia Communication Environments (SL, HS, TJ), pp. 216–220.
- CAV-2000-Meadows #analysis #encryption #formal method #protocol
- Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
- CAV-2000-StollerUL #detection #distributed #partial order #performance #using
- Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
- CL-2000-AudemardBS #named #satisfiability
- AVAL: An Enumerative Method for SAT (GA, BB, PS), pp. 373–383.
- CL-2000-JunttilaN #performance #satisfiability #towards
- Towards an Efficient Tableau Method for Boolean Circuit Satisfiability Checking (TAJ, IN), pp. 553–567.
- RTA-2000-Arts #dependence
- System Description: The Dependency Pair Method (TA), pp. 261–264.
- WICSA-1999-GuoAK #architecture #re-engineering
- A Software Architecture Reconstruction Method (GYG, JMA, RK), pp. 15–34.
- WICSA-1999-MedvidovicR #architecture #design #modelling #standard
- Assessing the Suitability of a Standard Design Method for Modeling Software Architectures (NM, DSR), pp. 161–182.
- WICSA-1999-Muller #design
- Aspect Design with the Building Block Method (JKM), p. 585–?.
- ASE-1999-DevulderL #case study #comparative #linear #programming #validation #verification
- A Comparative Study between Linear Programming Validation (LPV) and other Verification Methods (SD, JLL), pp. 299–302.
- ASE-1999-ReyesR #generative #named
- Siddhartha: A Method for Developing Domain-Specific Test Driver Generators (AAR, DJR), p. 81–?.
- DAC-1999-SuWL #interactive
- A Timing-Driven Soft-Macro Resynthesis Method in Interaction with Chip Floorplanning (HPS, ACHW, YLL), pp. 262–267.
- DAC-1999-TauschW #multi #performance
- A Multiscale Method for Fast Capacitance Extraction (JT, JKW), pp. 537–542.
- DATE-1999-AntakiSXA #design #testing
- Design For Testability Method for CML Digital Circuits (BA, YS, NX, SA), pp. 360–367.
- DATE-1999-CotaCL #adaptation #fault #linear #using
- A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester (ÉFC, LC, ML), pp. 184–188.
- DATE-1999-PapachristouA #design #distributed
- A Method of Distributed Controller Design for RTL Circuits (CAP, YA), pp. 774–775.
- DATE-1999-SmithM #component #polynomial
- Polynomial Methods for Allocating Complex Components (JS, GDM), pp. 217–222.
- HT-1999-LoweBW #assessment #development #hypermedia #modelling #process
- Improving Hypermedia Development: A Reference Model-Based Process Assessment Method (DBL, AJB, RW), pp. 139–146.
- ICDAR-1999-AmanoM #documentation #image
- A Feature Calibration Method for Watermarking of Document Images (TA, DM), pp. 91–94.
- ICDAR-1999-HeJLZ #documentation #image #retrieval
- Content-based Index and Retrieval Method of Chinese Document Images (YH, ZJ, BL, HZ), pp. 685–688.
- ICDAR-1999-Hori #recognition #video
- A Video Text Extraction Method for Character Recognition (OH), pp. 25–28.
- ICDAR-1999-IkedaOKNSF #recognition
- A Recognition Method for Touching Japanese Handwritten Characters (HI, YO, MK, HN, HS, HF), pp. 641–644.
- ICDAR-1999-ImpedovoS #evaluation
- Evaluation of Combination Methods (SI, AS), pp. 394–397.
- ICDAR-1999-KamadaF #image #performance
- High-speed, High-accuracy Binarization Method for Recognizing Text in Images of Low Spatial Resolutions (HK, KF), pp. 139–142.
- ICDAR-1999-KameshiroHOY #documentation #fault #image #multi #recognition #retrieval #segmentation #using
- A Document Image Retrieval Method Tolerating Recognition and Segmentation Errors of OCR using Shape-Feature and Multiple Candidates (TK, TH, YO, FY), pp. 681–684.
- ICDAR-1999-LaaksonenAOK #adaptation #online #recognition
- Dynamically Expanding Context as Committee Adaptation Method in On-Line Recognition of Handwritten Latin Characters (JL, MA, EO, JK), pp. 796–799.
- ICDAR-1999-LiangHP #segmentation #statistics
- A Statistically based, Highly Accurate Text-line Segmentation Method (JL, RMH, ITP), pp. 551–554.
- ICDAR-1999-LladosML #detection #diagrams
- A Hough-based Method for Hatched Pattern Detection in Maps and Diagrams (JL, EM, JLK), pp. 479–482.
- ICDAR-1999-MisraAC #image #memory management #performance
- A Memory Efficient Method for Fast Transposing Run-length Encoded Images (VM, JFA, AKC), pp. 161–164.
- ICDAR-1999-NakagawaYN #normalisation #recognition
- An Off-line Character Recognition Method Employing Model-dependent Pattern Normalization by an Elastic Membrane Model (MN, TY, TN), pp. 495–498.
- ICDAR-1999-OgataUMSF #recognition
- A Method for Street Number Matching in Japanese Address Recognition (HO, YU, KM, HS, HF), pp. 321–324.
- ICDAR-1999-OkamotoY #online #recognition #using
- On-line Handwritten Character Recognition Method using Directional Features and Clockwise/Counterwise Direction-Change Features (MO, KY), pp. 491–494.
- ICDAR-1999-WangT #documentation #image #recognition
- A New Method of Character Line Extraction from Mixed-unformatted Document Image for Japanese Mail Address Recognition (XW, TT), pp. 769–772.
- ICDAR-1999-XiLT #novel
- A Novel Method for Discriminating between Oriental and European Languages by Fractal Features (DX, SWL, YYT), pp. 345–348.
- ICDAR-1999-XingyuanGDO #analysis #robust
- A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
- SIGMOD-1999-AggarwalWY #similarity
- A New Method for Similarity Indexing of Market Basket Data (CCA, JLW, PSY), pp. 407–418.
- SIGMOD-1999-ChakrabartiM #concurrent #data access #multi #performance
- Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
- SIGMOD-1999-HinneburgK #clustering #database #scalability
- Clustering Methods for Large Databases: From the Past to the Future (AH, DAK), p. 509.
- ITiCSE-1999-Bobkowska #empirical #game studies
- Laboratory experiment with the 3RolesPlaying method (AEB), pp. 123–126.
- ITiCSE-1999-KurasGZ #education
- Changing IS curriculum and methods of instruction (MK, MG, AZ), pp. 36–39.
- ITiCSE-1999-Polak #case study #communication #education #using
- Teaching computer communication skills using case study method (PP), p. 190.
- CSMR-1999-Pedro-de-JesusS #database #relational #reverse engineering
- Selection of Reverse Engineering Methods for Relational Databases (MdLPdJ, PMAS), pp. 194–197.
- CSMR-1999-WangKW #component #maintenance #testing
- A Method for Built-in Tests in Component-based Software Maintenance (YW, GK, HW), pp. 186–189.
- ICSM-1999-SchauerRMK #composition #inheritance #object-oriented
- Hot Spot Recovery in Object-Oriented Software with Inheritance and Composition Template Methods (RS, SR, FM, RKK), pp. 220–229.
- WCRE-1999-AnquetilL #clustering
- Experiments with Clustering as a Software Remodularization Method (NA, TCL), pp. 235–255.
- WCRE-1999-Jermaine #using
- Computing Program Modularizations Using the k-Cut Method (CJ), pp. 224–234.
- WCRE-1999-Koschke #automation #component #incremental
- An Incremental Semi-Automatic Method for Component Recovery (RK), p. 256–?.
- STOC-1999-FerraginaMB #approach #geometry #multi #problem #string
- Multi-Method Dispatching: A Geometric Approach With Applications to String Matching Problems (PF, SM, MdB), pp. 483–491.
- ICALP-1999-BuhrmanJLV
- New Applications of the Incompressibility Method (HB, TJ, ML, PMBV), pp. 220–229.
- WIA-1999-SeuringG #automaton
- A Structural Method for Output Compaction of Sequential Automata Implemented as Circuits (MS, MG), pp. 158–163.
- FM-v1-1999-Jackson
- The Role of Formalism in Method (MJ), p. 56.
- FM-v1-1999-MunozR
- Structural Embeddings: Mechanization with Method (CAM, JMR), pp. 452–471.
- FM-v1-1999-PaigeO #formal method
- Developing BON as an Industrial-Strength Formal Method (RFP, JSO), pp. 834–853.
- FM-v1-1999-Rouzaud #calculus #refinement
- Interpreting the B-Method in the Refinement Calculus (YR), pp. 411–430.
- FM-v1-1999-Rushby #formal method #question
- Mechanized Formal Methods: Where Next? (JMR), pp. 48–51.
- FM-v1-1999-SabatierL #design #formal method #smarttech #transaction #validation
- The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications (DS, PL), pp. 348–368.
- FM-v2-1999-ChaudronTW #design #formal method #lessons learnt
- Lessons from the Application of Formal Methods to the Design of a Storm Surge Barrier Control System (MRVC, JT, KW), pp. 1511–1526.
- FM-v2-1999-DunstanKML #formal method
- Formal Methods for Extensions to CAS (MD, TK, UM, SL), pp. 1758–1777.
- FM-v2-1999-Krieg-BrucknerPOB #development #formal method
- The UniForM Workbench, a Universal Development Environment for Formal Methods (BKB, JP, ERO, AB), pp. 1186–1205.
- HCI-CCAD-1999-EndoKTHT
- Cybercity walker — layered morphin method (TE, AK, HT, MH, TT), pp. 1044–1048.
- HCI-CCAD-1999-FachB #adaptation #design #learning
- Training wheels: an “old” method for designing modern and adaptable learning environments (PWF, MB), pp. 725–729.
- HCI-CCAD-1999-Honold #elicitation #requirements
- Focus groups: A qualitative method to elicit culture-specific user requirements (PH), pp. 3–7.
- HCI-EI-1999-Baumann #evaluation #feedback #matrix #usability
- Matrix Evaluation Method for Planned Usability Improvements Based on Customer Feedback (KB), pp. 701–705.
- HCI-EI-1999-Czerwinski #generative #human-computer #research
- Research Methods for Next Generation HCI (MC), pp. 1103–1107.
- HCI-EI-1999-FitzpatrickD #evaluation #process #usability
- A Process for Appraising Commercial Usability Evaluation Methods (RF, AJD), pp. 1068–1072.
- HCI-EI-1999-HosonoIT #evaluation #requirements
- Sensory Evaluation Method for Determining Portable Information Terminal Requirements for Nursing Care Applications (NH, HI, YT), pp. 953–957.
- HCI-EI-1999-KurosuSM #case study #comparative #evaluation #heuristic
- A Comparative Study of sHEM (structured heuristic evaluation method) (MK, MS, SM), pp. 938–942.
- HCI-EI-1999-LuSUI
- A New Method to Synthesize Japanese Sign Language Based on Intuitive Motion Primitives (SL, HS, TU, SI), pp. 441–445.
- HCI-EI-1999-MoussaRMK #automation #generative #petri net #specification #user interface
- A Petri Nets based Method for Specification and Automatic Generation of User Interface (FM, MR, MM, CK), pp. 988–992.
- HCI-EI-1999-RavidB #prototype #requirements #user interface
- A Method for Extracting Requirements that a User Interface Prototype Contains (AR, DMB), pp. 900–904.
- HCI-EI-1999-SanuiU #email #evaluation #grid
- Extracting Baby-Boomers’ Future Expectations by the Evaluation Grid Method Through E-Mail (JS, MU), pp. 760–763.
- HCI-EI-1999-SuzukiKO #design #named #process
- QUIS: applying a new walkthrough method to a product design process (SS, AK, KO), pp. 933–937.
- HCI-EI-1999-Urokohara #analysis #design #usability #user interface #using
- Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
- SIGAda-1999-GedelaSX #ada #concurrent #formal method #modelling
- Formal modeling of synchronization methods for concurrent objects in Ada 95 (RKG, SMS, HX), pp. 211–220.
- CAiSE-1999-PrakashS #heuristic #modelling #quality
- Modelling Method Heuristics for Better Quality Products (NP, RS), pp. 429–433.
- CAiSE-1999-RalyteRP
- Method Enhancement with Scenario Based Techniques (JR, CR, VP), pp. 103–118.
- CAiSE-1999-SvinterikouT #information management #modelling #named
- TUML: A Method for Modelling Temporal Information Systems (MS, BT), pp. 456–461.
- ICEIS-1999-BorgesN #development #object-oriented
- An Assistant for Selecting Object Oriented Methods for Applications Development (GdESB, MEMN), p. 780.
- ICEIS-1999-JuricRH #architecture #distributed #legacy
- A Method for Integrating Legacy Systems within Distributed Object Architecture (MBJ, IR, MH), pp. 461–468.
- ICEIS-1999-NishiokaKKON #data type #inheritance
- A High Speed Access Method to Data Structures with Inheritance Hierarchy (SN, FK, JK, MO, JN), pp. 509–516.
- ICEIS-1999-YooYP #data access #internet
- A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
- CIKM-1999-EpterK #clustering #multi
- A Multiple-Resolution Method for Edge-Centric Data Clustering (SE, MSK), pp. 491–498.
- CIKM-1999-Kanada
- A Method of Geographical Name Extraction from Japanese Text for Thematic Geographical Search (YK), pp. 46–54.
- CIKM-1999-YuOE #performance #scalability
- Simple QSF-Trees: An Efficient and Scalable Spatial Access Method (BY, RO, MWE), pp. 5–14.
- KDD-1999-Domingos #classification #named
- MetaCost: A General Method for Making Classifiers Cost-Sensitive (PMD), pp. 155–164.
- MLDM-1999-HongW #data mining #mining #predict
- Advanced in Predictive Data Mining Methods (SJH, SMW), pp. 13–20.
- SIGIR-1999-HoashiMIH #query #word
- Query Expansion Method Based on Word Contribution (poster abstract) (KH, KM, NI, KH), pp. 303–304.
- SIGIR-1999-JonesSCKS #comparison #information retrieval #query
- A Comparison of Query Translation Methods for English-Japanese Cross-Language Information Retrieval (poster abstract) (GJFJ, TS, NC, AK, KS), pp. 269–270.
- SIGIR-1999-YangL #categorisation
- A Re-Examination of Text Categorization Methods (YY, XL), pp. 42–49.
- ECOOP-1999-DetlefsA
- Inlining of Virtual Methods (DD, OA), pp. 258–278.
- ECOOP-1999-Ernst
- Propagating Class and Method Combination (EE), pp. 67–91.
- ECOOP-1999-PangHLS #multi #using
- Multi-method Dispatch Using Multiple Row Displacement (CP, WH, YL, DS), pp. 304–328.
- TOOLS-ASIA-1999-HuZJ #object-oriented
- Applying Object-Oriented Method to CSIE System (YH, SZ, WJ), pp. 484–491.
- TOOLS-EUROPE-1999-Henderson-Sellers99b #uml
- Introduction to the OPEN Method with UML (BHS), p. 399.
- TOOLS-EUROPE-1999-KoskimiesBPH #architecture #challenge #design #object-oriented #reuse #tool support
- Designing Reusable Object-Oriented Architectures — Challenges, Methods & Tools (KK, JB, WP, GH), p. 421.
- TOOLS-EUROPE-1999-Meyer99c #development #eiffel
- Seamless Development with the Eiffel Method (BM), p. 397.
- TOOLS-EUROPE-1999-Stapleton #development #named
- DSDM: Dynamic Systems Development Method (JS), p. 406.
- TOOLS-PACIFIC-1999-MitchellM #contract
- Extending a Method of Devising Software Contracts (RM, JM), p. 234–?.
- TOOLS-PACIFIC-1999-SchmolitzkyEKM #how #question #type safety
- How Can Covariance in Pragmatical Class Methods be Made Statically Type-Safe? (AS, ME, JLK, GM), pp. 200–209.
- TOOLS-USA-1999-DanielsT #constraints #effectiveness #sequence #testing
- Measuring the Effectiveness of Method Test Sequences Derived from Sequencing Constraints (FJD, KCT), pp. 74–83.
- TOOLS-USA-1999-Henderson-Sellers99a #uml
- Introduction to the OPEN Method with UML (BHS), p. 504.
- LOPSTR-1999-DucasseR #consistency #formal method #proving
- Proof Obligations of the B Formal Method: Local Proofs Ensure Global Consistency (MD, LR), pp. 10–29.
- PPDP-1999-BaldanCFP #abstract interpretation
- A Simple and General Method for Integrating Abstract Interpretation in SICStus (DB, NC, GF, FP), pp. 207–223.
- RE-1999-VillerS #analysis #process #requirements #social
- Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
- SAC-1999-DunningR #estimation #heuristic #optimisation
- A Heuristic Cost Estimation Method for Optimizing Assignment of Tasks to Processors (LAD, SR), pp. 358–364.
- SAC-1999-HarwoodS #low cost #network
- A Method of Trading Diameter for Reduced Degree to Construct Low Cost Interconnection Networks (AH, HS), pp. 474–480.
- SAC-1999-Lee #multi #scheduling
- Artificial Intelligence Search Methods for Multi-Machine Two-Stage Scheduling (IL), pp. 31–35.
- SAC-1999-RauberR99a #matrix
- Matrix Computations Behind the Hierarchical Radiosity Method (TR, GR), pp. 533–540.
- ESEC-FSE-1999-Fierz #component #embedded #modelling
- The CIP Method: Component- and Model-Based Construction of Embedded Systems (HF), pp. 375–392.
- ESEC-FSE-1999-GyimothyBF #debugging #performance #slicing
- An Efficient Relevant Slicing Method for Debugging (TG, ÁB, IF), pp. 303–321.
- ICSE-1999-HolzmannS #verification
- A Practical Method for Verifying Event-Driven Software (GJH, MHS), pp. 597–607.
- ICSE-1999-Kontio #bibliography #development #risk management
- Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
- ICSE-1999-MaruyamaS #automation #dependence #graph #refactoring #using
- Automatic Method Refactoring Using Weighted Dependence Graphs (KM, KS), pp. 236–245.
- ICSE-1999-TaharaOH #development
- Agent System Development Method Based on Agent Patterns (YT, AO, SH), pp. 356–367.
- CC-1999-ZhangGRG #performance #pipes and filters
- Efficient State-Diagram Construction Methods for Software Pipelining (CZ, RG, SR, GRG), pp. 153–167.
- PPoPP-1999-MaassenNVBP #implementation #java #performance
- An Efficient Implementation of Java’s Remote Method Invocation (JM, RvN, RV, HEB, AP), pp. 173–182.
- CADE-1999-ArecesNR #logic
- Prefixed Resolution: A Resolution Method for Modal and Description Logics (CA, HdN, MdR), pp. 187–201.
- CAV-1999-Brinksma #consistency #formal method #testing
- Formal Methods for Conformance Testing: Theory Can Be Practical (EB), pp. 44–45.
- CSL-1999-HagiharaY #logic
- Resolution Method for Modal Logic with Well-Founded Frames (SH, NY), pp. 277–291.
- IWTCS-1999-ArtychB #concept #consistency #requirements #tool support
- External Conformance Requirements: Concepts, Methods and Tools (RA, KMB), pp. 363–378.
- IWTCS-1999-LatvakoskiH #communication #embedded #protocol #simulation #testing
- Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems (JL, HH), pp. 379–394.
- ASE-1998-Andrews #analysis #testing #tool support #using
- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
- DAC-1998-ChouW #equation #multi #parametricity
- Multilevel Integral Equation Methods for the Extraction of Substrate Coupling Parameters in Mixed-Signal IC’s (MC, JW), pp. 20–25.
- DAC-1998-CuletuAM
- A Practical Repeater Insertion Method in High Speed VLSI Circuits (JC, CA, JM), pp. 392–395.
- DAC-1998-DemirMR
- Phase Noise in Oscillators: A Unifying Theory and Numerical Methods for Characterisation (AD, AM, JSR), pp. 26–31.
- DAC-1998-DengiR #2d #bound #megamodelling
- Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
- DAC-1998-LillisB
- Table-Lookup Methods for Improved Performance-Driven Routing (JL, PB), pp. 368–373.
- DAC-1998-SteeleORH #verification
- Full-Chip Verification Methods for DSM Power Distribution Systems (GS, DO, SR, SZH), pp. 744–749.
- SIGMOD-1998-KornackerSH #debugging #named
- amdb: An Access Method Debugging Tool (MK, MAS, JMH), pp. 570–571.
- VLDB-1998-MuthOPW #data access #design #implementation #performance
- Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
- VLDB-1998-WeberSB #analysis #performance
- A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
- ITiCSE-1998-CarboneK #bibliography #education
- A survey of methods used to evaluate computer science teaching (AC, JK), pp. 41–45.
- ESOP-1998-AbadiG #bisimulation #encryption #protocol
- A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
- CSMR-1998-BattagliaSF #legacy #named
- RENAISSANCE: A Method to Migrate from Legacy to Immortal Software Systems (MB, GS, JMF), pp. 197–200.
- CSMR-1998-DumkeF #development #evaluation #object-oriented
- Metrics-Based Evaluation of Object-Oriented Software Development Methods (RRD, EF), pp. 193–196.
- CSMR-1998-Kleuker #distributed #formal method #re-engineering #using
- Reengineering of Distributed Systems Using Formal Methods (SK), pp. 189–192.
- CSMR-1998-RansomSW #evolution #legacy
- A Method for Assessing Legacy Systems for Evolution (JR, IS, IW), pp. 128–134.
- ICSM-1998-Schneidewind #maintenance #off the shelf #reliability
- Methods for Assessing COTS Reliability, Maintainability, and Availability (NFS), p. 224–?.
- SAS-1998-HagiyaT #analysis #data flow #java #on the #virtual machine
- On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
- ICALP-1998-HusfeldtR #problem
- Hardness Results for Dynamic Problems by Extensions of Fredman and Saks’ Chronogram Method (TH, TR), pp. 67–78.
- FM-1998-AgerholmL #approach #formal method #lightweight
- A Lightweight Approach to Formal Methods (SA, PGL), pp. 168–183.
- FM-1998-AgerholmL98a #formal method #lightweight #tool support
- The IFAD VDM Tools: Lightweight Formal Methods (SA, PGL), pp. 326–329.
- FM-1998-BroyS #development #formal method #process
- Enriching the Software Development Process by Formal Methods (MB, OS), pp. 44–61.
- FM-1998-Krieg-Bruckner #formal method
- UniForM Perspectives for Formal Methods (BKB), pp. 251–265.
- FM-1998-MeulenC #formal method #specification
- Formal Methods in the Specification of the Emergency Closing System of the Eastern Scheldt Storm Surge Barrier (MvdM, TC), pp. 296–301.
- ICFP-1998-Russell #analysis #design #functional #named
- MAP: A Functional Analysis and Design Method (DR), p. 342.
- CHI-1998-LewisBCR #adaptation #design #education #process #user interface
- Adapting User Interface Design Methods to the Design of Educational Activities (CHL, CB, GC, CR), pp. 619–626.
- CHI-1998-Masui #performance
- An Efficient Text Input Method for Pen-Based Computers (TM), pp. 328–335.
- CAiSE-1998-BrinkkemperSH #assembly
- Assembly Techniques for Method Engineering (SB, MS, FH), pp. 381–400.
- CAiSE-1998-DomgesPS
- A Filter-Mechanism for Method-Driven Trace Capture (RD, KP, KS), pp. 237–250.
- CAiSE-1998-RollandPR #reuse #specification
- Specifying the Reuse Context of Scenario Method Chunks (CR, VP, JR), pp. 191–218.
- CIKM-1998-ClairLP #process
- Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process (CSC, CL, NP), pp. 259–266.
- CIKM-1998-ZhouPL #implementation #process #transaction #workflow
- Dynamic Restructuring of Transactional Workflow Activities: A Practical Implementation Method (TZ, CP, LL), pp. 378–385.
- ICML-1998-Dietterich #learning
- The MAXQ Method for Hierarchical Reinforcement Learning (TGD), pp. 118–126.
- ICPR-1998-ArikiS #classification #multi #using
- Classification of TV sports news by DCT features using multiple subspace method (YA, YS), pp. 1488–1491.
- ICPR-1998-FunadaOMTNMSWY #feature model
- Feature extraction method for palmprint considering elimination of creases (JiF, NO, MM, TT, KN, AM, TS, TW, YY), pp. 1849–1854.
- ICPR-1998-HerouxDRT #automation #classification #identification
- Classification method study for automatic form class identification (PH, SD, AR, ÉT), pp. 926–928.
- ICPR-1998-HwangYTY #3d #linear #using
- A factorization method using 3D linear combination for shape and motion recovery (KCH, NY, HT, KY), pp. 959–963.
- ICPR-1998-KawataniS #recognition
- Handwritten Kanji recognition with the LDA method (TK, HS), pp. 1301–1305.
- ICPR-1998-KosmalaR #online #recognition #statistics #using
- On-line handwritten formula recognition using statistical methods (AK, GR), pp. 1306–1308.
- ICPR-1998-KrejciFS #image #multi
- A new multichannel blind deconvolution method and its application to solar images (RK, JF, SS), pp. 1765–1767.
- ICPR-1998-KronerL #authentication #pattern matching #pattern recognition #recognition
- Authentication of free hand drawings by pattern recognition methods (SK, ADL), pp. 462–464.
- ICPR-1998-KurataFS #geometry
- Affine epipolar geometry via factorization method (TK, JF, KS), pp. 862–866.
- ICPR-1998-LeiW #detection #novel #symmetry
- A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
- ICPR-1998-LiML #estimation #multi #recognition #using
- Human posture recognition using multi-scale morphological method and Kalman motion estimation (YL, SM, HL), pp. 175–177.
- ICPR-1998-MeckeAM #estimation #robust #sequence
- A robust method for block-based motion estimation in RGB-image sequences (RM, AAH, BM), pp. 663–667.
- ICPR-1998-MottlBKKM #analysis #image
- Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
- ICPR-1998-Onoguchi #detection
- Shadow elimination method for moving object detection (KO), pp. 583–587.
- ICPR-1998-PalubinskasDK #clustering #using
- An unsupervised clustering method using the entropy minimization (GP, XD, FK), pp. 1816–1818.
- ICPR-1998-RiazanovSZ #algebra #logic #optimisation #pattern matching #pattern recognition #recognition
- Mathematical methods for pattern recognition: logic, optimization, algebraic approaches (VVR, OVS, YIZ), pp. 831–834.
- ICPR-1998-RigollK #comparison #markov #modelling #online #verification
- A systematic comparison between on-line and off-line methods for signature verification with hidden Markov models (GR, AK), pp. 1755–1757.
- ICPR-1998-ShihLRC #image
- Morphologic field warping: a volumetric deformation method for medical image registration (WSVS, WCL, SYR, CTC), pp. 1680–1682.
- ICPR-1998-ShikuKN #string #using
- A method for character string extraction using local and global segment crowdedness (OS, KK, AN), pp. 1077–1080.
- ICPR-1998-TombreADHM #off the shelf #recognition #robust
- Stable, robust and off-the-shelf methods for graphics recognition (KT, CAS, PD, AH, GM), pp. 406–408.
- ICPR-1998-Visa #algorithm #image #search-based #segmentation
- A genetic algorithm based method to improve image segmentation (AV), pp. 1015–1017.
- ICPR-1998-YamashitaIO #pattern matching #pattern recognition #recognition
- Relative Karhunen-Loeve transform method for pattern recognition (YY, YI, HO), pp. 1031–1033.
- ICPR-1998-ZhugeTLHD #analysis #image #interactive #programming #segmentation
- An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
- KDD-1998-PadmanabhanT
- A Belief-Driven Method for Discovering Unexpected Patterns (BP, AT), pp. 94–100.
- KDD-1998-PinheiroS #database #mining #semistructured data
- Methods for Linking and Mining Massive Heterogeneous Databases (JCP, DXS), pp. 309–313.
- KDD-1998-Rosset #classification #comparison #evaluation #flexibility #named #performance #ranking
- Ranking — Methods for Flexible Evaluation and Efficient Comparison of Classification Performance (SR), pp. 324–328.
- KDD-1998-SteegRW #correlation #detection #higher-order #multi #performance
- Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data (EWS, DAR, EW), pp. 112–120.
- SIGIR-1998-FranzR #correlation #query
- A Method for Scoring Correlated Features in Query Expansion (MF, SR), pp. 337–338.
- TOOLS-USA-1998-BarnB #component #development #tool support
- Methods and Tools for Component Based Development (BB, AWB), pp. 384–395.
- TOOLS-USA-1998-Mellor #development #realtime
- Real-Time Development with the Shlaer-Mellor Method (SJM), p. 412.
- TOOLS-USA-1998-Meyer98a #contract #design #eiffel
- Design by Contract: The Eiffel Method (BM), p. 446.
- ALP-PLILP-1998-LeviV #abstract interpretation #proving
- Derivation of Proof Methods by Abstract Interpretation (GL, PV), pp. 102–117.
- ALP-PLILP-1998-Pitts #higher-order #semantics
- Operational Versus Denotational Methods in the Semantics of Higher Order Languages (AMP), pp. 282–283.
- ALP-PLILP-1998-Refalo #detection #incremental
- Approaches to the Incremental Detection of Implicit Equalities with the Revised Simplex Method (PR), pp. 481–496.
- LOPSTR-1998-Rosenblueth #source code #using
- An Exhaustive-Search Method Using Layered Streams Obtained Through a Meta-Interpreter for Chain Programs (DAR), pp. 322–324.
- ICRE-1998-SutcliffeR #analysis #experience #requirements
- Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
- REFSQ-1998-GoldkuhlA #information management #requirements
- Action Within Information Systems: Outline of a Requirements Engineering Method (GG, PJÅ), pp. 133–153.
- SAC-1998-SabinY #database #information retrieval
- Integrating information retrieval techniques with traditional DB methods in a Web-based database browser (RES, TKY), pp. 760–766.
- SAC-1998-WangW #adaptation #multi #optimisation #performance
- Efficient and adaptive Lagrange-multiplier methods for continuous nonlinear optimization (TW, BWW), pp. 361–365.
- SAC-1998-WohlmuthM #communication #configuration management #parallel
- A method for them embedding of arbitrary communication topologies into configurable parallel computers (OW, FML), pp. 569–574.
- FSE-1998-GuptaMS #automation #generative #testing #using
- Automated Test Data Generation Using an Iterative Relaxation Method (NG, APM, MLS), pp. 231–244.
- FSE-1998-KontioGL #case study #concept #experience #process #risk management #using
- Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
- ICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named #risk management
- COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
- ICSE-1998-MotoyoshiO #development #incremental #object-oriented
- An Incremental Project Plan: Introducing Cleanroom Method and Object-Oriented Development Method (YM, SO), pp. 430–433.
- ICSE-1998-RobbinsMR #architecture #design #standard
- Integrating Architecture Description Languages with a Standard Design Method (JER, NM, DFR), pp. 209–218.
- LCTES-1998-AnantharamanP #clustering #embedded #memory management #performance
- An Efficient Data Partitioning Method for Limited Memory Embedded Systems (SA, SP), pp. 108–222.
- CAV-1998-BellaP #induction
- Mechanising BAN Kerberos by the Inductive Method (GB, LCP), pp. 416–427.
- CAV-1998-CourturierM #empirical #formal method #using
- An Experiment in Parallelizing an Application Using Formal Methods (RC, DM), pp. 345–356.
- CAV-1998-Cuellar #formal method #industrial
- Formal Methods in an Industrial Environment (JC), pp. 57–60.
- CAV-1998-HoffmanP #experience #formal method
- A Formal Method Experience at Secure Computing Corporation (JH, CP), pp. 49–56.
- ASE-1997-BlazyF #development #formal method #maintenance
- Application of Formal Methods to the Development of a Software Maintenance Tool (SB, PF), pp. 162–171.
- ASE-1997-GoguenLMRS #distributed #formal method #tool support
- Distributed Cooperative Formal Methods Tools (JAG, KL, AM, GR, AS), pp. 55–62.
- ASE-1997-SahraouiMLD #concept #identification
- Applying Concept Formation Methods to Object Identification in Procedural Code (HAS, WLM, HL, FD), pp. 210–218.
- DAC-1997-FangWY #debugging #online #realtime
- A Real-Time RTL Engineering-Change Method Supporting On-Line Debugging for Logic-Emulation Applications (WJF, ACHW, TYY), pp. 101–106.
- DAC-1997-KapurZ #parametricity #performance
- A Fast Method of Moments Solver for Efficient Parameter Extraction of MCMs (SK, JZ), pp. 141–146.
- DAC-1997-KrupnovaAS #clustering
- A Hierarchy-Driven FPGA Partitioning Method (HK, AA, GS), pp. 522–525.
- DAC-1997-Roychowdhury #multi #performance #simulation
- Efficient Methods for Simulating Highly Nonlinear Multi-Rate Circuits (JSR), pp. 269–274.
- EDTC-1997-ArabiK #performance #testing #using
- Efficient and accurate testing of analog-to-digital converters using oscillation-test method (KA, BK), pp. 348–352.
- EDTC-1997-ChoiH #estimation
- Improving the accuracy of support-set finding method for power estimation of combinational circuits (HC, SHH), pp. 526–530.
- EDTC-1997-LaquaiRW #metric #performance #testing
- A production-oriented measurement method for fast and exhaustive Iddq tests (BL, HR, HW), pp. 279–286.
- HT-1997-Fraisse #automation #design #generative
- A Task Driven Design Method and Its Associated Tool for Automatically Generating Hypertexts (SF), pp. 234–235.
- ICDAR-1997-ChungY #comparison #feature model #performance #recognition
- Performance comparison of several feature selection methods based on node pruning in handwritten character recognition (KC, JY), pp. 11–15.
- ICDAR-1997-DjematenTZ #geometry #recognition
- A Geometrical Method for Printing and Handwritten Berber Character Recognition (AD, BT, AZ), pp. 564–567.
- ICDAR-1997-Horiuchi #classification
- Pattern Classification Method by Integrating Interval Feature Values (TH), pp. 847–850.
- ICDAR-1997-HoriuchiHYY #2d #normalisation #recognition #using
- Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
- ICDAR-1997-Jaeger
- A Psychomotor Method for Tracking Handwriting (SJ0), pp. 528–531.
- ICDAR-1997-KimL #normalisation #recognition
- Nonlinear Shape Normalization Methods for Gray-Scale Handwritten Character Recognition (SYK, SWL), pp. 479–482.
- ICDAR-1997-LiuHS #recognition #robust #segmentation
- Robust Stroke Segmentation Method for Handwritten Chinese Character Recognition (KL, YSH, CYS), p. 211–?.
- ICDAR-1997-LiuKK #recognition
- High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method (CLL, IJK, JHK), pp. 1033–1037.
- ICDAR-1997-MiuraSM #recognition
- A method of extracting curvature features and its application to handwritten character recognition (KTM, RS, SM), pp. 450–454.
- ICDAR-1997-NaoiY #automation #information management
- Global Interpolation Method II for Handwritten Numbers Overlapping a Border by Automatic Knowledge Acquisition of Overlapped Condition (SN, MY), pp. 540–543.
- ICDAR-1997-OhtaTA #retrieval
- Retrieval methods for English-text with missrecognized OCR characters (MO, AT, JA), pp. 950–956.
- ICDAR-1997-OkamotoY #online #recognition
- On-line handwriting character recognition method with directional features and direction-change features (MO, KY), pp. 926–930.
- ICDAR-1997-PavlidisSP #online #recognition #using
- An On-Line Handwritten Note Recognition Method Using Shape Metamorphosis (IP, RS, NP), pp. 914–918.
- ICDAR-1997-ShinjoNKMSH #documentation
- A method for connecting disappeared junction patterns on frame lines in form documents (HS, KN, MK, KM, YS, EH), pp. 667–670.
- ICDAR-1997-TonouchiK #algorithm #online #recognition #using
- An on-line Japanese character recognition method using length-based stroke correspondence algorithm (YT, AK), pp. 633–636.
- ICDAR-1997-TsengC97a
- A New Method for Segmenting Handwritten Chinese Characters (LYT, RCC), pp. 568–571.
- ICDAR-1997-VuurpijlS #categorisation #clustering
- Finding structure in diversity: a hierarchical clustering method for the categorization of allographs in handwriting (LV, LS), p. 387–?.
- ICDAR-1997-Yamada #feature model #recognition
- Non-uniformly Sampled Feature Extraction Method for Kanji Character Recognition (KY), pp. 200–205.
- ICDAR-1997-YamauchiIT #learning #multi #recognition
- Shape based Learning for a Multi-Template Method, and its Application to Handprinted Numeral Recognition (TY, YI, JT), pp. 495–498.
- ICDAR-1997-YamazakiK #verification
- Proposal for a Text-Indicated Writer Verification Method (YY, NK), pp. 709–713.
- ICDAR-1997-ZhaoSX #string
- A New Method for Segmenting Unconstrained Handwritten Numeral String (BZ, HS, SX), pp. 524–527.
- VLDB-1997-CiacciaPZ #metric #named #performance #similarity
- M-tree: An Efficient Access Method for Similarity Search in Metric Spaces (PC, MP, PZ), pp. 426–435.
- VLDB-1997-SellisRF #data access #multi
- Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
- CSMR-1997-JarzabekW #precise #reverse engineering #tool support #towards
- Towards a precise description of reverse engineering methods and tools (SJ, IW), pp. 3–9.
- CSMR-1997-Lowe #formal method
- Formal Methods (ML), p. 43.
- CSMR-1997-PidaparthiC #case study #design #migration #object-oriented #using
- Case Study in Migration to Object-Oriented System Structure Using Design Transformation Methods (SP, GC), pp. 128–135.
- ICSM-1997-HeSRC #black box #maintenance #testing
- Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing (ZH, GS, MR, IC), pp. 142–149.
- ICSM-2000-YoungerBL #concurrent #refinement #source code
- A Formal Transformation and Refinement Method for Concurrent Programs (EJY, KHB, ZL), p. 287–?.
- ICALP-1997-AndreevCR #trade-off #worst-case
- Worst-Case Hardness Suffices for Derandomization: A New Method for Hardness-Randomness Trade-Offs (AEA, AEFC, JDPR), pp. 177–187.
- ICALP-1997-Bernardo #algebra
- An Algebra-Based Method to Associate Rewards with EMPA Terms (MB), pp. 358–368.
- FME-1997-Gregoire #protocol #proving #using
- TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
- FME-1997-Paige #formal method #integration
- A Meta-Method for Formal Method Integration (RFP), pp. 473–494.
- ICFP-1997-ChinH #bound
- A Bounds Inference Method for Vector-Based Memoisation (WNC, MH), pp. 176–187.
- HCI-CC-1997-DobronetsSV #identification
- Ergodynamic Method of Identification of the Cognitive Strategy Used by the Human-Operator (BSD, AAS, VFV), pp. 837–840.
- HCI-CC-1997-LewandowskiK #assessment #safety
- Method of Assessment of Occupational Safety (JL, CK), pp. 703–706.
- HCI-CC-1997-SavidisSE #design #incremental #interface #physics #polymorphism
- Abstract Task Definition and Incremental Polymorphic Physical Instantiation: The Unified Interface Design Method (AS, CS, PLE), pp. 465–468.
- HCI-CC-1997-StrasserK #evaluation #rest
- Ergonomic Evaluation of a Wrist Rest for VDU Work via Electromyographic Methods (HS, EK), pp. 615–618.
- HCI-CC-1997-WatersonOC #development
- Further Development of a New Method for Task Allocation in Complex Systems (PEW, MTO, CWC), pp. 257–260.
- HCI-SEC-1997-Ficarra #evaluation #multi
- Method and Techniques for the Evaluation of Multimedia Applications (FVCF), pp. 635–638.
- HCI-SEC-1997-HijikataSYN #design #hypermedia
- A Dynamic Linkage Method for Hypermedia and Its Design Support Tool (YH, NS, TY, SN), pp. 727–730.
- HCI-SEC-1997-LaugheryP #case study #performance #predict
- Predicting Human Performance in Complex Systems-A Method and Case Study (KRLJ, BMP), pp. 75–78.
- HCI-SEC-1997-NakagawaKNT #evaluation #interface
- Simulation-Based Interface Evaluation Method of Equipment in Power Plants (TN, MK, YN, NT), pp. 233–236.
- HCI-SEC-1997-NishitaniKKS #industrial #usability
- Experimental Method for Usability Test of Industrial Plant Operation System (HN, TK, TK, CS), pp. 625–628.
- HCI-SEC-1997-Ntuen #formal method
- A Formal Method for Deriving Command Production Language from Human Intents (CAN), pp. 257–260.
- HCI-SEC-1997-SanuiM #evaluation #grid
- Revealing of Preference Structure by the Evaluation Grid Method (JS, GM), pp. 471–474.
- HCI-SEC-1997-SmithD #design #interface
- User Centred Design: The Application of the LUCID Interface Design Method (AS, LD), pp. 563–568.
- HCI-SEC-1997-StorkL #development #research
- Structured Methods for Human Factors Research and Development (AS, JL), pp. 531–534.
- HCI-SEC-1997-Yamaoka #concept #design
- A New Design Concept and Method Based on Ergonomics and Kansei Engineering and So On (TY), pp. 547–550.
- AdaEurope-1997-CheungCC #integration #object-oriented #towards
- Towards an Integration of Syntactic Constructs and Structural Features for Formalised Object-Oriented Methods (KSC, PKOC, TYC), pp. 173–184.
- CAiSE-1997-AltmeyerRSSZ #development #reuse
- Application of a Generator-Based Software Development Method Supporting Model Reuse (JA, JPR, BS, MS, GZ), pp. 159–172.
- CAiSE-1997-KloosterBHW #information management #intranet
- Intranet Facilitated Knowledge Management: A Theory and Tool for Defining Situational Methods (MK, SB, FH, GW), pp. 303–317.
- CAiSE-1997-PastorIPRM #formal method #named #object-oriented
- OO-METHOD: An OO Software Production Environment Combining Conventional and Formal Methods (OP, EI, VP, JRR, JM), pp. 145–158.
- CAiSE-1997-PohlDJ #towards
- Towards Method-Driven Trace Capture (KP, RD, MJ), pp. 103–116.
- EDOC-1997-IidaK #communication #corba #evaluation #reliability
- Evaluation of a Method for Reliable Message Transfer Communication in CORBA (KI, JK), pp. 104–110.
- ICML-1997-CohenD #case study #comparative #fault #induction #logic programming #predict
- A Comparative Study of Inductive Logic Programming Methods for Software Fault Prediction (WWC, PTD), pp. 66–74.
- ICML-1997-PrecupS #learning
- Exponentiated Gradient Methods for Reinforcement Learning (DP, RSS), pp. 272–277.
- ICML-1997-SchapireFBL #effectiveness
- Boosting the margin: A new explanation for the effectiveness of voting methods (RES, YF, PB, WSL), pp. 322–330.
- KDD-1997-BreitnerSW #database
- Process-Based Database Support for the Early Indicator Method (CB, JS, RW), pp. 131–134.
- KDD-1997-CerquidesM #comparison #empirical
- Proposal and Empirical Comparison of a Parallelizable Distance-Based Discretization Method (JC, RLdM), pp. 139–142.
- KDD-1997-HoS #named
- Zeta: A Global Method for Discretization of Continuous Variables (KMH, PDS), pp. 191–194.
- SIGIR-1997-OgawaM #statistics #word
- Overlapping Statistical Word Indexing: A New Indexing Method for Japanese Text (YO, TM), pp. 226–234.
- SIGIR-1997-SintichakisC
- A Method for Monolingual Thesauri Merging (MS, PC), pp. 129–138.
- ECOOP-1997-HolstS #framework #inheritance #object-oriented
- A General Framework for Inheritance Management and Method Dispatch in Object-Oriented Languages (WH, DS), pp. 276–301.
- OOPSLA-1997-BoylandC #implementation #java #multi
- Parasitic Methods: An Implementation of Multi-Methods for Java (JB, GC), pp. 66–76.
- TOOLS-ASIA-1997-HungLC #experience #network #using
- An Experience of Using FDOOA Method to Develop a Telecommunications Network Management System (YSH, WCL, CGC), pp. 320–329.
- TOOLS-ASIA-1997-PeiYJS #framework #modelling #object-oriented #parallel #using
- A Method for Using Object-Oriented Frameworks to Support Various High-Level Parallel Computing Models (LP, DY, LJ, DLS), pp. 151–158.
- TOOLS-PACIFIC-1997-WongC #multi #type safety
- Method Dispatching and Type Safety for Objects with Multiple Roles (RKW, HLC), pp. 286–296.
- TOOLS-USA-1997-AllenHF #uml #unification
- Method Unification: UML and OML (RA, BHS, DF), p. 372.
- TOOLS-USA-1997-HolstS #incremental #object-oriented
- Incremental Table-Based Method Dispatch for Reflective Object-Oriented Languages (WH, DS), p. 63–?.
- TOOLS-USA-1997-Mellor #development #realtime
- Real-Time Development with the Shlaer-Mellor Method (SJM), p. 372.
- TOOLS-USA-1997-Walden #analysis #design #reuse
- The BON Method: Analysis and Design for Reusability (KW), p. 372.
- PLILP-1997-GallardoGR #concurrent #haskell #inheritance
- Inheritance and Selective Methods Dispatching in Concurrent Haskell (JEG, FG, BCR), pp. 33–46.
- POPL-1997-BourdoncleM #higher-order #multi #polymorphism
- Type-Checking Higher-Order Polymorphic Multi-Methods (FB, SM), pp. 302–315.
- RE-1997-EasterbrookC #experience #formal method #specification
- Formal Methods for V&V of Partial Specifications: An Experience RSeport (SME, JRC), pp. 160–168.
- RE-1997-Wieringa #object-oriented #requirements #specification
- Advanced Object-Oriented Requirements Specification Methods (RW), p. 266.
- SAC-1997-HaraHTN #network
- Location Management Methods of Migratory Data Resources in ATM Networks (TH, KH, MT, SN), pp. 123–130.
- SAC-1997-Li #effectiveness #evaluation #multi #performance
- An efficient and effective performance evaluation method for multiprogrammed multiprocessor systems (KL), pp. 478–487.
- SAC-1997-PerrizoZK #multi #query
- A query processing method for data warehouses which contain multimedia (WP, ZZ, SK), pp. 323–327.
- ICSE-1997-BaresiOP #industrial #specification
- Introducing Formal Specification Methods in Industrial Practice (LB, AO, MP), pp. 56–66.
- ICSE-1997-Curtis #lessons learnt #process #tutorial
- Software Process Improvement: Methods and Lessons Learned (Tutorial) (BC), pp. 624–625.
- ICSE-1997-FaulkH #evolution #realtime #requirements #tutorial
- Rigorous Requirements for Real-Time Systems: Evolution and Application of the SCR Method (Tutorial) (SRF, CLH), pp. 637–638.
- ICSE-1997-FischerL #formal method #multi #tutorial
- Formal Methods for Broadband and Multimedia Systems (Tutorial) (SF, SL), pp. 665–666.
- ICSE-1997-Fowler #analysis #bibliography #design #object-oriented #tutorial
- A Survey of Object Oriented Analysis and Design Methods (Tutorial) (MF), pp. 653–654.
- ICSE-1997-FranklHLS #reliability #testing
- Choosing a Testing Method to Deliver Reliability (PGF, RGH, BL, LS), pp. 68–78.
- ICSE-1997-HeitmeyerKL #requirements #specification #tool support #validation #verification
- The SCR Method for Formally Specifying, Verifying, and Validating Requirements: Tool Support (CLH, JK, BGL), pp. 610–611.
- ICSE-1997-NakajimaF #algebra #modelling #object-oriented #specification
- An Object-Oriented Modeling Method for Algebraic Specifications in CafeOBJ (SN, KF), pp. 34–44.
- ICSE-1997-PodorizhnyO #case study #comparison #design #experience #modelling
- The Criticality of Modeling Formalisms in Software Design Method Comparison: Experience Report (RMP, LJO), pp. 303–313.
- ICSE-1997-SullivanSM #architecture #formal method #standard #using
- Using Formal Methods to Reason about Architectural Standards (KJS, JS, MM), pp. 503–513.
- HPDC-1997-ArmstrongWYBB #component
- Frame-Based Components for Generalized Particle Methods (RCA, PW, CY, MBP, NB), pp. 50–59.
- HPDC-1997-HuL #adaptation #mobile
- Adaptive Cache Invalidation Methods in Mobile Environments (QH, DLL), pp. 264–273.
- HPDC-1997-LeeHL #mobile
- Channel Allocation Methods for Data Dissemination in Mobile Computing Environments (WCL, QH, DLL), pp. 274–281.
- HPDC-1997-SudoSS #scheduling #thread
- Distributed-Thread Scheduling Methods for Reducing Page-Thrashing (YS, SS, SS), pp. 356–364.
- SOSP-1997-NeefeWRCA #adaptation #file system #performance
- Improving the Performance of Log-Structured File Systems with Adaptive Methods (JMN, DSR, AMC, RYW, TEA), pp. 238–251.
- CADE-1997-BaaderT #approach #problem #word
- A New Approach for Combining Decision Procedure for the Word Problem, and Its Connection to the Nelson-Oppen Combination Method (FB, CT), pp. 19–33.
- CADE-1997-GiunchigliaRS #logic #testing
- A New Method for Testing Decision Procedures in Modal Logics (FG, MR, RS), pp. 264–267.
- CADE-1997-Wen-Tsun #automation #reasoning
- The Char-Set Method and Its Applications to Automated Reasoning (WWT), pp. 1–3.
- CAV-1997-BoigelotBR #analysis #hybrid #linear #reachability
- An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (Extended Abstract) (BB, LB, SR), pp. 167–178.
- CAV-1997-Boralv #industrial #tool support #verification
- The Industrial Success of Verification Tools Based on Stålmarck’s Method (AB), pp. 7–10.
- DAC-1996-Eiriksson #design #verification
- Integrating Formal Verification Methods with A Conventional Project Design Flow (ÁTE), pp. 666–671.
- DAC-1996-KrauterXDP #image
- A Sparse Image Method for BEM Capacitance Extraction (BK, YX, EAD, LTP), pp. 357–362.
- DAC-1996-SuzukiS #estimation #hardware #performance
- Efficient Software Performance Estimation Methods for Hardware/Software Codesign (KS, ALSV), pp. 605–610.
- KBSE-1996-Darche #algorithm #automation #difference #generative #set
- Set Differentiation: A Method for the Automatic Generation of Filtering Algorithms (FDD), p. 19.
- HT-1996-ClearyB #automation #hypermedia
- Practical Methods for Automating Linking in Structured Hypermedia Systems (CC, RB), pp. 31–41.
- SIGMOD-1996-HellersteinN #execution #query
- Query Execution Techniques for Caching Expensive Methods (JMH, JFN), pp. 423–434.
- SIGMOD-1996-ZhangRL #clustering #database #named #performance #scalability
- BIRCH: An Efficient Data Clustering Method for Very Large Databases (TZ, RR, ML), pp. 103–114.
- VLDB-1996-BerckenS #data access #multi #query
- Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
- ITiCSE-1996-LuqueSSCFS #development #education #parallel
- Parallel systems development in education: a guided method (EL, JS, RS, EC, JF, MS), pp. 156–158.
- ICSM-1996-ChuYL #formal method #maintenance
- A Formal Method for Software Maintenance (WCC, HY, PL), pp. 206–216.
- WPC-1996-Graham #testing #tool support #visualisation
- A Method for The Formal Testing of Program Visualization Tools (TCNG), pp. 45–54.
- PLDI-1996-RuttenbergGLS #compilation #heuristic #pipes and filters
- Software Pipelining Showdown: Optimal vs. Heuristic Methods in a Production Compiler (JCR, GRG, WL, AS), pp. 1–11.
- STOC-1996-AndrewsLMZ #automation #latency #network
- Automatic Methods for Hiding Latency in High Bandwidth Networks (Extended Abstract) (MA, FTL, PTM, LZ), pp. 257–265.
- ICALP-1996-Lisovik #linear #set
- Hard Sets Method and Semilinear Reservoir Method with Applications (LPL), pp. 219–231.
- FME-1996-ArnoldBR #debugging #embedded #formal method
- An Example of Use of Formal Methods to Debug an Embedded Software (AA, DB, JPR), pp. 649–661.
- FME-1996-BicarreguiDW #analysis #formal method
- Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
- CSCW-1996-Wyner #coordination #design #distributed
- The Language of Coordination: A Method for the Distributed Design of Complex Organizations (doctoral colloquium) (GMW), p. 446.
- AdaEurope-1996-EmeryHR #architecture #case study #experience
- Experiences Applying a Practical Architectural Method (DEE, RFHI, TBR), pp. 471–484.
- AdaEurope-1996-LundqvistW #ada #object-oriented #using
- Using Object-Oriented Methods in Ada 95 to Implement Linda (KL, GW), pp. 211–222.
- CAiSE-1996-BatesBFL #analysis #formal method #guidelines #object-oriented
- Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
- CAiSE-1996-MirbelC #design #integration
- An Integration Method for Design Schemas (IM, JLC), pp. 457–475.
- CIKM-1996-LeePHC #composition #query #using
- Spatial Query Processing Using Object Decomposition Method (YJL, HHP, NHH, CWC), pp. 53–61.
- ICML-1996-GordonS #learning #parametricity #statistics
- Nonparametric Statistical Methods for Experimental Evaluations of Speedup Learning (GJG, AMS), pp. 200–206.
- ICPR-1996-ArikiI #integration #recognition
- Integration of face and speaker recognition by subspace method (YA, NI), pp. 456–460.
- ICPR-1996-ArmandeMM #3d
- A 3D thin nets extraction method for medical imaging (NA, PM, OM), pp. 642–646.
- ICPR-1996-BonifaziMNP #classification #image #industrial #recognition
- The classification of industrial sand-ores by image recognition methods (GB, PM, LN, GP), pp. 174–179.
- ICPR-1996-ChenL96c #novel #using
- A novel form structure extraction method using strip projection (JLC, HJL), pp. 823–827.
- ICPR-1996-ChiaCY #re-engineering #using
- Curved surface reconstruction using a simple structured light method (TLC, ZC, CJY), pp. 844–848.
- ICPR-1996-ChiangY #recognition
- A method for improving the machine recognition of confusing Chinese characters (CCC, SSY), pp. 79–83.
- ICPR-1996-ChouFF #online #recognition
- Radical-based neighboring segment matching method for on-line Chinese character recognition (KSC, KCF, TIF), pp. 84–88.
- ICPR-1996-DeguchiN #interactive #matrix #using #visual notation
- Visual servoing using eigenspace method and dynamic calculation of interaction matrices (KD, TN), pp. 302–306.
- ICPR-1996-HeydenR #evaluation #using
- Evaluation of corner extraction schemes using invariance methods (AH, KR), pp. 895–899.
- ICPR-1996-HoriuchiYY #nondeterminism #robust
- Robust relaxation method for structural matching under uncertainty (TH, KY, HY), pp. 176–180.
- ICPR-1996-HuangPC #using
- Shape from shading using Ritz method with tent basis (CKH, CP, WTC), pp. 398–402.
- ICPR-1996-HwangB #classification #network #performance #recognition
- An efficient method to construct a radial basis function neural network classifier and its application to unconstrained handwritten digit recognition (YSH, SYB), pp. 640–644.
- ICPR-1996-KawataniSM #recognition
- Handwritten numeral recognition with the improved LDA method (TK, HS, MM), pp. 441–446.
- ICPR-1996-Kita #using
- Force-based registration method using attribute values (YK), pp. 34–39.
- ICPR-1996-KnipeL #composition #re-engineering
- A new quadtree decomposition reconstruction method (JK, XL), pp. 364–369.
- ICPR-1996-LamY96a #image
- An Improved Method for Locating and Extracting the Eye in Human Face Images (KML, HY).
- ICPR-1996-LanitisSTCM #image #modelling
- A general non-linear method for modelling shape and locating image objects (AL, PDS, CJT, TFC, ECDM), pp. 266–270.
- ICPR-1996-LaunayBMBM #3d #flexibility #re-engineering
- A flexible iterative method for 3D reconstruction from X-ray projections (LL, PB, EM, MOB, JLM), pp. 513–517.
- ICPR-1996-LeeKB #recognition
- Highly accurate recognition of printed Korean characters through an improved grapheme recognition method (JSL, OJK, SYB), pp. 447–451.
- ICPR-1996-LeeL #verification
- An off-line method for human signature verification (LLL, MGL), pp. 195–198.
- ICPR-1996-LeeL96a #image
- A lossless image compression method for human static signatures (LLL, MGL), pp. 910–913.
- ICPR-1996-MariD #clustering #fuzzy #segmentation
- A segmentation method based on fuzzy topology and clustering (MM, SGD), pp. 565–569.
- ICPR-1996-MinCL #documentation #estimation #performance #reduction
- A data reduction method for efficient document skew estimation based on Hough transformation (YM, SBC, YL), pp. 732–736.
- ICPR-1996-Nagao #2d #using
- Direct methods for evaluating the planarity and rigidity of a surface using only 2D views (KN), pp. 417–422.
- ICPR-1996-NishimuraK0HNNO #image #locality #using
- Effect of time-spatial size of motion image for localization by using the spotting method (TN, HK, YI, AH, SN, SN, RO), pp. 191–195.
- ICPR-1996-NodaSK #image #modelling #segmentation
- An MRF model-based method for unsupervised textured image segmentation (HN, MNS, EK), pp. 765–769.
- ICPR-1996-Nouza #feature model #markov #modelling #recognition #speech
- Feature selection methods for hidden Markov model-based speech recognition (JN), pp. 186–190.
- ICPR-1996-OkamotoYSY #network #online #string #using
- On-line handwriting character string separation method using network expression (MO, HY, KS, KY), pp. 422–425.
- ICPR-1996-SaidCS #performance
- Dynamical morphological processing: a fast method for base line extraction (JNS, MC, CYS), pp. 8–12.
- ICPR-1996-Schikuta #clustering #named #performance #scalability #set
- Grid-clustering: an efficient hierarchical clustering method for very large data sets (ES), pp. 101–105.
- ICPR-1996-Shimshoni #3d #image #nondeterminism #performance #recognition
- A fast method for estimating the uncertainty in the location of image points in 3D recognition (IS), pp. 590–594.
- ICPR-1996-StarkF #3d
- A method for tracking the pose of known 3-D objects based on an active contour model (KS, SF), pp. 905–909.
- ICPR-1996-WatanabeLTY #gesture #interactive #realtime #recognition
- A method of real-time gesture recognition for interactive systems (SW, CWL, AT, MY), pp. 473–477.
- ICPR-1996-WatanabeTO #analysis #recognition
- A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
- ICPR-1996-YamadaT #sequence
- Elastic edge sequence matching method for global extraction and local tracking of echocardiogram (HY, KT), pp. 637–641.
- KDD-1996-ArningAR #database #detection #linear #scalability
- A Linear Method for Deviation Detection in Large Databases (AA, RA, PR), pp. 164–169.
- KDD-1996-KaufmanM #information management #multi #reasoning
- A Method for Reasoning with Structured and Continuous Attributes in the INLEN-2 Multistrategy Knowledge Discovery System (KAK, RSM), pp. 232–237.
- KDD-1996-TeranoI #induction #information management #interactive #learning #using
- Interactive Knowledge Discovery from Marketing Questionnaire Using Simulated Breeding and Inductive Learning Methods (TT, YI), pp. 279–282.
- KR-1996-Sandewall #constraints
- Assessments of Ramification Methods that Use Static Domain Constraints (ES), pp. 99–110.
- KR-1996-SmirnovV #contest #integer #performance #programming #representation
- Efficiency Competition through Representation Changes: Pigeonhole Principle vs. Integer Programming Methods (YVS, MMV), pp. 124–134.
- SEKE-1996-HsiaLK #approach #sequence #testing
- An Early Warning Approach for Method Sequence Testing (PH, XL, DCK), pp. 330–337.
- SEKE-1996-JamoussiB #generative #monte carlo #performance #random testing #testing
- Efficient Monte Carlo Method for Generating Random Test Data from Irregular Test Regions (AJ, FBB), pp. 17–24.
- SEKE-1996-MillsG #approach #automation #concurrent #design #knowledge-based #realtime
- A Knowledge-based Approach for Automating a Design Method for Concurrent and Real-Time Systems (KLM, HG), pp. 529–536.
- SEKE-1996-SlivaMS #communication #protocol
- A Method for Applying G-Nets To Communication Protocols (VPS, TM, SMS), pp. 145–152.
- SEKE-1996-ZhangZ #evolution #visual notation
- Developing Visual Languages Through an Evolving Method (KZ, DQZ), pp. 514–521.
- SIGIR-1996-CohenS #categorisation #learning
- Context-sensitive Learning Methods for Text Categorization (WWC, YS), pp. 307–315.
- SIGIR-1996-HullPS #documentation
- Method Combination For Document Filtering (DAH, JOP, HS), pp. 279–287.
- SIGIR-1996-Kwok #ad hoc #query #retrieval
- A New Method of Weighting Query Terms for Ad-Hoc Retrieval (KLK), pp. 187–195.
- ECOOP-1996-AmielD #ambiguity #multi
- Supporting Explicit Disambiguation of Multi-Methods (EA, ED), pp. 167–188.
- ECOOP-1996-KonoKM #distributed #implementation #memory management #using
- An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
- OOPSLA-1996-Moore #automation #inheritance #refactoring
- Automatic Inheritance Hierarchy Restructuring and Method Refactoring (IM), pp. 235–250.
- ICRE-1996-Cheng #formal method #how #question #requirements
- Where and How do Formal Methods Fit in Requirements Engineering? (BHCC), pp. 154–156.
- ICRE-1996-GonzalesW #design #process
- A facilitator method for upstream design activities with diverse stakeholders (RMG, ALW), pp. 190–198.
- ICRE-1996-Hudlicka #comparison #elicitation #requirements
- Requirements Elicitation with Indirect Knowledge Elicitation Techniques: Comparison of Three Methods (EH), pp. 4–11.
- ICRE-1996-RollandP #modelling #process #using
- Using Generic Method Chunks to Generate Process Models Fragments (CR, VP), pp. 173–181.
- FSE-1996-Jackson #problem
- Problems, Methods, and Structures (Abstract) (MJ), p. 1.
- ICSE-1996-Kontio #case study #off the shelf
- A Case Study in Applying a Systematic Method for COTS Selection (JK), pp. 201–209.
- CADE-1996-ParkG #clustering #satisfiability #scalability #testing
- Partitioning Methods for Satisfiability Testing on Large Formulas (TJP, AVG), pp. 748–762.
- CADE-1996-RousselM #compilation
- A New Method for Knowledge Compilation: The Achievement by Cycle Search (OR, PM), pp. 493–507.
- CAV-1996-Rushby #automation #deduction #formal method
- Automated Deduction and Formal Methods (JMR), pp. 169–183.
- ISSTA-1996-CrowleyLL #automation #formal method #testing
- Issues in the Full Scale Use of Formal Methods for Automated Testing (JLC, JFL, KAL), pp. 71–78.
- ISSTA-1996-GodefroidPS #concurrent #industrial #partial order #source code #using #validation
- Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs (PG, DP, MGS), pp. 261–269.
- JICSLP-1996-TamuraK #compilation #linear #logic programming #programming language #resource management
- Resource Management Method for a Compiler System of a Linear Logic Programming Language (Poster Abstract) (NT, YK), p. 545.
- JICSLP-1996-Zhou #implementation #novel
- A Novel Implementation Method of Delay (NFZ), pp. 97–111.
- LICS-1996-WillemsW #branch #linear #model checking #partial order
- Partial-Order Methods for Model Checking: From Linear Time to Branching Time (BW, PW), pp. 294–303.
- DAC-1995-FrenchLLO #compilation #simulation
- A General Method for Compiling Event-Driven Simulations (RSF, MSL, JRL, KO), pp. 151–156.
- DAC-1995-NakamuraY #clustering #logic #matrix #optimisation #scalability
- A Partitioning-Based Logic Optimization Method for Large Scale Circuits with Boolean Matrix (YN, TY), pp. 653–657.
- DAC-1995-ReddyKP #framework #novel #synthesis #verification
- Novel Verification Framework Combining Structural and OBDD Methods in a Synthesis Environment (SMR, WK, DKP), pp. 414–419.
- DAC-1995-StanionS #synthesis
- A Method for Finding Good Ashenhurst Decompositions and Its Application to FPGA Synthesis (TS, CS), pp. 60–64.
- DAC-1995-TelicheveskyKW #analysis #performance
- Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
- ICDAR-v1-1995-ArikiM #recognition #segmentation #using
- Segmentation and recognition of handwritten characters using subspace method (YA, YM), pp. 120–123.
- ICDAR-v1-1995-DeseillignyMS #re-engineering #recognition #string
- Characters string recognition on maps, a method for high level reconstruction (MPD, HLM, GS), pp. 249–252.
- ICDAR-v1-1995-Don #documentation #image
- A noise attribute thresholding method for document image binarization (HSD), pp. 231–234.
- ICDAR-v1-1995-JoeL #recognition
- A combined method on the handwritten character recognition (MJJ, HJL), pp. 112–115.
- ICDAR-v1-1995-MenierLG #modelling #online #recognition
- A new modeling method for on-line handwriting recognition (GM, GL, PG), pp. 499–503.
- ICDAR-v1-1995-ShimadaMMH #parallel #recognition
- Agent-based parallel recognition method of contour lines (SS, KM, AM, KH), pp. 154–157.
- ICDAR-v1-1995-TakasuSK #documentation #image #learning
- A rule learning method for academic document image processing (AT, SS, EK), pp. 239–242.
- ICDAR-v1-1995-WangY #editing #image
- Block selection: a method for segmenting a page image of various editing styles (SYW, TY), pp. 128–133.
- ICDAR-v2-1995-CongedoDIP #recognition
- A structural method with local refining for handwritten character recognition (GC, GD, SI, GP), pp. 853–856.
- ICDAR-v2-1995-Hirayama #analysis #using
- A method for table structure analysis using DP matching (YH), pp. 583–586.
- ICDAR-v2-1995-LiH #robust
- A Robust Method of Extracting Rectangle Blocks for Form Reading (XL, JH), p. 760–?.
- ICDAR-v2-1995-MalaviyaP #fuzzy
- Extracting meaningful handwriting features with fuzzy aggregation method (AM, LP), pp. 841–844.
- ICDAR-v2-1995-Randriamasy #benchmark #image #metric
- A set-based benchmarking method for address bloc location on arbitrarily complex grey level images (SR), pp. 619–622.
- ICDAR-v2-1995-Shieh #recursion
- Recursive morphological sieve method for searching pictorial point symbols on maps (JSS), pp. 931–935.
- ICDAR-v2-1995-SivaramakrishnanPHSH #classification #documentation #generative #using
- Zone classification in a document using the method of feature vector generation (RS, ITP, JH, SS, RMH), pp. 541–544.
- ICDAR-v2-1995-SrikantanLF #comparison #normalisation #recognition
- Comparison of normalization methods for character recognition (GS, DSL, JTF), pp. 719–722.
- ICDAR-v2-1995-TakahashiM #clustering
- A clustering method and radius tuning by end users (HT, KMM), pp. 698–701.
- ICDAR-v2-1995-ToraichiHH
- Observation method for mathematical graphology (KT, TH, RH), pp. 656–659.
- ICDAR-v2-1995-YuTS #detection #documentation
- Document skew detection based on the fractal and least squares method (CLY, YYT, CYS), pp. 1149–1152.
- ICDAR-v2-1995-ZhouHL #classification #recognition
- A method of Jia Gu Wen recognition based on a two-level classification (XLZ, XCH, FL), pp. 833–836.
- PODS-1995-AndriesCPB #set
- Applying an Update Method to a Set of Receivers (MA, LC, JP, JVdB), pp. 208–218.
- VLDB-1995-AmmannJR #formal method #semantics #transaction #using
- Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
- CSEE-1995-AlmstrumBF #education #research
- Research Methods in Computer Science Education (VLA, DB, AEF), p. 449.
- CSEE-1995-ScottC #programming #student
- Team Selection Methods for Student Programming Projects (TJS, JHCI), pp. 295–303.
- ICSM-1995-DeBaudR #domain model #modelling #re-engineering #using
- A software re-engineering method using domain models (JMD, SR), pp. 204–213.
- ICSM-1995-ShimomuraOCO #independence
- An independent software-modification method (TS, YO, TC, TO), pp. 214–221.
- WCRE-1995-EdwardsM #logic #using
- Deriving a Logical Data Model for a System Using the RECAST Method (HME, MM).
- STOC-1995-MillerTTW #generative
- A Delaunay based numerical method for three dimensions: generation, formulation, and partition (GLM, DT, SHT, NW), pp. 683–692.
- ICALP-1995-GrecoSZ #automaton #logic programming #source code
- The PushDown Method to Optimize Chain Logic Programs (Extended Abstract) (SG, DS, CZ), pp. 523–534.
- CHI-1995-JohnP #approach #case study #learning #using
- Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
- CHI-1995-RoeslerM #data access #online #taxonomy #what
- What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
- CHI-1995-WiedenbeckZM #empirical #online
- End-User Training: An Empirical Study Comparing On-Line Practice Methods (SW, PLZ, DSM), pp. 74–81.
- AdaEurope-1995-Simoens #analysis #design #development #lifecycle #metric #object-oriented
- The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
- TRI-Ada-1995-Ogren95a #case study #development #experience
- Experiences from Trial Use of MIL-STD-498 in Connection with the O4S (Objects for Systems) Development Method (IÖ), pp. 773–789.
- CAiSE-1995-OliveS #behaviour #concept #modelling
- A Method for Explaining the Behaviour of Conceptual Models (AO, MRS), pp. 12–25.
- CAiSE-1995-RossiB #metric
- Metrics in Method Engineering (MR, SB), pp. 200–216.
- CIKM-1995-AbdelmotyE #database #reasoning
- A General Method for Spatial Reasoning in Spatial Databases (AIA, BAEG), pp. 312–317.
- CIKM-1995-KimC #information retrieval #parallel #performance
- A New Parallel Signature File Method for Efficient Information Retrieval (JKK, JWC), pp. 66–73.
- KDD-1995-KohaviS #set #using
- Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology (RK, DS), pp. 192–197.
- KDD-1995-TsumotoT #automation #induction #multi #recursion #statistics #testing
- Automated Selection of Rule Induction Methods Based on Recursive Iteration of Resampling Methods and Multiple Statistical Testing (ST, HT), pp. 312–317.
- SEKE-1995-He #formal method #petri net
- PZ Nets- A Formal Method Integrating Petri Nets with Z (XH), pp. 173–180.
- SEKE-1995-Sliva #synthesis
- A G-Net Module Synthesis Method for Software Applications (VPS), pp. 419–426.
- SEKE-1995-Stanbrough
- An object view = methods + events (DS), pp. 80–86.
- SIGIR-1995-Fuhr #datalog #logic #probability #retrieval
- Probabilistic Datalog — A Logic For Powerful Retrieval Methods (NF), pp. 282–290.
- SAC-1995-BironK #feedback #information retrieval #performance
- New methods for relevance feedback: improving information retrieval performance (PVB, DHK), pp. 482–487.
- SAC-1995-HalgamugeBG #algorithm #classification #comparison #generative #heuristic #rule-based #search-based
- Comparison of a heuristic method with a genetic algorithm for generation of compact rule based classifiers (SKH, AB, MG), pp. 580–585.
- SAC-1995-ToliasTP #detection #fuzzy #image
- Detecting aneurysms in retinal images: fuzzy morphology vs. conventional methods (YAT, IBT, SMP), pp. 565–569.
- ICSE-1995-ArdisCJMPSO #case study #experience #framework #specification
- A Framework for Evaluating Specification Methods for Reactive Systems: Experience Report (MAA, JAC, LJJ, PM, CP, MGS, JVO), pp. 159–168.
- ICSE-1995-KangK #named #realtime #specification #verification
- PARTS: A Temporal Logic-Based Real-Time Software Specification and Verification Method (KCK, KIK), pp. 169–176.
- CAV-1995-EirikssonM #analysis #case study #design #using #verification
- Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
- CAV-1995-Emerson #calculus #model checking #tutorial #μ-calculus
- Methods for μ-calculus Model Checking: A Tutorial (Abstract) (EAE), p. 141.
- ICLP-1995-ChengPE #equation #implementation #logic programming #source code
- A Method for Implementing Equational Theories as Logic Programs (MHMC, DSPJ, MHvE), pp. 497–511.
- ICLP-1995-ChiuL #constraints #linear #theorem proving #using
- Interval Linear Constraint Solving Using the Preconditioned Interval Gauss-Seidel Method (CKC, JHML), pp. 17–31.
- ICLP-1995-Sato #learning #logic programming #semantics #source code #statistics
- A Statistical Learning Method for Logic Programs with Distribution Semantics (TS), pp. 715–729.
- ILPS-1995-FerrandL #composition #correctness #logic programming #proving #source code
- A Compositional Proof Method of Partial Correctness for Normal Logic Programs (GF, AL), pp. 209–223.
- DAC-1994-ChakrabartyH #named #testing
- DFBT: A Design-for-Testability Method Based on Balance Testing (KC, JPH), pp. 351–357.
- DAC-1994-McMillan #design #formal method
- Fitting Formal Methods into the Design Cycle (KLM), pp. 314–319.
- DAC-1994-TsuiPD #approximate
- Exact and Approximate Methods for Calculating Signal and Transition Probabilities in FSMs (CYT, MP, AMD), pp. 18–23.
- DAC-1994-VerlindKJLM #abstraction #communication #performance #verification
- A Time Abstraction Method for Efficient Verification of Communicating Systems (EV, TK, GGdJ, BL, HDM), pp. 609–614.
- EDAC-1994-AkitaA #logic #power management #probability
- A Method for Reducing Power Consumption of CMOS Logic Based on Signal Transition Probability (JA, KA), pp. 420–424.
- EDAC-1994-WangD #approximate #linear #optimisation #performance #using
- An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
- EDAC-1994-WuTWL #behaviour #synthesis
- A Synthesis Method for Mixed Synchronous / Asynchronous Behavior (TYW, TCT, ACHW, YLL), pp. 277–281.
- SIGMOD-1994-MohanN #architecture #database #named
- ARIES/CSA: A Method for Database Recovery in Client-Server Architectures (CM, IN), pp. 55–66.
- VLDB-1994-MedianoCD #named
- V-Trees — A Storage Method for Long Vector Data (MRM, MAC, MD), pp. 321–330.
- VLDB-1994-NgH #clustering #data mining #effectiveness #mining #performance
- Efficient and Effective Clustering Methods for Spatial Data Mining (RTN, JH), pp. 144–155.
- CSEE-1994-Dodani #formal method #re-engineering
- Formal Methods for Software Engineering (MD), p. 597.
- CSEE-1994-Gomaa #concurrent #design #realtime
- Software Design Methods for Concurrent and Real-Time Systems (HG), p. 341.
- ICSM-1994-CanforaCTM #data type #identification #precise #reuse
- A Precise Method for Identifying Reusable Abstract Data Types in Code (GC, AC, MT, MM), pp. 404–413.
- STOC-1994-AlonYZ #graph #named #scalability
- Color-coding: a new method for finding simple paths, cycles and other small subgraphs within large graphs (NA, RY, UZ), pp. 326–335.
- STOC-1994-VavasisY
- An accelerated interior point method whose running time depends only on A (extended abstract) (SAV, YY), pp. 512–521.
- ICALP-1994-BuhrmanT #bound #on the
- On the Cutting Edge of Relativization: The Resource Bounded Injury Method (HB, LT), pp. 263–273.
- FME-1994-BowenH #formal method
- Seven More Myths of Formal Methods (JPB, MGH), pp. 105–117.
- FME-1994-DehboneiM #formal method #industrial
- Formal Methods in the Railways Signalling Industry (BD, FM), pp. 26–34.
- FME-1994-GuttmanJ #formal method
- Three Applications of Formal Methods at MITRE (JDG, DMJ), pp. 55–65.
- FME-1994-StoreyH #using
- A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
- CHI-1994-McDanielOO94a #human-computer #object-oriented
- Methods in search of methodology — combining HCI and object orientation (SEM, GMO, JSO), pp. 145–151.
- AdaEurope-1994-ArberetD #memory management #tool support
- Test Methods and Tools for SOHO Mass Memory Unit Software (PA, LD), pp. 121–129.
- AdaEurope-1994-HagelsteinB #requirements
- A Front-End to HOOD — The Clyder Requirements Engineering Method (JH, DR), pp. 60–62.
- AdaEurope-1994-Schneeweiss #object-oriented
- Shlaer/Mellor or Rumbaugh? A Discussion of two Popular Object-Oriented Methods (HS), pp. 155–161.
- AdaEurope-1994-Taylor #development #formal method
- Formal Methods for a Space Software Development Environment (PT), pp. 90–103.
- TRI-Ada-1994-HollowayVGS #formal method
- Formal Methods Fact vs. Fiction (CMH, BLDV, DG, MS), pp. 256–258.
- CAiSE-1994-SaekiW #design #specification
- Specifying Software Specification & Design Methods (MS, KW), pp. 353–366.
- CIKM-1994-RezendeH #abstraction #semantics #using
- A Lock Method for KBMSs Using Abstraction Relationships’ Semantics (FdFR, TH), pp. 112–121.
- ICML-1994-AbeM #predict #probability
- A New Method for Predicting Protein Secondary Structures Based on Stochastic Tree Grammars (NA, HM), pp. 3–11.
- ICML-1994-MahoneyM
- Comparing Methods for Refining Certainty-Factor Rule-Bases (JJM, RJM), pp. 173–180.
- KDD-1994-Furnkranz #comparison #concept #learning #relational
- A Comparison of Pruning Methods for Relational Concept Learning (JF), pp. 371–382.
- KDD-1994-TsumotoT #estimation #probability #recursion
- Selection of Probabilistic Measure Estimation Method Based on Recursive Iteration of Resampling Methods (ST, HT), pp. 121–132.
- KR-1994-GereviniS #performance #reasoning
- An Efficient Method for Managing Disjunctions in Qualitative Temporal Reasoning (AG, LKS), pp. 214–225.
- KR-1994-Niemela #reasoning
- A Decision Method for Nonmomotonic Reasoning Based on Autoepistemic Reasoning (IN), pp. 473–484.
- SEKE-1994-HauslerL #re-engineering
- From software craft to software engineering: the Cleanroom method (PAH, RCL), pp. 172–179.
- SEKE-1994-Holm #communication #modelling
- The COMMODIOUS method — COMmunication MODelling as an aid to Illustrate the Organisational Use of Software (PH), pp. 10–19.
- SIGIR-1994-Gey #probability #using
- Inferring Probability of Relevance Using the Method of Logistic Regression (FCG), pp. 222–231.
- SIGIR-1994-Paice #algorithm #evaluation
- An Evaluation Method for Stemming Algorithms (CDP), pp. 42–50.
- ECOOP-1994-ChenTK #multi #performance
- Efficient Dynamic Look-Up Strategy for Multi-Methods (WC, VT, WK), pp. 408–431.
- ECOOP-1994-LampingA
- Methods as Assertions (JL, MA), pp. 60–80.
- ECOOP-1994-VitekH #message passing #performance
- Taming Message Passing: Efficient Method Look-Up for Dynamically Typed Languages (JV, RNH), pp. 432–449.
- OOPSLA-1994-AmielGS #multi #optimisation #using
- Optimizing Multi-Method Dispatch Using Compressed Dispatch Tables (EA, OG, ES), pp. 244–258.
- OOPSLA-1994-ChambersL #multi
- Typechecking and Modules for Multi-Methods (CC, GTL), pp. 1–15.
- TOOLS-EUROPE-1994-Carrillo-CastellonMP #smalltalk
- Eiffel-like Assertions and Private Methods in Smalltalk (MCC, JGM, EP), pp. 479–488.
- TOOLS-EUROPE-1994-Fowler #analysis #comparison #design
- Comparison of Analysis and Design Methods (MF), p. 517.
- TOOLS-EUROPE-1994-Mingins #eiffel
- The Eiffel Method (CM), p. 509.
- ICRE-1994-Ohnishi #requirements #visual notation
- A visual software requirements definition method (AO), pp. 194–201.
- ICRE-1994-ReizerAMP #formal method #requirements #specification #standard #using
- Using formal methods for requirements specification of a proposed POSIX standard (NRR, GDA, BCM, PRHP), pp. 118–125.
- ICRE-1994-White #analysis #comparative #embedded #requirements
- Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
- SAC-1994-GentherG #automation #classification #clustering #fuzzy #generative #using
- Automatic generation of a fuzzy classification system using fuzzy clustering methods (HG, MG), pp. 180–183.
- SAC-1994-RosenG #network #using
- Training hard to learn networks using advanced simulated annealing methods (BER, JMG), pp. 256–260.
- SAC-1994-RothermelT #bibliography #learning #logic
- Test Review: a new method of computer-assisted learning to promote careful reading and logical skills (DR, GT), pp. 573–577.
- ICSE-1994-CheungK #analysis #behaviour #distributed #effectiveness
- An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
- ICSE-1994-KazmanBWA #architecture #named
- SAAM: A Method for Analyzing the Properties of Software Architectures (RK, LJB, MW, GDA), pp. 81–90.
- ICSE-1994-PorterV #detection #empirical #fault #requirements
- An Experiment to Assess Different Defect Detection Methods for Software Requirements Inspections (AAP, LGV), pp. 103–112.
- CADE-1994-Beckert
- A Completion-Based Method for Mixed Universal and Rigid E-Unification (BB), pp. 678–692.
- CADE-1994-BourelyCP #automation #modelling
- A Method for Building Models Automatically. Experiments with an Extension of OTTER (CB, RC, NP), pp. 72–86.
- CADE-1994-McPheeCG #geometry #proving #theorem #using
- Mechanically Proving Geometry Theorems Using a Combination of Wu’s Method and Collins’ Method (NFM, SCC, XSG), pp. 401–415.
- CAV-1994-MihailP #on the #protocol #random #testing
- On the Random Walk Method for Protocol Testing (MM, CHP), pp. 132–141.
- ICLP-1994-Kagedal #analysis #data flow #prolog
- A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
- ICLP-1994-Pedreschi #prolog #proving #runtime #source code
- A Proof Method for Runtime Properties of Prolog Programs (DP), pp. 584–598.
- ILPS-1994-RameshC #prolog
- A Portable Method of Integrating SLG Resolution into Prolog Systems (RR, WC), pp. 618–632.
- ILPS-1994-YuanY #effectiveness
- A Simple but Effective Program Revision Method (LYY, JHY), p. 686.
- ISSTA-1994-BochmannP #bibliography #protocol #testing
- Protocol Testing: Review of Methods and Relevance for Software Testing (GvB, AP), pp. 109–124.
- ISSTA-1994-Corbett #ada #analysis #concurrent #empirical #evaluation #source code
- An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
- DAC-1993-BamjiV #constraints #identification #named
- MSTC: A Method for Identifying Overconstraints during Hierarchical Compaction (CB, RV), pp. 389–394.
- DAC-1993-ChouCC #finite #modelling #performance #simulation #using
- High-Speed Interconnect Modeling and High-Accuracy Simulation Using SPICE and Finite Element Methods (TYC, JC, ZJC), pp. 684–690.
- DAC-1993-DaoMHOM
- A Compaction Method for Full Chip VLSI Layouts (JD, NM, TH, CO, SM), pp. 407–412.
- DAC-1993-GraebWA #analysis #optimisation #worst-case
- Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
- DAC-1993-Kra #co-evolution #design #hardware
- A Cross-Debugging Method for Hardware/Software Co-design Environments (YK), pp. 673–677.
- DAC-1993-LewisP
- A Negative Reinforcement Method for PGA Routing (FDL, WCCP), pp. 601–605.
- DAC-1993-PomeranzRU #fault #generative #named #testing
- NEST: A Non-Enumerative Test Generation Method for Path Delay Faults in Combinational Circuits (IP, SMR, PU), pp. 439–445.
- DAC-1993-WooK #clustering #implementation #multi #performance
- An Efficient Method of Partitioning Circuits for Multiple-FPGA Implementation. (NSW, JK), pp. 202–207.
- ICDAR-1993-AbeMNK #comparison #detection
- Comparison of methods for detecting corner points from digital curves-a preliminary report (KA, RM, KN, TK), pp. 854–857.
- ICDAR-1993-GazzoloB #identification #realtime #recognition
- Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
- ICDAR-1993-HamanakaYT #feature model #online #recognition
- On-line Japanese character recognition experiments by an off-line method based on normalization-cooperated feature extraction (MH, KY, JT), pp. 204–207.
- ICDAR-1993-Hirayama #documentation #image #segmentation
- A block segmentation method for document images with complicated column structures (YH), pp. 91–94.
- ICDAR-1993-HoriuchiTYY #on the #recognition #using
- On method of training dictionaries for handwritten character recognition using relaxation matching (TH, KT, KY, HY), pp. 638–641.
- ICDAR-1993-HoriuchiTYY93a #image #recognition #using
- Stamped character recognition method using range image (TH, KT, HY, KY), pp. 782–785.
- ICDAR-1993-HoriuchiTYYI #optimisation #problem
- Generalized interpretation of optimization methods for labeling problems (TH, KT, HY, KY, TI), pp. 6–9.
- ICDAR-1993-InoharaKSS #complexity #database #retrieval #using
- Retrieval method of textile pictures database using a complexity scale (TI, KK, HS, SS), pp. 699–702.
- ICDAR-1993-JanssenDV #automation #evaluation
- Evaluation method for an automatic map interpretation system for cadastral maps (RDTJ, RPWD, AMV), pp. 125–128.
- ICDAR-1993-KonnoH #algorithm #probability #semantics
- Postprocessing algorithm based on the probabilistic and semantic method for Japanese OCR (AK, YH), pp. 646–649.
- ICDAR-1993-KuoW #segmentation
- A new method for the segmentation of mixed handprinted Chinese/English characters (HHK, JFW), pp. 810–813.
- ICDAR-1993-LeeDKA #case study #functional
- A study on a method of dividing machine-parts into functional groups for technical illustrations (IL, SD, TK, NA), pp. 886–889.
- ICDAR-1993-LeePT #evaluation #normalisation #performance #recognition
- Performance evaluation of nonlinear shape normalization methods for the recognition of large-set handwritten characters (SWL, JSP, YT), pp. 402–407.
- ICDAR-1993-MarcelliLP #recognition
- A structural indexing method for character recognition (AM, NL, TP), pp. 175–178.
- ICDAR-1993-MarukawaKSF #recognition #using
- A post-processing method for handwritten Kanji name recognition using Furigana information (KM, MK, YS, HF), pp. 218–221.
- ICDAR-1993-Nagaishi #identification #induction #recognition
- Identifying ability of a recognition method based on the field of induction (MN), pp. 926–929.
- ICDAR-1993-NakamuraSANK #string #using
- A method for recognizing character strings from maps using linguistic knowledge (AN, OS, MA, CN, HK), pp. 561–564.
- ICDAR-1993-NakashimaKMSN #generative #image
- A contour fill method for alpha-numeric character image generation (KN, MK, KM, YS, YN), pp. 722–725.
- ICDAR-1993-OhkuraSSH #on the #using
- On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
- ICDAR-1993-OkamotoT #hybrid #segmentation
- A hybrid page segmentation method (MO, MT), pp. 743–746.
- ICDAR-1993-OzawaN #image
- A character image enhancement method from characters with various background images (HO, TN), pp. 58–61.
- ICDAR-1993-SatohTK #collaboration #documentation #hypermedia
- A collaborative supporting method between document processing and hypertext construction (SS, AT, EK), pp. 533–536.
- ICDAR-1993-TanakaKT #development #process
- Development of a map vectorization method involving a shape reforming process (NT, TK, JT), pp. 680–683.
- ICDAR-1993-WebsterN #parallel #recognition
- The feasibility of a parallel processing oriented character recognition method based on a dynamic model (RGW, MN), pp. 714–717.
- ICDAR-1993-YamamotoYM #parallel #re-engineering #recognition
- Symbol recognition and surface reconstruction from topographic map by parallel method (KY, HY, SM), pp. 914–917.
- ICDAR-1993-YangHT #approximate #automation #identification #using
- Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
- ICDAR-1993-YasudaYY #correlation #recognition
- Effect of the perturbed correlation method for optical character recognition (MY, KY, HY), pp. 830–833.
- ICDAR-1993-YoshimuraSY #locality #recognition #using
- A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
- PODS-1993-DenninghoffV #database
- Database Method Schemas and Object Creation (KD, VV), pp. 265–275.
- SIGMOD-1993-AbiteboulLUW
- Methods and Rules (SA, GL, HU, EW), pp. 32–41.
- SIGMOD-1993-MohanN #database #flexibility #performance
- An Efficient and Flexible Method for Archiving a Data Base (CM, IN), pp. 139–146.
- SIGMOD-1993-SuLRD #estimation
- An Instant and Accurate Estimation Method for Joins and Selection in a Retrieval-Intensive Environment (WS, YL, NR, YD), pp. 79–88.
- VLDB-1993-Gal-OzGF #database #object-oriented
- A Model of Methods Access Authorization in Object-oriented Databases (NGO, EG, EBF), pp. 52–61.
- VLDB-1993-Mohan #effectiveness
- A Cost-Effective Method for Providing Improved Data Availability During DBMS Restart Recovery After a Failure (CM), pp. 368–379.
- CSM-1993-EdwardsM #lifecycle #logic #using
- Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method (HME, MM), pp. 162–171.
- WCRE-1993-CanforaCM #data type #identification #reuse #reverse engineering
- A Reverse Engineering Method for Identifying Reusable Abstract Data Types (GC, AC, MM), pp. 73–82.
- WCRE-1993-LanoH #reverse engineering
- Integrating Formal and Structured Methods in Reverse Engineering (KL, HPH), pp. 17–26.
- ICALP-1993-DillencourtS
- A Simple Method for Resolving Degeneracies in Delaunay Triangulations (MBD, WDS), pp. 177–188.
- ICALP-1993-Schonhage #adaptation #finite #parallel #performance
- Fast Parallel Computation of Characteristic Polynomials by Leverrier’s POwer Sum Method Adapted to Fields of Finite Characteristic (AS), pp. 410–417.
- FME-1993-BowenS #formal method #industrial #perspective #safety
- The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
- FME-1993-CraigenGR #formal method #industrial
- Formal Methods Reality Check: Industrial Usage (DC, SLG, TR), pp. 250–267.
- FME-1993-EngelhardtR #problem
- Generalizing Abadi & Lamport’s Method to Solve a Problem Posed by A. Pnueli (KE, WPdR), pp. 294–313.
- FME-1993-Hedlund #development #integration #object-oriented
- The Integration of LOTOS with an Object Oriented Development Method (MH), pp. 73–82.
- FME-1993-Jones #design #reasoning
- Reasoning about Interference in an Object-Based Design Method (CBJ), pp. 1–18.
- FME-1993-Jonkers #bibliography
- An Overview of the SPRINT Method (HBMJ), pp. 403–427.
- FME-1993-KalinichenkoNZ #composition #development #query #semantics #synthesis
- Application of Composition Development Method for definition of SYNTHESIS information resource query language semantics (LAK, NSN, VZ), pp. 428–441.
- FME-1993-Weber-Wulff #formal method #industrial
- Selling Formal Methods to Industry (DWW), pp. 671–678.
- HCI-ACS-1993-Kirsch #communication #evaluation #modelling
- Evaluation of Communication Methods for User Participation in Data Modelling (CK), pp. 558–563.
- HCI-ACS-1993-KishinoH #estimation #student
- A Code Key-in Time Estimation Method for College Students (SK, YH), pp. 624–629.
- HCI-ACS-1993-MiwaFKO #communication #interface
- A Method of Communication Between CAD and VR Interfaces (MM, MF, MK, TO), pp. 255–260.
- HCI-ACS-1993-PouraghabagherB #evaluation #eye tracking #monitoring #using
- An Evaluation of Information Highlighting Methods on Computer Screens Using an Eye Movement Monitor (RP, DB), pp. 762–767.
- HCI-ACS-1993-SuzukiH #effectiveness #on the #variability
- On a Simple and Effective Method to Analyze Heart Rate Variability (KS, YH), pp. 914–919.
- HCI-ACS-1993-WestlanderSCA #evaluation
- The Success of an Ambtious Broad QWL Strategy — Our Methods of Evaluation and Interpretation of the Findings (GW, IS, BC, EÅ), pp. 857–862.
- HCI-SHI-1993-DijkstraHD #editing
- User Responses to an Editor Supporting Syntactic Selection Method (AD, CH, HD), pp. 627–632.
- HCI-SHI-1993-FaradayS #design #multi #towards
- Toward a Walkthrough Method for Multimedia Design (PF, AGS), pp. 452–457.
- HCI-SHI-1993-KatoO #analysis #using
- Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
- HCI-SHI-1993-KobayashiN #generative #online
- A Method for Generating Messages of the On-Line Help System Based on a User Model and a Situational Model (YK, MN), pp. 621–626.
- HCI-SHI-1993-OgawaSTS #knowledge-based #scheduling
- Experimental Method for Construction of a Knowledge-Based System for Shipping Berth Scheduling (MO, NS, TT, SS), pp. 315–320.
- HCI-SHI-1993-UenoO #design #network
- A Design Guideline Search Method that Uses a Neural Network (KU, KO), pp. 27–32.
- HCI-SHI-1993-Warren #approach #development #modelling #realtime #safety #tool support
- The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
- INTERCHI-1993-NielsenP #empirical #heuristic #interface #usability
- Estimating the relative usability of two interfaces: heuristic, formal, and empirical methods compared (JN, VLP), pp. 214–221.
- AdaEurope-1993-Tonndorf #ada #compilation #performance #validation
- An Efficient Compiler Validation Method for Ada 9X (MT), pp. 95–107.
- TRI-Ada-1993-Frankel #ada #automation #perspective
- Ada 9X and CASE: A Methods Perspective (MIF), pp. 200–210.
- CAiSE-1993-BreuLSBPU #approach #architecture #development #distributed #information management
- The BOS-Method Architecture: An Improved Structured Approach for the Development of Distributed Information Systems (MB, GL, BPdS, LB, MP, JCU), pp. 221–233.
- CIKM-1993-LeeK #database #refinement #summary
- A Hypothesis Refinement Method for Summary Discovery in Databases (DL, MHK), pp. 274–282.
- CIKM-1993-MehtaGPN #generative #using
- The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
- CIKM-1993-Xie #encapsulation #optimisation #query
- Optimization of Object Queries Containing Encapsulated Methods (ZX), pp. 451–460.
- CIKM-1993-ZhangOCF #data type #optimisation #query #using
- A Method of Using Semijoins to Optimizing Queries with ADT Functions (XZ, NO, HC, YF), pp. 723–725.
- ICML-1993-BrezellecS #bottom-up #learning #named
- ÉLÉNA: A Bottom-Up Learning Method (PB, HS), pp. 9–16.
- ICML-1993-Schwartz #learning
- A Reinforcement Learning Method for Maximizing Undiscounted Rewards (AS), pp. 298–305.
- SEKE-1993-ChangCCL #branch #empirical #generative #testing
- An Empirical Study of Intelligent Test Case Generation Methods for Software Branch Coverage (KHC, JHCI, WHC, SSL), pp. 437–444.
- SIGIR-1993-OgawaBH #keyword #ranking #string #word
- Simple Word Strings as Compound Keywords: An Indexing and Ranking Method for Japanese Texts (YO, AB, MH), pp. 227–236.
- ECOOP-1993-CaseauP #higher-order #object-oriented
- Attaching Second-Order Types to Methods in an Object-Oriented Language (YC, LP), pp. 142–160.
- ECOOP-1993-SteyaertCDHLL
- Nested Mixin-Methods in Agora (PS, WC, TD, KDH, CL, MVL), pp. 197–219.
- TOOLS-EUROPE-1993-LewerentzC #formal method #object-oriented
- Formal Methods and Object-Orientation (CL, EC), p. 329.
- TOOLS-PACIFIC-1993-Duke #design #formal method #object-oriented #specification
- Formal Methods for the Design and Specification of Object-Oriented Systems (RD), p. 324.
- TOOLS-PACIFIC-1993-PotterM #design #eiffel #object-oriented
- Object-Oriented Design — the Eiffel Method (JP, CM), p. 320.
- TOOLS-USA-1993-Firesmith93a #development #named #object-oriented #realtime #scalability
- ADM4: an Object-Oriented Development Method for Large, Complex Real Time Systems (DF), p. 558.
- TOOLS-USA-1993-Fowler #analysis #comparison #design #object-oriented
- A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
- PLILP-1993-AliK #implementation #novel #parallel
- A Novel Method for Parallel Implementation of findall (KAMA, RK), pp. 235–245.
- RE-1993-BickertonS #classification #requirements
- The classification of requirements engineering methods (MJB, JS), pp. 182–186.
- RE-1993-IshiharaSK #dependence #natural language #specification #using
- A translation method from natural language specifications into formal specifications using contextual dependencies (YI, HS, TK), pp. 232–239.
- SAC-1993-KelleherLD #equation #on the #parallel #performance #reduction
- On the Performance of a Direct Parallel Method for Solving Separable Elliptic Equations Based on Block Cyclic Reduction (KK, SL, SKD), pp. 517–524.
- SAC-1993-Sen #low cost #probability #set #using
- Minimal Cost Set Covering Using Probabilistic Methods (SS), pp. 157–164.
- SAC-1993-StansiferW #object-oriented #reuse
- Method Reuse in Typed Object-Oriented Languages (RS, DW), pp. 63–70.
- SAC-1993-ThangiahN #adaptation #using
- Dynamic Trajectory Routing Using an Adaptive Search Method (SRT, KEN), pp. 131–138.
- ESEC-1993-JengC #component #formal method #library #using
- Using Formal Methods to Construct a Software Component Library (JJJ, BHCC), pp. 397–417.
- ESEC-1993-Kunzmann-Combelles #approach
- Quantitative Approach to Software Management: the ami Method (AKC), pp. 238–250.
- ICSE-1993-ArangoSPH #design
- The Graft-Host Method for Design Change (GA, ES, RP, JCH), pp. 243–254.
- ICSE-1993-GerhartCR #formal method #industrial #using
- Observations on Industrial Practice Using Formal Methods (SLG, DC, TR), pp. 24–33.
- HPDC-1993-Kung #network #performance
- New Flow Control Methods for High-Speed Networks (HTK), p. 4.
- HPDC-1993-MullinTDS #communication #formal method #protocol #scheduling
- Formal Method for Scheduling, Routing and Communication Protocol (LMRM, ST, DRD, EAS), pp. 234–242.
- HPDC-1993-TungK #distributed
- Distributed Control Methods (BT, LK), pp. 206–215.
- CAV-1993-GodefroidP #dependence #partial order #verification
- Refining Dependencies Improves Partial-Order Verification Methods (Extended Abstract) (PG, DP), pp. 438–449.
- ILPS-1993-Fitting #logic programming #metric #semantics #source code
- Metric Methods in the Semantics of Logic Programs (MF), pp. 69–71.
- ILPS-1993-Hui-Bon-Hoa #constraints
- An Intuitionistic Resolution Method for a Language Dealing with Scope Constraints (AHBH), p. 667.
- ISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction #using
- Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
- IWPTS-1993-CavalliFP #consistency #formal method #testing
- Formal Methods for Conformance Testing: Results and Perspectives (ARC, JPF, MP), pp. 3–17.
- IWPTS-1993-MottelerCS #fault #protocol #testing
- Fault Coverage of UIO-based Methods for Protocol Testing (HEM, AC, DPS), pp. 21–34.
- DAC-1992-ChiproutN #analysis #network
- Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
- KBSE-1992-SolderitschY #knowledge base #reuse #tool support #tutorial
- Knowledge Based Software Reuse Methods and Tools: DoD STARS RLF Technology (Tutorial) (JS, DY), p. 1.
- SIGMOD-1992-Carter
- Extending Ingres with Methods and Triggers (FC), p. 381.
- SIGMOD-1992-Lomet #multi #named
- MLR: A Recovery Method for Multi-level Systems (DBL), pp. 185–194.
- SIGMOD-1992-LometS #concurrent
- Access Method Concurrency with Recovery (DBL, BS), pp. 351–360.
- SIGMOD-1992-MohanL #concurrent #named #performance #using
- ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
- SIGMOD-1992-MohanPL #flexibility #performance #transaction #version control
- Efficient and Flexible Methods for Transient Versioning of Records to Avoid Locking by Read-Only Transactions (CM, HP, RAL), pp. 124–133.
- VLDB-1992-LiSR #clustering #named #parallel
- CMD: A Multidimensional Declustering Method for Parallel Data Systems (JL, JS, DR), pp. 3–14.
- VLDB-1992-MoenkebergW #adaptation #evaluation #performance #robust
- Performance Evaluation of an Adaptive and Robust Load Control Method for the Avoidance of Data-Contention Thrashing (AM, GW), pp. 432–443.
- VLDB-1992-UrpiO #database #deduction
- A Method for Change Computation in Deductive Databases (TU, AO), pp. 225–237.
- SEI-1992-Garlan #design #education #formal method #trade-off
- Formal Methods for Software Engineers: Tradeoffs in Curriculum Design (DG), pp. 131–142.
- SEI-1992-Lutz #formal method #paradigm
- Formal Methods and the Engineering Paradigm (MJL), pp. 121–130.
- STOC-1992-Leighton #parallel
- Methods for Message Routing in Parallel Machines (FTL), pp. 77–96.
- CHI-1992-KaratCF #comparison #empirical #evaluation #testing #user interface
- Comparison of empirical testing and walkthrough methods in user interface evaluation (CMK, RC, TF), pp. 397–404.
- CHI-1992-LimL #design
- A Method for (recruiting) Methods: Facilitating Human Factors Input to System Design (KYL, JBL), pp. 549–556.
- CHI-1992-NilsenJOP
- Method engineering: from data to model to practice (EN, HSJ, JSO, PGP), pp. 313–320.
- TRI-Ada-C-1992-FayadHRST #development #object-oriented #simulation
- Hardware-In-the-Loop (HIL) Simulation: An Application of Colbert’s Object-Oriented Software Development Method (MF, LJH, MAR, JWS, WTT), pp. 176–188.
- CAiSE-1992-Brough #automation #framework
- Methods for CASE: A Generic Framework (MB), pp. 524–545.
- CAiSE-1992-CostalO #concept #deduction #information management #modelling #reasoning
- A Method for Reasoning About Deductive Conceptual Models of Information Systems (DC, AO), pp. 612–631.
- CAiSE-1992-Dalianis #concept #generative #natural language #validation
- A Method for Validating a Conceptual Model by Natural Language Discourse Generation (HD), pp. 425–444.
- ML-1992-BalaMW #induction
- The Principal Axes Method for Constructive Induction (JWB, RSM, JW), pp. 20–29.
- ML-1992-ClouseU #education #learning
- A Teaching Method for Reinforcement Learning (JAC, PEU), pp. 92–110.
- SEKE-1992-Hayes-RothETH #concept #distributed #tool support
- Distributed Intelligent Control and Management: Concepts, Methods and Tools for Developing DICAM Applications (FHR, LDE, AT, BHR), pp. 235–244.
- SEKE-1992-HofstedeVNW #specification
- Integrated Specification of Method and Graphic Knowledge (AHMtH, TFV, ERN, GMW), pp. 307–316.
- SEKE-1992-JacquesSGL #knowledge-based #user interface
- A Knowledge-Based Method for Engineering Navigational Capability into User Interface Software (MSJ, DS, JG, LL), pp. 26–31.
- SIGIR-1992-RobertsonW #database #using
- Searching for Historical Word-Forms in a Database of 17th-Century English Text Using Spelling-Correction Methods (AMR, PW), pp. 256–265.
- ECOOP-1992-Chambers #multi #object-oriented
- Object-Oriented Multi-Methods in Cecil (CC), pp. 33–56.
- OOPSLA-1992-AndreR #incremental #optimisation
- Optimizing Method Search with Lookup Caches and Incremental Coloring (PA, JCR), pp. 110–126.
- OOPSLA-1992-MyersGZ #declarative #object-oriented #programming #prototype
- Declarative Programming in a Prototype-Instance System: Object-Oriented Programming Without Writing Methods (BAM, DAG, BTVZ), pp. 184–200.
- OOPSLA-1992-WanglerH #concept #interactive #visualisation
- Visualizing Objects: Methods for Exploring Human Computer Interaction Concepts (MFW, PH), pp. 146–153.
- TOOLS-EUROPE-1992-BaelenLSR #named #object-oriented #specification
- EROOS: An Entity-Relationship Based OO Specification Method (SVB, JL, ES, HVR), pp. 103–117.
- TOOLS-EUROPE-1992-BlakN #embedded #object-oriented #tool support
- OO Methods and Tools for Embedded Applications, The Mjolner BETA System (LB, JN), pp. 359–367.
- TOOLS-USA-1992-Mitchell #object-oriented
- Theoretical Basis of Object-Oriented Methods (JM), p. 272.
- POPL-1992-Ohori #calculus #compilation #polymorphism
- A Compilation Method for ML-Style Polymorphic Record Calculi (AO), pp. 154–165.
- ICSE-1992-Rosenblum #programming #towards
- Towards a Method of Programming With Assertions (DSR), pp. 92–104.
- HPDC-1992-BetelloRSR #clustering
- Lattice Boltzmann Method on a Cluster of IBM RISC System/6000 Workstations (GB, GR, SS, FR), pp. 242–247.
- CADE-1992-BeckertH #semantics #similarity
- An Improved Method for Adding Equality to Free Variable Semantic Tableaux (BB, RH), pp. 507–521.
- CADE-1992-Voronkov #logic #proving #standard #theorem proving
- Theorem Proving in Non-Standard Logics Based on the Inverse Method (AV), pp. 648–662.
- CSL-1992-Creignou #linear #problem #proving #satisfiability
- The Class of Problems that are Linear Equivalent to Satisfiability or a Uniform Method for Proving NP-Completeness (NC), pp. 115–133.
- IWPTS-1992-CavalliMK #automation #consistency #formal method #generative #protocol #specification #testing
- Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications (ARC, PM, SUK), pp. 237–248.
- IWPTS-1992-Witteman #consistency #experience #protocol
- Promoting the Local Test Method, GSM Protocol Conformance Test Experience (MFW), pp. 292–294.
- JICSLP-1992-Cerrito #calculus #ll #unification
- Herbrand Methods in Sequent Calculi: Unification in LL (SC), pp. 607–621.
- JICSLP-1992-FerrandD #correctness #logic programming #proving #source code
- Proof Method of Partial Correctness and Weak Completeness for Normal Logic Programs (GF, PD), pp. 161–174.
- JICSLP-1992-SatohI #abduction #evaluation #logic programming #query
- A Query Evaluation Method for Abductive Logic Programming (KS, NI), pp. 671–685.
- DAC-1991-CrastesSS
- A Technology Mapping Method Based On Perfect And Semi-Perfect Matchings (MC, KS, GS), pp. 93–98.
- DAC-1991-MogakiKSY #constraints #layout
- A Layout Improvement Method Based on Constraint Propagation for Analog LSI’s (MM, NK, NS, YY), pp. 510–513.
- DAC-1991-PapachristouCH #design #self #synthesis
- A Data Path Synthesis Method for Self-Testable Designs (CAP, SC, HH), pp. 378–384.
- DAC-1991-Woo #heuristic
- A Heuristic Method for FPGA Technology Mapping Based on the Edge Visibility (NSW), pp. 248–251.
- SIGMOD-1991-HansenU #dependence
- An Extended Memoryless Inference Control Method: Accounting for Dependence in Table-level Controls (SCH, EAU), pp. 348–356.
- SIGMOD-1991-LouO #deduction #inheritance #named #object-oriented
- LLO: An Object-Oriented Deductive Language with Methods and Method Inheritance (YL, ZMÖ), pp. 198–207.
- VLDB-1991-DenninghoffV #parallel #power of #semantics
- The Power of Methods With Parallel Semantics (KD, VV), pp. 221–232.
- VDME-1991-1-Bril #algebra #specification #using
- A Model-Oriented Method for Algebraic Specification using COLD-1 as Notation (RJB), pp. 106–124.
- VDME-1991-2-AbrialLNSS
- The B-Method (JRA, MKOL, DN, PNS, IHS), pp. 398–405.
- VDME-1991-2-GoodY #development
- Mathematical Methods for Digital Systems Development (DIG, WDY), pp. 406–430.
- AdaEurope-1991-BadaroM #ada #named #reuse
- ROSE-Ada: a Method and a Tool to Help Reuse of Ada Codes (NB, TM), pp. 304–325.
- CAiSE-1991-OrlowskaJ #algebra #relational
- A Funtional Method of Data Processing based on Relational Algebra (MEO, KGJ), pp. 98–123.
- KDD-1991-McLeishYGS #bibliography
- Discovery of Medical Diagnostic Information: An Overview of Methods and Results (MM, PY, MG, TS), pp. 477–490.
- KR-1991-Myers #integration #logic
- Universal Attachment: An Integration Method for Logic Hybrids (KLM), pp. 405–416.
- ML-1991-FawcettU #generative #hybrid
- A Hybrid Method for Feature Generation (TF, PEU), pp. 137–141.
- ML-1991-LingN #comparison
- Comparison of Methods Based on Inverse Resolution (XL, MAN), pp. 168–172.
- ML-1991-MaW #consistency #knowledge base #optimisation #performance
- Improving the Performance of Inconsistent Knowledge Bases via Combined Optimization Method (YM, DCW), pp. 23–27.
- ML-1991-TecuciM #adaptation #learning #multi
- A Method for Multistrategy Task-Adaptive Learning Based on Plausible Justifications (GT, RSM), pp. 549–553.
- ECOOP-1991-MugridgeHH #multi #programming language #static typing
- Multi-Methods in a Statically-Typed Programming Language (WBM, JH, JGH), pp. 307–324.
- OOPSLA-1991-AgrawalDL #multi #static typing #type checking
- Static Type Checking of Multi-Methods (RA, LGD, BGL), pp. 113–128.
- LOPSTR-1991-Noel #nondeterminism
- A Method for the Determinisation of Propositional Temporal Formulae (PN), pp. 276–296.
- ESEC-1991-AmadorVA #design
- Dynamically Replaceable Software: A Design Method (JA, BdV, AA), pp. 210–228.
- ESEC-1991-Berzins #modelling #source code
- Software Merge: Models and Methods for Combining Changes to Programs (VB), pp. 229–250.
- ESEC-1991-DickL #approach #formal method #visual notation
- Integrating Structured and Formal Methods: A Visual Approach to VDM (JD, JL), pp. 37–59.
- ESEC-1991-Troy #quality
- Impact of Methods on Productivity and Quality (RT), pp. 480–484.
- ICSE-1991-Craigen #formal method #tool support
- Tool Support for Formal Methods (DC), pp. 184–185.
- ICSE-1991-Gerhart #formal method #perspective
- Formal Methods: An International Perspective (SLG), pp. 36–37.
- ICSE-1991-JacobyT #evaluation #geometry #parametricity #reliability
- Parameter Value Computation by Least Square Method and Evaluation of Software Availability and Reliability at Service-Operation by the Hyper-Geometric Distribution Software Reliability Growth Model (HGDM) (RJ, YT), pp. 226–237.
- CAV-1991-FrancescoI #process #semantics
- A Semantic Driven Method to Check the Finiteness of CCS Processes (NDF, PI), pp. 266–276.
- ISLP-1991-HidakaKTT #clustering #commit #execution
- A Static Load Partitioning Method based on Execution Profile for Committed Choice Languages (YH, HK, JT, HT), pp. 470–484.
- IWPTS-1991-ArakawaS #concurrent #generative #source code #testing
- A Test Case Generation Method for Concurrent Programs (NA, TS), pp. 95–106.
- IWPTS-1991-DamKK #standard
- Text Derivation for Standardised Test Methods (HvD, HK, EK), pp. 69–82.
- IWPTS-1991-Hogrefe91a #consistency #formal method #requirements
- Session on Conformance Requirements and Test Purposes in the Context of Formal Methods (DH), pp. 289–290.
- TAV-1991-Young #formal method #question #re-engineering
- Formal Methods versus Software Engineering: Is There a Conflict? (WDY), pp. 188–189.
- DAC-1990-KuoLW #analysis #fault
- A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
- DAC-1990-MaoC #fault #testing
- A Variable Observation Time Method for Testing Delay Faults (WM, MDC), pp. 728–731.
- DAC-1990-McCormickA #analysis
- Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
- DAC-1990-PapachristouK #algorithm #linear #optimisation #scheduling
- A Linear Program Driven Scheduling and Allocation Method Followed by an Interconnect Optimization Algorithm (CAP, HK), pp. 77–83.
- DAC-1990-Soukup #algorithm #database
- Organized C: A Unified Method of Handling Data in CAD Algorithms and Databases (JS), pp. 425–430.
- PODS-1990-AbiteboulKW
- Method Schemas (SA, PCK, EW), pp. 16–27.
- PODS-1990-Yannakakis #database #graph
- Graph-Theoretic Methods in Database Theory (MY), pp. 230–242.
- SIGMOD-1990-BeckmannKSS #performance #robust
- The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles (NB, HPK, RS, BS), pp. 322–331.
- SIGMOD-1990-LometS #multi #performance
- The Performance of a Multiversion Access Method (DBL, BS), pp. 353–363.
- VLDB-1990-KitsuregawaO #database #parallel #robust
- Bucket Spreading Parallel Hash: A New, Robust, Parallel Hash Join Method for Data Skew in the Super Database Computer (SDC) (MK, YO), pp. 210–221.
- VLDB-1990-Mohan #concurrent #multi #named #transaction
- ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
- VLDB-1990-Mohan90a #commit #named #novel #transaction
- Commit_LSN: A Novel and Simple Method for Reducing Locking and Latching in Transaction Processing Systems (CM), pp. 406–418.
- VLDB-1990-SeegerK #database #performance #robust
- The Buddy-Tree: An Efficient and Robust Access Method for Spatial Data Base Systems (BS, HPK), pp. 590–601.
- LFP-1990-KiczalesR #performance
- Efficient Method Dispatch in PCL (GK, LR), pp. 99–105.
- CAiSE-1990-SmolanderTL #case study #how #tool support
- How to Combine Tools and Methods in Practice — a Field Study (KS, VPT, KL), pp. 195–214.
- ML-1990-Lehman #learning
- A General Method for Learning Idiosyncratic Grammars (JFL), pp. 368–376.
- ML-1990-UtgoffB #incremental #multi
- An Incremental Method for Finding Multivariate Splits for Decision Trees (PEU, CEB), pp. 58–65.
- SEKE-1990-ChungK #automation #programming #specification
- An Automatic Programming Method of Nonprocedural / Procedural Program Specification (MDC, YTK), pp. 222–227.
- SIGIR-1990-Egghe #formal method #information retrieval
- A New Method for Information Retrieval, Based on the Theory of Relative Concentration (LE), pp. 469–493.
- ALP-1990-Bundgen #finite #term rewriting
- Applying Term Rewriting Methods to Finite Groups (RB), pp. 332–346.
- POPL-1990-Mitchell #inheritance #towards
- Toward a Typed Foundation for Method Specialization and Inheritance (JCM), pp. 109–124.
- CADE-1990-DoughertyJ
- An Improved General E-Unification Method (DJD, PJ), pp. 261–275.
- CADE-1990-Pierce #proving #towards
- Toward Mechanical Methods for Streamlining Proofs (WP), pp. 351–365.
- CAV-1990-Godefroid #automation #partial order #using #verification
- Using Partial Orders to Improve Automatic Verification Methods (PG), pp. 176–185.
- CLP-1990-ChengER90 #functional #logic #on the #programming
- On Warren’s Method for Functional Programming in Logic (MHMC, MHvE, BER), pp. 546–560.
- CLP-1990-MuthukumarH90 #automation #definite clause grammar #independence #logic programming #parallel #source code
- The DCG, UDG, and MEL Methods for Automatic Compile-time Parallelization of Logic Programs for Independent And-parallelism (KM, MVH), pp. 221–236.
- DAC-1989-ChengY #difference #fault #memory management #performance #simulation #using
- Differential Fault Simulation — a Fast Method Using Minimal Memory (WTC, MLY), pp. 424–428.
- DAC-1989-Coppola #algorithm #analysis #logic
- New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
- DAC-1989-MaoC #fault #testing
- A Simplified Six-waveform Type Method for Delay Fault Testing (WM, MDC), pp. 730–733.
- DAC-1989-MeijsG #finite #performance
- An Efficient Finite Element Method for Submicron IC Capacitance Extraction (NPvdM, AJvG), pp. 678–681.
- DAC-1989-SaucierDP #using
- State Assignment Using a New Embedding Method Based on an Intersecting Cube Theory (GS, CD, FP), pp. 321–326.
- HT-1989-Perlman #design #development #evaluation #hypermedia
- Asynchronous Design/Evaluation Methods for Hypertext Technology Development (GP), pp. 61–81.
- SIGMOD-1989-LometS #data access #multi
- Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
- VLDB-1989-BattistaL #deduction #modelling
- A Deductive Method for Entity-Relationship Modeling (GDB, ML), pp. 13–21.
- VLDB-1989-ChangS #database
- A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
- VLDB-1989-KitsuregawaNT #hybrid
- The Effect of Bucket Size Tuning in the Dynamic Hybrid GRACE Hash Join Method (MK, MN, MT), pp. 257–266.
- VLDB-1989-RothermelM #named #transaction
- ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions (KR, CM), pp. 337–346.
- SEI-1989-ZwebenSB #testing
- Exploratory Studies of the Software Testing Methods Used by Novice Programmers (SHZ, CS, RB), pp. 169–188.
- STOC-1989-Razborov #approximate #on the
- On the Method of Approximations (AAR), pp. 167–176.
- ICALP-1989-Kenyon-MathieuV #analysis #data type
- General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (Extended Abstract) (CKM, JSV), pp. 473–487.
- FPCA-1989-Takayama #performance #proving #source code
- Extended Projection — New Method to Extract Efficient Programs from Constructive Proofs (YT), pp. 299–312.
- CHI-1989-JacksonR #named
- Circling: a method of mouse-based selection without button presses (JCJ, RJRH), pp. 161–166.
- CAiSE-1989-DahlO #development #modelling #tool support
- The Relationship between Models, Methods and System Development Tools (i.e. Case Tools and 4GL) (LD, RO).
- CAiSE-1989-Lustig #automation #how #tool support
- How CASE Tools and Methods Relate to Each Other (GL).
- CAiSE-1989-Rolland #automation #future of #modelling #on the #tool support #why
- On the Future of Modelling — Why Current CASE Tools Insist on Supporting 20 Years Old Methods and Techniques (CR).
- CAiSE-1989-StenstromS #data-driven #development #named
- SVEA — A User Driven and Data Driven System Development Method (IMS, ES).
- CAiSE-1989-Swende #architecture #data-driven #named #resource management
- IRMA — Information Resource Management Architecture: A Data-driven Method Used in Planning the Overall System Architecture (ES).
- SEKE-1989-Cooke #design #proving
- Proving Properties of Software Design Methods (DEC), pp. 9–12.
- SEKE-1989-MurataY #petri net #realtime #rule-based
- Petri Net Method for Real-Time Control of Rule-Based Systems (TM, JY), pp. 122–127.
- SIGIR-1989-ChangLL #clustering #data access #multi
- Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
- SIGIR-1989-ChristodoulakisF #data access
- File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
- ECOOP-1989-PunW #design #object-oriented #programming
- A Design Method for Object-Oriented Programming (WWYP, RLW), pp. 225–240.
- OOPSLA-1989-DixonMSV #inheritance #multi #performance
- A Fast Method Dispatcher for Compiled Languages with Multiple Inheritance (RD, TM, PS, MV), pp. 211–214.
- OOPSLA-1989-MullerRKS #interface #multi
- The Use of Multimethods and Method Combination in a CLOS Based Window System Interface (HM, JRR, JK, TS), pp. 239–253.
- POPL-1989-CytronFRWZ #performance
- An Efficient Method of Computing Static Single Assignment Form (RC, JF, BKR, MNW, FKZ), pp. 25–35.
- ESEC-1989-NorrisS #formal method
- Industrialising Formal Methods for Telecommunications (MTN, SGS), pp. 159–175.
- ICSE-1989-InoueOKT #adaptation #process
- A Formal Adaptation Method for Process Descriptions (KI, TO, TK, KT), pp. 145–153.
- ICSE-1989-PatelONB #formal method #tool support
- Tools to Support Formal Methods (SP, RAO, MTN, DWB), pp. 123–132.
- ICSE-1989-Potts #design #representation
- A Generic Model for Representing Design Methods (CP), pp. 217–226.
- NACLP-1989-Lin #backtracking #parallel #performance #random
- Expected Performance of the Randomized Parallel Backtracking Method (ZL), pp. 677–696.
- TAV-1989-Gerhart #assessment #formal method #summary
- Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems (SLG), pp. 152–155.
- TAV-1989-Hamlet #comparison #testing
- Theoretical Comparison of Testing Methods (RGH), pp. 28–37.
- DAC-1988-BergstraesserGHW #architecture #named #synthesis #tool support
- SMART: Tools and Methods for Synthesis of VLSI Chips with Processor Architecture (TB, JG, KH, SW), pp. 654–657.
- DAC-1988-GloverM #fault #generative #testing
- A Method of Delay Fault Test Generation (CTG, MRM), pp. 90–95.
- DAC-1988-GuraA #simulation
- Improved Methods of Simulating RLC Couple and Uncoupled Transmission Lines Based on the Method of Characteristics (CVG, JAA), pp. 300–305.
- PODS-1988-HaddadN
- Counting Methods for Cyclic Relations (RWH, JFN), pp. 333–340.
- VLDB-1988-FaloutsosC #comparison #data access #design #performance #scalability
- Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
- VLDB-1988-NakayamaK #using
- Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
- VLDB-1988-SeegerK #data access #design #implementation #performance
- Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
- VDME-1988-NielsenHWG #tool support
- The RAISE Language, Method and Tools (MN, KH, KRW, CG), pp. 376–405.
- VDME-1988-Ruggles88a #formal method #standard
- Formal Methods in Standards — A Report from the BCS Working Group (CR), pp. 79–85.
- LFP-1988-SussmanH #abstraction #named #tutorial
- Tutorial: Abstraction in Numerical Methods (GJS, MH), pp. 1–7.
- SIGIR-1988-Case #comprehension #how #retrieval #scalability
- How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
- SIGIR-1988-JonesdK #alloy #named #statistics
- ALLOY: An Amalgamation of Expert, Linguistic and Statistical Indexing Methods (LPJ, Cd, SK), pp. 191–199.
- SIGIR-1988-SaltonB #automation #information retrieval #on the
- On the Use of Spreading Activation Methods in Automatic Information Retrieval (GS, CB), pp. 147–160.
- ALP-1988-Comon #algebra #effectiveness
- An Effective Method for Handling Initial Algebras (HC), pp. 108–118.
- POPL-1988-GarlandG #data type #induction #reasoning
- Inductive Methods for Reasoning about Abstract Data Types (SJG, JVG), pp. 219–228.
- ICSE-1988-Itzigehl #parallel
- A Method for Asynchronous Parallelization (PRI), pp. 4–9.
- CADE-1988-MarcusR #automation #implementation #proving
- Two Automated Methods in Implementation Proofs (LM, TR), pp. 622–642.
- CSL-1988-Eder #calculus #comparison
- A Comparison of the Resolution Caculus and the Connection Method, and a new Calculus Generalizing Both Methods (EE), pp. 80–98.
- JICSCP-1988-CodognetCF88 #backtracking
- Yet Another Intelligent Backtracking Method (CC, PC, GF), pp. 447–465.
- JICSCP-1988-GotoKNC88 #garbage collection #incremental #lazy evaluation #parallel
- Lazy Reference Counting: An Incremental Garbage Collection Method for Parallel Inference Machines (AG, YK, TN, TC), pp. 1241–1256.
- JICSCP-1988-SekiI88 #evaluation #query #source code
- A Query Evaluation Method for Stratified Programs Under the Extended CWA (HS, HI), pp. 195–211.
- DAC-1987-FaroughiS #algorithm #array
- An Improved Systematic Method for Constructing Systolic Arrays from Algorithms (NF, MAS), pp. 26–34.
- PODS-1987-Marchetti-SpaccamelaPS #analysis #complexity #implementation #logic #query #worst-case
- Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
- SIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
- Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
- SIGMOD-1987-SaccaZ
- Magic Counting Methods (DS, CZ), pp. 49–59.
- VLDB-1987-HwangY #query
- An Analytical Method for Estimating and Interpreting Query Time (HYH, YTY), pp. 347–358.
- VLDB-1987-LiRW #database #performance #scalability
- A New Compression Method with Fast Searching on Large Databases (JL, DR, HKTW), pp. 311–318.
- STOC-1987-Smolensky #algebra #bound #complexity #formal method
- Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity (RS), pp. 77–82.
- VDME-1987-ChedgeyKK #ada #development #object-oriented #using
- Using VDM in an Object-Oriented Development Method for Ada Software (CC, SK, HJK), pp. 63–76.
- VDME-1987-Letschert #specification
- VDM as a Specification Method for Telecommunications Software (TL), pp. 106–109.
- HCI-CE-1987-Tominaga #specification
- A Computer Method for Specifying Colors by Means of Color Naming (ST), pp. 131–138.
- SIGIR-1987-Fagan #automation #documentation #retrieval
- Automatic Phrase Indexing for Document Retrieval: An Examination of Syntactic and Non-Syntactic Methods (JLF), pp. 91–101.
- ECOOP-1987-KristensenMMN #classification #inheritance
- Classification of Actions, or Inheritance also for Methods (BBK, OLM, BMP, KN), pp. 98–107.
- ESEC-1987-BlackSLL #development
- Translation between Pragmatic Software Development Methods (WJB, AGS, PL, PJL), pp. 357–365.
- ESEC-1987-CollbergK #implementation #multi
- A Property-Based Method for Selecting Among Multiple Implementations of Modules (CSC, MGK), pp. 193–201.
- ICSE-1987-Bjorner #development #formal method #on the
- On the Use of Formal Methods in Software Development (DB), pp. 17–29.
- ICSE-1987-Kelly #comparison #design #realtime
- A Comparison of Four Design Methods for Real-Time Systems (JCK), pp. 238–252.
- SLP-1987-Ali87 #execution #implementation #parallel #prolog
- A Method for Implementing Cut in Parallel Execution of Prolog (KAMA), pp. 449–456.
- DAC-1986-MiyoshiOSOA #design #logic #scalability #simulation
- An extensive logic simulation method of very large scale computer design (MM, YO, AS, NO, NA), pp. 360–365.
- DAC-1986-SupowitF #verification
- A new method for verifying sequential circuits (KJS, SJF), pp. 200–207.
- SIGMOD-1986-BiskupC #integration
- A Formal View Integration Method (JB, BC), pp. 398–407.
- ESOP-1986-CodognetCF #backtracking #logic programming #source code
- A Very Intelligent Backtracking Method for Logic Programs (CC, PC, GF), pp. 315–326.
- GG-1986-EngelsLS #grammarware #graph grammar #specification
- Graph Grammar Engineering: A Software Specification Method (GE, CL, WS), pp. 186–201.
- CRAI-1986-Jones #development #formal method
- Software Development Based on Formal Methods (CBJ), pp. 153–172.
- SIGIR-1986-El-HamdouchiW #clustering #documentation #using
- Hierarchic Document Clustering Using Ward’s Method (AEH, PW), pp. 149–156.
- OOPSLA-1986-BallardMW #named
- Quicktalk: A Smalltalk-80 Dialect for Defining Primitive Methods (MBB, DM, AWB), pp. 140–150.
- CADE-1986-HsiangR #proving #theorem proving
- A New Method for Establishing Refutational Completeness in Theorem Proving (JH, MR), pp. 141–152.
- CADE-1986-Plaisted
- A Simple Non-Termination Test for the Knuth-Bendix Method (DAP), pp. 79–88.
- SLP-1986-GallierR86 #horn clause #similarity
- SLD-Resolution Methods for Horn Clauses with Equality Based on E-Unification (JHG, SR), pp. 168–179.
- SLP-1986-LiM86 #execution #logic programming #parallel
- The Sync Model: A Parallel Execution Method for Logic Programming (PPL, AJM), pp. 223–234.
- DAC-1985-Barke #finite
- Resistance calculation from mask artwork data by finite element method (EB), pp. 305–311.
- DAC-1985-FinchMBS
- A method for gridless routing of printed circuit boards (ACF, KJM, GJB, GS), pp. 509–515.
- DAC-1985-HennionSC #algorithm #generative
- A new algorithm for third generation circuit simulators: the one-step relaxation method (BH, PS, DC), pp. 137–143.
- SIGMOD-1985-Faloutsos #comparison #design #performance
- Signature files: Design and Performance Comparison of Some Signature Extraction Methods (CF), pp. 63–82.
- VLDB-1985-FaloutsosC #design #query
- Design of a Signature File Method that Accounts for Non-Uniform Occurrence and Query Frequencies (CF, SC), pp. 165–170.
- FPCA-1985-Wadler85 #backtracking #exception #functional #how #lazy evaluation #pattern matching
- How to Replace Failure by a List of Successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages (PW), pp. 113–128.
- ICSE-1985-KnightA #evaluation #fault
- An Experimental Evaluation of Simple Methods for Seeding Program Errors (JCK, PA), pp. 337–342.
- DAC-1984-Blanks #array #using
- Initial placement of gate arrays using least-squares methods (JPB), pp. 670–671.
- DAC-1984-Marvik #layout #verification
- A method for IC layout verification (OAM), pp. 708–709.
- SIGMOD-1984-ChenK #network #relational #retrieval
- Combining Relational and Network Retrieval Methods (HHC, SMK), pp. 131–142.
- VLDB-1984-Bratbergsengen #algebra #relational
- Hashing Methods and Relational Algebra Operations (KB), pp. 323–333.
- LFP-1984-StoyeCN #agile #combinator #reduction
- Some Practical Methods for Rapid Combinator Reduction (WRS, TJWC, ACN), pp. 159–166.
- SIGIR-1984-RabittiZ #data access #documentation #evaluation
- Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
- ICSE-1984-Gerhart #axiom #specification
- Application of Axiomatic Methods to a Specification Analyser (SLG), pp. 441–453.
- ICSE-1984-HozumiSE #development #scalability
- A Method of Large-Scale Software Development (HH, YS, HE), pp. 520–527.
- ICSE-1984-MiliD #verification
- A System for Classifying Program Verification Methods: Assigning Meanings to Program Verification Methods (AM, JD), pp. 499–509.
- CADE-1984-CavalliC #linear #logic
- A Decision Method for Linear Temporal Logic (ARC, LFdC), pp. 113–127.
- CADE-1984-Kirchner #algorithm #equation #unification
- A New Equational Unification Method: A Generalization of Martelli-Montanari’s Algorithm (CK), pp. 224–247.
- CADE-1984-Stickel #case study #commutative #proving #theorem proving
- A Case Study of Theorem Proving by the Knuth-Bendix Method: Discovering That x³=x Implies Ring Commutativity (MES), pp. 248–258.
- SLP-1984-MiyachiKKFTY84 #database #logic
- A Knowledge Assimilation Method for Logic Databases (TM, SK, HK, KF, AT, HY), pp. 118–125.
- DAC-1983-HitchcockT #automation #synthesis
- A method of automatic data path synthesis (CYHI, DET), pp. 484–489.
- DAC-1983-RothermelM #design #using
- Routing method for VLSI design using irregular cells (HJR, DAM), pp. 257–262.
- SIGMOD-1983-JarkeK #performance #quantifier #query
- Range Nesting: A Fast Method to Evaluate Quantified Queries (MJ, JK), pp. 196–206.
- SIGMOD-1983-Lomet #performance
- A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
- ICALP-1983-AptD #axiom #logic #using
- An Axiomatization of the Intermittent Assertion Method Using Temporal Logic (Extended Abstract) (KRA, CD), pp. 15–27.
- ICALP-1983-HsiangD #proving #theorem proving
- Rewrite Methods for Clausal and Non-Clausal Theorem Proving (JH, ND), pp. 331–346.
- RE-1983-Partsch #algebra #on the #requirements
- On the Use of Algebraic Methods for Formal Requirements Definitions (HP), pp. 138–158.
- DAC-1982-AdachiKNS #design #layout #top-down
- Hierarchical top-down layout design method for VLSI chip (TA, HK, MN, TS), pp. 785–791.
- DAC-1982-CiesielskiK
- An analytical method for compacting routing area in integrated circuits (MJC, EK), pp. 30–37.
- DAC-1982-PitchumaniS #design #formal method #verification
- A formal method for computer design verification (VP, EPS), pp. 809–814.
- DAC-1982-TamminenS #data access #geometry #performance
- The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
- SIGMOD-1982-BernsteinB #calculus #performance #quantifier #relational #testing
- Fast Methods for Testing Quantified Relational Calculus Assertions (PAB, BTB), pp. 39–50.
- VLDB-1982-Leiss #database #statistics
- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.
- SCC-1982-BurkeF #fault
- A Practical Method for Syntactic Error Diagnosis and Recovery (MGB, GAF), pp. 67–78.
- SCC-1982-KrummeA #code generation
- A Practical Method for Code Generation Based on Exhaustive Search (DWK, DHA), pp. 185–196.
- LFP-1982-Hughes #combinator #implementation
- Super Combinators: A New Implementation Method for Applicative Languages (RJMH), pp. 1–10.
- SIGIR-1982-BollmannKZ #education #information retrieval #named #research
- FAKYR — A Method Base System for Education and Research in Information Retrieval (PB, EK, HZ), pp. 13–19.
- ICSE-1982-FutatsugiO #functional
- A Hierarchical Structuring Method for Functional Software Systems (KF, KO), pp. 393–402.
- ICSE-1982-Runge
- The Inspection Method Applied to Small Projects (BR), pp. 416–417.
- ICSE-1982-ShiratoriGN #communication #design #protocol
- A New Design Language for Communication Protocols and a Systematic Design Method of Communication Systems (NS, JG, SN), pp. 403–413.
- DAC-1981-HaferP #analysis #design #formal method #logic #specification
- A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
- VLDB-1981-Sakai #concept #design #transaction
- A Method for Defining Information Structures and Transactions in Conceptual Schema Design (HS), pp. 225–234.
- VLDB-1981-Schlageter #concurrent #database #distributed
- Optimistic Methods for Concurrency Control in Distributed Database Systems (GS), pp. 125–130.
- ICSE-1981-KomodaHKS #analysis #approach #modelling #requirements #using
- An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
- ICSE-1981-MoherS #re-engineering
- Methods for Improving Controlled Experimentation in Software Engineering (TGM, GMS), pp. 224–234.
- ICSE-1981-RichardsonC #analysis #reliability
- A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
- DAC-1980-GiambiasiMM #deduction #fault #simulation
- Methods for generalized deductive fault simulation (NG, AM, DM), pp. 386–392.
- DAC-1980-Miller #analysis #automation #design
- Inter-active graphic methods for automating mechanical engineering design and analyses (JMM), pp. 114–128.
- STOC-1980-Ukkonen #automaton #equivalence #realtime
- A Decision Method for the Equivalence of some Non-Real-Time Deterministic Pushdown Automata (EU), pp. 29–38.
- ICALP-1980-BergstraT #data type #equation #finite #specification
- A Characterisation of Computable Data Types by Means of a Finite Equational Specification Method (JAB, JVT), pp. 76–90.
- TFDA-1980-BundgaardS #ada #semantics
- A Denotational (Static) Semantics Method for Defining Ada Context Conditions (JB, LS), pp. 21–212.
- SIGIR-1980-McGregorM #database
- The Fact Database: A System Based on Inferential Methods (DRM, JRM), pp. 203–217.
- SIGIR-1980-Schek #database
- Methods for the Administration of Textual Data in Database Systems (HJS), pp. 218–235.
- POPL-1980-Kamin #data type #specification
- Final Data Tye Specifications: A New Data Type Specification Method (SNK), pp. 131–138.
- DAC-1979-DysartK #automation #bound #branch
- An application of branch and bound method to automatic printed circuit board routing (LD, MK), pp. 494–499.
- DAC-1979-KjelkerudT79a #logic #modelling #simulation
- Methods of modelling digital devices for logic simulation (EK, OT), pp. 235–241.
- DAC-1979-Zimmermann #design
- The MIMOLA design system a computer aided digital processor design method (GZ), pp. 53–58.
- SIGMOD-1979-BadalP #analysis #performance #semantics #validation
- Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
- VLDB-1979-KungR #concurrent #on the
- On Optimistic Methods for Concurrency Control (HTK, JTR), p. 351.
- ICALP-1979-Ukkonen #bottom-up #lr #parsing
- A Modification of the LR(k) Method for Constructing Compact Bottom-Up Parsers (EU), pp. 646–658.
- ICSE-1979-Mullery
- CORE : A Method for Controlled Requirement Expression (GPM), pp. 126–135.
- DAC-1978-AllisonG #3d #architecture #visual notation
- The three-dimensional graphical input method for architecture (HCA, DPG), pp. 133–137.
- DAC-1978-PreasG #automation #layout
- Methods for hierarchical automatic layout of custom LSI circuit masks (BP, CWG), pp. 206–212.
- VLDB-1978-FloryK #database #design #logic
- A Model and a Method for Logical Data Base Design (AF, JK), pp. 333–341.
- VLDB-1978-HuberL #information management
- Information Protection by Method Base Systems (RH, PCL), pp. 420–426.
- VLDB-1978-Kalinichenko #axiom #modelling
- Data Models Transformation Method Based on Axiomatic Data Model Extension (LAK), pp. 549–555.
- STOC-1978-Pratt #logic
- A Practical Decision Method for Propositional Dynamic Logic: Preliminary Report (VRP), pp. 326–337.
- POPL-1978-GlanvilleG #code generation #compilation
- A New Method for Compiler Code Generation (RSG, SLG), pp. 231–240.
- DAC-1977-SchulerC #fault #performance #simulation
- An efficient method of fault simulation for digital circuits modeled from boolean gates and memories (DMS, RKC), pp. 230–238.
- SIGMOD-1976-Kahn #database #design #process
- A Method for Describing Information Required by the Database Design Process (BKK), pp. 53–64.
- VLDB-1976-SenkoA #abstraction #data access #physics
- DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
- ICSE-1976-EhrenbergerRO #program analysis #verification
- Program Analysis — A Method for the Verification of Software for the Control of a Nuclear Reactor (WDE, GR, KO), pp. 611–616.
- DAC-1975-Case #evaluation #sequence #statistics #testing
- A statistical method for test sequence evaluation (GRC), pp. 257–260.
- POPL-1975-Lipton #named #process #proving #reduction
- Reduction: A New Method of Proving Properties of Systems of Processes (RJL), pp. 78–86.
- POPL-1973-Beech #on the #pl-i #standard
- On the Definitional Method of Standard PL/1 (DB), pp. 87–94.
- DAC-1972-HightowerU #agile #testing
- A method for rapid testing of beam crossover circuits (DWH, BAU), pp. 144–156.
- SIGFIDET-1972-Parker #data access #information retrieval
- File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
- SIGFIDET-1972-Smith #using
- A Method for Data Translation Using the Stored Data Definition and Translation Task Group Languages (DCPS), pp. 107–124.
- DAC-1971-Nagamine #automation #design #logic #source code
- An automated method for designing logic circuit diagnostic programs (MN), pp. 236–241.
- SIGIR-1971-HuntK #data transformation #source code
- A Heathkit Method for Building Data Management Programs (EH, GAK), pp. 117–131.
- DAC-1970-Koga
- A checking method of wiring (YK), pp. 173–177.
- DAC-1970-Quiet #automation #source code
- An automated method for producing diagnostic programs (EQ), pp. 132–137.
- DAC-1970-RockwellP #analysis #finite
- Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
- DAC-1967-Branin #analysis #network
- Computer methods of network analysis (FHBJ).
- SHARE-1964-Weindling #geometry
- A method for the best geometric placement of units on a plane (MNW).
- LISP-1963-Minsky #garbage collection
- Garbage Collector methods (MM), p. 10.